Jan 25, 2010

Toshiba Qosmio X305






Hello friends ....
After a long time I came with this article hope u like it :)

From many days I was in a search of a kind of laptop which can play most of the games..
I am not addicted to games but without games my life is bore .

So after searching a lot finally I found this "Toshiba Qosmio X305" on official site of Toshiba.

All the basic things are included in this laptop no doubt about that , but the most important feature is the graphic memory. With the help of 1GB of graphics memory you can imagine what you can do with that .The secret is it is bundled with two NVIDIA® GeForce® 9800M GTS SLI® graphics cards, with 1GB DDR3 discrete graphics memory.



I can have the full fun of the games like crisis :)


With all the power there is the good thing about the design .
It is very different from the traditional design of a laptop . Means the looks are intentionally given for the game lovers .


The Intel® Core™ 2 Extreme mobile processor is the best in the series of Intel can only give high performance and nothing else LoL:)


Most of the things are repeated as it is new laptop like 5.1 stereo and all . But if we talk about the memory then this gives a different impression , as it has 4GB RAM .
Go get new Vista or MAC for this laptop.



Currently I can only imagine for this laptop as it is of $1500 :( Will buy someday ... :)


This series of laptops varies from $1500 to $4200...

Buy this buddy from official site .
BUY IT







Read rest of entry

Jan 9, 2010

Auto Hide IP v4.6.3.2


Auto Hide IP v4.6.3.2

Auto Hide IP v4.6.3.2


Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit
other crimes against you. Auto Hide IP allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button.Auto Hide IP is privacy-protection software which enables you to conceal your real IP address, surf anonymously, and automatically change your IP address every few minutes.
With it, you can select fake IP from different countries via “Choose IP Country” option and can Check IP directly. Using it, you are able to conceal your identity online by showing them a fake IP, blocking hackers and prying eyes from knowing your true location or identity. You can also choose “Launch on Startup” and then it will run and load a fake IP automatically when you log on to Windows. Besides, you can easily switch between fake IP and real IP by simply clicking a button of Hide IP or Stop Hide.Auto Hide IP works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks and any other kind of Internet.
•  Anonymous Web Surfing
Prevent others from seeing your true IP when browsing the Internet. Change your IP frequently with the click of a button!
•  Protect Your Identity
Identity thieves can use your IP address to monitor your web activity and intercept your private financial information. Criminals, hackers, and even the government can trace your exact location right down to your street address.
•  Choose IP Country
You can also select fake IP from different countries via “Choose IP Country” option and can Check IP directly.
•  Send Anonymous E-mails
Prevent your real IP address from being shown in E-mail headers on any Webmail E-mail service such as Yahoo, Hotmail, or Gmail. It is very easy for anyone to find your geographic area you send E-mail from using free publicly available IP lookup tools.
•  Un-ban Yourself From Forums and Message Boards
Have you been banned from a forum or message board? No problem! Use Auto Hide IP to change your IP allowing you to access any website that has banned you such as eBay, Craigslist, and many browser-based games
http://i40.tinypic.com/166j3ix.gif
http://hotfile.com/dl/21667722/aa03b7f/Auto.Hide.IP.v4.6.3.2.rar.html



Your Ad Here

Read rest of entry

Jan 6, 2010

Hacking Facebook password: Facebook Phishing for Hacking Facebook

I was asked by Ricky to post a Facebook Phisher for hacking Facebook password. I have written about Facebook Freezer for hacking Facebook account. But, it does not help you in hacking Facebook password. So, I am writing on hacking Facebook password using Facebook Phisher in this article.
Hacking Facebook password

What do you think is above page?? Facebook login... No friends. Its a Facebook Phisher used for hacking Facebook passwords.

Note: The article is for educational purpose only. Remember, Phishing is legally offensive. I am not responsible for any action done by you.

Hacking Facebook password:





Your Ad Here



Facebook Phishing is one of the most preferred method used for hacking Facebook password.

1. Free Download Facebook Phisher for hacking Facebook password.

2. The downloaded file is zipped and password protected. (techotips.blogspot.com.)

3. The downloaded file contains:
a. Index.html
b. write.php

4. Upload both files to any free webhost like http://www.yourfreehosting.net/.

5. Now, send this phisher link (index.html link) to your victim and make him login to his Facebook account using your sent Phisher.

6. Once he logs in to his Facebook account using Phisher, all his typed Facebook id and password is stored in "passes.txt". This file is created in your webhost control panel as shown.

Facebook Phishing
If you dont get passes.txt, try refreshing your page.Once you get passes.txt, you get Facebook password and can easily use it for hacking Facebook account.

7. Now, open passes.txt to get hacked Facebook id and password as shown.
How to hack Facebook account
Note: For more information on hacking Facebook password using Facebook Phisher, refer my article .How to use Facebook Phisher

So friends, I hope you can use this Facebook Phisher for hacking Facebook password. If you have any problem in using this Facebook Phisher for hacking Facebook password, please mention it in comments.

Enjoy Facebook Phishing for hacking Facebook passwords...




Read rest of entry

Jan 2, 2010

Top 20 Must Have Hacking Tools

These are Top 20 Hacking Tools, the list is exhaustive, this are a few to name.


The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.

Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol
TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.
Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).
DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).
GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil’s advocate alerting you to security vulnerabilities.
>Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.
Nikto is an Open Source (GPL) web server

scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.
John the Ripper is a fast password cracker, currently available for many flavors of Unix.
OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.
Tripwire is a tool that can be used for data and program integrity assurance.
Kismet is an 802.11 wireless network sniffer – this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.
NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.
IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.
OpenBSD Packet Filter
fport identifys all open TCP/IP and UDP ports and maps them to the owning application.
SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited.
OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.




Read rest of entry

How to hack a computer remotly 90% undectable - method 2 85% sucess rate

This shows how hackers hack   remotly which is 90% undetectable


In this tutorial you will learn how to hack a computer any where in the world. Ok well not anywhere obviously things like the military and the goverment will have very high security so you definately wont be able 2 hack them using this method. I hope not aniways .

A Major Notice If you are behind a router you will need to port forward your router. To do this you can use a DMS. Its hard to explain as every router has a different interface ( homepage that has a different layout ) so i suggest you go to google and search portforward.com. It will teach you how to port forward your router there.

Ok to begin with you will need these three tools
Daemon Crypt -
Pc Guard -
Yuri Rat -

Ok now that you have these three tools your 1st step will be to open up Yuri Rat and then click on server build



You should now have the following the screen



In this screen I want you to put your IP address into the DNS/IP section.

To get IP Address go to Start > Run > Type CMD and hit enter. When the black box appears type in IPCONFIG. You will then have your IP Address

Port: You Can Leave As Default (-7898-)

Assigned Name: Doesn’t effect how the server will work its just to keep you more organized so if you wanted to hack your friend “JOE” and specifically make this server for him then you may want to type something like “JOES TROJAN”.

Server Install Name: You should leave this as default as I myself don’t know what the difference is as every server you make is named server when it is 1st created anyway. Do not change it as it may make problems but I am not sure.

Ok as you can see there are more settings on the right hand side. I am going to recommend you settings for different purposes

To Hack A Friend For Fun: Uncheck Everything Unless You Want To Do Optional
(OPTIONAL) Melt Server - Your server will disappear into another folder
(OPTIONAL) Custom Icon if you want to make it more believable or something then get an icon of super Mario or something you get my drift

To Find Out Valuable Information: Check Everything

Ok Now You Are Finished Click Build

Your server will then be saved to your C:\ or Hard Drive which ever you know it as. Now we are going to make the server about 90% Undetectable. Only once has one of my servers been detected by an anti virus and I think it was a Norton not sure which version. Ive scanned more then once with Kasper Sky & Symantec Anti Virus and every time they said its clean so lets begin

Open Up Daemon Crypt

Select Your File by clicking browse and going to the folder your server is in. If you have not moved it, it will most likely be in C:\

So Now You Have This



Click On Crypt and then you can close Daemon Tools

Now Install Your Pc Guard for Win32

When you open it you should get this



Ok you have to do basically the same thing as what you did with daemon tools. Click Browse and then find your server so that you have this




Your Ad Here



You then want to click on the General Settings and put these settings



Ok now you want to go to customization and make sure nothing is ticked



For the last step you want to click the protection methods tab and set it to plain. And then click on protect



Your server is now undetectable =)

Ok so now we have our server and everything is ready to go. Only thing now is to do some social engineering. Basically just lie to your friend/victim and tell them that it is a harmless file. If you do not know anything about your victim talk 2 him for like 3 days find out what he likes. Then lets say he likes football and naked women XD. say to him its a funny game where you play a 5minute 2D football match and if you win a sexc girl comes up on the screen and strips or something along them lines. Im not to good at social engineering. You could even say to your friend/victim that it is a patch for a game that you know that they have and it adds on extra things. The Server is now on there computer and they have double clicked it. If you checked the melt server option then the server will basically evaporate into their computer. They say hey its not working you say hey thats strange it works on my comp. Ahh fuck it i cant b bothered 2 send it again..

Ok so now you have the server running on there comp and it has opened up the default port for you to connect to.

Once again open Yuri Rat and click on listen. Yuri rat will then listen for your online servers that you have gave to people running on the default port 7898. If the person who you sent the rat to is not online you cant connect. When the server you sent out to your friend/victim a balloon notification will pop up. Note that yuri rat should still be listening for the servers. The server will show up in yuri rat. You right click and press connect. And there you go. you are now successfully connected to your victim



Ok now without uploading plug ins from yuri rat to your friends/victims computer you will only be able to do limited things with the program which are Download files from there comp & put files from your comp onto their comp.

When you are connected click on plug ins and them upload all of them.

You will then have access to keyloggers, screen capture and muc more. If you get stuck click on the help button and it wil tel you more a
out plug ins
Read rest of entry
 

Recent Posts

IS THIS BLOG INTRESTING

TECH & ETHICAL HACK TIPS Copyright © 2009 Gadget Blog is Designed by ADITYA Sponsored by HACKING AND CRACKING TIPS