tekball

home of latest tips and tricks for computer,mobie and internet.free sofwares,games,books,tutorials,downloads and much more....

SEARCH TEKBALL

Loading

Friday, March 4, 2011

Picture Perfect Follow a few simple rules of photography to create stunning pictures.


As clichéd as it may sound, the
truth is that a picture speaks a
thousand words, and a well-shot
picture always stands out. When you
enter a living room, it’s common to see
family portraits and vacation memories
When shooting outdoors, the most
important aspect to look at is lighting.
With the right amount of lighting, you
can achieve just about the same output
as you would using in-house or studio
lighting. However, there are certain
factors to consider when shooting
outdoors.
                                                                                   
Keeping your subject a little off-center adds more depth to the overall
picture.
Camera settings and techniquesFirst and foremost, avoid shooting
on the walls or show cases. Now, it can
be embarrassing to have washed out or
grainy pictures in those photo frames.
In this workshop, we discuss the various
aspects of shooting the perfect picture in
dif  erent scenarios and enhancing them
at noon or when the sun is directly
overhead. Apart from the lighting
conditions, you will also need to look
into your camera settings. If you have
a normal point-and-shoot, you should
consider having settings like aperture,
shutter speed and the manual mode.
However, not all cameras come with a manual mode. In such cases, just the aperture and shutter speed controls willsui   ce. We have taken both indoor and outdoor shoots into consideration for the
following tutorial as there are no fi  xed settings that apply to all situations.
STEP 1: RULE OF
THIRDS
A very common mistake that most of us make when shooting portraits is to place the subject right at the center. While it might seem like the most natural way of capturing portraits, it defi  nitely has the makings of a very dull and unimaginative picture. The basis of this after they’ve been shot. Right from the
initial steps of shooting, using proper cameras and equipment, to the post processing and printing of images, we’ll give you brief step-by-step guides on the various crucial aspectsrule states that if you were to divide a
rectangular frame with two equidistant vertical and horizontal lines into nine equal parts, then the point where the lines meet is where the subject should be placed. This rule is applied to prevent positioning the subject at the center. To make things simpler, you can enable the ‘grid’ view option that most cameras come with.
STEP 2: APERTURE AND SHUTTER
SPEED
Both aperture and shutter speed are inversely proportional to one another, which means that if you increase the aperture range, the shutter speed will automatically decrease, and vice versa. However, this only happens when you choose to shoot either in aperture priority mode or shutter speed mode. The shutter priority mode is best used when you're shooting either in low light or whenthe subject that is being shot requires
a really high shutter speed, like when you're capturing fast moving objects. If you want greater control over the depthof fi eld, then the aperture priority modeshould help achieve this. Decrease thenumber of f-stops to get a better depthof fi  eld. This is best used when you only need your product or subject to be your
point of focus.
STEP 3: ISO
The selection of ISO settings plays an important role in photography and how
your images turn out. The lower the camera's ISO levels, the fi  ner will be
the overall image quality. However, the ISO levels all depend on the lighting
conditions. Better the lighting conditions, smaller will be the ISO levels. However,
we recommend not going beyond ISO 400 when using digital cameras,
because anything over this value will produce visible noise. The same cannot
be said when shooting with an SLR, because SLRs come with a larger sensor
size along with better post-processing capabilities. The best way to overcome
the noise issues with digital cameras would be to set it to manual mode (if
your camera supports this) or switch to either shutter/aperture priority while not 
going above ISO 400. It is recommended that you make use of a tripod, especially
when you are shooting under low light conditions.
STEP 4: FLASH INTENSITY
Manually adjusting flash intensity will help prevent
pictures from appearing too bright or dull.

Depending on what you are shooting,
you will need to selectively adjust the
fl  ash intensity, otherwise you might just
end up burning your overall image. We
do not recommend using the on-camera
fl  ash, as you will only end up spoiling
the overall image. Try making use of the
Bounce Flash method discussed later on
in this workshop. For point-and-shoot
cameras though, the Bounce Flash
method won’t quite work since the fl  ash comes fit with the device. So apart from reducing the fl  ash manually, you can have a white sheet of paper placed in front of the fl  ash to further reduce the fl  ash intensity.
Camera gear
LENSES TO LOOK
OUT FOR WHEN SHOOTING
INDOOR AND OUTDOOR: As far
as point-and-shoot cameras go, you obviously don’t have the choice of choosing the lens, as these cameras come fit with a decent amount of zoom out of the box. There are a few that offer upto 30x optical zoom,
which is more than enough to capture objects that are at quite a distance. Adding to this are the
preset scene modes that make the normal digital point-and-shoot  a jack of all trades. So you get is a  zoom lens, a macro lens and a normal lens all fi  t into one single unit.However, the stock lens that you normally get with a DSLR gives a maximum of just 3x zoom, which isn’t much, especially if outdoor photography
is what you are mostly into. Here, however, you have lenses to take care of
each aspect of photography. There are three types of lenses that generally fi  t a
DSLR - zoom lenses, prime lenses and macro lenses.
ZOOM LENSES: A typical zoom lens
(24 – 90 mm) will give an approximate
zoom range of 3.5x. However, if you want
the best of both worlds, try going in for a
28 – 200 mm zoom lens. That way, you
wouldn’t need to carry an additional lens
when travelling.
PRIME LENSES: Prime lenses, on the
other hand, don’t of  er any kind of zoom.
In other words, these lenses have a fi  xed
focal length. But what they lack in zoom,
they more than make up by delivering
superior image quality. In addition, these
lesnses are lighter and cheaper than traditional zoom lenses. They also have a larger aperture range that is capable of capturing images in low light conditions while maintaining the same shutter speed of a zoom lens. Prime lenses are best used when you require the picture to have a certain depth of fi  eld.
MACRO LENSES:
Macro lenses are best used when you want to capture extreme close up shots of subjects. They are best used to highlight specifi  c parts of a subject while blurring out the rest. However, they require sufficient
lighting to make the overall picture stand out.
TRIPODS:
Tripods are
an essential part of any
photographer’s equipment. So
making use of a tripod when shooting will undoubtedly
produce much better results. There are a few things
that you need to look at before taking the plunge.
First and foremost, you will need to check
the overall weight of the tripod. This
will depend on your requirements. If  you are the kind to
make use of several lenses and camera
fl  ashes, it would be advisable to settle
for a tripod that’s slightly heavy. But if
you are always on the move and all you
have is the camera, you should consider
buying a tripod that’s light and compact
enough to carry. Secondly, check the
tripod for stability as there are a few
that tend to wobble when fi  t with a
camera. The best way to do this would be to mount the camera with the legs of
the tripod spread out. If it feels wobbly or uncomfortable, you should consider looking at something else.
Next, consider the extensibility
of the tripod. Choose something that reaches your height when fully extended.
However, this also depends on what you are trying to shoot. Tripod heads should
also be taken into account i.e.: their ease of use, overall movement of the
camera when attached to the tripod, and if they are easy to detach when the need arises.
So make sure you take all these into account before
purchasing a tripod.If you are not too keen on
purchasing a tripod, you can instead invest in a monopod.
Monopods are much lighter to carry and since they only have a
single leg, they wouldn’t take you more than a few seconds to set
up. They are also considerably cheaper than their three-
legged counterparts. However, keep in mind that a monopod
will not eliminate camera shake as well as a
tripod, but will
to be continued.........

Thursday, March 3, 2011

Sharecash Downloader 2011 : Downloading from Sharecash without survey

I am back with one more hacking software called Sharecash Downloader used for downloading from sharecash without completing any surveys before downloading.

In this post i have provided link to download Sharecash Downloader software for downloading from sharecash without completing tedious surveys which is very irritating for peoples.

So, you can use this Sharecash Downloader software to download files from Sharecash without completing any surveys.... just read on.

Sharecash Downloader:

1. Free Download Sharecash Downloader software for downloading from Sharecash.org.

Password : www.realhackingtips.blogspot.com

2.  Sharecash downloader only work with originalsharecash.org links.

3. Now, run Sharecash downloader software (works perfect on Windows XP and Windows Vista) on your computer to see:

Note : If you get an error message about the proxy/update server being down, just keep trying to open the program. Sometimes the server times out for a few seconds.




Note : For running this software we requires .net framework 3.0 .

4. Enter the original sharecash download link and hit on "Go to Link" button.

Note : If new window open then just click on OK button.

5. check the status at the bottom of the window of sharecash downloader,when its show status "Ready to Download" After that clicked, on "Download" and you will be able to download the file without completing any surveys.

Note : If new window open then just click on OK button.

This is the proof that this Sharecash Downloader is working perfect for Sharecash.




So my friends, enjoy this Sharecash downloader software for downloading files from sharecash.org without completing any surveys.Follow the procedure exactly as mentioned above in steps so you can download from sharecash without completing any surveys. If you have any problem in using this Sharecash downloader for downloading from Sharecash.org, please mention it in comments.

Enjoy Sharecash downloader for downloading files without completing any survey....

ways on how to Trace Mobile number in India

We all receive unknown numbers on our mobile daily. Sometimes, it becomes necessary to trace mobile number and its location. Many visitors commented to post on
how to trace mobile number in India.
Well, there are many ways and websites out on web which provide service to trace mobile number in India. I have filtered out most useful websites and softwares used to trace mobile number. This article, thus, provides you with softwares and websites which are useful to trace mobile number in India. Just read on... I have provided link for software download.





How to Trace Mobile number in India:

I have listed 4 useful sites/softwares to trace mobile number in India.

1. Wiki page:
Wiki contains mobile numbering system which contains a list of phone numbers and their network operators with locations. Thus, only first 4 digits of target phone number can be useful to trace mobile number in India using this mobile numbering system.
Check out Wiki page here.

2. Internet4Mobile:
If you want an automated system to trace mobile number, use this service provided by Internet4Mobile. There are many similar services available on web, but I recommend this one as it provides you following information about Mobile number:

- State
- City (only provided by this service).
- Operator
- Locate mobile number on Google Maps.

Trace mobile number using Internet4Mobile here.

3. Mobile Tracking Software:
Well, if you want to trace a mobile number in India directly from your cell phone, you can use Mobile phone application - Mobile Number Locator. This application allows you to find mobile number location right from your cellphone.

Download Mobile Number Locator to trace mobile number in India.

4. Other Useful Websites:
Some of the useful websites to trace mobile number in India:

- Bhartiyamobile
- IndiaTrace (variety of Tracing features).

So friends, I hope you can now
trace mobile number in India
from the links given in above article. If you have any problem in this tutorial on how to trace mobile number in India, please mention it in comments.

Enjoy n trace mobile number in India...

How To Hack and Crack IDM

Hello Friends, in my previous article we discussed on Sharecash Downloader today i am going to explain how to hack or crack Internet Download Manager (IDM) manually. IDM is the best Internet download manager available on internet but its not free and its cracked or patched versions contains viruses.

 Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID.

 I am explaining the manual hacking method because most of my users said that patch and keygen contain viruses.

This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.



Hack or crack IDM manually :

Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.If you don't wanna update your version, Just click on Registration.

Step2: When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

Step3: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:

RLDGN-OV9WU-5W589-6VZH1
HUDWE-UO689-6D27B-YM28M
UK3DV-E0MNW-MLQYX-GENA1
398ND-QNAGY-CMMZU-ZPI39
GZLJY-X50S3-0S20D-NFRF9
W3J5U-8U66N-D0B9M-54SLM
EC0Q6-QN7UH-5S3JB-YZMEK
UVQW0-X54FE-QW35Q-SNZF5
FJJTJ-J0FLF-QCVBK-A287M

And click on ok to register.

Step4: After you click ok, it will show an error message that you have registered IDM using fake serial key and IDM will exit. Now here the hack starts.

Step5: Now Go to START => Then go to RUN and type the following text and click enter:

notepad %windir%\system32\drivers\etc\hosts

Note : For Windows 7 users, due to security reasons you will not be able to save hosts file.
so follow this steps :
First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.


Step6: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.

Step7: Now a notepad file appears something like this as shown below:



Now copy the below lines of code and add to hosts file as shown above image box :

127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com

After adding these piece of code, save the notepad file. And exit from there.

Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.

That means it will remain full version for life time and you can update it without any problem in future.

 proof of Successfully Hacking IDM:


I hope you are now able to convert your Trial version of IDM into Full Version. If you have any problem in this tutorial on
How To Hack and Crack IDM,
please mention it in comments.Enjoy .........

Facebook Hacking Course Released

Facebook hacking Course is basically contains series of videos which will tell you exactly how hackers hack facebook accounts, What methods they use and how you can avoid falling for these kinds of attacks, You will watch my computer screen as I show you exactly how it's done, Each video contains a pre made lab so you can practice what you learned



Facebook Hacking Softwares

Lots of people are interested in learning how hackers hack facebook passwords and you might have came across lots of options and the first one would probably be a program or software which has an ability to hack Facebook passwords but the truth is that there is no such simple program or software that can do it for you, The reason behind it is that these major companies pay thousands of dollars to protect their users privacy, Do you honestly think this is possible?, Do you think that they don't have any protection and security officials to knock down such softwares, So Stop fooling your self and stop searching about these so called "Facebook Hacking softwares"

Facebook Hacking Services

The second option which people come across is that they go for Facebook Hacking services which promise to hack facebook accounts for you for money but the truth is that no one is going to do it for you, their purpose is just to scam you and take money.

What will be I learning in Facebook Hacking Course?

You will learn:
The exact techiniques which hackers use to hack facebook accounts.
Security tips to protect your facebook account from getting hacked.
Protecting your Privacy
And much more.

Bonus

By buying this facebookhackingcourse you will get the following bonus:

1.Secret Anonymizing Techniques

This section will contain 2 bonus videos which will tell you the exact methods used by hackers to hide their identity while doing malicious things online

2.Direct Email Access and support

If you get stuck or don't understand any thing presented in the course, I will help you no longer how much time it takes, however this offer is for limited time only

So What are you waiting for go and grab your hands on Facebook hacking course and learn Facebook hacking and security right now.

Click here to purchase

Tuesday, March 1, 2011

How to hack facebook accounts or passwords

Hello friends welcome again, Today i am going to show you the way "How to hack Facebook accounts or passwords".i have told you the three methods to hack any email account and in gmail hack hack was only limited to gmail only. Today i am going to share the similar technique to hack Facebook account. So guys read on..



Today I will tell you the latest approach of Hacking Facebook Passwords or Accounts i.e "Smart Phishing with Email trap". And guys  you will be surprised to listen that what is the victim's trap ratio in Smart phishing trap is above 70% means , at least 70% people will going to come into your trap and success ratio is 100% means their accounts is yours ROFL. First of all What is "Smart Phishing with Email trap" ..

SMART PHISHING WITH EMAIL TRAP
Normal phishing is technique to hack passwords by fooling the victim make him login to particular website suing your phish or fake page. But normal phishing is easily detectable. But Smart Phishing with Email trap is almost undetectable and I will show you How its undetectable. In smart phishing we send HTML mails to the victim with same header as that of original mails by email address that looks similar to original one. And ask user to join some Group or watch video or read comment etc.. And mail looks that user has to enter in it and his password is ours. Here we exploit the fact that Most users who uses Facebook are subscribed to notification by their friends. So its quite easier to exploit fact. 

How to Hack Facebook Passwords or Accounts ?

1. First of all download the Facebook Phisher.

2. Extract the rar file now you will get three files as given below:
  •       index.html
  •       passes.txt
  •       write.php
3. Upload all the Three files to any of the free Web hosting server. Remember while creating the  account on these servers try the username as nearer as possible to the original URL like faccbook or facobook etc.. As its the most crucial step. Some Free Web hosting servers are given below you can also find few more for yourself.

4. Once you have uploaded all the three files to web hosting server now you have to send these to your victim. This is the most important step regarding smart phishing technique.
Below are some sample mails that will help you to understand how to TRAP victim effectively.

Sample Is shown Below:  This the sample email that comes to your email account from facebook.
Now You have to edit this mail. Open this email and click on forward  now you will see this email in editable mode now remove the forwarded headers etc and forward from Header.
Remember your Name in Gmail must be Facebook and email account should be like noreplyfacebook@gmail.com etc... Now you have to put the Fake link of index.html file that u have got after uploading on the Web hosting server in place of Two exploit points. Remember always put link in href and original text should be as such. And also try to keep the link as much as closer to facebook original link.


Similarly you can use JOIN This Group on Facebook sample mail and Watch this video on Facebook in the similar fashion i have told you.


5. Now After sending phisher to victim, once the user logs in to his Facebook account using your Phisher, his user ID and password are ours..And these are stored in passes.txt What you have to do is just refresh your Web hosting account files. 




6. The Log.txt file will contain the passwords and look like this:


 

Thats all Now you have hacked the password of victim. I hope you all have Liked It. 


HOW to Protect Your Facebook Account?

1. Never Follow any link from the any website or email. Always open manually www.facebook.com and then enter credentials.
2. Always check the URL in the address bar while joining any Group.


Find Unauthorized Activity in Your Email Account

Hello friends, do you think or suspect your email account has been hacked or somebody else is using your account?  Do you suspect that your Email account is under attack? Is email account secured enough that it cannot be hacked? Do you want to make your email account 100% hack proof? If Yes, then this article is for you. So friends read on..




Sometimes our email account has been hacked and we are not aware of that. Someone else i.e. some hacker is accessing your account and might be misusing it. But since we are not aware of that and we still think that our account and its privacy is safe but some third person is using it and accessing our private information and details. Now How you will detect that your account is under attack that How to find unauthorized activity in your email account. Here are few tips.


These are some signs of Unauthorized activity in Your email account:
1. Your new emails are marked as Read even if you’ve not read them.
2. Your emails are moved to Trash or even permanently deleted without your notice.
3. Your emails are being forwarded to a third party email address (check your settings then go to forwarding).
4. Your secondary email address is changed.
5. Phone Information is changed.

If you come across any of the above activities on your email account, then it is a clear indication that your email account is hacked.

There are some additional security features that Gmail provide its users for the Security and safety o your account.
Gmail provides an additional security feature to protect your email account through the means of IP address logging. That is, Gmail records your IP address every time you login to your Gmail account. So, if a third party gets access to your account then even his/her IP is also recorded. To see a list of recorded IP address, scroll down to the bottom of your Gmail account and you’ll see something like this.

You can see from the above figure that Gmail shows the IP address of last login (last account activity). You can click on Details to see the IP address of your last 5 activities. If you find that the IP listed in the logs doesn’t belong to you, then you can suspect unauthorized activity.



Steps to stop unauthorized activity on your email account
1. Verify you mobile phone, so that if your account is somehow got hacked then it will be easier to recover your email password.
2. If you suspect that your account is already hacked then these are the recommended things that you should perform.
a.  Change your Password
b.  Change your security question.
c.  Remove any third party email address (if any) to which your account is set to forward emails.
d.  Make sure that you can access the email account of your secondary email address.
e.  Also change you secondary email password and security question.

This will help you to stop all the illegal activity in your account. But there are several peoples who have asked me that their account is hacked or they forgot the password . Now if your account is already hacked means you are not been able to access your account then i please read the following article that i have written few weeks before. In this article i have explained all the possible ways to recover your email account password back again.

Hack Facebook Password using Keylogger

Hello Friends, in my previous post i have explained 4 ways to hack Facebook account password, where i have discussed the second best method to hack Facebook password is using Keyloggers. Today i will explain you how to hack Facebook password using keylogger.

Today i will explain you in detail with snapshots how to create your Facebook hacker keylogger, its a 100% Fully undetectable keylogger you can check this file using Virus total.  Its a 100% FUD remote keylogger with several advanced features. 
Today i will disclose you how i hacked 19000+ accounts, its so easy that anyone can do it. On my website you will never get any infected tool. If you have any doubt or feel something suspicious always test the link or file with virus total website before downloading. Never believe any website including mine also, always scan download links with virus total website or any such website before downloading it. Download it only when it does not have any virus.

Hack Facebook password using Keylogger Involves following steps:
1.  Create your Server that will hack passwords.
2. Extract the Icons from any software
3. Bind the Keylogger to make it Hidden
4. Spread your keylogger to victims

Note: This tutorial is for Educational Purposes only. I and Isoftdl is not responsible for any misuse of knowledge.

Let's start Facebook hacking tutorial in detail :

STEP1 : Create Server for Hacking Passwords
First of all for hacking any facebook account password, we have to create our keylogger server that will run on victims machine or PC and capture his keystrokes and mail us on the email account that we will use to build the keylogger. The keylogger server building process consists of several steps. 
The steps involved are mentioned below in detail:
1. First of all download the Keylogger.
Download Keylogger from here: LICK HERE TO DOWNLOAD 

DOWNLOAD BINDER HERE: CLICK HERE TO DOWNLOAD BINDER
2. Extract the RAR file. Now you will get one Folder and three files as shown in below snapshot:


 3. Now open the Keylogger file. Here you will need gmail ID and password. For safer use create a fake Gmail account and use it here as shown below:


hack facebook account
Hack Facebook account password using Keylogger
4. Now Click on server settings as shown. Here enter the time after which you want to receive reports, its always preferable to use 20 min timer for receiving files.  And Click on Output box to choose location of file and give it any name. Its always recommended to use system process name to make it undetectable like svchost or check any process name from your task manager and name it. Other fields are optional. The complete snapshot is shown below:


5. Now Click on Log and Result Setting. In Log EMail Title enter the subject of email like My keylogger report or simply my report or something else that you like. Also Click the last two options that i.e add Computer name and add victim name. The snapshot is shown below:


6. Now Click on Other Options.  In this section you just have to do one thing. Most hackers prefer warning message POP up but I love keylogger using any message. So unclick message button. Because when you bind it with any other software then it should not any warning messages otherwise it will be detectable.

7. Now at last click on Build Keylogger. Now after you click on it you will see your keylogger file at location that you have chosen in 4th step. Now this keylogger server file will be used to bind with any other software in Binding Step.

8. Now you keylogger server is ready that you will use to hack Facebook accounts. That's all for the server creation step now move to second main step.


Step 2.: Extracting the Icon file from any installer(resource hacker)
1. Open the Resource hacker folder and open the reshacker file.
2. Now go to its menu and open any setup file. Suppose we want to attach our keylogger to Ccleaner setup file. So open the Ccleaner setup with resource hacker. 
3. Now in menu there is one action button click on it and then click save all resources.




4. Now save all the resources to desktop or any other location of your choice.
5. It consists of two files one is icon file and other is res file . We only need icon file, so you can delete the other file i.e res file.
6. Now we have Icon of installer file(as discussed above Ccleaner setup Icon).




Step 3: Bind the Keylogger server with any software
1. Now Go to keylogger folder and open the Binder.
2. Now Click on + button given below to add files.
3. Now add the keylogger server and the set up of software (i.e. in our case it's Ccleaner setup).
4. Now in menu of Binder, Go to Settings. There select the icon that we have generated in the previous step and set the location of output file as shown in figure.
5. Now again go to File's menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. Now you have to spread it or send it to the victim that is your friend.



Step4 : How to Spread Keylogger or send it to victim or friend
1. Now you have one Software setup file with keylogger attached with it.(In our case we have Ccleaner setup with keylogger attached with it.
2. Now Spread your keylogger through forums. You might be a member of various forums use them to spread your keylogger in form of software posts. You can use various software's to spread them that users frequently download.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software give it the software that has keylogger attached with it. 
Note: you can also attach keylogger with images also. But that can be detectable by antivirus. So avoid such type of hacking.
So isn't that so easy to hack anyone's Facebook account in just few minutes. 

How to protect yourself from these hacks?
Prevention is always better than cure so always follow these steps:
1. Don't use cracked softwares and don't download them from unauthorized websites.
2. Always keep your antivirus and anti-spyware up to date.
3. Always scan the files before transferring them to your USB.
4. Do not allow other users to use your PC i.e password protect it.




Note: Hacking Email accounts is illegal. This post is just to aware you how easy is to hack Facebook and email accounts. So that you cannot fall into the traps of hackers.

I hope you all have liked it. If you have any queries ask me.  Please comment if you like my posts. Thanks for reading....

HOTFILE PREMIUM

HOTFILE Instructions:
1. Sign up a new Free account on http://hotfile.com
2. Install the latest version of firefox
3. go to this link -- https://addons.mozilla.org/en-US/firefox/addon/13793/
and install add and edit cookies and restart firefox
4. Sign in with your hotfile free account.
5. From the Firefox menu, click to Tools then select Cookie Editor.
6. Now in filter bar search for hotfile
7. The cookie name is AUTH ( you need to sign-in first to hotfile before you can see the cookie auth ) .
8. Now copy the Premium Cookie to the content bar. Click on save.
9. Copy/Paste the link that you want to download to firefox. 


For detailed information click here


205fa6773009dff74d8e69ba2117815309558109ac6c44acbd5091d00889d9ac
793c0fdef5e1ea529a042c1c38f2816d386d144233d433b8cb9ee12cd909badc


cb9720e0a3f18f04a308b84167f8816b5213ca57a8d0d0ba001c53846cebdf10
3c7354e1c59786fbbb60d6729fd8815dab948b033a529d269173ccc31af4dc77
6689383911fb2cc316eda055c55d816cd0b269a99186ccac6c6961c955ff49e1
061c5141c3e27708ea170aa5dd5d8174206bc020ccc1389468087a7a65eaae3f
528b00da3ec4831cbaf02880f6b98158b4ff7bdf3b1ec27582657781acb17325
56e9be850ab56cc5d0e40842fe3681600fd7f4a98d719f1528ea2f0487513086
dd302837a677bb3dd882d8037f1c8156f2af2855c1e68c7c0d9a28422e375c5f


9b482347afbdaa038ec10cabc8088131b47b7cc75542cbfd9a90f21f848d87dd
6874f59c9b6b58971fcec1316972815fe76de9334e2e545519b773d0d42ba2c0
ad65ccfa25f41dab9941d36d1ddd8159189431f9194fa83e12a223926df6ad32
d476d0c357d3a1b1d102f614b6e3814750fbda1f2e9d1b31bb59777cf455a801
c2c52240f187b9bba37a5950e896815de4a6f3f817ba5686c7ff1a0a41d43b71


login : okulaari66
pass : llc6Kq9

login: scorpion35
pass: 161235

Login : tylavie
Pass : diamond

Login : asphodel
Pass : tunahead

Login : marcel2k
Pass : marissa

Login : hovangr22
Pass : :vanosgr5672

Login : gmtgmt
Pass : thomas

How to use Hotfile Cookies for downloading as Premium



How to use Hotfile Cookies for downloading as Premium
1) Sign up a new Free account on the http://hotfile.com site that you want to use premium cookie.


2) Install "Cookie Editor" addon ( https://addons.mozilla.org/en-US/firefox/addon/13793/ ) then restart your Firefox browser.
3) Sign in with your signed account.
4) From the Firefox menu, click to Tools then select Cookie Editor
5) Double click to "Hotfile" site with "auth" value    ( only signing into free account you will able to see under line in picture darked hotfile.com   auth ) .
























 6) Paste this value to "Content" and click to Save button.


















7)Copy/Paste the link to the browser that you want to download

Viral and Malicious Facebook Application Toolkit

During last weekend a viral rogue app campaign hit Facebook again. This time the application was called “Profile Creeps” which, like many other rogue applications before it, promises to do what Facebook simply doesn’t allow *ANY* app to do – let us know who looks at our profile. But users are still tricked into installing apps that promise to do just this. And just like most others, the latest one leads to a survey that in the end generates money for the people behind the app.

let’s look at a very similar fraudulent application that “can” allow Facebook users to know who “creeps” at their profile, called “Facebook Profile Creeper Tracker Pro”. The application asks for some permissions, shows an online survey/advertisements and tells the user at the end of the process that he/she is the one that looks at his/her own profile the most. In other words, this application should be revoked according to the terms and conditions of Facebook.
“Facebook Profile Creeper Tracker Pro” and similar fraudulent applications

This application was built with a pre-defined toolkit called “Tinie app” which is a Facebook viral application template available in some variations for only $25 or even less. The next image is one of the template images in the toolkit that aims to give some directions to the buyer, besides the full-blown step-by-step guide that comes with the kit itself:

The buyer doesn’t have to have development experience with Facebook, he/she just needs to follow the accompanying instructions and a working viral Facebook application is at their disposal.

Facebook ClickJacking : Malware takes on new Italian disguises

Facebook users have been subjected to clickjacking attacks that force them to authorize actions they had no intention of approving.
The latest few campaigns seen by SophosLabs, for instance, target Italian users of the social network.


COCA COLA: Dopo aver visto questo video non berrò più coca cola. Svelata la ricetta segreta. Guarda il video verita
Which translates as: “COCA COLA: After watching this video you won’t drink Coca Cola. The secret recipe revealed. Watch the video truth.”

LO SCHERZO DI SAN VALENTINO CHE STA FACENDO IL GIRO DEL MONDO! TE RETO A VER ESTA PAGINA PARA 5 SEGUNDOS SIN REIRTE
Which translates as: “THE VALENTINE’S DAY JOKE THAT IS GOING AROUND THE WORLD! I CHALLENGE YOU TO VIEW THIS PAGE FOR 5 SECONDS WITHOUT LAUGHING.”
All of these Facebook scams use clickjacking techniques to trick the user into “liking” them.
SophosLabs is intercepting the suspicious pages as Mal/FBJack-A.
Facebook users can protect themselves from clickjacking threats like this by using browser plugins such as NoScript for Firefox.

Cryptography


 By definition cryptography is the process of converting recognisable data into an encrypted code for transmitting it over a network (either trusted or untrusted). Data is encrypted at the source, i.e. sender's end and decrypted at the destination, i.e. receiver's end.

In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted into usable plaintext using different encryption algorithms.


The Purpose :-
* Authentication : The process of proving one's identity.
* Privacy/confidentiality : Ensuring that no one can read the message except the intended receiver.
* Integrity : Assuring the receiver that the received message has not been altered in any way from the original.
* Non-repudiation : A mechanism to prove that the sender really sent this message.

In general cryptographic algorithms are classified into three categories as follows :

1) Secret Key Cryptography (SKC) : Uses a single key for both encryption and decryption.
2) Public Key Cryptography (PKC) : Uses one key for encryption and another for decryption.
3) Hash Functions : Uses a mathematical transformation to irreversibly "encrypt" information.

Secret Key Cryptography :- With secret key cryptography, a single key is used for both encryption and decryption. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.

Secret key cryptography algorithms that are in use today include :

1) Data Encryption Standard (DES) : DES is a block-cipher employing a 56-bit key that operates on 64-bit blocks. DES uses a key of only 56 bits, and thus it is now susceptible to "brute force" attacks.
Triple-DES (3DES) and DESX are the two important variants that strengthen DES.

2) Advanced Encryption Standard (AES ) : The algorithm can use a variable block length and key length; the latest specification allowed any combination of keys lengths of 128, 192, or 256 bits and blocks of length 128, 192, or 256 bits.

3 ) International Data Encryption Algorithm (IDEA) : Secret-key cryptosystem written by Xuejia Lai and James Massey, in 1992 and patented by Ascom; a 64-bit SKC block cipher using a 128-bit key. Also available internationally.

4) Rivest Ciphers : Named for Ron Rivest, a series of SKC algorithms.

RC1 : Designed on paper but never implemented.
RC2 : A 64-bit block cipher using variable-sized keys designed to replace DES. It's code has not been made public although many companies have licensed RC2 for use in their products. Described in RFC 2268.
RC3 : Found to be breakable during development.
RC4 : A stream cipher using variable-sized keys; it is widely used in commercial cryptography products, although it can only be exported using keys that are 40 bits or less in length.
RC5 : A block-cipher supporting a variety of block sizes, key sizes, and number of encryption passes over the data. Described in RFC 2040.
RC6 : An improvement over RC5, RC6 was one of the AES Round 2 algorithms.

5) Blowfish : A symmetric 64-bit block cipher invented by Bruce Schneier; optimized for 32-bit processors with large data caches, it is significantly faster than DES on a Pentium/PowerPC-class machine. Key lengths can vary from 32 to 448 bits in length. Blowfish, available freely and intended as a substitute for DES or IDEA, is in use in over 80 products.

Network Hacking


Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com



Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n




Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in




Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

Turkojan 4


Features :
* Reverse Connection
* Remote Desktop(very fast)
* Webcam Streaming(very fast)
* Audio Streaming
* Thumbnail viewer
* Remote passwords
* MSN Sniffer
* Remote Shell
* Web-Site Blocking
* Chat with server
* Send fake messages
* Advanced file manager
* Zipping files&folders
* Find files
* Change remote screen resolution
* Mouse manager
* Information about remote computer
* Clipboard manager
* IE options
* Running Process
* Service Manager
* Keyboard Manager
* Online keylogger
* Offline keylogger
* Fun Menu
* Registry manager
* Invisible in Searching Files/Regedit/Msconfig
* Small Server 100kb
Download :
http://www.4shared.com/file/72543880/bd92d968/TurkojaN_4.html
http://w14.easy-share.com/1702095672.html

BlackHole RAT Beta – Mac OS X Trojan Horse

BlackHole is a variant of a well-known Remote Access Trojan (RAT) for Windows known as darkComet.

“Hello, Im the BlackHole Remote Administration Tool.
I am a Trojan Horse, so i have infected your Mac Computer.
I know, most people think Macs can’t be infected, but look, you ARE Infected!
I have full controll over your Computer and i can do everything I want, and you can do nothing to prevent it.
So, Im a very new Virus, under Development, so there will be much more functions when im finished.
But for now, it’s okay what I can do?”
This message, displayed in the full screen window with the reboot button blocks user’s screen.
As even the malware itself admits, it is not yet finished, but it could be indicative of more underground programmers taking note of Apple’s increasing market share.
Functions :
  • Remote execution of shell commands.
  • Opens URL using victim’s default browser.
  • Sends a message which is displayed on the victims screen.
  • Creates a text file.
  • Perform shutdown, restart and sleep operation.
  • Popping up a fake “Administrator Password” window to phish the target.

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information. Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase &  lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength


3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.