Just Click here

Friday, April 11, 2008

Ice Cold Reloaded

Ice Cold Reloaded :

The best known msn and hotmail account freezer. Works with the new hotmail settings. Hence the name reloaded.

Download

A Background Prank

You would have probably seen this on a lot of websites but if not read on it might interest you.

  1. Press The "Print Scrn" button next to scroll lock.
  2. Delete all icons from the desktop.
  3. Click start.
  4. Click run.
  5. Type 'mspaint' without quotes.
  6. Press CTRL+V.
  7. Save the picture somewhere on the hard drive.
  8. Right click on the desktop.
  9. Select propeties.
  10. Click on the desktop tab.
  11. Click browse.
  12. Select the picture and click ok.
  13. Click ok again.

Bluejacking

You will probably experiance in your life that a message has appeared on your phone saying something claiming that it is a contact. Well it isn't it is a message.

Unfortunatly we only use Pocket PC's so it won't be the same as most phones but why not buy one. You can get them on ebay for about £100.

  1. Have active sync setup.
  2. Connect it with your phone.
  3. Search the web for one.
  4. Install it on the pocket pc.
  5. Once installed open btcrawler.
  6. Click "scan".
  7. Then click on "transfer".
  8. In the first box type your message.
  9. Under it select the phone you wan't to use. (Use the plain phone eg. "K800i" or "K800i Object Push".
  10. Message appears on the phone.

The Easyiest Methoths To Get Password

Bill Gates, founder of Microsoft Corporation had made the operating system with the easyist methoths to get passwords or change them. First thing is his new cmd to change a password of another account do this:
  1. Start > run > cmd > ok.
  2. Type without the quotes 'net user acounthere newpasswordhere'.
  3. Press enter.
  4. Oh look the password has been changed.

Pograms like ophcracks live cd works search for it on google and you can get it in a flash.

The SAM file is encrypted by if you can extract the hack go onto plain-text.info to convert it into a password.

The Hacker Rules

1)Don't ever maliciously hack a system. Do not delete or modify files
unnecessarily, or intentionally slow down or crash a system.
The lone exception to this rule is the modification of system logs and
audit trails to hide your tracks.

2)Don't give your name or real phone number to ANYONE, it doesn't matter
who they are. Some of the most famous phreaks have turned narcs because
they've been busted, and they will turn you in if you give them a
chance. It's been said that one out of every three hackers is a fed, and
while this is an exaggeration, use this as a rule and you should do
fine. Meet them on a loop, alliance, bbs, chat system, whatever, just
don't give out your voice number.

3)Stay away from government computers. You will find out very fast that
attempting to hack a MilTac installation is next to impossible, and will
get you arrested before you can say "oh shit". Big Brother has infinite
resources to draw on, and has all the time it needs to hunt you down.
They will spend literally years tracking you down. As tempting as it may
be, don't rush into it, you'll regret it in the end.

4) Don't use codes from your own home, ever! Period. This is the most
incredibly lame thing i've seen throughout my life in the 'underground';
incredible abuse of codes, which has been the downfall of so many people.
Most PBX/950/800s have ANI, and using them will eventually get you
busted, without question. And calling cards are an even worse idea.
Codes are a form of pseudo-phreaking which have nothing to do with the
exploration of the telephone networks, which is what phreaking is about.
If you are too lazy to field phreak or be inventive, then forget about
phreaking.

5) Don't incriminate others, no matter how bad you hate them. Turning in
people over a dispute is a terrible way to solve things; kick their ass,
shut off their phones/power/water, whatever, just don't bust them.
It will come back to you in the end..

6) Watch what you post. Don't post accounts or codes over open nets as a
rule. They will die within days, and you will lose your new treasure.
And the posting of credit card numbers is indeed a criminal offense
under a law passed in the Reagan years.

7) Don't card items. This is actually a worse idea than using codes, the
chances of getting busted are very high.

8)If for some reason you have to use codes, use your own, and nothing
else. Never use a code you see on a board, because chances are it has
been abused beyond belief and it is already being monitored.

9) Feel free to ask questions, but keep them within reason. People won't
always be willing to hand out rare accounts, and if this is the case
don't be surprised. Keep the questions technical as a rule. Try and
learn as much as you can from pure hands on experience.

10) And finally, be somewhat paranoid. Use PGP to encrypt your files, keep
your notes/printouts stored secretly, whatever you can do to prolong
your stay in the h/p world.

11) If you get busted, don't tell the authorities ANYTHING. Refuse to speak
to them without a lawyer present.

12) If police arrive at your residence to serve a search warrant, look it
over carefully, it is your right. Know what they can and can't do, and
if they can't do something, make sure they don't.

13)If at all possible, try not to hack off your own phoneline. Splice your
neighbour's line, call from a Fortress Fone, phreak off a junction box,
whatever.. if you hack long enough, chances are one day you'll be
traced or ANI'd.
Don't believe you are entirely safe on packet-switched networks either,
it takes a while but if you scan/hack off your local access point they
will put a trace on it.

14) Make the tracking of yourself as difficult as possible for others.
Bounce the call off several outdials, or try to go through at least two
different telco companies when making a call to a dialup.
When on a packet-switched network or a local or wide area network,
try and bounce the call off various pads or through other networks
before you reach your destination. The more bounces, the more red tape
for the investigator and the easier it is for you to make a clean
getaway.
Try not to stay on any system for *too* long, and alternate your calling
times and dates.

15) Do not keep written notes! Keep all information on computer, encrypted
with PGP or another military-standard encryption program.
Written notes will only serve to incriminate you in a court of law.
If you write something down originally, shred the paper.. itty bitty
pieces is best, or even better, burn it! Feds DO trash, just like us,
and throwing out your notes complete will land in their hands, and
they'll use it against you.

16) Finally, the day/night calling controversy. Some folks think it is a
better idea to call during the day(or whenever the user would normally
use his account) as to not arouse the sysadmin's suspicion of abnormal
calling times, while others think it is better to call when nobody is
around.
This is a tough one, as there is no real answer. If the sysadmin keeps
logs(and reads over them) he will definetly think it strange that a
secretary calls in at 3 am.. he will probably then look closer and find
it even stranger that the secretary then grabbed the password file and
proceeded to set him/herself up with a root shell.
On the other hand, if you call during the time the user would normally
call, the real owner of the account may very well log in to see his
name already there, or even worse be denied access because his account
is already in use.
In the end, it is down to your opinion.
And remember, when you make a decision stick to it; remember the time
zone changes.