Spread Firefox Affiliate Button

Hack Passwords Using USB Drive!

Today I will show you how to hack Passwords using an USB Pen Drive.
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc.
Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox, chrome etc. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer.

We need the following tools to create our rootkit:

==================


MessenPass:

Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView:

Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

Posted on 7/22/2009 08:18:00 PM by ket@n and filed under | 0 Comments »

School life Vs College life

School life Vs College life


School: 1 colored dress for 100s of days
College: 100 colored dresses for 1 day

School: 2 note books for 1 subject
College: 1 notebook for all subjects

School: white pipe in teacher's hand (chalk)
Coll: white pipe in student's hand (cigarette)

School: Most frequent letter-Leave letter
College: Most frequent letter - Love letter

School: if we go itz boring
college :if we dont go its boring

SO ENJOY...........
Posted on 7/17/2009 11:05:00 PM by m@yur and filed under | 0 Comments »

Hack this Website

www.smsintegra.com

This website is used to send sms through internet.I will tell you how to hack any paid user of this site.


^change the red part with any username.. u want to find the pass, eg. - mohit ,raj, etc....



  • One page will open to change password (don't change the password) just right click then click on View source.

  • Then press "Ctrl+f " or simply find
    ID="password" value="
    continued..
Posted on 7/11/2009 07:38:00 PM by ket@n and filed under , , | 1 Comments »

firefox features n short tricks

Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.

But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.

1) More screen space. Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.

2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.....
Posted on 7/02/2009 08:27:00 PM by m@yur and filed under | 0 Comments »

What are Trojans?

What is a trojan?
A trojan horse could be either:
a) Unauthorized instructions contained within a legitimate program. These instrcutions perform functions unknown to (and probably unwanted by) the user.
b) A Useful program that has been altered by the placement of unauthorized instructions within it.
These instructions perform functions unknown to (and probably unwanted by) the user.
c) Any program that appears to perform a desirable and necessary function but that (because of
unauthorized instructions within it) performs functions unknown to (and probably unwanted by) the user.

Under a restricted environment (a restricted Unix shell or a restricted Windows computer), malicious trojans can't do much, since they are restricted in their actions. But on a home PC, trojans can be lethal and quite destructive.
Posted on 6/18/2009 12:26:00 AM by ket@n and filed under , | 0 Comments »

♫► SAY NO TO PIRACY GET THESE FREE SOFTWARES◄♫

I am sure at some stage we all are guilty of using Pirated Software. There has been so much reported and discussed about this in recent years that it has got me thinking — Do We Really Need Pirated Software?
The conclusion I have come to is NO!
Let us first of all examine briefly what Piracy is all about?
I found this on Autodesk site and it sums up the matter quite excellently in the first 4 points, which are reproduced below:

1. What is software “piracy”?
Software “piracy” is the unauthorized possession and/or use of software. It is a crime no different from shoplifting software from store shelves. Purchasers of software do not actually own the software. What they own is the right to use the software according to the terms of the publisher’s license. Purchasers agree to abide by the terms of the license, which typically limits copying privileges to a single copy for backup purposes.
All legal software is supplied with a license. This applies whether the software is acquired for use on one machine, for networking across a number of machines, or if it is pre-installed as part of a system. The license is designed to protect the rights of software developers and is enforced by copyright laws.
Piracy may take many forms, including:
* unauthorized copying of software programs purchased legitimately, also known as “end-user” piracy. This can occur when the number of PCs installed with the software exceeds the licenses that an individual or company has purchased;
* gaining illegal access to protected software, also knwn as “cracking”; nd
* reproducing and/or distributing counterfeit or unauthorized software, often over the counter, or sold, bartered, or shared by individuals on the Internet; and software programs pre-installed by vendors who sell computers without providing the accompanying software license.

2. What is the difference between criminal and civil software piracy?
The majority of software piracy is....
Posted on 6/14/2009 07:02:00 PM by ket@n and filed under | 0 Comments »

What is a virus?


A VIRUS is a small, executable program with the ability to replicate itself by adding its code to that of a host program or the system area of a hard disk. The user is generally unaware of the actions of a virus as it replicates and usually only becomes aware of its presence when the virus 'activates', which it does according to a given set of conditions.Once the user knows what signs to look for, it can be very obvious when viral activity occurs... Let's discuss the difference between viruses.....

Every virus has its own personality. Viruses differ in many ways, each having its own unique properties that make it different. Here are some ways that viruses differ from each other:
  • SIZE - A virus can be as small as 66 bytes or less, or as large as 4096 bytes or more. Compared to most computer programs a virus must be very small.
  • METHOD OF INFECTION - A virus can infect the host program in different ways. Below are three methods commonly used. They are by no means the only ways, but they are the most common. It is possible for a virus to use one or more of these methods.
  1. OVERWRITING - When a virus infects using this method, it will simply write a copy of itself over the begining of the host program. This is a very simple method and is used by more primitive viruses.  Overwriting tends to make the user suspicious because the host program no longer functions. This method of infection causes no change in the size of an infected program.
  2. APPENDING - This method is a bit more complex. The virus appends itself onto the end of the host program and also edits the begining of the program. When the user runs the infected program ....
Posted on 5/20/2009 11:40:00 PM by ket@n and filed under | 0 Comments »