New Post

Rss

Monday, March 22, 2010
John the Ripper - Best Password Cracker | Cracking Tool

John the Ripper - Best Password Cracker | Cracking Tool

Whenever anyone thinks How to hack or crack the Passwords then JTR is the first software that comes in the mind of every hacker. Its the Best Password Cracking tool available. The main thing that makes it more popular is that its an open source freeware.


INTRODUCTION:
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus many more with contributed patches.










DOWNLOAD:
http://www.openwall.com/john/


Note: a few Windows "antivirus" and "anti-spyware" products have started to recognize password recovery tools as if they were "trojans". This is how those products' vendors inflate their detected "virus" counts. The effect is that end-users are no longer able to check password recovery software forreal viruses. If this affects you, please complain to your antivirus vendor.
Office Password Recovery Magic 6.1.1.151 - Crack Office Files

Office Password Recovery Magic 6.1.1.151 - Crack Office Files




Office Password Recovery Magic 6.1.1.151 | 2.05 MB

Office Password Recovery Magic is password recovery software designed to help users recover the lost or forgotten password. Any office files' read-only passwords can be recovered here. We still can recover *.xls, *.ppt, *.mdb, *.doc and Office 2007 formats files. The easy-to-use interface help users do exact search. Users can set parameters to exact the range of searching password, such as the length of the password and the shape of the password. Users still can using dictionary file, which is a string document to find password more quickly. You can enjoy full function of recovering password. If you have questions or suggestions about our software, please contact us, we hope to grow up with you together.



Key Features of Office Password Recovery Magic:

• Recover the lost or forgotten password quickly.
• Recover read-only passwords for Microsoft Office Word.
• Recover read-only passwords for Microsoft Office Excel.
• Recover read-only passwords for Microsoft Office PowerPoint.
• Recover read-only passwords for Microsoft Office Access.
• User-friendly interface.


Home page - http://www.password-recovery-magic.com/



Download links:
Letitbit
or
Sunday, March 21, 2010
Hack Any Wireless Network With AirCrack-Ng

Hack Any Wireless Network With AirCrack-Ng



Hack Any Wireless Network With AirCrack-Ng


Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.


Aircrack-ng is the next generation of aircrack with lots of new features:



  • Better documentation (wiki, manpages) and support (Forum, trac, IRC: #aircrack-ng on Freenode).
  • More cards/drivers supported
  • More OS and platforms supported
  • New WEP attack: PTW
  • WEP dictionnary attack
  • Fragmentation attack
  • Improved cracking speed
  • Capture with multiple cards
  • New tools: airtun-ng, packetforge-ng (improved arpforge), wesside-ng, easside-ng, airserv-ng, airolib-ng, airdriver-ng, airbase-ng, tkiptun-ng and airdecloak-ng
  • Optimizations, other improvements and bug fixing


DOWNLOAD:
AIRCRACK-NG
Saturday, March 20, 2010
How to protect yourself From Keyloggers and Hackers

How to protect yourself From Keyloggers and Hackers

Hello Guys Another tutorial for Today. I have posted various articles How to hack systems,emails etc using keyloggers and other things. Most of the Users asked me How to Prevent ourselves from these Keyloggers and Other Hacking things like Trojans, backdoors etc...


Things That You Need :
1. Mozilla Firefox ( always Use Mozilla FireFox Best Web Browser Ever).
2. Key Scrambler (used to Encrypt Keystrokes)
3. Spyware Terminator (Best Selling Anti-spyware and Anti-Adware).


Protection From KeyLoggers :


Step1 : Download the Mozilla Firefox Web Browser . Freeware and Download It from Any Software site like 
http://www.filehippo.com/download_firefox/


Step2: Then Download the Key Scrambler :
http://download.cnet.com/KeyScrambler-Personal/3000-2144_4-10571274.html




INTRODUCTION OF KEY SCRAMBLER:
KeyScrambler Personal is a free plug-in for your Web browser that protects everything you type from keyloggers. It defeats keyloggers by encrypting your keystrokes at the keyboard driver level, deep within the operating system. When the encrypted keystrokes reach your browser, KeyScrambler then decrypts them so you see exactly the keys you've typed. Keyloggers can only record the encrypted keys, which are completely indecipherable. Unlike anti-virus and anti-spyware programs that depend on recognition to remove keyloggers that they know about, KeyScrambler will protect you from both known and unknown keyloggers. What's more, KeyScrambler provides protection without getting in your way. You don't have anything to learn about the program and you don't have to do anything differently, but with KeyScrambler your important personal information will be a whole lot safer.


This Will Protect You From any type of logging Software like Keylogger etc...


Step3: Download Spyware Terminator (Best Anti-spyware Software )
http://www.filehippo.com/download_spyware_terminator/





Spyware Terminator includes:
  • Fast spyware scanning
  • 100% real-time protection
  • HIPS protection
  • Antivirus protection
  • Multilanguage Support
  • Free automatic updates
  • Free scheduled scans
  • Free support
Spyware Terminator will scan your computer for known threats and report findings in a manner that is easy to read and interpret. Every entry is given a rating and a classification, which makes it very easy to decide if a detected item should be removed. Unlike some free software titles, Spyware Terminator will remove all threats for free.
Spyware Terminator is licensed for free for both home and business use.

If you follow the all three above steps then you can never be a victim of Getting Hacked...
Enjoy and have Secure Privacy... Have Fun!
How to Hack Administrator Password : (Manual + DISC)

How to Hack Administrator Password : (Manual + DISC)

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.

Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?
Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.
The download link for both CD and floppy drives along with the complete instructions is given below
It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.

Another simple way to reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name ADMIN, then do as follows
4. Type net user ADMIN  * and hit Enter(Note: there is space between ADMIN and *) .Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

How to bypass Paypal Limited Account (Working)

How to bypass Paypal Limited Account (Working)

Most of the Part of This Post is referenced from the Previous Paypal Post i.e How to Verify PayPal without Credit Card or Debit Card. The Limits of An Paypal Account can not only removed by Verifying your Paypal Account. But If you want to Buy some things like Domain etc.. You need to Do More...



Few reasons can make PayPal account limited are: Big size of withdrawals, Too Many refunds or chargeback, sum of money going through account, Credit/debit card that does not check out.

Tips to avoid your PayPal account from becoming limited:
  • Do not open a brand new account and accept a large amount of money right after verification process.
  • Don’t frequently change your account information.
  • Do not add or remove credit cards on your account frequently.
  • When you receive a large amount of money do not try to immediately withdraw the money, or send it to another account because you might mistrusted of having received fraudulent funds.
  • While you should keep a little balance of your dollar in your PayPal account.
If your account has limited (the solutions)
To solve if your PayPal account limited, login to your PayPal account and open “Resolution Center” on your PayPal account to remove limitations and complete all checklist item to restore the account by clicking resolve button.
Each PayPal case is usually different. On the case of my PayPal account limited, I must upload the following data:


  • Confirm credit card
  • Upload copy of your utility bill (proof of address).
  • Upload copies of national ID card, driver’s license or passport.
Now, after doing all checklist item on the resolution center your Paypal Account Restrictions and Limitations will be Removed.
So Enjoy Guys and have Fun!
How to Verify PayPal without Credit Card or Debit Card

How to Verify PayPal without Credit Card or Debit Card

Hello Guys welcome back , Today I am going to share with you all "How to verify the Paypal Account Without having Credit Card or Debit Card" . This is the General Problem, So we are discussing that.Most of us Think that its Pity Difficult to verify Paypal Account without Credit or Debit Card but believe me Guys its Easy like 123... in a Go...So Read On...


For Verifying Paypal Account you will need two Things:
1. A Paypal Account (lol its Obvious).
2. A Bank Account (that you will attach with paypal to verify ur Account).


VERIFY YOUR PAYPAL ACCOUNT:
Follow the Below Simple Steps to Verify your Paypal Account and Enjoy the Full Features of Paypal Without Restrictions:

Step1 : Login to your PayPal account then Open “my account Tab”. Go to “Profile” then click “Add/edit Bank Account”.  Add and then complete all the needed information.


Step2: PayPal will email you a notification on how to confirm your bank accountand get verified. PayPal will make two small deposits to your bank accounton a specific date.

Step3: Check your bank account and note the exact amounts of those deposits.

Step4: Log in to your PayPal account and click Confirm bank account on the Account Overview page. Enter the two deposit amounts to get verified.


That's all the Process to Verify the Paypal Account. So Enjoy Guys.
If you have Any Query Ask in Form Of Comments :)
Friday, March 19, 2010
no image

Vodafone Stealing Information Using Botnet Malware - So Beware Guys

Guys Its Really shocking but Its truth . The New Vodaphone HTC Magic Phone Contain Malware's in the software Inbuilt and Its stealing Personal Data of the Users. So Beware Guys !
This is Pity Ridiculous that company is distributing malware at its userbase. Unfortunately it probably won’t be the last.



Today one of our colleagues received a brand new Vodafone HTC Magic with Google’s Android OS. “Neat” she said. Vodafone distributes this phone to its userbase in some European countries and it seems affordable as you can get it for 0€ or 1€ under certain conditions.
The interesting thing is that when she plugged the phone to her PC via USB her Panda Cloud Antivirus went off, detecting both an autorun.inf and autorun.exe as malicious. A quick look into the phone quickly revealed it was infected and spreading the infection to any and all PCs that the phone would be plugged into.




A quick analysis of the malware reveals that it is in fact a Mariposa bot client. This one, unlike the one announced last week which was run by spanish hacker group “DDP Team”, is run by some guy named “tnls” as the botnet-control mechanism shows:
00129953 |. 81F2 736C6E74 |XOR EDX,746E6C73 ; ”tnls”
The Command & Control servers which it connects to via UDP to receive instructions are:
mx5.nadnadzz2.info
mx5.channeltrb123trb.com
mx5.ka3ek2.com
Once infected you can see the malware “phoning home” to receive further instructions, probably to steal all of the user’s credentials and send them to the malware writer.
Interestingly enough, the Mariposa bot is not the only malware I found on the Vodafone HTC Magic phone. There’s also a Confiker and a Lineage password stealing malware. I wonder who’s doing QA at Vodafone and HTC these days.
Wednesday, March 17, 2010
Folder Lock 6.4.0 - Protect Your Private Data

Folder Lock 6.4.0 - Protect Your Private Data







Folder Lock 6.4.0 | 5 MB


Folder Lock offers fastest way for encrypting and password protecting files and folders. You can either choose to encrypt important files from techies or lock your files, pictures and private data from casual users. Folder Lock comes with locking, encryption, shredding, stealth mode, hack attempt monitoring, portability, plug & play support, history cleaning, and more than 20 privacy features all tailored to special needs for people wanting privacy and security.
Folder Lock creates encrypted storages called 'Lockers'. You can keep as many of your private files & folders in your Locker and password protect it with a single click. You can transfer, secure and backup these Lockers. Lockers are portable, you can keep them in USB Drives, CD/DVD, & notebooks or transfer them via email or upload. These Lockers are undeletable on the computer where Folder Lock is installed.

Folder Lock uses US military standard 256-bit Advanced Encryption Standard Algorithm to protect your valuables. Encryption is on-the-fly and decryption is automatic i.e. content is loaded in memory instead of hard drive. This means your data is unrecoverable without correct password no matter how the protection is tampered and the protection is fast as it does away the hassle of decrypting everything in your hard drive.

Folder Lock offers full portability by offering PC independent password protection of your files and folders. Create a portable Locker in your USB Drive or Memory Stick and Folder Lock will also create an autoplay executable in your USB drive. Automatic plug & plug is also supported making it easy to open protected Lockers on USB drive without the need to install Folder Lock.

With Folder Lock, all your data sits in one location i.e. your secured Locker. Furthermore, the program support multi-user interface making it easy for the whole family or your colleagues to use your computer for storing their own Lockers with their own passwords. Never again worry about data loss, theft or privacy breaches. If you share your computer with others or fear hackers and thieves may steal your data, give Folder Lock a try!

Folder Lock is compatible on all 32-bit and 64-bit flavors of Windows 7.0, Windows Vista, Windows XP, Windows 2008, Windows 2003 Server and Windows 2000. The protection is cross-platform compatible and PC independent. Folder Lock offers great features and zero compromise on data security in all versions of Windows.


Features and Benefits:
• 256-bit AES encryption on-the-fly (military standard) for file protection.
• File Lock, Folder Lock, Drive Lock, File Encryption and Folder Encryption. All in one complete package.
• Full Portability. Password protect USB Drives, Lock CDs & DVDs and share password with trusted friends.
• Backup or transfer your password protected Lockers anywhere. All data sits in one place for easy backup.
• Undeletable Lockers (on the PC where Folder Lock is installed). Deletion requires you to login into Folder Lock.
• Shred files automatically when data is encrypted. Choose this option for full data security.
• Stealth Mode feature can efficiently hide all the traces of Folder Lock ever been installed on your PC.
• Windows History Cleaning. Removes recent history of PC activity automatically when Locker closes.
• Hack Attempt Monitoring option can monitor fake password attempts and can Shutdown PC automatically.
• Fastest Encryption! Encrypted data is later decrypted in memory, preventing data recovery & slow processing.
• Complete Privacy! Whether you're concerned with privacy, data theft, data loss, data leaks or virus attacks. You need Folder Lock!


Changes in Folder Lock 6.4.0:
- This is a major update version of Folder Lock featuring complete compatibilty on Windows 7.0, both 32-bit and 64-bit flavors of Home Basic, Home Premium, Enterprise, Ultimate versions of Windows. There are many other enhancements in this version, improving the compatibility of program with other third-party software.



DOWNLOAD:


DEPOSITFILES  ||   HOTFILE
Monday, March 15, 2010
Advanced Host Monitor Enterprise v8.54 Portable

Advanced Host Monitor Enterprise v8.54 Portable


Advanced Host Monitor Enterprise v8.54 Portable
Advanced Host Monitor Enterprise v8.54 Portable | 18.5 MB

Advanced HostMonitor is a network monitor program. You can create a list of jobs and tests in advance on a 'set and forget' basis. Among the many checks it can do, it can monitor any TCP service, ping a host, retrieve an URL, check the available disk space, and more. It checks network servers at regular intervals and takes pre-defined actions if a device does not respond.

It can provide a visual and sound warning, send an E-mail message to a mailbox, pager or mobile phone, execute another program, etc. All this allowing you to respond to a problem before your users start to complain.HostMonitor is a highly scalable network monitoring software suitable for small and enterprise-level networks. Probably you will say "There are dozens of programs like this"? That is right! But please check what HostMonitor offers and compare its power and flexibility to surprisingly low price: using 60 test methods our software can check almost any parameter of your servers; highly flexible action profiles allow you to start actions in predefined order depending on the test results.
Probably you will say "There are dozens of programs like this"? That is right! But please check what HostMonitor offers and compare its power and flexibility to surprisingly low price:

* using 60 test methods our software can check almost any parameter of your servers;
* highly flexible action profiles allow you to start actions in predefined order depending on the test results;
* HostMonitor creates various log files using different detail levels and file formats (Text, HTML, DBF and ODBC);
* built-in Report Manager allows you to create and customize reports to your liking in a variety of ways;
* using Remote Monitoring Agents for Windows, FreeBSD, Linux, NetBSD, OpenBSD and Solaris you may easily monitor remote networks;
* Web Service, Telnet Service and Remote Control Console simplifies remote management;
* and this is not all...

Fixed The following issues were resolved
* HostMonitor: in some cases "Limit number of RCC connections for the account" option could work incorrectly. Fixed
* In some cases WatchDog application could start inactive (unmarked) actions. Fixed
* Web Service could report "Transmission error" instead of "Unauthorized" or "Unacceptable IP address" error. Affected Web Service version 3.56 only. Fixed in this version
* WMI Explorer could display "List index out of bounds" error while processing query like "select * from CIM_LogicalDevice" due to inconsistent list of properties provided by various objects.
Download Links:
HOTFILE  ||  DEPOSITFILES
Password Unlocker Bundle v5.5.147 -Unlock All Passwords

Password Unlocker Bundle v5.5.147 -Unlock All Passwords





Password Unlocker Bundle v5.5.147 Retail

Password Unlocker Bundle 5.5 is giant lost password recovery software, built in with up to 13 modules! It’s to recover lost passwords for all popular files, archives, and applications, like Windows, Word, Excel, PDF, RAR, SQL, and more.. This password recovery solution contains all our flagship products of password unlocker series, We roll out this product bundle in a purpose to provide an all-in-one password solution for you either in office or at home.


Features:
- Password recovery modules in one for Windows, Word, Excel, PDF, RAR, SQL, Instant Messengers, and more...
- Recover passwords for Windows, Word, Excel, PPT, PDF, email accounts, network connections, ZIP and RAR archives, and more…
- Use popular password recovery attacks:Dictionary attack, Brute-force attack, and Brute-force with Mask attack
- Supports Windows 7
- Recovers various password types fast
- Wizard User Interface design, easier to use
- Support multiple-core processor to accelerate the password recovery speed
- The password recovery process is automatically saved every after a period of time, if stopped, the program will ask you to restart the unfinished task or not

DOWNLOAD:

http://hotfile.com/dl/32868657/6b8ae94/PasU.rar.html
Saturday, March 13, 2010
How to Recover Deleted SMS from SIM or Phone

How to Recover Deleted SMS from SIM or Phone

Have you deleted SMS messages that you wish had not gotten deleted? You will be happy to know there are a number of different software that can help you recover the messages you need and want, but not all of them are free and you need to purchase the software. However, if you own a Nokia phone you might be in luck, as there are very good chances of message recovery from your cellphone without need of any specialized data recovery software for free. In this tutorial I will explain, what are the steps to be followed in order to recover deleted SMS from a SIM card or phone memory.


STEPS INVOLVED:
1. First of all download and install FExplorer, excellent file manager and also sends files via Bluetooth.




DOWNLOAD:
http://www.mediafire.com/?wzdzsejfksq


2. Launch FExplorer and navigate to C: if you use Phone Memory to store your messages (default) and D: if you use Storage Card as your SMS storage location.

3. Now navigate to and open "system" folder.

4. Now open the "mail" folder.

5. This folder should contain many folders named similar to 0010001_s etc. with files named similar to 00100000 etc. These files are the actual deleted messages. Simply, use the FExplorer inbuild text viewer to view these files. You will need to browse through every folder and open all files inside them until you get the required SMS.

This tool includes more great fetures like:

  • Cut, copy & paste files
  • Check date modified & size
  • Display free space available
  • View file with inbuilt text viewer
  • Cut, copy, create & paste directories
  • File find. (although this only works within a directory)
  • Take screenshots
  • Set your backlight to be permanently on
  • Send files via bluetooth. (may be necessary to rename .sis to .sis_)
  • Compress memory - increasing available free memory ...and much more.
All of all FExplorer is a handy file explorer application for your Series 60 phone. With a wide range of features, tips and tricks, FExplorer will become one of your favorite mobile applications!


Monday, March 8, 2010
Send Free Online Fax Without Fax Machine - Isoftdl Special

Send Free Online Fax Without Fax Machine - Isoftdl Special

Hey Guys Good News to all. If you Don't have fax Machine Don,t worry now you can send fax online also via WEB.There are several ways to send fax Online and most of them are free. You can use the Web to send a free fax – and no, you don’t have to have a fax machine or even find some spare change. Isn't Its Interesting...
There are Various Sites that allow us to send free fax all over the world Online.. I am listing the Best one's so Enjoy and have Fun!





Here is the List of 6 Services to Send a Free Fax Online

1. FaxZero- FaxZero, A free fax services via IP that lets you fax PDF files and Word Documents to any fax machine around USA and Canada only. FaxZero prints an ad on the coversheet, but leaves the main pages uncorrupted (Ad-free faxes are about two bucks). FaxZero services has limitation whereby one day you can send twice only and each time faxes with maximum three pages only.
2. TPCfax- The more versatile way involves sending your fax by email with a correctly formatted e-mail address (the WWW page does it all transparently), and allows you to include files which contain much more formatting than just the plain ASCII text you can send here.
3. ScanR- ScanR is an intriguing service that turns your camera phone into a scanner, copy machine, and fax machine all in one fell swoop. Here’s how ScanR works: basically, you take a picture of a document you want to share with someone else, send it to a ScanR email address, and they send this document on by fax as a .pdf file.
4. 
PamFax
- Looking for a simple and inexpensive solution to send your faxes? PamFax has it all: simple to use and fully integrated with Skype. User friendly wizard makes sending a fax a breeze, send faxes from Word/Excel 2003/2007, easy payment with your Skype Credit. No upfront payments, no subscriptions, no additional cost, no registration, Fax preview and much more.
5. Drop.io- Drop.io recently added the ability to send uploaded documents via fax. You can send Word, Excel, and PDF files to any fax number. The only limitation is that files cannot be more than 20 pages long, which is a vast improvement
6. Popfax- Popfax is a fax service that offers a free fax online trial, but then goes to a paid subscription service.




MANUAL TRICK - With The Help of FAX MACHINE SOFTWARE:


Got a scanner and a modem? Save yourself the cost of a fax machine. Send and receive your faxes with Fax Machine. Here is how it works: insert a document in your scanner, start Fax Machine, click Scan a page (several times if you want to send a multi-page fax), click Send Fax, fill in the recipient telephone number and off it goes. That's all!

Other features that make Fax Machine stand out:
  • Distinctive Ring support, even on Windows XP/Vista systems
  • Can forward received faxes by e-mail, even automatically right after the fax is received
  • Can print received faxes automatically right after the fax is received
  • Can print log of sent and received faxes, or save these logs to a text file
  • Can be set to start when Windows starts
  • You can specify what printer to use to print send confirmations and received faxes.
  • Is available in English, Dutch, French, German, Italian and Spanish. Choose your language when installing the application.
  • Fax Machine contains a printer driver, which lets you "print" to Fax Machine from any Windows application that supports printing.
DOWNLOAD:

http://rapidshare.com/files/69756261/fax_machine.rar
Designed by Hackingloops.