New Post

Rss

Wednesday, February 24, 2010
Word, Excel, Office, PDF, Rar Password Cracker 2010

Word, Excel, Office, PDF, Rar Password Cracker 2010





Word, Excel, Office, PDF, Rar Password Unlocker 2010
Great build for all situations, it collected for the utility to recover passwords office applications and archives. More details ....

Word Password Unlocker 4.0

Word Password Unlocker-effective tool for recovering passwords to documents of Microsoft Word.
Lost a password for opening a document of Microsoft Word? Lost a password for saving changes to a document? For WORD Password Recovery is not a problem! This small tool will be able to make your job easier both at home and in the office!

Features:
* Recovery of passwords for all versions of Microsoft Word from 97 to 2007
* Recovers the password to open a Word file
* Removes the password to open and edit documents
* Fast recovery of passwords in precision
* Allows users to customize the mask the password, if known to any part of the password

Excel Password Unlocker v4.0

Excel Password Unlocker - eliminates passwords with sheets of Excel. If you are faced with the problem of editing protected pages
Microsoft Office Excel, you will appreciate the need to use this program. Excel Unlocker enables you to change the password to the worksheet in your Excel Workbook, thus obtaining access to the opportunities that have been closed by someone through negligence or willful misconduct later, or that you yourself have closed, and the password is successfully forgotten.

Office Password Unlocker v4.0

Office Password Unlocker-a program for the return of passwords for Office. The program returns the passwords to MS Word and MS Excel quickly, easily and efficiently. This program supports three types of attack to guarantee you receive it. Also, you can not only view a document after you receive it, as well as edit dokument.Prosto show the path to the application Office, you want to decrypt, and then click "Start" and the program itself will do its job. The program is very easy to use and does not require any special skills, so that even a child can safely handle it.

With three modes of cracking the password, the program works fast and effectively. This program will automatically perform a complete scan of the document and will look for the password until it finds the result. The main characteristic of the program is that the program is developing a special scheme for each password cracking. For example, you can choose to brute-force, if anything at all do not remember or do not know about the password. Also, you can choose to brute-force with a hidden attack, if you remember at least a piece of the password, for example length. If you are sure that you know most of the password, you can try to attack mode reference.

Features:
• Recovers the password for opening documents.
• Removes the password to open and modify the document.
• Support to recover passwords for Word, Excel, PowerPoint and Access.
• Support for all versions of Office from 97 to 2007.
• The ability to minimize recovery time, if known, any feature of the password.

Features:
• Three modes of cracking:
- Brute-force - if anything at all do not remember or do not know the password
- Brute-force with a hidden attack - if you remember at least a piece of the password, for example the length of
- Background mode of attack - if you think you know most of the password
• High-speed cue. Full support for multicore processors.
• The ability to create their own databases and dictionaries.
• Ability to stand prioretit processor to improve performance.
• Automatic saving of the recovery process and resume if accidentally stopped.
• Turn off the computer after the recovery.
• Convenient and easy to use interface.

PDF Password Unlocker v4.0

PDF Password Unlocker-it is an effective program to recover passwords encrypted Adobe Acrobat PDF documents. This is the easiest-to-use program to recover passwords and return program that allows you to not only open the encrypted PDF files and edit them and perform actions such as selecting text and graphics, add or edit comments, copied to the clipboard, change the contents of the document raspechatyvat.Prosto and show the path to Adobe Acrobat PDF, which you want to decrypt and click "Start" button and the program itself will do its job. The program is very easy to use and does not require any special skills, so that even a child can safely handle it.

With three modes of cracking the password, the program works fast and effectively. This program will automatically perform a complete scan of the document and will look for the password until it finds the result. The main characteristic of the program is that the program is developing a special scheme for each password cracking. For example, you can choose to brute-force, if anything at all do not remember or do not know about the password. Also, you can choose to brute-force with a hidden attack, if you remember at least a piece of the password, for example length. If you are sure that you know most of the password, you can try to attack mode reference.

Features:
• Support for creating PDF documents in Adobe and other applications.
• Recovers the password for opening documents.
• The speed above nearly doubled compared with similar programs.
• The rate of selection of the 4,000,000 options in the second for single-prosessorov and to 8,000,000 in the second for multi-core.

Features:
• Three modes of cracking:
- Brute-force - if anything at all do not remember or do not know the password
- Brute-force with a hidden attack - if you remember at least a piece of the password, for example the length of
- Background mode of attack - if you think you know most of the password
• Support for Adobe PDF versions from 3.x to 9.X.
• Support for PDF files created by other applications.
• Gives the opportunity to remove restrictions on copying, printing, etc. ..
• Supports 40-bit RC4 ,128-bit RC4 ,128-bit AES and 256-bit encryption AES.
• The ability to minimize recovery time by adjusting, if known to any part of the password.
• Ability to create your own vocabulary.
• Automatic saving of the recovery process and resume if accidentally stopped.
• Convenient and easy to use interface.

Rar Password Unlocker v3.2

Rar Password Unlocker-program that allows to quickly reveal any zaporoleny archives, including SFX-archive (self-extracting) with an arbitrary length password (both digital and alphanumeric content) and file size not more than 3 GB. Works with any of the ways to encrypt the contents of RAR-archive (with encrypted / unencrypted file names). It has a large number of settings and options that allow the most rapidly and effectively to achieve the desired result.

Hacking is done by removing the password from the registry backup. This method does not require daily or even annual expectations, depending on other programs, burglary in which the method of enumeration values. This program was developed by a foreign company Haksoft and recently hit the market in Russia (July 2008), gaining a huge popularity from domestic users. This version is equipped with an English interface, but it does not hamper its use.

Operating system: Windows ® 2003/2000/XP/Vista/Seven
Language: English
Size: 14.3 MB
Medicine: Present

DOWNLOAD:
http://hotfile.com/dl/29348277/01ca3ff/Psslk.rar.html
Hacking Class 16 - Introduction to Viruses, Backdoors, Trojans (continued)

Hacking Class 16 - Introduction to Viruses, Backdoors, Trojans (continued)

In the Previous Class We have studied about what are viruses and How they Work and who creates them...Today we are Going in more details about viruses,worms, Trojans etc..So Guys Read On...


SYMPTOMS OF VIRUS ATTACKS:
Hey guys below I have mentioned some symptoms that will indicate that your system is infected from viruses..


If the system acts in an unprecedented manner, you can suspect a virus attack that is Processes take more resources and are time consuming than previous i.e System hangs frequently...
Some More are mentioned Below:


– If computer beeps with no display
– If one out of two anti-virus programs report virus on the system
– If the label of the hard drive change
– Your computer freezes frequently or encounters errors
– Your computer slows down when programs are started
– You are unable to load the operating system
– Files and folders are suddenly missing or their content changes
– Your hard drive is accessed too often (the light on your main unit flashes rapidly)
– Microsoft Internet Explorer "freezes" 
– Your friends mention that they have received messages from you but you never sent such messages 


DIFFERENCE BETWEEN WORMS AND VIRUSES


Most of us thinks that worms are viruses and their working is similar to viruses but this not the real scenario. There is a Big difference between the general viruses and Worms.




A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs. A worm spreads through the infected network automatically but a virus does not.
How To Detect Your System is Infected by Virus??

This is one of the major question to answer and the simplest answer to it is that there are some General Indications that Indicates that System is infected or Not.
General Indications are stated Below:

•Programs take longer to load than normal(because virus halts the normal working of programs as it attaches itself to it, so the execution time increases) .
•Computer's hard drive constantly runs out of free space.
•Files have strange names which are not recognizable.
•Programs act erratically(Programs Gives errors on use)
•Resources are used up easily (can be Easily viewed using task manager).

HOW DOES THE VIRUS INFECTS THE SYSTEM??

Viruses infect the system in the following ways:
1.Loads itself into memory and checks for executables on the disk.
2.Appends the malicious code to a legitimate program which is Important to the user.
3.Since the user is unaware of the replacement, he/she launches the infected program.
4.As a result of the infected program being executes, other programs get infected as well.
5.The above cycle continues until the user realizes the anomaly within the system.

STAGES OF VIRUS LIFE CYCLE FROM DESIGN TO ELIMINATION



Hacking Class 16 - Introduction to Viruses, Backdoors, Trojans





The life cycle indicated above is a general life cycle of the Virus from design Phase to Elimination phase...

VIRUS CLASSIFICATION - TYPES OF VIRUSES
Viruses are classified on the basis of two basic Things:
1. What they Infect
2. How they Infect

Examples:
 

System Sector or Boot Virus:
•Infects disk boot sectors and records.
 

File Virus:
•Infects executables in OS file system.
 

Macro Virus:
•Infects documents, spreadsheets and databases such as word, excel and access.
Source Code Virus:
•Overwrites or appends host code by adding Trojan code in it.
 

Network Virus:
•Spreads itself via email by using command and protocols of computer network.


Thats all for Today we will discuss more about viruses in the Next tutorial...So guys Keep Reading ...If You have any Queries ask me.. In the Next class we will discuss more about specific types of viruses and much more.. So Keep Enjoying..

Wednesday, February 17, 2010
Hacking Class 15 - Introduction to Trojans,Viruses and Backdoors

Hacking Class 15 - Introduction to Trojans,Viruses and Backdoors

Welcome Back Guys, After a heavy Busy Schedule I come with the Next Hacking Tutorial. I think everybody who is using computer has faced the problem of viruses at least once in life. In today's Class I will going to Introduce What are Trojans,Viruses, Backdoors,worms etc. And How they work to infect the system. In later classes we will discuss more about them Like How to Get rid of Viruses, Trojans etc. How to remove them and the Most Important How to Use them for Hacking Victims systems etc..So Guys Keep Reading..




Lets Start With Viruses... What are These and How they Work..


Hacking Class 15 - Introduction to Trojans,Viruses and Backdoors




VIRUSES:

Virus is a self-replicating program that produces its own code by attaching copies of itself into other executable codes like executive files(.exe) ,Dynamic link Library's(.dlls) etc..
Virus Generally operates in the background and offcourse without the Desire of the User as Noone want that virus to harm their computer..ROFL :P


Some Well known Characteristics of Viruses:

  • Resides in the memory and replicates itself while the program where it attached is running
  • Does not reside in the memory after the execution of program
  • Can transform themselves by changing codes to appear different
  • Hides itself from detection by three ways:
  1. • Encrypts itself into cryptic symbols (encodes themselves with special Characters)
  2. • Alters the disk directory data to compensate the additional virus bytes(changes the the location of the file by adding one additional bit to data location)
  3. • Uses stealth algorithms to redirect disk data
WORKING OF VIRUSES:
Generally most of the Viruses Works in two Phases:
1. Infection Phase
2. Attack Phase 
From the name you can have the Idea what are these Phases .

• Infection Phase:
– Virus developers decide when to infect host system’s programs
– Some infect each time they are run and executed completely.  Ex: Direct Viruses
– Some virus codes infect only when users trigger them which include a day, time, or a particular event
    Ex: TSR viruses which get loaded into memory and infect at later stages

• Attack Phase:
– Some viruses have trigger events to activate and corrupt systems
– Some viruses have bugs which replicate and perform activities like file deletion, increasing session time
– They corrupt the targets only after spreading completely as intended by their developers

It will be much more Clear From the Snapshot that How the Virus Works:

Hacking Class 15 - Introduction to Trojans,Viruses and Backdoors
Fig: Infection Phase that How file is attached to .exe files to infect Programs.

Hacking Class 15 - Introduction to Trojans,Viruses and Backdoors
Fig: Attack Phase that How the Files are got Fragmented and system speed Slows Down

Why People Create Viruses ??
I think Everybody thinking of that why people creates Viruses and which people Creates them.. hahahaha Real Question that comes to my Mind when I was Newbie in this field..
Some of he Most Common Reasons are Discussed Below:
• Research projects (People Doing Research Work Detect the Flaws in particular system and creates Code for that)
• Pranks(Just for fun like us people who just creates viruses for irritating frens)
• Vandalism
• To attack the products of specific companies (like Microsoft Products Xp,Vista,Windows 7 etc.)
• To distribute political messages
• Financial gain(Stealing Money from accounts etc..)
• Identity theft
• Spyware (to Monitor the Working of Remote Computers)

So Guys thats all for Today we will discuss more about them in Next classes i.e Tomorrow so wait Till then..
In tomorrow's class we will discuss How to detect viruses attacks and how to get rid of them...
Enjoy and Have Fun!
Tuesday, February 16, 2010
no image

Windows Genuine Advantage Validation (WGA) v1.9.9.0



Windows Genuine Advantage Validation (WGA) v1.9.9.0 | Win App | 0.8MB

New cracked Windows Genuine Advantage Validation by iND. 100% working on Windows Update, Microsoft Download Center and Microsoft Update. And no nag screens. Windows Genuine Advantage (WGA) is an anti-piracy system created by Microsoft that enforces Microsoft Windows online validation of the authenticity of several recent Microsoft operating systems when accessing several Microsoft Windows services, such as Windows Update, and downloading Windows components from the Microsoft Download Center. Specifically, WGA covers Windows XP and Windows Vista. It does not cover Windows 2000, Windows Server 2003 or the Windows 9x family. However, certain downloads and non-critical updates from the Download Center for Windows 2000 require validation.

INSTALL NOTES
1. Extract into a new empty folder
2. Run installer.bat

On January 8th, 2009 Microsoft has released an updated version of Windows Genuine Advantage Validation Tool that contains v1.9.9.0 of the file: LegitCheckControl.dll.

OS: Windows XP
Language: English

Size: 870 KB

no image

How To Use Parental Controls in Windows 7


The Parental Controls feature is a valuable tool for controlling the amount of time your children spend on the computer and the programs they’re using. Today we take a look at how to setup and use Parental Controls in Windows 7.
Parental Controls
To access Parental Controls open the Start Menu and type parental controls into the Search box and hit Enter.
3cont
Alternatively you can open Control Panel and click on Parental Controls.
4cont
When you open Parental Controls, click on the child’s account you want to set up.
5cont
Make sure to password protect your Administrator account…otherwise anyone can turn off Parental Controls and use the computer with no restrictions.
16cont
If you see a password hasn’t been set when you go into Parental Controls, click on the message and you’ll be prompted and Ensure Administrator Passwords.
2cont
Under Parental Controls mark the radio button next to On, enforce current settings. Then you can go through and control their computer time, games, and programs.
6cont
Set Time Limits
Click on Time limits to control when your child has access to the computer. If you want to only allow a few hours each day, it’s easiest to left-click and drag the mouse across all of the time slots to block them. Then allow the time blocks when you want to make the computer available.
7cont
Control Games
Click on Games to control the type of access your child has to games on the computer. You can completely block all games or select games by ratings and game names. These game ratings are based on the Entertainment Software Rating Board.
9cont
You can also select different game rating systems if it’s more appropriate for your location or if you like a certain system better than another.
12cont
You can also block games based on the type of content it contains…and it gives you a lot of choices.
10cont
Control Programs
If you want to restrict certain programs on the machine, click on Allow and block specified programs then scroll through the list of installed programs and block them.
11cont
Additional Controls 
Windows 7 doesn’t have a Web Filter included like Vista did. If you want additional controls like Web Filtering and activity reports, you’ll need to install Windows Live Family Safety which is part of the Window Live Essentials suite. With it you can block access to certain sites and also get access to an activity report that shows you what sites your children have been visiting.
13cont
Everything can be controlled online which makes it nice if you want to access a report or change settings while at work.
15cont 
The Parental Controls feature is easy to use and helps you administer how your children use the computer. Of course nothing is perfect or foolproof and the Parental Controls won’t replace good old fashioned “real parenting” but it makes it easier.
Credit:Geeks
Remote Office Manager 4.1.2 En/Ru - Man Remote Systems on LAN-WAN

Remote Office Manager 4.1.2 En/Ru - Man Remote Systems on LAN-WAN


Remote Office Manager 4.1.2 En/Ru


Remote Office Manager 4.1.2 En/Ru| 6.5 mb

Remote Office Manager is a program for administering and controlling computers remotely in local area networks and wide area networks. It allows you to remotely access the computer desktop in real time. You see the remote computer screen in a resizable window and can control the remote computer with your mouse and keyboard. ROM is compatible with Windows 7. Remote Office Manager (ROM) provides fast, safe and comfortable remote access to computers and supports LAN and WAN (Internet) connections. Besides mouse and keyboard control, ROM offers a number of other tools useful for a system administrator, for example, file transfer, a task manager, remote launch, capturing sound from the remote computer and much more.

Despite its multiple features, Remote Office Manager uses minimum memory, saves CPU resources and can also be configured to run in low bandwidth networks (via EDGE, GPRS) due to its features of running in the so-called saving mode. All data sent over the network are compressed and encrypted. 

Main Remote Office Manager advantages: 
• Complete compatibility with Windows 7.
• High performance in both local area and low bandwidth networks.
• A lot of features - file transfer, task manager, device manager, Wake On LAN and much more.
• Remote installation. There are several types of remote installation available, including installation in a domain, using a group policy and MSI.
• Multi-monitor system support. If the remote computer has several monitors, ROM allows you to view or control them simultaneously in one window or switch to the necessary monitor.
• Security. All data is encrypted with the help of up-to-date technologies and public key protocols (RSA with a 2048-bit public key and AES with a 256-bit session key).
• Network map. It allows you to arrange computers on the network map showing their actual topological location.
• Configuring the program for running in case of a complicated network topology due to such features as "Connect through" and "Callback connection".
• ROM is deeply integrated with the drag-and-drop mechanism of the system. You can drag and drop files and folders directly onto the remote screen window and from it, which makes working with files as easy as possible. The file transfer mode also completely supports this mechanism.
• Capturing sound from the remote computer.
• Supporting an unlimited number of simultaneous connections.



Posted Image

                                                OR
Monday, February 15, 2010
UnHackMe 5.0.5.300 - Protect yourself from hackers

UnHackMe 5.0.5.300 - Protect yourself from hackers



Allows you to detect and remove HackerDefender Trojans and its clones


UnHackMe allows you to detect and remove a new generation of Trojan programs - invisible Trojans. UnHackMe is a very useful security utility for your operating system.
They are called "rootkit" A rootkit is a collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer.


It hides their files, registry keys, and process names, and network connections from your eyes.Your antivirus could not detect such programs because they use compression and encryption of its files.


The sample software is Hacker Defender rootkit. You need use UnHackMe to detect and remove Hacker Defender or its clone.

Posted Image
HOTFILE  ||   RAPIDSHARE



Tuesday, February 9, 2010
Please Read Them Carefully and Forward to all of Your Friends - Health is Wealth

Please Read Them Carefully and Forward to all of Your Friends - Health is Wealth



Hey Friends I am sharing with you some true Facts .. Please Follow them and forward to your Friends if they use them....



1)Mobile
Don't put your mobile closer to your ears until the
recipient answers, Because directly after dialing, the mobile 
phone would use it's maximum signaling power,
which is: 2watts = 33dbi. Please Be Careful. Please use left ear while using 
cell (mobile), because if you use the right one it may affect brain directly. This is a true fact from Apollo medical team.




2) APPY FIZZ
Do not drink APPY FIZZ . It contains cancer causing agent.

3) Mentos
Don't eat Mentos before or after drinking Coke or
Pepsi coz the 
person will die immediately as the mixture
becomes cyanide. Please fwd to whom u care.


4) Kurkure
Don't eat kurkure because it contains high amount of
plastic if U don't Believe burn kurkure n u can see
plastic melting. Please forward to all!!!!!!!!! !! News
report from 
Times of India




5) Avoid these tablets as they are very dangerous
* D cold
* Vicks action- 500
* Actified
* Coldarin
* Co some
* Nice
* Nimulid
* Cetrizet-D
They contain Phenyl- Propanol -Amide PPA.Which Causes strokes, and these tablets are banned in U.S.


6) Cotton Ear Buds
Cotton Ear Buds... (Must read it) Please do not show sympathy to people selling buds on roadside or at Signals..... Just wanted to warn you people not to buy those packs of ear buds you get at the roadside. It's made from cotton that has already been used in hospitals. They take all the dirty, blood and pus filled cotton, wash it, bleach it and use it to make ear buds. So, unless you want
to become the first person in the world to get Herpes Zoster Oticus (a viral infection of the inner, middle, and external ear) of the ear and that too from a cotton bud, DON'T BUY THEM! Please forward to all this may be 
helpful for someone..... .......

Please forward to all your near and dear ones....!

Special Thanks to Karthik Who has Forwarded This to Me!

Designed by Hackingloops.