Archive for April 2013

BSNL Broadband Hacked | How To Hack Bsnl Broadband

Here is the trick for How To Hack Bsnl Broadband I hope you will really enjoy it Follow the below steps to do this 

1. Identify your IP address (dont knw? visit @ whatismyip.com)

2.Download IP scanner.( i prefer angryziber.com/w/Download).

3.
Open IP scanner .GO to option/select port.Enter 80 in 1st option(enter post to scan)

4.In hostname option type ur ip.Click On the ip button next to host name on opening it will automatically fill the ip range.



5.In the first option Let ur original IP be but in the second option fill the ip greated then original.Now click Scan

6.IT will give you LIst of ips showing some ips green on left side.

7.Right click that ip and then to option 'open computer' & select browser

8.ASk for username and pass.GIve username :admin password:admin

9.if it doesnt respond take some other green IP.

10. When pages get open go to home & click Wan.Here uu will see user id and pass in coded form

11.To fetched actual passowrd download this soft from "(scanwith.com/X-Pass_download.htm)

12.Extract files from tht and run'X-pass'.Drag d 'x' icon in password filled and u will get the pass.

13. To check that pass go to http://10.240.160.195/webLogin.jsp

Thats it Done! x)

Posted in | Leave a comment

How To Send Fake Emails?

After my post on How To Secure Facebook Account From Hackers , Today I am going to show you how to send fake emails. Ya fake emails, I know many of you ask this can we send Emails with others name, or other email address, ya you are right you can do this here. 
For those who didn't know what is fake mail for them I am discussing some terms related to them below.

What is Fake Mail?
A fake mail is mail in simple word a anonymous email. A fake mail is a mail in which the sender can send this mail to anyone without mention his/her original ID. 




Yes the site is Embei's Fake Mailer


This site looks like this.
Here you can give any Name, Email ID, Subject, Text.
Name- This is the option from which the mail is to be send.
Email-ID- Here you can give any Email-ID as per your choice.
To- This is important as here you have to give the recipient's Email address.
Subject- Anything as per your choice.
Text- Anything as want to write and send it to the victim.
And many other option as your per your requirement.

Note: This post was only for Educational purpose. So remember don't use it for any illegal purpose or you only will be responsible. 
I Hope you really enjoy it !!

Posted in , | Leave a comment

Website Hacking Best Techniques By Xcoder


Everyday, you search in Google, Yahoo, and other search engines, "How to Hack Websites?", "Methods to Hack Website", "Website Hacking", etc. Website Hacking have become a popular business or rather an interesting game for many people, reasons behind this hack is normally to prove their skills and to get fame, or anything else. As we know, "To catch a thief, we must think like a thief", like here also, we can conclude that to secure a things, we must first find insecure in it, then we can proceed on securing. So, before proceeding to the topic of securing we must first know what is insecure in it.


There are many drawbacks by which websites are compromised, these is normally due to the poor management of site by the webmaster or admin.

So, the methods by which websites are hacked are:
  • Cross-Site Scripting
  • SQL Injection
  • Remote File Inclusion
  • Local File Inclusion
  • Denial of Service Attack
  • Brute-Force Attack
These are some of the common methods to hack a website, let's discuss them below:
  • Cross-site Scripting: Cross-Site Scripting is a type of attack in which a hacker inject script into webpages. Their effect may range from a pretty nuisance to a significant security risk. By this way of injecting codes into webpages, a hacker can gain access to sensitive page content, session cookies, and a variety of other information which are maintained by the browser on behalf of the user.
  • SQL Injection: SQL stands for Structured Query Language, SQL Injection is a another type of web application vulnerability occurring in the database layer of an application. It is mostly used for stealing sensitive data (like Username, Password, Email ID, many more). It takes advantages of improper coding in the web application that allow the attacker to inject SQL commands.
  • Remote File Inclusion: Remote File Inclusion (RFI) allows an attacker to include a remote file, usually through a script on the web server. A hacker usually upload a file (normally a shell) by tricking the web server on the webpage.
  • Local File Inclusion: A Local File Inclusion (LFI) is a method to include local files on runtime. This is much same like RFI. This method involves the discovering of /etc/passwd file in the web directory.
  • Denial of Service Attack: Denial of Service Attack (DoS attack) or Distributed Denial of Service attack(DDoS attack) is an attempt to make the computer resource unavailable to its users. These are the common attack nowadays, its main purpose is to obstruct the communication of the victim's computer by forcing the targeted computer(s) to reset.
  • Brute-Force Attack: Brute-Force Attack is a method in which an attacker tries to crack every possible letters of the password until the whole password is cracked. The main drawback of this attack is that it takes too much time while cracking the password, as it tries every possible character which can be a part of the password.
There are many other ways too for taking over a site, but these are nowadays very common.












Some others methods are DNS Hijacking, Insufficient Administration, Misconfiguration, Uses of Trojans, many more.

My advice to all the webmaster or admin is to check their site against these vulnerabilities as to protect them from future attacks.

Posted in , , | Leave a comment

Everyday, you search in Google, Yahoo, and other search engines, "How to Hack Websites?", "Methods to Hack Website", "Website Hacking", etc. Website Hacking have become a popular business or rather an interesting game for many people, reasons behind this hack is normally to prove their skills and to get fame, or anything else. As we know, "To catch a thief, we must think like a thief", like here also, we can conclude that to secure a things, we must first find insecure in it, then we can proceed on securing. So, before proceeding to the topic of securing we must first know what is insecure in it.



There are many drawbacks by which websites are compromised, these is normally due to the poor management of site by the webmaster or admin.

So, the methods by which websites are hacked are:
  • Cross-Site Scripting
  • SQL Injection
  • Remote File Inclusion
  • Local File Inclusion
  • Denial of Service Attack
  • Brute-Force Attack
These are some of the common methods to hack a website, let's discuss them below.
  • Cross-site Scripting: Cross-Site Scripting is a type of attack in which a hacker inject script into webpages. Their effect may range from a pretty nuisance to a significant security risk. By this way of injecting codes into webpages, a hacker can gain access to sensitive page content, session cookies, and a variety of other information which are maintained by the browser on behalf of the user. 
  • SQL Injection: SQL stands for Structured Query Language, SQL Injection is a another type of web application vulnerability occurring in the database layer of an application. It is mostly used for stealing sensitive data (like Username, Password, Email ID, many more). It takes advantages of improper coding in the web application that allow the attacker to inject SQL commands.
  • Remote File Inclusion: Remote File Inclusion (RFI) allows an attacker to include a remote file, usually through a script on the web server. A hacker usually upload a file (normally a shell) by tricking the web server on the webpage. 
  • Local File Inclusion: A Local File Inclusion (LFI) is a method to include local files on runtime. This is much same like RFI. This method involves the discovering of /etc/passwd/ file in the web directory.
  • Denial of Service Attack: Denial of Service Attack (DoS attack) or Distributed Denial of Service attack(DDoS attack) is an attempt to make the computer resource unavailable to its users. These are the common attack nowadays, its main purpose is to obstruct the communication of the victim's computer by forcing the targeted computer(s) to reset.
  • Brute-Force Attack: Brute-Force Attack is a method in which an attacker tries to crack every possible letters of the password until the whole password is cracked. The main drawback of this attack is that it takes too much time while cracking the password, as it tries every possible character which can be a part of the password.
There are many other ways too for taking over a site, but these are nowadays very common.












Some others methods are DNS Hijacking, Insufficient Administration, Misconfiguration, Uses of Trojans, many more.

My advice to all the webmaster or admin is to check their site against these vulnerabilities as to protect them from future attacks.

Leave a comment

How To Secure Facebook Account From Hackers


Facebook is always at the top of Hacker's list due to its large popularity, ease to use, connects large number of people,  large collection of applications, many more. Facebook was launched in 2004, as of January 2011, it had more than 600 million active user. A hacker can get many useful information about anyone with Hacking his or her Facebook Account and can destroy anyones social life with it. Due to large number of attacks on Facebook everyday, it is trying to deeply secure its data from attackers. Many new awesome security feature had been built to secure its users, but loophole is always there.

Some days before Facebook had built a new security feature, it is Login Approval  similar to 2-Step Verification. As I have already mentioned a post about 2-step verification, if you have read that post then you must have some knowledge about it. Anyways back to the post.

What is Login Approval?

Login Approvals is an opt-in security feature similar to Login Notifications, but with an extra security step. With Login Approvals, each time you try to access your Facebook account from an unrecognized device (ex: any computer or mobile phone you haven't named and saved to your Facebook account), you will first have to enter a security code that's been sent to your mobile phone. 

How to turn on Login Approval?

To turn on Login Approval in Facebook
  • Go to your Account Settings page and select the change option next to Account Security.
  • Check the box under Login Approval ( If you don’t have a mobile phone number linked to your Facebook account, you will need to add one).
  • If you are haven't named the device you are on, you will be prompted to do so when you turn on Login Approvals. Do not click the "Save this device" option if you are using a public device (ex: a friend’s phone, a library computer). Note that all of the devices linked to your Facebook account (ex: your recognized devices) are listed under the Login Approvals section.
What will happen after turning on the Login Approval?
After turning on this feature whenever you will login to your Facebook Account from any other unrecognized devices you will be ask to enter a security code which will be sent to your mobile. 


Google 2-Step Verification V/S Facebook Login Approval?
Google 2-Step verification is far most better than Facebook Login Approval because Google 2-Step verification also provide some backup codes in case of mobile loss or other and  in case when you can't receive verification code due to some network problem or else, you can also get a call from Google informing you about the verification codes, as compared to Facebook Login Approval. Facebook may also work hard to compete with Google 2-Step Verification.
 
I hope you really enjoy it this post !!

Posted in , , | Leave a comment

How to recover your deleted files from memory card | Recover Deleted Pictures and Files from Memory Cards

My Had Accidently Deleted quite a few recent pics from my Nokia N97 Memory Card and He was feeling pretty much disgraced about that. We recently went for an excellent trip, captured all those fun moments in the camera and yes if those memories get deleted, everyone will feel disgusted about that. It is at that time, I googled and finally found a recovery software that not only recovered ALL THE PICTURES from my memory card but also it was absolutely FREE to use as well. Amazing right?

PC Inspector Smart Recovery is just the right software that can do wonders for you. Believe me, it works perfectly fine although takes a bit of time (when I say “bit of time” that means hours and hours…) to recover all those accidently deleted pictures and files. The software is very easy to use and even if you are not a computer savvy person, you can use it without much discomfort.

PC INSPECTOR Smart Recovery works with Flash Card™, Smart Media™, SONY Memory Stick™, IBM™ Micro Drive, Multimedia Card, Secure Digital Card or any other data carrier for Digital Cameras. I have tried this software on my Phone Memory Card as well and it recovered all the pictures that got accidently deleted.
If you have unintentionally deleted or formatted pictures, videos or sound files on your data carrier or have pulled it out during a write operation, no matter – PC INSPECTOR smart recovery can easily, quickly and absolutely reliably reconstruct the lost data. It supports the following picture formats: .jpg, .amr, .tif, .bmp, .gif, Canon .crw , Fuji .raf , RICOH .raw, Olympus .orf (E-XX), Olympus .orf (C5050), Nokia 3gp, Kodak .dcr, Minolta .mrw, Nikon .nef (D1H/D1X), Nikon .nef (D2H/D2X), Nikon .nef (E5000/E5700), Sigma – Foveon .x3f, mp4, QuickTime .mov (Konica Minolta). Video files in .avi, QuickTime .mov format and audio files in .wav, .dss format can also be recovered.
Suggestions If you have deleted the files by mistake and want to recover most of those, PLEASE STOP TAKING ANY MORE PICTURES from your digital camera or mobile phone. That’s because the more you write new data on your memory card, the chances of recovering old and deleted data becomes less.

Software download link :- CLICK HERE

i hope you really enjoying it !!

Thanks for visiting!

Posted in , , | Leave a comment

How To Format Mobile Phone | Trick to Complete Formatting Mobile Phone




 Here is the trick for complete formatting of your virus infected or other problem arriving mobile phone...

This trick is for almost all Nokia models.

1. Switch off your phone...
2. Remove SIM card & memory chip...
3. Now press & hold keys - 3,*,call green) ...
4. Then without leaving these three buttons press power button...
5. Formatting task will be started...
6. Remember its a very rare trick....

 Yes its true its call hard format.

 key * , 3 , Call button (green) press and hold when display is on than formatting screen is displayed.
Wait for formatting to be finished,
Before carrying out this process make sure you have copied all your contacts and notes onto your Memory, because every thing will be deleted. When its finished the formatted phone may be like new, just like when u have brought it from showroom! :)

Posted in | Leave a comment

How to check china mobile IMEI number valid and original? | Check Mobile IMEI Number


I came across a news article regarding China Mobiles and the importance of IMEI numbers. So here I provide a method by which you can check whether your phone has a valid and original IMEI number.

Mobile number without or wrong IMEI number are banned accorss India now. Mostly China mobile phone brands like Alkatel, Sigmatel, Spice, Karbon, GFIVE and many more now provide valid IMEI number

Check China or any Mobile Phone IMEI Number Validity


1.Press *#06# on your mobile handset and note down the 15 digit IMEI number
2.Compose a new message from your mobile >> Type your 15 digit IMEI number >> Send it to 53232
3.If you get “Success” as the reply, then your mobile IMEI number is valid
4.If you get “Invalid IMEI” as the reply, that means your IMEI number is not valid
5.You are now done.

This will help you to know that your imei number is valid or not

I hope u really enjoy it !!!

Posted in , | Leave a comment

How To Hack Windows Administrator Password In Safe Mode

 

 
Have you ever tried using someone’s computer when they said you couldn’t? And you cant log in because they have a password? Below is the step by step procedure where you can log in to machine
Just in case anyone is confused:
 
Your Acount Name – the account name you wish to have
Victim Account Name – the account name of which you wish to change the password.
 
Step 1:
Restart the computer, and when it boots back up tap the f8 key a few times to go to a menu that asks about safe mode.
 
Step 2:
Select safe mode with Command Prompt. It should load into safe mode allowing you to use CMD.
 
Step 3:
Now what you need to do is type this command:
net user YourAccountName localgroup administrators /add
NOTE: What this does is is create the account in the administrators group. =)
 
Step 4:
now type
shutdown -r -t 1
NOTE: this restarts the computer. Then log in with your newly created account.
 

ALTERNATE PROCESS:

Another way to do this is to do the same thing as earlier and boot into safe mode with command prompt.
Type this:
net user VictimAccountName *
You should see this output
Please Enter a new password:
Please Confirm new Password:
To add your account to the admin panel type this: net localgroup administrator “username” /add
This takes the account specified and changes the password to what you want.
Be careful as entering the password doesn’t show anything.
Please drop a comment if this doesn’t works. Leave me some Feedback. =)

Posted in | Leave a comment

How To Hack Yahoo Accounts Easily


Hello Readers, I am very glad and happy to write it. I have heard a lots of people nowadays ask on How to Hack Gmail, Yahoo, Facebook, YouTube, Orkut, etc, etc. For them I am posting this hack. I hope you will really enjoy it and make use of it but don't use it for any harmful purpose and misuse it. So for this hack you will need a small program of which I will discuss below and tell you about on how to use it.


The name of this wonderful program is Magic PS. Its a wonderful software utility which sends User ID and password of the victim to your yahoo account.

Steps for Hacking:

  • First of all download this program from here ( It's recommended to turn off Anti-Virus before using it)
  • Extract it on desktop (The file is in .zip format so you have to extract it)
  • Choose the desired option, give your Yahoo ID, bind it with other file, choose any icon, and other options as your choice.
  • At last you will see a newly created .exe file.
  • Send it to the victim, as soon as he will run it you will get his ID and Password
Screenshot of the program:



I will recommend you to use these option as shown in screenshot below:


















I hope you really enjoy it.

Posted in , | Leave a comment

How To Hack Mobile Phones Through Bluetooth

Yes guys it is The Moobile bluetooth hacker. It is a software which can be used to hack any mobile phone through bluetooth network. 
 
Once connected to a another Phone by bluetooth you can do the following:
 
 
 
 
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile
5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
Switch off the phone
9) Restore factory settings
10) Change ringing volume


Notes:
1.) When connecting devices use a code 0000
2.) At start of programming on smartphones do not forget to turn on bluetooth before start of the application
What else you want
Just go and download it download
enjoy and keep visiting here :)

Posted in , | Leave a comment

How To Hack Free STD-ISD Calls | make free STD-ISD calls

Today i am going to show you How To make free STD-ISD calls. I hope you will really enjoy it Follow the below steps to do this..

1) Dial 1-800-373-3411 (1-800-FREE-411),

2) When the automated operator greets you (probably after an ad) you need to say “Free Call”. You will, then, be connected to the server.

3) Enter (key in) your destination number in “country code + destination number” format. For example 9122********* could connect you to someone in Mumbai.


4) Continue talking for 5 minutes and then this free call will get disconnected. You know what you want to do after that, yes follow steps 1-4 again.

This number 1-800-FREE-411, when dialed from a landline in USA is a free number. For our readers outside USA there is no reason to get disappointed. You can use skype to call 1-800-373-3411 for free and you can get free international calls anywhere in the world. Yes!! That is free ISD as well as STD calls
i hope you really enjoy it !!

Posted in , | Leave a comment

Google Lauches A New Authenticating Process

Hello Today I am posting about a new authenticating process which Google had launced, its  2-step verification. 
Using 2-step verification will help prevent strangers from accessing your account with just a stolen password. When you sign in with 2-step verification, you'll verify your identity using both a password and a code that you receive on your phone.

Why you should use 2-step verification
2-step verification adds an extra layer of security to your Google Account by requiring you to have access to your phone – as well as your username and password – when you sign in. This means that if someone steals or guesses your password, the potential hijacker still can't sign in to your account because they don't have your phone.

How you sign in with 2-step verification

  1. When you want to access Google products from your browser, go to that product and enter your username and password.

    image of brain with arrow to sign in 
  2. You'll next be prompted to enter your verification code, which you'll get from your phone. You'll only have to do this once every 30 days if you so choose.

    image of phone to verification screen 
  3. Soon after you turn on 2-step verification, non-browser applications and devices that use your Google Account (such as Gmail on your phone or Outlook), will stop working. You'll then have to sign in using your username and a special password you generate for this application. (Don't worry, you'll only have to do this once for each device or application.)

    image of application-specific password to phone

What you’ll need

While 2-step verification requires some web savvy, you only need a few basic items:
  1. A phone that is usually available to you when you sign in. This could be:
    • A standard phone (landline or mobile)
    • Any Android device, BlackBerry device, iPhone, iPod Touch, or iPad that can run the Google Authenticator application
  2. A backup phone that you can use if you lose access to your primary phone. This could be:
    • A work or home phone (landline or mobile)
    • The phone of someone you trust, like a friend or family member.

How to get started

Go to your Accounts settings page and look for the Using 2-step verification link. If you have the link, click it and start the setup process.
If you do not see the link and you are a Google Apps user, you might have to access the 2-step verification setup through a special URL. It is also possible that your domain administrator has not yet set it up for your organization. Check with your domain administrator to find out.

ManageAccount settings page

i hope you really enjoy it this post.  If you have any queries ask me below.

Posted in | Leave a comment

Check SQL Injection in Best 3 Steps


 https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7VotU9eC4YgiQaOdXuSFOqUURZTiURznyX0XEmpZK3CWNYxISgD3Pu5Fa8a80gvv6_442FuoSi3R_RembfYwx2ZurjuY3mBdymGYAm6_7sgTomdtyy3K4_fcmT4iVbG0o7-gWHQX6PuYt/s1600/SQL-Injection-Attack.jpg



I have heard a lots of people nowadays ask on How to Check SQL Injection   I hope you will really enjoy it 
So Today I'm teaching SQL injection (SQLi) indepth so I will try teaching you guys a little of that as well. SQLi is the most popular attack on any website these days.There has been an enormous increase in SQL programmers and websites,and the biggest problem with SQL is "Either your perfect/hacked".Due to poor
coding programmers often leave vulnerabilities in their site and hackers its our job to inform them and patch them up.So lets see

how to check if a site if vulnerable to SQLi


Since this is still the basic,there is nothing much to do.All you have to is:


1.Get a site which uses SQL queries. For your convenience simpler terms it is any site which has "
www.site.com/something.php?ex=43". You must have seen tons of such sites.Note: NOT all sites which have "=" use SQL queries it might also use "PHP Get/Post method".

2.Once, you have a site like then just insert a apostrophe (') like this "
www.site.com/something.php?ex=43'".

3.If the site is vulnerable to SQL then it would return an error something like this.You might get an error like this "
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\' AND single_group = "S"' at line 1"

This error need not be the same always,as long as you get an error you can tell that the site is vulnerable to SQLi and its up to you to become a her and report to the site admin.

Posted in , | Leave a comment

Airtel Hack 2012-13 for Unlimited Free SMS By AlienBases

Many people search for free Airtel message center number to start sending unlimited messages without paying for them. Well, previously many websites made posts on these free message center numbers, but after the frequent use of the number, Airtel capped or filtered those numbers from further use. But still there are few working message center numbers and here I am going to reveal that with you. Note that Airtel might ban this number anytime, so be fast in using this and send free sms to anyone from your Airtel mobile number.

How to send unlimited free SMS using free SMS center no hack


  1. Navigate to Messages option on your mobile and click on Settings
  2. Click on Message Center Number and proceed to add a new message center number.
  3. In Message Center Name field, write anything. For an example, “Hungry Hacker”.
  4. In the Message Center Number field, write +919810051905
  5. Choose Preferred Connection Type as Packet Data
  6. Save the message center and activate it from the options.

Now we have configured the message settings to send and receive all message through an another message center number. But since we have selected Packet data as connection type, we have to do some additional settings on our phone.

  1. Go to your phone menu and navigate to Settings >> Phone Settings >> Connection >> Packet Data
  2. In the settings of packet Data, edit the following options
  3. Packet Data Connection >> When available and Access Point >> Airtel Live
  4. Save all settings and you are done.

Note: Here we are using a CDMA message center number to send free messages from Airtel mobile. Since CDMA networks don’t support 91 as the country code, you have to add 0 before every number. This is very important and if you make mistake here, this trick will not work.

Example : Suppose you want to send free messages to 9861098610, now while composing the SMS, type this number as 09861098610 in stead of 919861098610 or +919861098610.

And also, message center number settings option may vary from phone to phone. The above steps are mentioned for Nokia mobile phones. If you want to try sending free SMS from any other handset, use your mobile manual and set the new message center number accordingly.

Posted in | Leave a comment

How to Send free SMS Worldwide | Hack Send Free SMS To Worldwide


Most of you might have heard about Google Voice which provides great free VOIP service within USA. However, Google Voice is not free for people outside USA. When you try to visit Google Voice home page from anywhere but USA, it says that Google Voice is not available in your country. Today, we bring you a hack that will let you use Google Voice to send and receive free SMS anywhere in the world.
Requirements:
  • A smart Phone (iPhone, Blackberry or other smart phones)
  • Internet connection
  • Two Google Voice Accounts
Steps

If you have a smart phone you can download the google voice application for it. If Google does not have an application for your device you can still use web version which you can access from your phone’s web browser.
You will need a Google voice Account . If you are outside USA you can use a proxy such as Click Here to create Google Voice account. Remember that you will need one account for each person that you want to send (or receive) SMS to (from). Google Voice comes with a USA phone number that you have the option to choose from host of numbers.
Once you have the accounts set up you can login to your phone using this information. The good thing is that this application works on GPRS too. Moreover, you can use GPRS without the special data plan for iPhone.
After you have logged into your application successfully, you can send SMS to any number in USA and Canada. Since all your friends now have a Google Voice Number you can sms them and they can reply back on your Google voice number. Your friends or partners need not be within the same country. They can be anywhere in the world. This is totally free SMS service for you.....
Enjoy !!

Posted in | Leave a comment

Tips for Protection Against Keyloggers

  
 
 
1.Enable Your Firewall:-

Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software to protect your computer from unauthorized access.By default Microsoft windows firewall is enabled.

2.Use Good Antivirus Software And Avoid Downloading cracked Softwares:-

Use good antivirus softwares like Norton,mcafee or use the free ones like Avg,Avast,Avira.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.

Now Will Discuss How to Fool Keyloggers

If you believe that their is a keylogger in your system then you can do the following things to protect yourself

1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run.

2.Type 2-3  random characters in your password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password.

3.Keylogger runs in the background.Always check out for suspicious processes using task manger and end them.

This tips and tricks will help you out in protecting yourself from these harmful spywares

1.Enable Your Firewall:-

Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software to protect your computer from unauthorized access.By default Microsoft windows firewall is enabled.

2.Use Good Antivirus Software And Avoid Downloading cracked Softwares:-

Use good antivirus softwares like Norton,mcafee or use the free ones like Avg,Avast,Avira.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.

Now Will Discuss How to Fool Keyloggers

If you believe that their is a keylogger in your system then you can do the following things to protect yourself

1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run.

2.Type 2-3  random characters in your password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password.

3.Keylogger runs in the background.Always check out for suspicious processes using task manger and end them.

This tips and tricks will help you out in protecting yourself from these harmful spywares
 
1.Enable Your Firewall:-

Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software to protect your computer from unauthorized access.By default Microsoft windows firewall is enabled.

2.Use Good Antivirus Software And Avoid Downloading cracked Softwares:-

Use good antivirus softwares like Norton,mcafee or use the free ones like Avg,Avast,Avira.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.

Now Will Discuss How to Fool Keyloggers

If you believe that their is a keylogger in your system then you can do the following things to protect yourself

1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run.

2.Type 2-3  random characters in your password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password.

3.Keylogger runs in the background.Always check out for suspicious processes using task manger and end them.

This tips and tricks will help you out in protecting yourself from these harmful spywares

Posted in , , | Leave a comment

Restore your computer after virus Attack

Restore your computer after virus Attack

Even after the virus is totally removed from the Computer, some Pepole find it difficult to restore all those things back which were affected by the virus. A virus usually when enters into a system disables the registry editor and task manager so that the user can not remove the virus from the system.

Here is a free tool Re-Enable using which even a novice users can fix all the things which were disabled by the virus. An antivirus can remove the virus files but sometimes it may fail to restore the system settings. In such situations this tool can come handy.
http://1.bp.blogspot.com/_F7GuXCzPQdY/TGLTgssan1I/AAAAAAAAEQI/F7cVkRXrJmY/s1600/Re-Enable_1.png

The program has the ability to restore functionality to these Windows features:
  • Windows Registry
  • Command Line Tool
  • Windows Task Manager
  • System Restore Config
  • Folder Options
  • Run command
  • My Computer
  • Task Scheduler
  • Right Click Context menu
  • Ms-Config (Xp only)
  • Control Panel
  • Search

You will require dot net 3.5 or higher version to run this software. Or if you don’t want to download .Net framework then you can try the portable version of this software.

Download Re-Enable

Do you have questions, comments, or suggestions? Feel free to post a comment!

Posted in , | Leave a comment

Make Your Pc A Cool Look And Feel

Hi guys today i come up with a trick that make your pc feel cool and also awesome look.
So Like all know by using several themes we can give our pc a different look ...

Want to give your pc a 3D Look Using this application?

Using a small software known as Bump Top You can switch your desktop to a 3D view have 
Look At image below..:)


                                         Download Bump Top


Want To make your pc more dynamic and Professional Look?

Now if you are not satisfied With This 3D look Lets Go deeper and Have A Look On
My Exciting new look..Yes You can also make your pc look like this

How To Make its Very simple Just Download A Software known as Rainmeter 
Here
Install It 
After that download any of the Skins as your desired look from below
                                                   Download
           Download

Goto your downloaded Skin
right click on file and click on "install RainMeter skin"

Hope You have liked this tutorial do share ,hit like us ,post comments Thank you.

Posted in , | Leave a comment