Just Click here

Monday, December 15, 2008

WebCam Hacking

The name of this program is called WebMSNSpy , it is used to hack into someone's webcam without notifying the other contacts . They won't know a thing that you hack into their webcams . But this program contains some viruses in it .

Download

Tuesday, December 2, 2008

Windows Movie Maker version 2.1

Microsoft has released another version of their Movie Maker software. With Movie Maker 2, you can create, edit, and share your home movies. You create movies with drag-and-drop commands, and you can edit your footage so you highlight only the best scenes. Then you can share your movie via the Web, e-mail, or CD; you can also save your movie back to the video tape in your camera to play back on a TV or on the camera itself.

Download

Wednesday, October 29, 2008

WLM - MSN Password Finder

MSN Password Finder could find any msn e-mail address , to find your password . This program contain some viruses so close the anti-virus software to work , or the anti-virus software would ruin your program ! Think before download this program .

Download

Avira AntiVir Personal -Free Antivirus

Avira AntiVir Personal - Free Antivirus is a comprehensive, easy to use antivirus program, designed to offer reliable free of charge virus protection to home-users only. Avira offers: Extensive Malware Recognition of viruses, Trojans, backdoor programs, worms, etc. Automatic incremental updates of antivirus signatures, engine and entire software. Permanent virus protection, with Virus Guard real time monitoring. Install and configuration in just a couple of steps. Virus protection against known and unknown threats, using an advanced heuristic system. Scheduler where you can set the scanner to make automatic virus scans or updates on your system. Forum and phone support, Knowledge Base with virus descriptions available on Web site. Rootkit Detection and Removal. Version 8 adds an enhanced interface, a modularized AV-search engine for improved scan performance, an integrated failsafe security system, SMTP support for AntiVir MailGuard and a new Fast Activation Tool (FACT).

Download

YouTube Downloader

It's software that allows you to download videos from YouTube and many others and convert them to other video formats. The program is easy to use, just specify the URL for the video you want to download and click the Ok! It also allows you to convert downloaded videos for iPod, iPhone, PSP, Cell Phone, Windows Media, XVid and MP3. Allows you to access YouTube videos for which you need to be 18+ years of age. Now, plays videos downloaded.

Version 2.1.7 allows you to download videos from YouTube entering the embed code, adds a new download mode, and lets users disable audio when converting.

Download

Friday, May 30, 2008

Joke Of Hacking A Website

Ok , this is just a simple java script to rearrange the things in the website.

First , go to a website that you want to fool with .

Next , copy this ( javascript: document.body.contentEditable = 'true'; document.designMode = 'on'; void 0 ) then paste it in to the URL you want to fool with , then press enter .

Then , rearrange the thing in the website you want to fool with .

NOTE : This is not hacking .

Friday, May 2, 2008

Free Calling BT Payphone

  1. Ok , Find your average payphone (Tall thing with see-through windows...) and enter...
  2. In front of you is the dial pad... Ok Beneath this is a small diagram of what and how the phone works.. Remember this place....
  3. Ok Now put your money in and dial out to whoever you want to...!
  4. Ok ... When you have finished your chatting.. Simply hit (With the palm of your hand, knee, elbow etc) the diagram underneath the dial pad sharp and hard.. Your money will then fall into the reject tray allowing you to pick it up and walk away one fone call free !!

Note: You Must Hit the machine before the coin has dropped !!

5) Simple Huh ???

Ok Here are a few hints on this method..

  1. Ok I say above hit the diagram at the end of the call.. This is the safe method as you dont really lose out either way.. But.. You can hit the phone at any time after connection, but be warned! I have had my money fall into the correct coin resovoir and the phone line cut off a couple of times
  2. DONT DO IT IN PUBLIC!! This is not a method to try on a saturday afternoon in the middle of Birmingham !!!
  3. It may take more than 1 hit so keep trying !!!

Windows Boot Killer

To kill the boot up process (kill the computer).

  1. Click start.
  2. Click run.
  3. Type cmd.
  4. Press enter.
  5. type cd\.
  6. type del ntdetect.com.
  7. exit and turn the computer off.

Thursday, May 1, 2008

Hotel PPT Tv Hacking

So, if you are sitting in your hotel, there is nothing on the 13 free channels and you really want to catch that.. eh hum new movie out right now, but you dont want to pony up the $10 or whatever they charge for pay-per-view movies... Well you are in luck! It is VERY easy to get free PPV in **MOST** Hotels. The funny thing is, you can do it a couple different ways. In the following article I will present the two most popular -- other ways are up to you to figure out!
Method One: WinTV USB2 & Laptop
Required Items

Laptop
WinTV USB (I used the WinTV USB2)
Small wrench (to unscrew coax connector)
Ok, before you can get free PPV, you need to identify a few items in your hotel room. The first being the Television Set. =) Take a look at the back of the TV and find where the coax goes into the TV. Follow that coax out FROM the TV going to the wall... If you find that this coax runs in to a mysterious "black box" before going into the wall you are in LUCK! (it is also possible that even if the coax runs straight into the wall you could still get free PPV, but I have not tested this)

Once you have identified the Blackbox, lets unscrew the Coax going from the wall to the blackbox (as you can see in the above picture, it was running to the "CABLE" location) At this point you need to hook your WinTV USB to your computer and ensure that all the required software and drivers are installed.

Using your WinTV software, have your computer scan ALL of the channels using the "cable" setting. You will of course find the 13 "free channels" that you had before, but then something interesting will happen... In the higher channels you will find the PPV.. Hurray!

Apparently (and someone please correct me if you have more info) the key lies in the black box. When you order a PPV movie on your tv using your remote, the blackbox communicates with a backend PVR which tells the blackbox to tune to a specified channel -- and then the PVR plays this movie on said channel. I have found in my testing (and chatting with others) that depending on the system, you may be at the mercy of your fellow hotel guests at what you will be watching. Meaning that someone will have had to order a movie in order for it to be playing...

Now at this time, you are watching TV on your laptop... An enterprising hacker might route it back out to the TV via the RCA inputs.. hehe..


The second way of "Testing Hotel Televison Security" is using a very special tool called a "Universal Remote" You can find these tools at several locations, however the one we will be discussing will be the RCA 4-n-1 Univeral remote available from Radio Shack for $12.99 or less. We are now going to use our Universal remote to access internal "private channel lists" to remove the block on certain channels.

Program your remote with the code: 000
If this doesnt work, you may need to do some fiddling around to locate the correct code, but in my testing I have found that it works most of the time.

Once you have programmed your remote follow these steps:

Press the "Menu" button to access the Administration menu on the TV.
Using the channel and volume keys, navigate to the "Channel List" option.
Using the Left/Right buttons change to Channel List B. (we will be screwing with Channel list B so we can flip back to channel list A to restore it back to normal functionality.
Once you have Channel List B selected, arrow down to "Channel memory". Now you can use the up and down arrows to tune all channels.. You want to "STORE" the channels you find of course. Hurray again, free PPV!

Friday, April 11, 2008

Ice Cold Reloaded

Ice Cold Reloaded :

The best known msn and hotmail account freezer. Works with the new hotmail settings. Hence the name reloaded.

Download

A Background Prank

You would have probably seen this on a lot of websites but if not read on it might interest you.

  1. Press The "Print Scrn" button next to scroll lock.
  2. Delete all icons from the desktop.
  3. Click start.
  4. Click run.
  5. Type 'mspaint' without quotes.
  6. Press CTRL+V.
  7. Save the picture somewhere on the hard drive.
  8. Right click on the desktop.
  9. Select propeties.
  10. Click on the desktop tab.
  11. Click browse.
  12. Select the picture and click ok.
  13. Click ok again.

Bluejacking

You will probably experiance in your life that a message has appeared on your phone saying something claiming that it is a contact. Well it isn't it is a message.

Unfortunatly we only use Pocket PC's so it won't be the same as most phones but why not buy one. You can get them on ebay for about £100.

  1. Have active sync setup.
  2. Connect it with your phone.
  3. Search the web for one.
  4. Install it on the pocket pc.
  5. Once installed open btcrawler.
  6. Click "scan".
  7. Then click on "transfer".
  8. In the first box type your message.
  9. Under it select the phone you wan't to use. (Use the plain phone eg. "K800i" or "K800i Object Push".
  10. Message appears on the phone.

The Easyiest Methoths To Get Password

Bill Gates, founder of Microsoft Corporation had made the operating system with the easyist methoths to get passwords or change them. First thing is his new cmd to change a password of another account do this:
  1. Start > run > cmd > ok.
  2. Type without the quotes 'net user acounthere newpasswordhere'.
  3. Press enter.
  4. Oh look the password has been changed.

Pograms like ophcracks live cd works search for it on google and you can get it in a flash.

The SAM file is encrypted by if you can extract the hack go onto plain-text.info to convert it into a password.

The Hacker Rules

1)Don't ever maliciously hack a system. Do not delete or modify files
unnecessarily, or intentionally slow down or crash a system.
The lone exception to this rule is the modification of system logs and
audit trails to hide your tracks.

2)Don't give your name or real phone number to ANYONE, it doesn't matter
who they are. Some of the most famous phreaks have turned narcs because
they've been busted, and they will turn you in if you give them a
chance. It's been said that one out of every three hackers is a fed, and
while this is an exaggeration, use this as a rule and you should do
fine. Meet them on a loop, alliance, bbs, chat system, whatever, just
don't give out your voice number.

3)Stay away from government computers. You will find out very fast that
attempting to hack a MilTac installation is next to impossible, and will
get you arrested before you can say "oh shit". Big Brother has infinite
resources to draw on, and has all the time it needs to hunt you down.
They will spend literally years tracking you down. As tempting as it may
be, don't rush into it, you'll regret it in the end.

4) Don't use codes from your own home, ever! Period. This is the most
incredibly lame thing i've seen throughout my life in the 'underground';
incredible abuse of codes, which has been the downfall of so many people.
Most PBX/950/800s have ANI, and using them will eventually get you
busted, without question. And calling cards are an even worse idea.
Codes are a form of pseudo-phreaking which have nothing to do with the
exploration of the telephone networks, which is what phreaking is about.
If you are too lazy to field phreak or be inventive, then forget about
phreaking.

5) Don't incriminate others, no matter how bad you hate them. Turning in
people over a dispute is a terrible way to solve things; kick their ass,
shut off their phones/power/water, whatever, just don't bust them.
It will come back to you in the end..

6) Watch what you post. Don't post accounts or codes over open nets as a
rule. They will die within days, and you will lose your new treasure.
And the posting of credit card numbers is indeed a criminal offense
under a law passed in the Reagan years.

7) Don't card items. This is actually a worse idea than using codes, the
chances of getting busted are very high.

8)If for some reason you have to use codes, use your own, and nothing
else. Never use a code you see on a board, because chances are it has
been abused beyond belief and it is already being monitored.

9) Feel free to ask questions, but keep them within reason. People won't
always be willing to hand out rare accounts, and if this is the case
don't be surprised. Keep the questions technical as a rule. Try and
learn as much as you can from pure hands on experience.

10) And finally, be somewhat paranoid. Use PGP to encrypt your files, keep
your notes/printouts stored secretly, whatever you can do to prolong
your stay in the h/p world.

11) If you get busted, don't tell the authorities ANYTHING. Refuse to speak
to them without a lawyer present.

12) If police arrive at your residence to serve a search warrant, look it
over carefully, it is your right. Know what they can and can't do, and
if they can't do something, make sure they don't.

13)If at all possible, try not to hack off your own phoneline. Splice your
neighbour's line, call from a Fortress Fone, phreak off a junction box,
whatever.. if you hack long enough, chances are one day you'll be
traced or ANI'd.
Don't believe you are entirely safe on packet-switched networks either,
it takes a while but if you scan/hack off your local access point they
will put a trace on it.

14) Make the tracking of yourself as difficult as possible for others.
Bounce the call off several outdials, or try to go through at least two
different telco companies when making a call to a dialup.
When on a packet-switched network or a local or wide area network,
try and bounce the call off various pads or through other networks
before you reach your destination. The more bounces, the more red tape
for the investigator and the easier it is for you to make a clean
getaway.
Try not to stay on any system for *too* long, and alternate your calling
times and dates.

15) Do not keep written notes! Keep all information on computer, encrypted
with PGP or another military-standard encryption program.
Written notes will only serve to incriminate you in a court of law.
If you write something down originally, shred the paper.. itty bitty
pieces is best, or even better, burn it! Feds DO trash, just like us,
and throwing out your notes complete will land in their hands, and
they'll use it against you.

16) Finally, the day/night calling controversy. Some folks think it is a
better idea to call during the day(or whenever the user would normally
use his account) as to not arouse the sysadmin's suspicion of abnormal
calling times, while others think it is better to call when nobody is
around.
This is a tough one, as there is no real answer. If the sysadmin keeps
logs(and reads over them) he will definetly think it strange that a
secretary calls in at 3 am.. he will probably then look closer and find
it even stranger that the secretary then grabbed the password file and
proceeded to set him/herself up with a root shell.
On the other hand, if you call during the time the user would normally
call, the real owner of the account may very well log in to see his
name already there, or even worse be denied access because his account
is already in use.
In the end, it is down to your opinion.
And remember, when you make a decision stick to it; remember the time
zone changes.