Wednesday, 31 March 2010
Hacking Gmail Account
Hacking Gmail Account
Often i get emails from people asking me How to Hack Gmail or Orkut Accounts, or they say ' Please can you hack an Gmail account for me'!. So i thought of making a step by step Gmail Hacking tutorial for newbies. In this tutorial i will show you two working techniques to Hack gmail accounts. To know more about hacking emails read this thread.1- Register an account in any of free web-hosting website that offer php and ftp servers , http://www.freetzi.com...
How To Hack Email ! ?
How To Hack Email ! ?
If you have ever downloaded and executed any email hacking software's ! then chances are you got backdoored or its a worm. there is no such softwares which hacks email for you. to hack emails you must penetrate into websites database where they store password hashes of email accounts, its not an easy task but its not impossible. but building a tool to bypass security fields of a web server is something unimaginable and i am pretty sure that at present there is no such software in market. well but if i say that hacking emails are impossible then i might go wrong, there are few ways you can hack an email, you might not succeed everytime but its possible. In brief i am going to tell few ways how you can hack
PHISHING : While reading...
All About Firewall
All About Firewall
What is a Firewall?
A firewall is a tool that monitors communication to and from your computer. It sits between your computer and the rest of the network, and according to some criteria, it decides which communication to allow, and which communication to block. It may also use some other criteria to decide about which communication or communication request to report to you (either by adding the information to a log file that you may browse whenever you wish, or in an alert message on the screen), and what not to report.
What Is It Good For?
Identifying and blocking remote access Trojans. Perhaps the most common way to break into a home computer and gain control, is by using a remote access Trojan (RAT). (sometimes it is called...
How to block spams on gmail:
How to block spams
on gmail:
1. Block image spam
As the webmail filters get better, spam also evolves and becomes harder to block. This is particularly true when it uses images and literary texts. Here's a simple Gmail trick to divert spam messages (contain images) to the Trash folder (or any folder you specify) automatically.
Step 1: Firstly you need to go to 'Settings > Filters' and choose "Create a Filter".
Step 2: Type 'multipart/related .gif'...
Convert Text To Speech
Convert Text To SpeechCarryoutText is an easy to use service that converts your text to a MP3 file. It converts English text to a downloadable MP3 file that you can listen at the computer or with your MP3 player.
Convert Text into Downloadable MP3 Audio
You can use your commute time more productively by converting your blogs, news articles and any other text to an audio file that can be played on your IPod or your favorite MP3 player. Students can also use it for their...
Access Control Changer – Full control of Files & Folders
Access Control Changer – Full control of Files & Folders
Access denied errors are quiet common when we try to access files or folders from one user account to the other on the same system or, when permissions for the folders are set set to disallow you to open some files or folders.
We often create different user accounts on our system, but receiving such errors can be quiet annoying at times when it is urgent to access important file...
Monday, 29 March 2010
Iexpress file joiner, exe binder, exe packer to hack remote computer

Iexpress file joiner, exe binder, exe packer to hack remote computer
.Iexpress File joiner exe binder:
Just follow guidelines below to use Iexpress file joiner exe binder windows utility.
1. Go to Start -> Run (Can also press shortcut key Win+R). In dialog box, enter- iexpress and hit on OK to bring up File joiner.
2. Now, you will get something like:
3. Hit on Next twice and then on Package title pane, enter the name of exe package you want to create...
Monday, 22 March 2010
How to scan a target for open ports and services using Netcat, SuperScan, Strobe
How to scan a target for open ports and services using Netcat, SuperScan, Strobe
Netcat: The netcat application has many uses; one is the ability to scan a target for open ports and services. Another utility, cryptcat, is almost identical except that it operates with encryption.
From a DOS prompt, type the following with the syntax of:
Other useful commands for Netcat
The –v option instructs netcat to run in verbose mode, allowing you to see the progress of the scan.The –r option instructs...
How to Identify CGI Vulnerabilities using TCS CGI Scanner
How to Identify CGI Vulnerabilities using TCS CGI Scanner
The TCS Common Gateway Interface (CGI) Scanner application is designed to find targets that have vulnerable CGI Script errors. These errors are normally due to systems that have not been patched or updated.
Click to highlight the default target of htpp://www.tpp.ru and click on the at the top left of the application to delete the current target.
On the gray bar along the top left of the application, enter the IP address or hostname...
IP Spoofing Attack
IP Spoofing Attack Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication. IP Spoofing
Every computer connected to Network have its unique IP address. When Person A sends an email to person B, The mail is assigned with the header which contains the IP’s of sender and Reciver so that mail can go to the same person B and not to some one else. Now...
How To Crash Small Websites (NOOB FRIENDLY)
How To Crash Small Websites (NOOB FRIENDLY)
Ok so your friend or your enemy has made a little shitty website for whatever maybe a private server or anything.. And your feeling devious and want to crash it . TOOLS: >>Port Scanner<< >>rDos<< >>HotSpotSheild Proxy!<< Step One: First we need to find the websites IP Adress. This is very easy todo. Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press...