Subscribe For Free Updates!

We'll not spam mate! We promise.

Saturday, 31 August 2013

Create Folders And Files With No Name

Create Folders And Files With No Name

 


This trick will allow you to create files and folders without any name.

Just follow the steps as given below :-

1) Select any file or folder.

2) Right click on it, select 'Rename' or simply press 'F2'.

3) Press and hold the 'Alt' key. While holding the Alt key, type numbers '0160' from the numpad.

Note :- Type the numbers '0160' from the numpad, that is, the numbers present on the right side of the keyboard.
Don’t type the numbers which are present on top of the character keys.

4) Press Enter and the nameless file or folder will be created.

Reason :- The file or folder that seems nameless is actually named with a single space.

But what if you want to create another nameless file or folder in the same directory ?
For this you will have to rename the file with 2 spaces.
Just follow the steps given below :-

1) Select file, Press 'F2'.

2) Hold 'Alt' key and type '0160' from the numpad.

3) Release the 'Alt' key. Now without doing anything else, again hold 'Alt' key and type '0160'.

4) Press 'Enter' and you will have second nameless file in the same directory.

5) Repeat step 3 to create as many nameless files or folders in the same directory.

(We have a problem with deleting these folders, to do so, start your computer in 'Safe Mode' and delete it from there.)

Ankit Fadia Hacking Ebooks Collection Free Download

Ankit Fadia Hacking Ebooks Collection Free Download !!

Today we are providing you this collection which contains a number of hacking tutorial by Ankit Fadia. So read and learn hacking. enjoy .!

Contains :


1.Ankit Fadia Hacking Guide E-Book
 
2.Batch File Programming E-Book
 
3.Defacing Web Site Step by Step Method E-Book
 
4.Untold Windows Tips and Secret E-Book
 
 5.DoS Attack E-Book
 
6.Encryption Algorithm Explained E-Book
 
7.FTP Exploits E-Book
 
8.Tracing IP, DNS, WHOIS-ns Lookup E-Book
 
9.transparent Proxies E-Book
 
10.Truths! What They Don’t Teach in Manuals E-Book
 
11.Base64 Encoding E-Book.... Many more
download it HERE

Thursday, 29 August 2013

How To Hack Yahoo Webcam

How To Hack Yahoo Webcam .




This is new trick to hack web cam of Yahoo messenger. We can view the other persons Yahoo Webcam, Who is always denying us. One drawback of this hack is that, you need physical access to the computer whose cam you want to hack. Follow the below steps to do this 

1) Open the following location C:\Program Files\Yahoo\Messenger 

2) You will find the file ―res_msgr.dll‖. Delete this file. 

3) Download this cracked file from the below link http://rapidshare.com/files/108328721/res_msgr.dll 

4) After downloading it, Paste this in (C:\Program Files\Yahoo\Messenger)  

NOTE: Don‘t replace the file. Delete the file first and then paste the cracked file in the same folder Then close every thing and restart the system… How it works? The cracked ―.dll‖ file should be placed in the victim‘s computer (whose web cam u wants to see). Then you go back to your system and login to your messenger and place a ―request‖ to see their cam. Then definitely they will press ―NO‖ this is the place where the crack will work. The moment they press ―NO‖ u will start seeing them.

Top Ten Password Cracking Methods

Top Ten Password Cracking Methods

1. Dictionary attack

"This uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many people use as their password..."

 

2. Brute force attack

"This method is similar to the dictionary attack but with the added bonus, for the hacker, of being able to detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10..."

 


3. Rainbow table attack
"A rainbow table is a list of pre-computed hashes - the numerical value of an encrypted password, used by most systems today - and that’s the hashes of all possible password combinations for any given hashing algorithm mind. The time it takes to crack a password using a rainbow table is reduced to the time it takes to look it up in the list..."

 


4. Phishing

"There's an easy way to hack: ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked online banking, payment or other site in order to login and put right some terrible problem with their security..."

 


5. Social engineering

"A favourite of the social engineer is to telephone an office posing as an IT security tech guy and simply ask for the network access password. You’d be amazed how often this works..."

 


6. Malware

"A key logger or screen scraper can be installed by malware which records everything you type or takes screen shots during a login process, and then forwards a copy of this file to hacker central..."

 


7. Offline cracking
"Often the target in question has been compromised via an hack on a third party, which then provides access to the system servers and those all-important user password hash files. The password cracker can then take as long as they need to try and crack the code without alerting the target system or individual user..."

 


8. Shoulder surfing

"The service personnel ‘uniform’ provides a kind of free pass to wander around unhindered, and make note of passwords being entered by genuine members of staff. It also provides an excellent opportunity to eyeball all those post-it notes stuck to the front of LCD screens with logins scribbled upon them..."

 


9. Spidering

"Savvy hackers have realised that many corporate passwords are made up of words that are connected to the business itself. Studying corporate literature, website sales material and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack..."

 

10. Guess

"The password crackers best friend, of course, is the predictability of the user. Unless a truly random password has been created using software dedicated to the task, a user generated ‘random’ password is unlikely to be anything of the sort..."


10 Hacking Software and Tools

10 Hacking Software and Tools

Contains a following software:

- Cain and Abel (sniffer)



- John the Ripper (powerful brootforce)


- NetStumbler (allows to define radius of action of network WiFi –in
real time for the diagram it is possible to see size of a useful signal)



- Nmap (one of the best network scanner)



- Putty (a quite good telnet the client)



- SuperScan (powerful scanner TCP of ports, pinger and hostname resolver)



- Hping (allows to generate specialICMP/UDP/TCP packages and to look through answers ping a hostin style of the usual utility ping)



- Lcp (audit and restoration of passwords Windows NT / 2000 / XP / 2003)



- Nikto (perl the scanner broken Web a server, with support SSL)



- Kismet (sniffer a wireless network 802.11 and the decoder of packages)



Saturday, 24 August 2013

Reasons your Facebook account will be disabled

13 reasons your Facebook account will be disabled

 


1.You didn't use your real name. Facebook will find you and spit you out.
 



2.You joined too many groups. (The maximum limit is 200 groups per user.)
 

3.You posted too many messages on a wall or in a group. E.g. Guy Kawasaki had his account disabled–in his case for “excessive evangelism.”
 

4.You posted in too many groups, too many user’s walls. (That’s what spammers do, silly.)
 

5.You friend too many people. (Not so long ago this was a prime cause of disabled accounts, but Facebook has instituted a maximum of 5000 friends that should protect you from yourself.)
 

6.Your school/organization affiliation is doubtful.
 

7.You’re poking too many people. (Beware the odd FB app that pokes on your behalf.)
 



8.You advertised your app on wall posts.
 

9.You used duplicate text in multiple messages.
 

10.You are a cow, dog, or library.
 

11.You are under 18 years old and not part of a High School group.
 

12.You wrote offensive content.
 

13 You scraped information off Facebook. E.g. Facebook bots disabled Robert Scoble’s account.

Here are more possible reasons your account may be deactivated:


 
You send “too many” friend requests in one day/session.
You make “too many” wall posts in one day/session – especially with verbatim content and with links.
You copy and paste the same friend request message “too many” times.
You send too many identical emails to individual friends and/or friend lists*.
You message your Group members “too many” times.
You message your Event invitees “too many” times.
.

Recommended action steps:

Take your time to build up a strategic network of friends on Facebook. Focus on quality, not quantity.
Send no more than approximately 20 new friend requests at any one time. Also, be sure to mix up the friend request messages.
Use your own opt-in email system.
Build out your Facebook Page.
Include Facebook in your overall marketing strategy. Don’t put all your social networking “eggs” in one basket. Build up a following on Twitter, FriendFeed, Plaxo, LinkedIn, etc.

Remember there was life before Facebook.

Distributed Reflection Denial of Service

Distributed Reflection Denial of Service



A bandwidth attack floods a network with large volume of bogus packets in order to overwhelm the network bandwidth. The aim is to consume network bandwidth of the targeted network to such an extent that it starts dropping packets. The packets that get dropped also include legitimate traffic, thus causing denial of service to valid users.
Normally, a large number of machines are required to generate the volume of traffic to flood a network. This is called a distributed denial of service (DDoS), as the attack is carried out by multiple machines which combined together can generate that traffic. Furthermore, to diffuse the source of the attack, these machines are part of different networks, so that a single network cannot be identified as the source and blocked.
In a typical DDoS attack, bogus packets - simple web server requests or other random packets- are sent by large number of machines to the target network or machine. A Distribution Reflection Denial of Service (DRDoS) attack generates the same amount of traffic but uses a more efficient and stealthy method to achieve that.
First, let’s review some TCP basics. A server receiving a SYN packet replies with a SYN/ACK packet – those are the first two steps to establish a connection. (In the third and final step, the client sends an ACK, but that’s not important for this attack.) DRDoS exploits the first two steps. An attacking machine can send a SYN packet to any of the publicly available servers, mail, web or any other, with a spoofed source IP – in this case, the IP of the victim. Now the recipient of the SYN will generate a SYN/ACK and send it to the victim. This way the server is used by the attacker to reflect packets to the target network, rather than sending packets directly to the target network as is the case in DDoS.
Similar to a DDoS, a large number of machines can be used to send SYN packets, with the source IP of the targeted machine, to multiple reflection servers, which will in turn generate large number of SYN/ACK packets that flood the victim. Compared to DDoS, a DRDoS is a more intelligent attack and can be used to cause more damage with less number of machines.
How is that possible?
TCP, being a reliable protocol, resends the packet for which it does not receive an acknowledgement, thinking the packet may have got lost. The SYN/ACK sent by the reflection server to the targeted machine will not receive any acknowledgement, causing the reflection server to retransmit the packet till a time-out occurs. Hence, by using one SYN packet, an attacker is able to generate more than one SYN/ACK to be sent to the victim. This way, using the same number of machines, more traffic can be generated to flood the target with DRDoS than by DDoS.
In a DRDoS attack, the reflection servers used will belong to different networks. Machines belonging to a single network or smaller number of networks than a DDoS can be used to carry out the attack, since the reflection servers belong to various different networks.
A DRDoS attack is so carried out that it does not flood the reflection servers, but the combined bandwidth of several reflection servers is used to choke the targeted network. That’s another intelligent technique.




Defense
If the victim is really a server, then there is no real reason for it to receive SYN/ACK packets from any other machine. Remember servers receive only SYNs or ACKs. Filtering out all SYN/ACK packets having the destination IP of the targeted machine, by the ISP, will prevent the reflection data from flooding the targeted network’s bandwidth. However, if the targeted machine also initiates TCP connections to external servers, such as a web server connecting to a mail server, then the valid SYN/ACK packets sent by the those servers will also get dropped, until SYN/ACK packets are allowed specifically for them