<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Only Hacking</title><description></description><managingEditor>noreply@blogger.com (Only Hacking)</managingEditor><pubDate>Tue, 10 Mar 2026 14:57:01 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">17</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://onlyhacking007.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>NEWS----</title><link>http://onlyhacking007.blogspot.com/2013/06/news.html</link><author>noreply@blogger.com (Only Hacking)</author><pubDate>Mon, 10 Jun 2013 09:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-5421907409856846729</guid><description>&lt;br /&gt;
hi all: D sorry I never post, I promise I will start tomorrow frequently update: D thank you.&lt;br /&gt;
Do not forget to LIKE the facebook page of this website, so this blog is getting famous.&lt;br /&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Phising Tutorial</title><link>http://onlyhacking007.blogspot.com/2012/09/phising-tutorial.html</link><author>noreply@blogger.com (Only Hacking)</author><pubDate>Mon, 24 Sep 2012 06:26:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-2134693091972570119</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://www.youtube.com/watch?v=nBPz0qUFRos"&gt;http://www.youtube.com/watch?v=nBPz0qUFRos&lt;/a&gt;&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title/><link>http://onlyhacking007.blogspot.com/2012/06/to-hack-website-in-most-cases-admin.html</link><category>web hacking</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Tue, 5 Jun 2012 21:24:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-5467988143223667237</guid><description>&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkWnZ5cmmWGd7A-HV5sDrdzDesl9-GpX3cwzeIB-QB0RUgCoNxai4zAvOjWBQXTrEc2022kgN84ONcN4pje6ooUuSwUR0l4OKFUT0Luxo0DTL0UlOrvPxLQ2ynJpJhv70dA116uYrCTC9F/s1600/mc4xu0.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkWnZ5cmmWGd7A-HV5sDrdzDesl9-GpX3cwzeIB-QB0RUgCoNxai4zAvOjWBQXTrEc2022kgN84ONcN4pje6ooUuSwUR0l4OKFUT0Luxo0DTL0UlOrvPxLQ2ynJpJhv70dA116uYrCTC9F/s1600/mc4xu0.gif" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
To
 &lt;span class="IL_AD" id="IL_AD5"&gt;hack&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;
 a &lt;span class="IL_AD" id="IL_AD2"&gt;website&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;
 in most cases admin page is more important.I will show you a simple 
trick to find admin pages&lt;br /&gt;
I will use a simple loop hole in &lt;span class="IL_AD" id="IL_AD3"&gt;robots&lt;/span&gt;.txt&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;Do
 you know about robots.&lt;span class="IL_AD" id="IL_AD1"&gt;txt file&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt; ?&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Yes
 it is file to &lt;span class="IL_AD" id="IL_AD7"&gt;spiders&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt; of search engines to decide what to 
crawl and what not to crawl. &lt;span style="font-family: &amp;quot;Agency FB&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 14pt; line-height: 115%;"&gt;The &lt;b&gt;Robot Exclusion Standard&lt;/b&gt;, also known as 
the &lt;b&gt;Robots Exclusion Protocol&lt;/b&gt; or &lt;b&gt;robots.txt protocol&lt;/b&gt;, is a
 convention to prevent cooperating web 
crawlers and other web robots from accessing all or part of a website&lt;/span&gt;&lt;span style="font-family: &amp;quot;Agency FB&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 14pt; line-height: 115%;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: &amp;quot;Agency FB&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 14pt; line-height: 115%;"&gt;&lt;br /&gt;
&lt;b&gt;Yes lets start&lt;/b&gt;:&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: &amp;quot;Agency FB&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 14pt; line-height: 115%;"&gt;&lt;br /&gt;
First &lt;span class="IL_AD" id="IL_AD6"&gt;select a&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;
 website eg:&lt;b&gt;www.google.com&lt;/b&gt;&lt;br /&gt;
Then after the address add &lt;b&gt;/robots.txt&lt;/b&gt; to website adress&lt;br /&gt;
Now ur Url will be &lt;b&gt;&lt;a href="http://www.google.com/robots.txt"&gt;www.google.com/robots.txt&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
Now you will get a txt file showing all pages which is disallowed by 
admin to search engine&lt;br /&gt;
If the site admin is a good Administrator he will not allow admin page 
to be crawled by search engine&lt;br /&gt;
Now seach for &lt;b&gt;admin&lt;/b&gt; you will find admin page&lt;br /&gt;
See bellow&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwmOZwdWKqCSDS3OPkXD7RuzNdiohKGY5jZPBJUkXyhPxPODtVX2YMC-qlHa97I6w1mmhhCMNXsq8QvxygtMuw5c2tmwflXx-Y1nhgsHHcZ7BaYw5qVNmIqdXT3mheq6u3TZ93Ky10GFVT/s1600/find_admin.JPG" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwmOZwdWKqCSDS3OPkXD7RuzNdiohKGY5jZPBJUkXyhPxPODtVX2YMC-qlHa97I6w1mmhhCMNXsq8QvxygtMuw5c2tmwflXx-Y1nhgsHHcZ7BaYw5qVNmIqdXT3mheq6u3TZ93Ky10GFVT/s1600/find_admin.JPG" /&gt;&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkWnZ5cmmWGd7A-HV5sDrdzDesl9-GpX3cwzeIB-QB0RUgCoNxai4zAvOjWBQXTrEc2022kgN84ONcN4pje6ooUuSwUR0l4OKFUT0Luxo0DTL0UlOrvPxLQ2ynJpJhv70dA116uYrCTC9F/s72-c/mc4xu0.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>How To Get Free Backlinks To Your Website</title><link>http://onlyhacking007.blogspot.com/2012/06/how-to-get-free-backlinks-to-your.html</link><category>web hacking</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Tue, 5 Jun 2012 21:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-8010929477787233329</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiBb2ntT2A94-CloVmWoduf3j3abwDQ9esa4kuyY5mIdSIzdfWtQqZl1sW5phgPmm0KqJAyB5FKL2mqRcF1s3c5oS3cH7Hswc4Y1kxDsPJwqegJL7zLUXE-D1F5gRP6IbV_pISAmb8w8zR/s1600/logo_247_mini.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiBb2ntT2A94-CloVmWoduf3j3abwDQ9esa4kuyY5mIdSIzdfWtQqZl1sW5phgPmm0KqJAyB5FKL2mqRcF1s3c5oS3cH7Hswc4Y1kxDsPJwqegJL7zLUXE-D1F5gRP6IbV_pISAmb8w8zR/s1600/logo_247_mini.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Yes all know that BackLinks today are vey costly.And the are the major 
factor which affect YourPage ranking and Seo.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Backlinks links were originally important (prior to the emergence of 
search engines) as a &lt;span class="IL_AD" id="IL_AD6"&gt;primary&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt; means of web navigation; today, their &lt;span class="IL_AD" id="IL_AD8"&gt;significance&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;
 lies in search engine optimization (SEO). The number of backlinks is 
one indication of the popularity or importance of that website or page 
(for example, this is used by Google to determine the PageRank of a 
webpage). Outside of SEO, the backlinks of a webpage may be of 
significant personal, &lt;span class="IL_AD" id="IL_AD7"&gt;cultural&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt; or semantic interest: they indicate 
who is paying attention to that page.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
So, today I am
 discussing about a way to get free Backlinks&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
To get free BackLinks&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="font-family: Wingdings;"&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;Go to the site bellow &lt;span class="IL_AD" id="IL_AD2"&gt;and sign&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt; up&lt;/li&gt;
&lt;li&gt;  &lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Wingdings;"&gt;&lt;span style="font: 7pt &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="http://247backlinks.info/?bonus=58859"&gt;Register Here&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;  &lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Wingdings;"&gt;&lt;/span&gt;Verify your email and a
 password will be sent to u.&lt;/li&gt;
&lt;li&gt;  &lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Wingdings;"&gt;&lt;span style="font: 7pt &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/span&gt;Login and click on Create 
Project&lt;/li&gt;
&lt;li&gt;  &lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Wingdings;"&gt;&lt;span style="font: 7pt &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/span&gt;Fill in with correct 
details(Your Domain,Keywords ect.,)&lt;/li&gt;
&lt;li&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;  &lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;After a &lt;span class="IL_AD" id="IL_AD3"&gt;few hours&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt; they will send u the backlinks 
created in a &lt;span class="IL_AD" id="IL_AD4"&gt;text file&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt; to ur mail Address&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style="font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;&lt;/span&gt;  &lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;Note: 1000 backlinks is a promotion from 
them.After finishing your 1000&amp;nbsp; backlinks&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
You can buy additional backlinks from them 
with &lt;span class="IL_AD" id="IL_AD1"&gt;Paypal&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;
 or Reffering others.&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiBb2ntT2A94-CloVmWoduf3j3abwDQ9esa4kuyY5mIdSIzdfWtQqZl1sW5phgPmm0KqJAyB5FKL2mqRcF1s3c5oS3cH7Hswc4Y1kxDsPJwqegJL7zLUXE-D1F5gRP6IbV_pISAmb8w8zR/s72-c/logo_247_mini.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">16</thr:total></item><item><title>Google Chrome Hacked In Five Mins</title><link>http://onlyhacking007.blogspot.com/2012/06/google-chrome-hacked-in-five-mins.html</link><category>web hacking</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Tue, 5 Jun 2012 21:07:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-3341927054202947066</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHu3TyEjNVMP34xVskBkmxfT6pIXf5WKBQPvTC3GOkK7i9ehpm-_2uJVhseQZa3uLBarKEssTtpGXN80eKdX18N3irc2cjkceLcr19utFiy7Tb9koqp5HyT4mrz4qu5XFceMk6jcdYC_tW/s1600/crme.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHu3TyEjNVMP34xVskBkmxfT6pIXf5WKBQPvTC3GOkK7i9ehpm-_2uJVhseQZa3uLBarKEssTtpGXN80eKdX18N3irc2cjkceLcr19utFiy7Tb9koqp5HyT4mrz4qu5XFceMk6jcdYC_tW/s1600/crme.JPG" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Hackers have defeated &lt;span class="IL_AD" id="IL_AD1"&gt;Google Chrome&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt; for the first time in an  annual 
competition to test the security of the most popular &lt;span class="IL_AD" id="IL_AD4"&gt;web browser&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
A &lt;span class="IL_AD" id="IL_AD3"&gt;group of&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;
 French hackers were able to bypass Google security features  to gain 
control of a &lt;span class="IL_AD" id="IL_AD2"&gt;Windows&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt; PC in less than five &lt;span class="IL_AD" id="IL_AD5"&gt;minutes&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;
 at the Pwn2own                   competition &lt;span class="IL_AD" id="IL_AD6"&gt;in Canada&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
Chrome had stood undefeated in the 2011 competition but a French firm, 
Vupen defeated it this time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
“We wanted to show that Chrome was not unbreakable. Last year, we saw  a
 lot of headlines that no one could hack Chrome. We wanted to &lt;span class="IL_AD" id="IL_AD7"&gt;make  sure&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;
 it was the first to fall this year,” The Telegraph quoted firm’s  
research head Chaouki Bekrar, as saying.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bekrar said his team had worked for six weeks ahead of &lt;span class="IL_AD" id="IL_AD8"&gt;the competition&lt;span class="IL_AD_ICON"&gt;&lt;/span&gt;&lt;/span&gt;
 to explore vulnerabilities.&lt;br /&gt;
He added that his company had also devised a procedure to hack into  
Firefox and Internet Explorer, but wanted to first demonstrate that  
Chrome was not invincible.&lt;br /&gt;
Vupen had earlier used two previously unknown vulnerabilities to beat  
Chrome's security, which is perceived to be stronger than rivals  
Firefox and Internet Explorer because of its use of “sandboxing”.&lt;br /&gt;
&lt;br /&gt;
` &lt;br /&gt;
Vupen said it would keep details of how it bypassed Google's sandbox 
technology private "for our customers".&lt;br /&gt;
&lt;br /&gt;
Original Source By&amp;nbsp;&lt;a href="http://www.hindustantimes.com/technology/BusinessComputing-Updates/Google-Chrome-hacked-in-five-mins/SP-Article1-822832.aspx#.T1oqf-w2VA4.facebook" target="_blank"&gt;Hindustan Times&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHu3TyEjNVMP34xVskBkmxfT6pIXf5WKBQPvTC3GOkK7i9ehpm-_2uJVhseQZa3uLBarKEssTtpGXN80eKdX18N3irc2cjkceLcr19utFiy7Tb9koqp5HyT4mrz4qu5XFceMk6jcdYC_tW/s72-c/crme.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>Angry Bird Space For Android Fake</title><link>http://onlyhacking007.blogspot.com/2012/04/angry-bird-space-for-android-fake.html</link><category>Mobile</category><category>Technology</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Tue, 24 Apr 2012 00:37:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-113018061674695019</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGmSjE0SQ0DXTKaDfewpF3FOsVTjqskpIvfIFS11USKJsIWSP04EUGnlSbMUR3NvMjRklueaJ0cnpZ4kgI6on8ErtsNz5UHJnrBkWp4_I_0teRzJMPoDnJd9xq_O9Xm8yPGkm6xttGo00/s320/Aplikasi+android+game+Angry+Birds+Space+palsu.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGmSjE0SQ0DXTKaDfewpF3FOsVTjqskpIvfIFS11USKJsIWSP04EUGnlSbMUR3NvMjRklueaJ0cnpZ4kgI6on8ErtsNz5UHJnrBkWp4_I_0teRzJMPoDnJd9xq_O9Xm8yPGkm6xttGo00/s320/Aplikasi+android+game+Angry+Birds+Space+palsu.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Saat peluncuran yang dinanti-nantikan beberapa waktu lalu, Angry Birds langsung menggebrak pasar game dunia dengan versi terbarunya Angry Birds Space."&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Saat peluncuran yang dinanti-nantikan beberapa waktu lalu, Angry Birds langsung menggebrak pasar game dunia dengan versi terbarunya Angry Birds Space."&gt;When
 the awaited launch some time ago, Angry Birds kicked off the world game
 market with its latest version of Angry Birds Space. &lt;/span&gt;&lt;span title="Pada seri terbarunya tersebut, Rovio sebagai produsen game terpopuler di dunia ini memperkenalkan beberapa karakter terbaru Angry Birds Space."&gt;In
 the new series, the Rovio as a producer in the world's most popular 
game introduces several new characters Angry Birds Space. &lt;/span&gt;&lt;span title="Beberapa karakter terbaru tersebut diantaranya Red Bird, Blue Bird, Ice Bird, Lazer Bird, Terence Crashes, dan Bom Explodes Bird."&gt;Some of these new characters including Red Bird, Blue Bird, Ice Bird, Bird Lazer, Terence Crashes, Explodes Bird and Bomb.&lt;/span&gt;&lt;span title="Dengan ketenaran dan kepopuleran seri Angry Birds Space tersebut, ternyata membuat game tersebut sangat diminati oleh beberapa kalangan."&gt;With fame and popularity of the series Space Angry Birds, it turns out to make the game very interested in some circles. &lt;/span&gt;&lt;span title="Tapi hal itu juga harus berimbas dengan munculnya beberapa masalah yang dihadapi game besutan Rovio ini dalam bentuk aplikasi pada sistem operasi Android."&gt;But
 it should also be affected by the emergence of some of the problems 
facing this Rovio game made in the application form on the Android 
operating system. &lt;/span&gt;&lt;span title="Menurut info yang beredar akhir-akhir ini, Rovio dibuat bingung dengan munculnya aplikasi Android game Angry Birds Space palsu yang telah tersebar di Android Market."&gt;According
 to information circulating lately, Rovio be confused with the advent of
 Android apps false Space Angry Birds game that has been spread in the 
Android Market. &lt;/span&gt;&lt;span title="Yang menjadi masalah yaitu Angry Birds Space palsu ini menyebarkan malware dan bersembunyi di payload pada smartphone Android yang telah mendownload aplikasi game tersebut."&gt;The
 problem is this fake Space Angry Birds spread the malware to hide in 
the payload on the Android smartphones have downloaded the game.&lt;/span&gt;&lt;/span&gt;&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Aplikasi Android Game Angry Birds Space Palsu"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Lebih parahnya lagi, setelah para pengguna mendownload lalu menginstal aplikasi game Angry Birds Space palsu ini, aplikasi game Android palsu ini akan mendownload malware tambahan dan menjadikan smartphone Android si pengguna sebagai bagian dari sebuah botnet."&gt;Even
 worse, after users download and install the game Angry Birds Space 
applications of this false, fake Android apps this game will download 
additional malware and making of the Android smartphone users as part of
 a botnet. &lt;/span&gt;&lt;span title="Setelah menjadi bagian dari sebuah botnet, smartphone Android pengguna selanjutnya akan digunakan sebagai sebuah tenaga yang berfungsi untuk menjadi sejumlah operasi bagi para hacker yang telah memasukkan malware pada Angry Birds Space palsu tersebut."&gt;After
 being part of a botnet, Android smartphone users will then be used as a
 power function for a number of operations for hackers who have included
 the malware in fake Space Angry Birds.&lt;/span&gt;&lt;span title="Tapi buat sobat pengguna smartphone Android yang akan mendownload game Angry Birds Space pada ponselnya bisa bernapas lega."&gt;But for my friend to be Android smartphone users to download games on cellphone Space Angry Birds can breathe freely. &lt;/span&gt;&lt;span title="Karena ada cara mudah menghindari aplikasi Android game Angry Birds Space palsu."&gt;Because there is an easy way to avoid application of the Android game Angry Birds false Space. &lt;/span&gt;&lt;span title="Caranya yaitu :"&gt;The trick is:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Caranya yaitu :"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Caranya yaitu :"&gt; &lt;/span&gt;&lt;span title="Periksa developer dari aplikasi yang akan didownload"&gt;1. Check the developer of the application to be downloaded&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Periksa developer dari aplikasi yang akan didownload"&gt;&amp;nbsp; 2. &lt;/span&gt;&lt;span title="Jika sobat sudah terlanjur mendownload aplikasi game Angry Birds Space, pastikan aplikasi yang telah didownload tersebut berasal dari sumber yang jelas"&gt;If
you had already download the game Angry Birds Space, make sure 
you have downloaded&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application from the obvious sources&lt;/span&gt;&lt;/span&gt;&lt;span class="" id="result_box" lang="en"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Jika sobat sudah terlanjur mendownload aplikasi game Angry Birds Space, pastikan aplikasi yang telah didownload tersebut berasal dari sumber yang jelas"&gt;&amp;nbsp; 3. &lt;/span&gt;&lt;span title="Sebelum mendownload dan menginstal, terlebih dahulu back up data penting dari smartphone atau ponsel Android sobat"&gt;Before downloading and installing, first back up your important data from your smartphone or Android. &lt;/span&gt;&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGmSjE0SQ0DXTKaDfewpF3FOsVTjqskpIvfIFS11USKJsIWSP04EUGnlSbMUR3NvMjRklueaJ0cnpZ4kgI6on8ErtsNz5UHJnrBkWp4_I_0teRzJMPoDnJd9xq_O9Xm8yPGkm6xttGo00/s72-c/Aplikasi+android+game+Angry+Birds+Space+palsu.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Differnce Android &amp; Blackberry</title><link>http://onlyhacking007.blogspot.com/2012/04/differnce-android-blackberry.html</link><category>Mobile</category><category>Technology</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Tue, 24 Apr 2012 00:31:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-8440569980151131361</guid><description>&lt;div style="text-align: justify;"&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Beda sumber dan beda tanggapan mengenai perbedaan kedua ponsel ini."&gt;Different sources and different responses of the difference both of these phones. &lt;/span&gt;&lt;span title="Menurut beberapa provider seluler, disini saya ambil contoh Indosat."&gt;According to a cellular provider, here I take the example of Indosat. &lt;/span&gt;&lt;span title="Bagi Indosat, ponsel berlogo titik-titik yang membentuk huruf 'B' ini memiliki keunggulan aplikasi dan perangkat."&gt;For Indosat, mobile bearing dots that form the letter 'B' has the advantage of applications and devices. &lt;/span&gt;&lt;span title="Sehingga siapa pun yang baru memiliki BlackBerry tak akan kesulitan untuk menggunakannya."&gt;So that anyone who has the new BlackBerry will not be difficult to use. &lt;/span&gt;&lt;span title="Sedangkan si robot ijo milik Google mengadopsi sistem operasi terbuka."&gt;While the Green Robot adopt Google's open operating system. &lt;/span&gt;&lt;span title="Hanya orang yang suka ngoprek aplikasi saja yang bakal lebih menggemari."&gt;Only people who like to research and build applications that will be more fond of it.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Hanya orang yang suka ngoprek aplikasi saja yang bakal lebih menggemari."&gt;&amp;nbsp;&lt;/span&gt;&lt;span title="Dari segi fitur dan kegunaan, secara teknis hardware Android jauh diatas Blackberry."&gt;In terms of features and usability, it is technically well above the Blackberry Android hardware. &lt;/span&gt;&lt;span title="Untuk software, bisa dibilang Blackberry sangat kaku."&gt;For software, you could say the Blackberry is very stiff. &lt;/span&gt;&lt;span title="Sebagai contoh Android sanggup play dengan 25 fps HD pada saat kita mengcopy file avi 1GB tanpa converting."&gt;For example, Android could play with 25 fps HD when we copy a 1GB avi files without converting. &lt;/span&gt;&lt;span title="Sedangkan Blackberry mengharuskan kita menggunakan converting."&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Sedangkan Blackberry mengharuskan kita menggunakan converting."&gt;While the Blackberry requires us to use converting. &lt;/span&gt;&lt;span title="Sedangkan dari segi tampilan mungkin sobat bisa membedakannya sendiri."&gt;In terms of appearance may be able to distinguish his own friend. &lt;/span&gt;&lt;span title="Blackberry merupakan satu jenis ponsel yang dibuat oleh RIM dengan berbagai tipe tapi dalam bentuk model tampilan ponsel yang hampir sama."&gt;Blackberry
 is a kind of mobile phones made by RIM with various types but in the 
form of models of mobile phones look almost identical. &lt;/span&gt;&lt;span title="Sebagai contoh dan bahan perbandingan bisa sobat lihat pada produk-produk buatan Apple seperti Macbook, iPhone, iPad, dll."&gt;As an example and a comparison can be my friend look at Apple products like the Macbook, iPhone, iPad, etc.. &lt;/span&gt;&lt;span title="Dimana semua tipe produk itu berada dinaungan satu perusahaan dan OS yang hanya dimiliki oleh satu naungan perusahaan."&gt;Where all types of products that are under one company and the OS is only owned by one company's auspices. &lt;/span&gt;&lt;span title="Beda dengan si robot ijo Android yang bebas melanglang buana di berbagai tipe hp."&gt;Differences with the green Android robot that wandered freely in various types of hp. &lt;/span&gt;&lt;span title="Seperti Samsung, HTC, dll."&gt;Such as Samsung, HTC, etc.. &lt;/span&gt;&lt;span title="Sebagai contoh juga si robot ijo ini bisa dibandingkan dengan Windows, OS yang dibuat oleh perusahaan ternama Microsoft ini bisa sobat temukan diberbagai tipe dan merk laptop."&gt;For
 example, the robot also can be compared ijo Windows, OS made by 
Microsoft is well-known company can find in various types mate and 
laptop brands. &lt;/span&gt;&lt;span title="Kebanyakan ponsel Android menggunakan input touchscreen yang kurang populer di Indonesia."&gt;Most Android phones to use touchscreen input is less popular in Indonesia.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Kebanyakan ponsel Android menggunakan input touchscreen yang kurang populer di Indonesia."&gt;&amp;nbsp;&lt;/span&gt;&lt;span title="Satu catatan dari saya buat sobat yang ingin membeli si robot ijo, bahwa Android membutuhkan koneksi internet yang sangat cepat untuk memaksimalkan kegunaannya."&gt;I
 made a note from my friend who wanted to buy the green robot, that 
Android requires a very fast internet connection to maximize its 
usefulness. &lt;/span&gt;&lt;span title="Dan seperti kita ketahui, koneksi internet yang murah meriah alias cepat tapi dengan harga relatif murah dari Operator selular Indonesia menurut saya kurang dapat diandalkan dan untuk memaksimalkan koneksi internet, sobat harus merogoh kocek lebih dalam (jangan membeli celana dengan kocek yang tidak dalam)."&gt;And
 as we know, a cheap internet connection alias quickly but with a 
relatively cheap price of the service provider Indonesia in my opinion 
less reliable and to maximize your internet connection, my friend have 
to spend more (do not buy pants with pockets that are not in). &lt;/span&gt;&lt;span title="Sekian dari saya, semoga bisa menjawab sebagian pertanyaan sobat tentang perbedaan kedua smartphone terpopuler di Indonesia itu."&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Sekian dari saya, semoga bisa menjawab sebagian pertanyaan sobat tentang perbedaan kedua smartphone terpopuler di Indonesia itu."&gt;So
 much from me, hopefully my friend can answer most questions about the 
differences between the two most popular smartphone in Indonesia.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool</title><link>http://onlyhacking007.blogspot.com/2012/04/wwwhack-19-download-wwwhack19zip-web.html</link><category>web hacking</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Tue, 24 Apr 2012 00:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-760658049528512710</guid><description>&lt;div style="text-align: justify;"&gt;
WWWhack is a brute force &lt;u&gt;&lt;span style="color: blue; font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="background-color: transparent; border-bottom: 1px solid blue; font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;utility that will try to crack web sites guarded by an web access 
password. This utility can use a word file or try all possible 
combinations, and by trial-and-error, will attempt to find a combination
 of username/password that is accepted by the web server.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
This shows the weakness in securing sensitive areas of your web site by the web &lt;span style="color: blue; font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;authentication &lt;/span&gt;&lt;span class="kLink" style="font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;method&lt;/span&gt;&lt;/span&gt; alone.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
To use wwwhack 1.9 you need to set your system clock to the year 2000 or before as it expires in ’2001′.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Once again this is an oldskool tool but a lot of people are still 
seeking it, for learning purposes I presume as there are better 
alternatives now like thc-hydra&lt;span style="color: black;"&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
You can &lt;a href="http://www.darknet.org.uk/content/files/wwwhack19.zip"&gt;download wwwhack 1.9 here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
password : darknet123&lt;br /&gt;
&lt;br /&gt;
source : &lt;a href="http://www.darknet.org.uk/2006/12/wwwhack-19-download-wwwhack19zip-web-hacking-tool/#comments%20" target="_blank"&gt;http://www.darknet.org.uk/2006/12/wwwhack-19-download-wwwhack19zip-web-hacking-tool/#comments &lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">35</thr:total><enclosure length="357223" type="application/zip" url="http://www.darknet.org.uk/content/files/wwwhack19.zip"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>WWWhack is a brute force utility that will try to crack web sites guarded by an web access password. This utility can use a word file or try all possible combinations, and by trial-and-error, will attempt to find a combination of username/password that is accepted by the web server. This shows the weakness in securing sensitive areas of your web site by the web authentication method alone. To use wwwhack 1.9 you need to set your system clock to the year 2000 or before as it expires in ’2001′. Once again this is an oldskool tool but a lot of people are still seeking it, for learning purposes I presume as there are better alternatives now like thc-hydra. You can download wwwhack 1.9 here. password : darknet123 source : http://www.darknet.org.uk/2006/12/wwwhack-19-download-wwwhack19zip-web-hacking-tool/#comments</itunes:subtitle><itunes:author>noreply@blogger.com (Only Hacking)</itunes:author><itunes:summary>WWWhack is a brute force utility that will try to crack web sites guarded by an web access password. This utility can use a word file or try all possible combinations, and by trial-and-error, will attempt to find a combination of username/password that is accepted by the web server. This shows the weakness in securing sensitive areas of your web site by the web authentication method alone. To use wwwhack 1.9 you need to set your system clock to the year 2000 or before as it expires in ’2001′. Once again this is an oldskool tool but a lot of people are still seeking it, for learning purposes I presume as there are better alternatives now like thc-hydra. You can download wwwhack 1.9 here. password : darknet123 source : http://www.darknet.org.uk/2006/12/wwwhack-19-download-wwwhack19zip-web-hacking-tool/#comments</itunes:summary><itunes:keywords>web hacking</itunes:keywords></item><item><title>Hack Password Using Brutus</title><link>http://onlyhacking007.blogspot.com/2012/04/hack-password-using-brutus.html</link><category>web hacking</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Tue, 24 Apr 2012 00:11:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-7106762243102933577</guid><description>A lot of people come to Darknet looking for Brutus AET2 
(brutus-aet2.zip) to download, but unfortunately due to some stupid 
Homeland security bullshit I actually had to remove the file or risk 
having no hosting left..&lt;br /&gt;
If you don’t know, Brutus is one of the fastest, most flexible remote
 password crackers you can get your hands on – it’s also free. It is 
available for Windows 9x, NT and 2000, there is no UN*X version 
available although it is a possibility at some point in the future. 
Brutus was first made publicly available in October 1998 and since that 
time there have been at least 70,000 downloads and over 175,000 visitors
 to this page. Development continues so new releases will be available 
in the near future.&lt;br /&gt;
Brutus was written originally to help me check routers etc. for default and common passwords.&lt;br /&gt;
&lt;b&gt;Features&lt;/b&gt;&lt;br /&gt;
Brutus version AET2 is the current release and includes the following authentication types :&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;HTTP&lt;a class="kLink" href="http://www.darknet.org.uk/2006/09/brutus-password-cracker-download-brutus-aet2zip-aet2/#" id="KonaLink0" style="font-family: inherit !important; font-size: inherit !important; font-weight: inherit !important; position: static; text-decoration: underline !important;"&gt;&lt;span style="color: blue; font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;span class="kLink" style="background-color: transparent; border-bottom: 1px solid blue; color: blue; font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;/span&gt;&lt;span class="kLink" style="background-color: transparent; border-bottom: 1px solid blue; color: blue; font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;HTTP (HTML Form/CGI)&lt;/li&gt;
&lt;li&gt;POP3&lt;/li&gt;
&lt;li&gt;FTP&lt;/li&gt;
&lt;li&gt;SMB&lt;/li&gt;
&lt;li&gt;Telnet&lt;/li&gt;
&lt;/ul&gt;
Other types such as IMAP, NNTP, NetBus etc are freely downloadable 
from this site and simply imported into your copy of Brutus. You can 
create your own types or use other peoples.&lt;br /&gt;
&lt;br /&gt;
The current release includes the following functionality :&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Multi-stage authentication engine&lt;/li&gt;
&lt;li&gt;60 simultaneous target connections&lt;/li&gt;
&lt;li&gt;No username, single username and multiple username modes&lt;/li&gt;
&lt;li&gt;Password list, combo (user/password) list and configurable&lt;span style="background-color: white; color: blue; font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt; brute force&lt;span class="kLink" style="border-bottom: 1px solid blue; font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;/span&gt;&lt;span class="kLink" style="border-bottom: 1px solid blue; font-family: inherit; font-size: inherit ! important; font-weight: inherit ! important; position: static;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; color: black;"&gt;&lt;/span&gt; modes&lt;/li&gt;
&lt;li&gt;Highly customisable authentication sequences&lt;/li&gt;
&lt;li&gt;Load and resume position&lt;/li&gt;
&lt;li&gt;Import and Export custom authentication types as BAD files seamlessly&lt;/li&gt;
&lt;li&gt;SOCKS proxy support for all authentication types&lt;/li&gt;
&lt;li&gt;User and password list generation and manipulation functionality&lt;/li&gt;
&lt;li&gt;HTML Form interpretation for HTML Form/CGI authentication types&lt;/li&gt;
&lt;li&gt;Error handling and recovery capability inc. resume after crash/failure.
&lt;/li&gt;
&lt;/ul&gt;
You can download it here:&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.hoobie.net/brutus/brutus-download.html"&gt;Brutus AET2&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
source : &lt;a href="http://www.darknet.org.uk/2006/09/brutus-password-cracker-download-brutus-aet2zip-aet2/%20" target="_blank"&gt;http://www.darknet.org.uk/2006/09/brutus-password-cracker-download-brutus-aet2zip-aet2/ &lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>HOW TO HACK TWITTER  ACCOUNTS</title><link>http://onlyhacking007.blogspot.com/2012/04/how-to-hack-twitter-accounts.html</link><category>twitter</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Tue, 3 Apr 2012 00:04:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-2597443798266871454</guid><description>Do you want to learn how to hack twitter?, Are you looking for a way to  hack your friends twitter account without them fiding out? Interested in  finding out ways to hack someones profile? Maybe you want to take a  quick peek at their direct message inbox, steal their username or find a  glitch to use a hacking script.In this article I will show you a fairly  easy step by step guide on how to hack twitter user accounts without  having to directly hack into twitter or their computer and risk getting  caught...ignore all those hacking services, twitter hacks and hackers  that charge you money for something you can do on your own for  free...hack the password of any of your friends accounts and get their  password even as a prank or joke.  &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hack twitter, hacking twitter passwords from user accounts and find out someones twitter password&lt;/b&gt;...Is  any of it really possible? Yes it is!. Surely you've heard on the news  of how President Obama's twitter got hacked or a few other celebrities.  It is all due to twitter's poor coding/programming which causes all  those errors like &lt;a href="http://how-to-hack-twitter-accounts.angelfire.com/images/twit.png" target="_blank"&gt;THIS POPULAR ONE&lt;/a&gt;. &lt;br /&gt;
&lt;br /&gt;
A couple of month's ago I wanted to check my old Twitter account  but forgot what email and password I had used to sign up, I sent an  email to their technical support but they didn't reply so I decided to  put my geek skills to good use and find a way to get my login  information back by writing a twitter account hacking code or exploit as  they are called.&lt;br /&gt;
&lt;br /&gt;
&lt;div color="#34ccff"&gt;&lt;b&gt;HOW HACKING TWITTER ACCOUNTS WORKS&lt;/b&gt;&lt;/div&gt;Twitter has two databases (one for males and one for females users)  where they keep all the information from their users, if you remember  the email you use to login but forget your password, you can use the  'Forgot your password?' option, however if like me you don't have any of  that information it's impossible to &lt;b&gt;legally&lt;/b&gt; recover that account. &lt;br /&gt;
&lt;br /&gt;
If you know anything about programming websites you know the  'Forgot your password?' service has to be in direct contact with the  databases in order to send requests to retrieve the forgotten  information for you, basically what that means is if you 'ask' the  database for the login information with the right 'code' (in our case  exploit), it will send you back that information. &lt;br /&gt;
&lt;br /&gt;
So all I had to figure out is what the code was and what system  they used to contact the databases through the 'Forgot your password?'  service, after a few weeks of writing and testing codes I came up with  the right one for the job and after doing a bit of research I learned  Twitter uses something similar to an email service to contact their  databases.&lt;br /&gt;
&lt;br /&gt;
But as usual, everything isn't as easy as it seems.  For security reasons the databases are programmed to verify the account  your requesting is actually yours and not someone elses so they need  some type of authentication or verification (thats why they send you a  verification link to your email when creating your account or changing  your password), luckily for us Twitter is so poorly programmed they also allow you to use a  friends/followers account to verify your own (it's a glitch in the  "Mutual Friends/Followers" service where they authenticate accounts by  checking if the associated friends/followers email is related to the  'victims' account), in other words, if the person you want to get the  login information from is following you on Twitter and your following  them...you can use your own account to verify theirs (by confusing the  database into thinking we are checking if you both mutually follow each  other rather than the true act of reseting their password and getting  them to send it to us) and get their login email and password sent to  you...but the victim &lt;i&gt;must be following you and you them&lt;/i&gt;.  &lt;br /&gt;
&lt;div color="#34ccff"&gt;&lt;b&gt;HOW TO DO IT&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;&lt;b&gt;1)&lt;/b&gt;&lt;/span&gt; First off you will need to get your username and the victims username, how do you do this?   &lt;br /&gt;
&lt;br /&gt;
Go to the victims twitter profile and look at your browsers  address bar, at the end of all the address you should see something like  this: (I have used a red arrow to point it out) &lt;br /&gt;
&lt;br /&gt;
&lt;img border="0" height="33" src="http://how-to-hack-twitter-accounts.angelfire.com/images/url.jpg" width="265" /&gt; &lt;br /&gt;
&lt;br /&gt;
Write it down somewhere as you will need to use it a bit further down, once that is done you may continue to step 2. &lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;&lt;b&gt;2)&lt;/b&gt;&lt;/span&gt; At the bottom of this page I  have pasted the exploit code I created to fool the databases, this is  the tricky part as you will have to edit the code a bit yourself so that  it fits your needs when searching for the victims login information.  &lt;br /&gt;
&lt;br /&gt;
Scroll down to the bottom of this page and find the code I have highlighted in &lt;span style="color: #999999;"&gt;gray&lt;/span&gt;  so you know what to copy, select the code and copy it to your clipboard  (press CTRL+C) then paste it (CTRL+V) on a notepad or text document so  you can edit it.  &lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;&lt;b&gt;3)&lt;/b&gt;&lt;/span&gt; Once you have the code  somewhere you can edit it, you will need to insert three things into it,  the twitter username of the victim and the friend authentication login  information. I will give you step by step examples by trying the exploit  code of my friend Sarah's account as the victim, see what parts you  have to edit and with what: &lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://how-to-hack-twitter-accounts.angelfire.com/images/eg.jpg" target="_blank"&gt;&lt;img border="0" height="300" src="http://how-to-hack-twitter-accounts.angelfire.com/images/eg.jpg" width="400" /&gt;&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;1.&lt;/span&gt; Should be the victims username.&lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;2.&lt;/span&gt; Should be your twitter login username to verify your the victims follower/friend.&lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;3.&lt;/span&gt; Should be your password so the database can authentic you really are mutually following each other with the victim.  &lt;br /&gt;
&lt;br /&gt;
When editing the code, don't accidentally delete one of the  quotes (") or it won't work, so make sure you put the information inside  them. &lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;&lt;b&gt;4)&lt;/b&gt;&lt;/span&gt; Now that you have the exploit  code edited and ready to send, we are all set to send it to the database  through an email, since it's not your regular email but an exploit  email we will have to use a special Subject so the database knows how to  read it in programming language. &lt;br /&gt;
&lt;br /&gt;
Go to your email address and &lt;i&gt;Compose&lt;/i&gt; a new email to &lt;a href="mailto:twittersupport@techie.com" target="_blank"&gt;twittersupport@techie.com&lt;/a&gt; which is twitters customer service email for forgotten passwords, in the &lt;i&gt;Subject&lt;/i&gt; copy and paste the code below highlighted in &lt;span style="color: #999999;"&gt;gray&lt;/span&gt;: &lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;span style="color: #999999;"&gt; $[search_database = $find user+id= "VICTIMSUSERNAME", '%verification+user+gender' = }"F"{  begin_search();&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;br /&gt;
Once you have edited the &lt;i&gt;Subject&lt;/i&gt; and entered the email address, your &lt;i&gt;Composed&lt;/i&gt; email should look like the screenshot below, I will numerate each item: &lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://how-to-hack-twitter-accounts.angelfire.com/images/mail.jpg" target="_blank"&gt;&lt;img border="0" height="40" src="http://how-to-hack-twitter-accounts.angelfire.com/images/mail.jpg" width="300" /&gt;&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;1.&lt;/span&gt; The email address of the twitter database's forgotten password customer service.&lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;2.&lt;/span&gt; This is where you insert the victims username.&lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;3.&lt;/span&gt;  This is where you insert the victims gender (as mentioned above the  twitter database is devided in a male section and female), put an M  inside the quotes if they are a male or a F if they are a female.&lt;br /&gt;
&lt;span style="color: #34ccff;"&gt;&lt;b&gt;5)&lt;/b&gt;&lt;/span&gt; After you have correctly written the &lt;i&gt;To:&lt;/i&gt; and &lt;i&gt;Subject:&lt;/i&gt; sections, you may proceed to insert the exploit code you previously edited in step &lt;i&gt;3&lt;/i&gt; into the body section of the email. Now all you have to do is click &lt;i&gt;Send&lt;/i&gt; and wait for the database to send you back it's reply with the information.  &lt;br /&gt;
&lt;br /&gt;
It should take from 12-24 hours depending on the traffic twitter  has that day, this is a sample of the email response you'll receive: &lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://how-to-hack-twitter-accounts.angelfire.com/images/reply.jpg" target="_blank"&gt;&lt;img border="0" height="150" src="http://how-to-hack-twitter-accounts.angelfire.com/images/reply.jpg" width="300" /&gt;&lt;/a&gt; &lt;br /&gt;
&lt;div color="#34ccff"&gt;&lt;b&gt;THE EXPLOIT CODE&lt;/b&gt;&lt;/div&gt;&amp;lt;div style="margin: 5px 20px 20px;"&amp;gt;&lt;br /&gt;
&amp;lt;div class="smallfont" style="margin-bottom: 2px;"&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Judul Spoiler&amp;lt;/b&amp;gt;: &amp;lt;input onclick="if (this.parentNode.parentNode.getElementsByTagName('div')[1].getElementsByTagName('div')[0].style.display != '') { this.parentNode.parentNode.getElementsByTagName('div')[1].getElementsByTagName('div')[0].style.display = ''; this.innerText = ''; this.value = 'Close'; } else { this.parentNode.parentNode.getElementsByTagName('div')[1].getElementsByTagName('div')[0].style.display = 'none'; this.innerText = ''; this.value = 'Open'; }" style="font-size: 11px; margin: 0px; padding: 0px; width: 55px;" type="button" value="Open" /&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class="alt2" style="border: 1px inset; margin: 0px; padding: 6px;"&amp;gt;&lt;br /&gt;
&amp;lt;div style="display: none;"&amp;gt;&lt;br /&gt;
twt_select_db("find", $linkID) or die(twt_database_error());  $resultID = twt_query("SELECT FriendID FROM signup WHERE email = '$email'", $linkID) or die(twt_database_error());  $num_rows = db_num_rows($resultID); $row = twitter_fetch_array($resultID); $user_id = $row[0]; &lt;br /&gt;
&lt;br /&gt;
if ($user_id == "PUT_USERNAME_HERE") = '$repeat' {&lt;br /&gt;
print Success, We have sent you an email with the Login email and Password of that Username.&lt;br /&gt;
}&lt;br /&gt;
else {&lt;br /&gt;
// print "We're sorry, your follower does not appear to be in our database." &lt;br /&gt;
&lt;br /&gt;
$passwordfromdb = $row[0];&lt;br /&gt;
$find userID = (%follower_list)&lt;br /&gt;
#forgot_pass_userid = "%repeat%"; &amp;lt;%search_database_for_id%&amp;gt;&lt;br /&gt;
#user email= "YOUR_USERNAME_HERE"; (%follower_vulnerability_match%)&lt;br /&gt;
#user password = "YOURPASSWORDHERE"; (%follower_vulnerability_matchk%)&lt;br /&gt;
$follower_database_exploit = '%request_forgot_pass_info'&lt;br /&gt;
$email_to = %%%@subject_email &lt;br /&gt;
&lt;br /&gt;
session_start();&lt;br /&gt;
session_reset_pass("session");&lt;br /&gt;
$email_address = $_POST['email_address'];&lt;br /&gt;
if (!isset($_POST['email_address'])) {&lt;br /&gt;
&lt;br /&gt;
&lt;form action="&amp;lt;?php echo $_SERVER['REQUEST_URI']; ?&amp;gt;" method="post"&gt;&lt;br /&gt;
}&lt;br /&gt;
elseif (empty($email_address)) {&lt;br /&gt;
&amp;nbsp;&amp;nbsp;  echo $empty_fields_message;&lt;br /&gt;
function decrypt userID password() { &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  $salt = "abchefghjkmnpqrstuvwxyz0123456789"; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  srand((double)microtime()*1000000); &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; $i = 0; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  while ($i &amp;lt;= 7) { &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  $num = decrypt() % 33; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; $tmp = substr($salt, $num, 1); &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  $pass = $pass . $tmp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  $i++; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;} &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;return $pass; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;}  &lt;br /&gt;
&lt;br /&gt;
mail($email_address, $subject, $message, "Twitter Password Reset Confirmation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
/end$  &lt;/form&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">21</thr:total></item><item><title>Facebook Password Decryptor</title><link>http://onlyhacking007.blogspot.com/2012/04/facebook-password-decryptor.html</link><category>Facebook</category><category>Software</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Mon, 2 Apr 2012 23:52:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-6900964422845501109</guid><description>&lt;span&gt;after a day of surfing and I found that I was looking for software as well.&lt;/span&gt; &lt;span&gt; although when he first saw me a little hesitant but after I tried successfully and the results are satisfactory poorer.&lt;/span&gt; &lt;span&gt; let alone the software is portable so not need to install and can be taken anywhere in the flash aja save lives.&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;span&gt; How to use:&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;span&gt; A.&lt;/span&gt; &lt;span&gt; Bring your subscription to the cafe.&lt;/span&gt; &lt;br /&gt;
&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt; &lt;span&gt; 2.&lt;/span&gt; &lt;span&gt; Open the software.&lt;/span&gt; &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt; &lt;span&gt; 3.&lt;/span&gt; &lt;span&gt; Click the Start Recovery.&lt;/span&gt; &lt;/div&gt;&lt;table cellpadding="0" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="height: 8px; text-align: justify;"&gt; &lt;span&gt; It will appear as a list below.&lt;/span&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style="height: 8px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt; &lt;a href="http://passwordforensics.com/images/facebookpassworddecryptor_main_big.jpg"&gt;&lt;img alt="FacebookPasswordDecryptor showing recovered passwords" height="305" src="http://passwordforensics.com/images/facebookpassworddecryptor_main.jpg" style="border-bottom-style: none; border-width: 0px; text-align: center; vertical-align: middle;" width="400" /&gt;&lt;/a&gt; &lt;a href="http://passwordforensics.com/images/facebookpassworddecryptor_main_nopassword.jpg" rel="gb_image[]" style="border-width: 0px;" title="FacebookPasswordDecryptor Main Screen"&gt;&lt;br /&gt;
&lt;/a&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style="height: 20px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style="height: 8px;"&gt; &lt;span&gt; 4.&lt;/span&gt; &lt;span&gt; Then click on show passwords in the lower left corner, it will display the password.&lt;/span&gt; &lt;/td&gt;&lt;td style="height: 8px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td style="height: 8px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td style="height: 8px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style="height: 8px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td style="height: 8px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="http://passwordforensics.com/images/facebookpassworddecryptor_cmdline.jpg"&gt;   &lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style="height: 8px;"&gt; &lt;span&gt; Download: &lt;a href="http://translate.googleusercontent.com/translate_c?hl=id&amp;amp;rurl=translate.google.co.id&amp;amp;sl=auto&amp;amp;tl=en&amp;amp;twu=1&amp;amp;u=http://www.box.com/s/38bknrh280jl1q7psatl&amp;amp;usg=ALkJrhhsZoOEnbBbZHjSPAHeTBB2BjJo3w" target="_blank"&gt;FacebookPasswordDecryptor (1.8MB)&lt;/a&gt;&lt;/span&gt; &lt;/td&gt;&lt;td style="height: 8px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td style="height: 8px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style="height: 8px;"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt; &lt;span&gt; Good luck --- + + "at his own sins"&lt;/span&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">7</thr:total></item><item><title>HACK FACEBOOK USING CAIN &amp; ABEL</title><link>http://onlyhacking007.blogspot.com/2012/04/hack-facebook-using-cain-abel.html</link><category>Facebook</category><category>Software</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Mon, 2 Apr 2012 23:50:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-6714994780195039879</guid><description>&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;This time I will share about cain &amp;amp; abel.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;Cain &amp;amp; Abel is a software that can be used to hack FB or other social networks.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;For the download link I've provided at the bottom.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;As  for the process will not install it taught me, I anggep all already in  the can ... er can run in a network, so if you go to the cafe, people  "who logged FS, FB, and others can be obtained ma passnya user.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;HTTP click on the left, and see the results&lt;/span&gt; &lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;For how to use them can read this tutorial:&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;1&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;. open cain and abel&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;2. klik start / stop sniffer as in fig:&lt;/span&gt; &lt;/div&gt;&lt;table align="left" cellpadding="0" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td height="12" width="12"&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir05llD6cUd1Ix1720rRuRH7HWZUruI1CM153dNNVdq-8JFLlIx1WsJKMEWxqb2TSdZvsWZtWlGJZJhvYgkprMuTkVfNqmUky9sFh0_aIMXYLa6yFZNQejZy_jwECtmjBGm24CpWkcWqza/s320/1.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir05llD6cUd1Ix1720rRuRH7HWZUruI1CM153dNNVdq-8JFLlIx1WsJKMEWxqb2TSdZvsWZtWlGJZJhvYgkprMuTkVfNqmUky9sFh0_aIMXYLa6yFZNQejZy_jwECtmjBGm24CpWkcWqza/s320/1.jpg" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;2.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;then click the + [blue] to scan mac address, then it will look like this:&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ7Su6ECU4gWykmBBF4cN0iiN1h1jd9mECBPsFwLy9lQ8yGD29nl71PXfja_DzWLEuNOnPCN7xAx21OK3neGR9QIwQL4OvigmQvlzTS6kf3T5AX6BHSFSjNlZtd7cuYbPXKEHAKN9AmcnU/s320/2.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ7Su6ECU4gWykmBBF4cN0iiN1h1jd9mECBPsFwLy9lQ8yGD29nl71PXfja_DzWLEuNOnPCN7xAx21OK3neGR9QIwQL4OvigmQvlzTS6kf3T5AX6BHSFSjNlZtd7cuYbPXKEHAKN9AmcnU/s320/2.jpg" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;3.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;the mac address scan immediately click OK&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;loading and then it will get lots of IP addresses within a network and can be known mac addresses:&lt;/span&gt; &lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh23QGVGp7tBIx2i8ofn0BGBzwD4-S_6T4Xdrc7RIdfURzurFRbtGLbfRCYZZGlifBaVz2CxlA7ZVWSkv4c3Ejd7gbTclm_SWNxRD7wF5imzu4JzVVZWi66mrQgO-GTlPrFrT4VK6aSVJUm/s320/3.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh23QGVGp7tBIx2i8ofn0BGBzwD4-S_6T4Xdrc7RIdfURzurFRbtGLbfRCYZZGlifBaVz2CxlA7ZVWSkv4c3Ejd7gbTclm_SWNxRD7wF5imzu4JzVVZWi66mrQgO-GTlPrFrT4VK6aSVJUm/s320/3.jpg" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;after well up here you can go on to further wrote&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;4.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;Click the APR tab at the bottom, and will look like this:&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMAo0MP0WTyygsJGV5bzowDL2CJmENf8af0JH_LGq1ONeBv-GSOvE3VvCa7MMxD-T4-sAEzlnpEEmtC6euhalKJmE8-e-xMqwhbeFR25-QaOrHR0KoFYUS4G_Xk8AUHfkrMLq9Sie6_P2P/s320/4.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMAo0MP0WTyygsJGV5bzowDL2CJmENf8af0JH_LGq1ONeBv-GSOvE3VvCa7MMxD-T4-sAEzlnpEEmtC6euhalKJmE8-e-xMqwhbeFR25-QaOrHR0KoFYUS4G_Xk8AUHfkrMLq9Sie6_P2P/s320/4.jpg" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;5.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;then click the + (blue color) to add the IP address you want in the poisoning would look like this:&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSLI3l59RiJHcSIN7iuyWoUudhHDs7NBMCa4IOYCxHJAeed5G1IaL0_nO8hYDEbHLtIcpbHaiaN4B1hD8l0dSYcNaOIYg_PtcDf-EEl_nujmTPLxR7y-ZQ_kDBDDtLOCz9_SqNJRQooe9j/s320/5.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSLI3l59RiJHcSIN7iuyWoUudhHDs7NBMCa4IOYCxHJAeed5G1IaL0_nO8hYDEbHLtIcpbHaiaN4B1hD8l0dSYcNaOIYg_PtcDf-EEl_nujmTPLxR7y-ZQ_kDBDDtLOCz9_SqNJRQooe9j/s320/5.jpg" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;6.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;on the left you select IP routernya [how we ta hu routernya IP? ...&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;What needs to explain too?&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;go to cmd and typed ipconfig / all it will be in the know of all information.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;Now think for yourself which aja ya so routernya&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;that the right side is the ipaddress that you want to poisoning.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;If you want all of a network simply block all abis wrote that click ok&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;Abis step it then looks like this:&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUSzA3NhfwX1M4u7SvMkODtQ9PDO3bO0mD4cp-sJy__wZ134YmDqnvXhdBd0XxMkFvqMAca3bvEhunblioQW3ONZ7SRDp07bRH-6kIxLCRN_5FG-m2QGJIa40AqJFRAUDF6q6ZXtPrc6h-/s320/6.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUSzA3NhfwX1M4u7SvMkODtQ9PDO3bO0mD4cp-sJy__wZ134YmDqnvXhdBd0XxMkFvqMAca3bvEhunblioQW3ONZ7SRDp07bRH-6kIxLCRN_5FG-m2QGJIa40AqJFRAUDF6q6ZXtPrc6h-/s320/6.jpg" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;7.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;Well idle status right?&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;it was a sign not in poisoning, Click start / stop arp and its status will change to poisoning:&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzpy6KmVb7XsdkL6D7AgrhUDFEwH2O4Iioai2US_lt9SjDSEoZuYicKgWbAm5Y6lzbjN1A_recKKM6Dm_DkV5AcsefLMOALMDHlZLtv_XhwbcZKzBJlEZbhPA32BIqVSCvb7YKYj4TkhIx/s320/7.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzpy6KmVb7XsdkL6D7AgrhUDFEwH2O4Iioai2US_lt9SjDSEoZuYicKgWbAm5Y6lzbjN1A_recKKM6Dm_DkV5AcsefLMOALMDHlZLtv_XhwbcZKzBJlEZbhPA32BIqVSCvb7YKYj4TkhIx/s320/7.jpg" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;8.&lt;/span&gt;  &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;The existence of the list below indicates that there is a process that is being done&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;just enter the password with the password tab at the bottom:&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUWdNLIeNbdwMK55TKCU2COgLZ_CvMM3zbH7ATyUu3ConqiBHIb1u7jgL1zr1p3Cn5sSFOgpgPVDLoTV43KJfDL0pGdcZBxkaVK5gmCSXxjB_pttUKSUDYvTP8sshXdu8qsWE1SA-Lo-su/s320/8.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUWdNLIeNbdwMK55TKCU2COgLZ_CvMM3zbH7ATyUu3ConqiBHIb1u7jgL1zr1p3Cn5sSFOgpgPVDLoTV43KJfDL0pGdcZBxkaVK5gmCSXxjB_pttUKSUDYvTP8sshXdu8qsWE1SA-Lo-su/s320/8.jpg" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt;9.&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;"&gt; on the left click HTTP, and see the results ...&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: justify;"&gt; &lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt; line-height: 115%;"&gt;+ + + + --- Thanks_____&lt;/span&gt; &lt;/div&gt;&lt;div class="MsoNormal" style="text-align: justify;"&gt; &lt;a href="http://www.oxid.it/downloads/ca_setup.exe" target="_blank"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt; line-height: 115%;"&gt;Download: Cain &amp;amp; Abel (7MB)&lt;/span&gt;&lt;/a&gt; &lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir05llD6cUd1Ix1720rRuRH7HWZUruI1CM153dNNVdq-8JFLlIx1WsJKMEWxqb2TSdZvsWZtWlGJZJhvYgkprMuTkVfNqmUky9sFh0_aIMXYLa6yFZNQejZy_jwECtmjBGm24CpWkcWqza/s72-c/1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">303</thr:total><enclosure length="1761" type="application/octet-stream" url="http://www.oxid.it/downloads/ca_setup.exe"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>This time I will share about cain &amp;amp; abel. Cain &amp;amp; Abel is a software that can be used to hack FB or other social networks. For the download link I've provided at the bottom. As for the process will not install it taught me, I anggep all already in the can ... er can run in a network, so if you go to the cafe, people "who logged FS, FB, and others can be obtained ma passnya user. HTTP click on the left, and see the results For how to use them can read this tutorial: 1. open cain and abel 2. klik start / stop sniffer as in fig: 2. then click the + [blue] to scan mac address, then it will look like this: 3. the mac address scan immediately click OK loading and then it will get lots of IP addresses within a network and can be known mac addresses: after well up here you can go on to further wrote 4. Click the APR tab at the bottom, and will look like this: 5. then click the + (blue color) to add the IP address you want in the poisoning would look like this: 6. on the left you select IP routernya [how we ta hu routernya IP? ... What needs to explain too? go to cmd and typed ipconfig / all it will be in the know of all information. Now think for yourself which aja ya so routernya that the right side is the ipaddress that you want to poisoning. If you want all of a network simply block all abis wrote that click ok Abis step it then looks like this: 7. Well idle status right? it was a sign not in poisoning, Click start / stop arp and its status will change to poisoning: 8. The existence of the list below indicates that there is a process that is being done just enter the password with the password tab at the bottom: 9. on the left click HTTP, and see the results ... + + + + --- Thanks_____ Download: Cain &amp;amp; Abel (7MB)</itunes:subtitle><itunes:author>noreply@blogger.com (Only Hacking)</itunes:author><itunes:summary>This time I will share about cain &amp;amp; abel. Cain &amp;amp; Abel is a software that can be used to hack FB or other social networks. For the download link I've provided at the bottom. As for the process will not install it taught me, I anggep all already in the can ... er can run in a network, so if you go to the cafe, people "who logged FS, FB, and others can be obtained ma passnya user. HTTP click on the left, and see the results For how to use them can read this tutorial: 1. open cain and abel 2. klik start / stop sniffer as in fig: 2. then click the + [blue] to scan mac address, then it will look like this: 3. the mac address scan immediately click OK loading and then it will get lots of IP addresses within a network and can be known mac addresses: after well up here you can go on to further wrote 4. Click the APR tab at the bottom, and will look like this: 5. then click the + (blue color) to add the IP address you want in the poisoning would look like this: 6. on the left you select IP routernya [how we ta hu routernya IP? ... What needs to explain too? go to cmd and typed ipconfig / all it will be in the know of all information. Now think for yourself which aja ya so routernya that the right side is the ipaddress that you want to poisoning. If you want all of a network simply block all abis wrote that click ok Abis step it then looks like this: 7. Well idle status right? it was a sign not in poisoning, Click start / stop arp and its status will change to poisoning: 8. The existence of the list below indicates that there is a process that is being done just enter the password with the password tab at the bottom: 9. on the left click HTTP, and see the results ... + + + + --- Thanks_____ Download: Cain &amp;amp; Abel (7MB)</itunes:summary><itunes:keywords>Facebook, Software</itunes:keywords></item><item><title>CREDIT CARD-i SECURITY TIPS</title><link>http://onlyhacking007.blogspot.com/2012/03/credit-card-i-security-tips.html</link><category>Security</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Thu, 29 Mar 2012 01:29:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-841181331964788473</guid><description>&lt;b&gt;Protect your Bank Rakyat Credit Card-i by doing&lt;/b&gt; &lt;br /&gt;
&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  &lt;b&gt;Sign&lt;/b&gt; your new Bank Rakyat Credit Card-i(s) as soon as you received it so that no one can use it. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  &lt;b&gt;Ensure&lt;/b&gt; your card is always within your sight when you make a purchase and the sales person return your card, receipt and sales draft. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  &lt;b&gt;Draw a line&lt;/b&gt; through blank spaces above the total or circle the purchase amount on the sales draft when you sign for your sales draft. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  &lt;b&gt;Keep&lt;/b&gt; all sales draft for transactions made, including at a self service station. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt; &lt;b&gt;Keep copies of your sales drafts&lt;/b&gt; .  Verify amount purchased with sales drafts for that month against your card statement.  Report immediately should there be any discrepancy or error. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  If &lt;b&gt;your card is stolen, lost or damage, call Bank Rakyat Card Centre immediately at 03-26924600 / 03-26936880&lt;/b&gt; .  Please make a written confirmation and police report of the stolen or lost card. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  &lt;b&gt;Make a list&lt;/b&gt;  of all your credit card numbers and telephone numbers of your Issuer's  Card Centers, in case of emergencies, stolen or lost card.  Keep the list in a safe place. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  &lt;b&gt;Please ensure&lt;/b&gt;  that you receive your monthly card statement every month, otherwise  please call our Customer Service at 03-26936880 immediately. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  &lt;b&gt;Kindly make your card payments&lt;/b&gt; before the statement due date to avoid any interruption on your card usage. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  &lt;b&gt;Keep your card away&lt;/b&gt; from heat and direct sunlight.   Magnetic stripe should not be scratched, placed back of two cards or  near any magnetic devices (example: television, radio &amp;amp; etc). &lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;Important Message&lt;/b&gt; &lt;br /&gt;
&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  Do not lend your credit card-i to anyone, even to a friend or family members.  Bank Rakyat Credit Card-i is non-transferable. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  Do not disclose your account number over the phone unless you have verified the company or individual you're speaking with. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  Do not write or keep your PIN number in your purse or wallet.  Memorize and destroy the PIN notification. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  Do not leave your credit card-i unattended.  Remember that your credit card-i(s) is as good as cash. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  Kindly ensure that your credit card-i is always in your possession. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;  It is important to budget accordingly to avoid overspending. &lt;/li&gt;
&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">13</thr:total></item><item><title>Hacking Facebook Accounts using Win-Spy Pro Keylogger Software</title><link>http://onlyhacking007.blogspot.com/2012/03/hacking-facebook-accounts-using-win-spy.html</link><category>Facebook</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Mon, 26 Mar 2012 00:15:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-8655300594571211079</guid><description>o my knowledge, i have already discussed all most all the possible ways to&lt;i&gt; hack facebook account&lt;/i&gt;. If you did missed that, please read here: &lt;a href="http://www.hacker9.com/how-facebook-hacking-carried-out-password-methods.html" target="_blank"&gt;&lt;i&gt;Ways to hack facebook account&lt;/i&gt;&lt;/a&gt;. We have also seen that there is nothing called &lt;i&gt;“facebook hacking Software”&lt;/i&gt; or &lt;i&gt;“Facebook hacker software”&lt;/i&gt;.  All these software’s are fake and spyware, that once installed on your  system, will rapidly upload any sensitive data of yours like credit card  details or saved passwords to the creators server. Read more here: &lt;a href="http://www.hacker9.com/hacking-fb-accounts-using-007-facebook-hack-v1-0-the-truth.html" target="_blank"&gt;&lt;i&gt;The Truth behind Facebook Hacking Software&lt;/i&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Here in this post i will be demonstrating how you can hack your  friends ‘facebook account’ who is residing far away from you using the  Best remote keylogger software “&lt;i&gt;Winspy&lt;/i&gt;“. Keylogging method is  the best option for you, when you really want to reveal your victims  password and at the same time, you do not want your victim to know about  ‘his account being hacked’.&lt;br /&gt;
&lt;br /&gt;
The best part in winspy keylogger is, you need not manipulate or bind  the remote installation file with any other file like .mp3 or .jpg.  Winspy keylogger will automatically do that for you, as specified.  Though some antiviruses like COMODO may flag it as Trogn, In such cases  you can always use Crypters to make then undetectable. Read here: &lt;a href="http://www.hacker9.com/how-to-make-keyloggers-undetectable-using-binders-and-crypters.html" target="_blank"&gt;&lt;i&gt;Making keyloggers Undetectable using Binders and Crypters&lt;/i&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;blockquote&gt;&lt;span style="color: red; font-size: medium; font-weight: bold;"&gt;&lt;i&gt;Buy It Now:&lt;/i&gt; &lt;/span&gt;&lt;a href="http://www.hacker9.com/WinSpy/" target="_blank"&gt;&lt;span style="font-size: medium; font-weight: bold;"&gt;Download “Win-Spy v9.8 Keylogger”&lt;/span&gt;&lt;/a&gt;&lt;/blockquote&gt;&lt;b&gt;[ &lt;/b&gt;&lt;span style="color: red;"&gt;*&lt;/span&gt;&lt;b&gt; ]&lt;/b&gt; After buying, please be sure to note down the “clickbank transaction id”. you will need it to activate your software.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Features of WinSpy Keylogger:&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Inbuilt Icon changer and Image Binder&lt;/li&gt;
&lt;li&gt;Captures Keystrokes including passwords, chats, websites visited, etc.&lt;/li&gt;
&lt;li&gt;Remote FTP – Upload or download any file from remote PC.&lt;/li&gt;
&lt;li&gt;Added PC Usage or Active Time Report&lt;/li&gt;
&lt;li&gt;Improved Chat Reports – Google Talk Chat, Facebook Chat, MSN Live Chat, etc.&lt;/li&gt;
&lt;li&gt;WebCam Recording with SMS Alert&lt;/li&gt;
&lt;/ul&gt;&lt;code&gt;&lt;span style="font-size: medium;"&gt;Tutorial - How to Use Win-spy for "Facebook Hacking"?&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#1:&lt;/span&gt;&lt;/b&gt; Click  Open the Win-spy installation file that you just downloaded and it will  start the installation process. You will be asked to register the  software using ‘&lt;i&gt;clickbank transaction id&lt;/i&gt;‘. Just copy paste the &lt;i&gt;clickbank transaction id&lt;/i&gt; that you copied after buying it. (Forgot to copy? don’t worry, head over to your email inbox and check for email from &lt;i&gt;clickbank&lt;/i&gt;).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="clickbank transaction id" class="aligncenter size-full wp-image-2271" height="241" src="http://www.hacker9.com/wp-content/uploads/2012/01/1.png" title="clickbank transaction id" width="417" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#2: &lt;/span&gt;&lt;/b&gt;Next you will be asked to choose &lt;i&gt;Login&lt;/i&gt; details (username &amp;amp; password). So that only you are able to access the software and captured data (&lt;i&gt;keylogs&lt;/i&gt;).&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="Download Winspy keylogger" class="aligncenter size-full wp-image-2270" height="241" src="http://www.hacker9.com/wp-content/uploads/2012/01/2.png" title="2 Download Winspy keylogger" width="417" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#3: &lt;/span&gt;&lt;/b&gt; Once you  are done with selecting username and password, the keylogger will then  ask you to press&lt;br /&gt;
&amp;nbsp;and hold 3 keys simultaneously for “&lt;i&gt;login box&lt;/i&gt;” to appear.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="Winspy keylogger login" class="aligncenter size-full wp-image-2283" height="241" src="http://www.hacker9.com/wp-content/uploads/2012/01/3.png" title="Winspy keylogger login" width="415" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#4: &lt;/span&gt;&lt;/b&gt; Once you press and hold these 3 keys: Ctrl+Shift+F12, a “&lt;i&gt;Login Box&lt;/i&gt;” Box will appear immediately. Now enter your username and password to login to your main control panel.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="Download Winspy keylogger" class="aligncenter size-full wp-image-2269" height="161" src="http://www.hacker9.com/wp-content/uploads/2012/01/4.png" title="Download Winspy keylogger" width="248" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#5: &lt;/span&gt;&lt;/b&gt; Your  control panel will look something like below. This is your main  keylogger control panel, where in you can manage everything. Remember  this main keylogger will also monitor your PC in completely stealth mode  and report everything in your control panel.&lt;br /&gt;
&lt;div style="text-align: center;"&gt;(&lt;span style="color: #333333;"&gt;Click to Enlarge&lt;/span&gt;)&lt;/div&gt;&lt;a href="http://www.hacker9.com/wp-content/uploads/2012/01/661.png" target="_blank"&gt;&lt;img alt="Download Winspy keylogger" class="aligncenter size-medium wp-image-2265" height="168" src="http://www.hacker9.com/wp-content/uploads/2012/01/661-300x168.png" title="Download Winspy keylogger" width="300" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Every time when you restart or reboot your PC, Win-spy keylogger will  automatically start monitoring your PC. In case you don’t wish to  monitor you PC, Just login by pressing Ctrl+Shif+F12 and click ‘&lt;b&gt;&lt;i&gt;&lt;span style="color: #003300;"&gt;file &amp;gt;&amp;gt; exit&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;‘. Once you&lt;i&gt; logout/exit&lt;/i&gt; the program, you cannot login back. To login back, you will need to reboot your PC.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#5: &lt;/span&gt;&lt;/b&gt; Now  coming back to our main mission, i.e creating Remote installation file  for your victim. To create this installation file for your “XYZ” victim,  Just click ‘&lt;span style="color: #003300;"&gt;&lt;i&gt;&lt;b&gt;Remote &amp;gt;&amp;gt; Remote install&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;‘ in your control panel. Here a warning message will pop-up, Just click ‘yes’ and proceed.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full wp-image-2274" height="161" src="http://www.hacker9.com/wp-content/uploads/2012/01/77.png" title="Remote keylogger" width="302" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#6: &lt;/span&gt;&lt;/b&gt; Now here comes the main Step. Next you will see all the settings and options in you “remote installation file”.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="Remote install options" class="aligncenter size-full wp-image-2275" height="563" src="http://www.hacker9.com/wp-content/uploads/2012/01/88.png" title="Remote install options" width="590" /&gt;&lt;br /&gt;
&lt;ul&gt;&lt;ul&gt;Fill in the required Fields:&lt;/ul&gt;&lt;/ul&gt;&lt;i&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Enter User&lt;/span&gt;:&lt;/b&gt;&lt;/i&gt; Enter a description on how you are going to identify remote PC.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="File types" class="alignright size-full wp-image-2277" height="98" src="http://www.hacker9.com/wp-content/uploads/2012/01/99.png" title="File types" width="80" /&gt;&lt;i&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Enter Filename&lt;/span&gt;:&lt;/b&gt;&lt;/i&gt; This is the name of the file you will be sending. A .exe file (or .ppt) with this &lt;i&gt;filename&lt;/i&gt;  will be created on your desktop. You will be sending this file to the  Remote PC. As you will see, there 5 different file extensions you can  choose from. The most commonly used and recommended ones are &lt;i&gt;.exe&lt;/i&gt; or &lt;i&gt;.ppt&lt;/i&gt; formats. If .ppt &lt;i&gt;(powerpoint extension)&lt;/i&gt; selected, you might need to update some settings in you office suit. In both &lt;i&gt;.exe&lt;/i&gt; or &lt;i&gt;.ppt&lt;/i&gt;,  you can add image to it. So that when your victim runs it, he will be  shown the Image and the keylogger will install in background  automatically.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Include Picture&lt;/span&gt;:&lt;/b&gt;&lt;/i&gt;  This is the picture remote user will see when they click on the remote  file. Supports GIF or JPG formats. If no picture is included then when  user clicks on the file it would appear as nothing has happened. Win-Spy  will install silently.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;File Icon&lt;/span&gt;:&lt;/b&gt;&lt;/i&gt; You can add any icon to your remote installation file. If you have Included image then its recommended that you use image icon.&lt;br /&gt;
&lt;i&gt;&lt;span style="color: red;"&gt;#tip:&lt;/span&gt;&lt;/i&gt; To create icon of Image, use this software called &lt;a class="external" href="http://www.aha-soft.com/anytoicon/" rel="nofollow" target="_blank"&gt;&lt;i&gt;Any2Icon&lt;/i&gt;&lt;/a&gt;. &lt;a class="external" href="http://www.aha-soft.com/anytoicon/" rel="nofollow" target="_blank"&gt;Download here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Email keylog to&lt;/span&gt;:&lt;/b&gt;&lt;/i&gt;  This will be the email address where you would receive win-spy keylog  reports. Enter your gmail address in this Email Tab. Its Recommended  that you use only gmail email address. Do not change SMTP server  settings. Do a “Test” and make sure mail was sent and received. Check  your SPAM folder for email if not receiving email.&lt;br /&gt;
&lt;br /&gt;
There are some other optional settings like: screen capture, WebCam, FTP, etc. Just go through and configure as you wish.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#7: &lt;/span&gt;&lt;/b&gt; Once  you are done with filling up all the required details, Click on “Create  Remote file” Button. This will take some seconds and once it is done, it  will then save the installation file on your Desktop.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#8: &lt;/span&gt;&lt;/b&gt; The  next Step is to send this file to your victim via email or better send  it via facebook messages (as attachment). Make sure you have archived it  in a .rar or .zip file, So that online antivirus programs of facebook  or email service don’t pick it up as exe file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="attachment" class="aligncenter size-full wp-image-2281" height="233" src="http://www.hacker9.com/wp-content/uploads/2012/01/attachment.png" title="attachment" width="465" /&gt;&lt;br /&gt;
&lt;br /&gt;
It totally depends on you as to how you are going to convince your  victim to install it at his end. here you will need a criminal mind to  perform this Con. &lt;b&gt;&lt;i&gt;For ex:&lt;/i&gt;&lt;/b&gt; lets say i am chatting with my victim in facebook messages, suddenly i will send him 1 broken photo link and will ask him to &lt;i&gt;identify any object in the photo&lt;/i&gt;. Obviously he will reply that the &lt;i&gt;“link is not working”&lt;/i&gt; or “&lt;i&gt;i don’t have permission to access that link&lt;/i&gt;“.  Then i will attach Zip file containing the keylogger and ask him to  download this file to checkout that photo. At his end he will download  it, open it and he will see the image on his screen. and by the time he  reply you back, the keylogger is already installed on his PC.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step &lt;span style="color: red;"&gt;#9: &lt;/span&gt;&lt;/b&gt; Once  your victim has successfully installed it, you will then get keylogs  periodically in your specified Gmail’s “SPAM” folder. You can also use  Remote PC viewer in your win-spy control panel to view all your victims  activity.&lt;br /&gt;
&lt;br /&gt;
That’s it. Good luck!. If you are facing any problem, do comment below and i will get back to you anytime.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;P.S.&lt;/b&gt; We hold no responsibility for the keylogger  software we have refereed to and We can not guarantee the remote setup  will work for everyone. Please do not Misuse it unless its for good  reason. Also We claim no legal or moral responsibilities for your  actions. Please check your local laws.&lt;br /&gt;
&lt;div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"&gt;&lt;br /&gt;
&lt;a href="http://www.hacker9.com/hacking-facebook-accounts-using-win-spy-keylogger-software.html#ixzz1qCkVpXyy" style="color: #003399;"&gt;http://www.hacker9.com/hacking-facebook-accounts-using-win-spy-keylogger-software.html#ixzz1qCkVpXyy&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">7</thr:total></item><item><title>How Not Get Hacked</title><link>http://onlyhacking007.blogspot.com/2012/03/how-not-get-hacked.html</link><category>Security</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Mon, 26 Mar 2012 00:11:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-8033581181745075807</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="hacked" class="aligncenter size-full wp-image-2294" height="336" src="http://www.hacker9.com/wp-content/uploads/2012/02/hacked2.jpg" title="hacked" width="448" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;User often finds himself/herself in a dilemma hoe to escape the  hacking problem. The concern is online banking or any other online  transaction that needs high securities. The below mentioned tips are  helpful for those who are just a beginner or intermediate user in online  computing.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;1.&lt;/b&gt; Don’t assume only for risk based scenarios or  what type of attack will manifest your security. A person should prepare  for highest risk acceptance. Many people makes their decisions assuming  for particular scenario, however this is wrong practice for not to get  hacked. Rather, think about how regular and normal people can access  your data easily, because a hacker goes with this path only.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;2.&lt;/b&gt; Try to keep your password more complicated. This  thing will not only keep you away from bruit force attack but also it  takes much time for others to recognize your password. These days  password hacking is most common problem among internet users. To avoid  such things, an internet user, must adopt with strong hashed password.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;3.&lt;/b&gt; Keep a practice of using browsers like Mozilla  Firefox, Safari, Google Chrome etc instead of using Internet Explore.  This is one of the best ways to stay away from hacking. There are lot  many cases about internet explorer that it is vulnerable to virus, spy  ware and ad ware attacks. Make sure you use internet explorer in case of  legit websites only.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;4.&lt;/b&gt; No matter what browser the user uses, but  browsers are hostile for hacking. So, keep adding more security to your  web browsers. Always try to use add-ons, because add-ons helps in  identifying fishing websites, prevent passwords of getting into wrong  hands and prevent your computer getting hacked.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;5.&lt;/b&gt; Don’t ever click on links provided in emails.  Chunk emails from phishing websites are used for hacking. Phishing  emails are difficult to trace, if you are unsure of email or website,  try to type address manually into the address bar of a browser.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;6.&lt;/b&gt; Always use a single credit card for online  purchases. Using single credit card for online transactions is easy to  remember your previous transactions and easier to monitor changes in  strange way.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;7.&lt;/b&gt; Shoulder attack, make sure there is no one behind  you attempting to peak your password. Also do not make any sticky notes  about your password. Your password is most vulnerable for hacking.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;8.&lt;/b&gt; Do not use your computer overnight, because this is the only time when most of hackers are active&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;9.&lt;/b&gt; After downloading any software or program from  website, make sure you scan downloaded software 3 times by your  antivirus software. You cannot predict a virus by its name and type.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;10.&lt;/b&gt; Keep changing your password regularly and also does not share login information with anybody.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Above are some tips and things to be remember while surfing through  internet and using important and confidential data over internet. These  are some small things but make much difference when users avoid or don’t  take it seriously. Try to be secure in each and every aspect because a  small hole can ruin everything.&lt;/div&gt;&lt;div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: justify; text-decoration: none;"&gt;&lt;br /&gt;
&lt;a href="http://www.hacker9.com/how-not-to-get-hacked-10-tips.html#ixzz1qCjkXIEE" style="color: #003399;"&gt;http://www.hacker9.com/how-not-to-get-hacked-10-tips.html#ixzz1qCjkXIEE&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Top 50 Passwords That Can Get You Hacked Instantly</title><link>http://onlyhacking007.blogspot.com/2012/03/top-50-passwords-that-can-get-you.html</link><category>Security</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Mon, 26 Mar 2012 00:07:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-4163549397649874258</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVDLSCqIZmt0437MXPiSgbgmUQkPg2dt7lgENXD2wuTIYoHYg8IyQG3iDBM3UgE-IIf9aBLbX4wXMf28N3-c8zgHfHaSOYuVInl8CLBz0Nm-SnIyJVImJO0Khr_i_xrzBmEv60BGwWkxM/s1600/pass.jpeg" style="background-color: white; border-bottom-style: none; border-color: initial; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; border-width: initial; color: #666666; display: inline !important; font-family: Verdana; font-size: 12px; line-height: 20px; margin-left: 1em; margin-right: 1em; text-align: center; text-decoration: none;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVDLSCqIZmt0437MXPiSgbgmUQkPg2dt7lgENXD2wuTIYoHYg8IyQG3iDBM3UgE-IIf9aBLbX4wXMf28N3-c8zgHfHaSOYuVInl8CLBz0Nm-SnIyJVImJO0Khr_i_xrzBmEv60BGwWkxM/s1600/pass.jpeg" style="border-width: 0px; padding: 10px;" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="" style="clear: both; text-align: left;"&gt;Passing  guessing is one of the fastest technique to hack any account. According  to a survey by Sophos 33% of the people use the same passwords. What  this means that if a hacker can get inside a person's facebook account,  he can also get inside his/her other account using the same password.  The chart below is the set of most commonly used Gawker Passwords that  were leaked online due to a security breach.&amp;nbsp;&lt;/div&gt;&lt;a href="http://www.blogger.com/post-create.g?blogID=2728449491748419906" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-a-tHNgPzmrpG1GAp5R3ped3fwRXHaFA__X1Oe2ZznZ_6k6MNJwHy4Fu01TUfmxmepxQKevckfOyugNiBDPExpL09bNENg7HSiFPBOStVQuA7L_sup80HrJaRGbf52AeCkyoXxuYK5WY/s1600/top50-passwords.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-a-tHNgPzmrpG1GAp5R3ped3fwRXHaFA__X1Oe2ZznZ_6k6MNJwHy4Fu01TUfmxmepxQKevckfOyugNiBDPExpL09bNENg7HSiFPBOStVQuA7L_sup80HrJaRGbf52AeCkyoXxuYK5WY/s1600/top50-passwords.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;The  following incident shows us how careless people can be while choosing  their passwords and ultimately getting themselves hacked. Alternatively  if you are worried that you password might be guessed or simply want to  check if you are using a poor passwords. Kindly refer the our post  below:&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&amp;nbsp;http://www.rafayhackingarticles.net/2012/02/top-50-passwords-that-can-get-you.html&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVDLSCqIZmt0437MXPiSgbgmUQkPg2dt7lgENXD2wuTIYoHYg8IyQG3iDBM3UgE-IIf9aBLbX4wXMf28N3-c8zgHfHaSOYuVInl8CLBz0Nm-SnIyJVImJO0Khr_i_xrzBmEv60BGwWkxM/s72-c/pass.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Facebook Hacker V1.0 - A Keylogging Software</title><link>http://onlyhacking007.blogspot.com/2012/03/facebook-hacker-v10-keylogging-software.html</link><category>Facebook</category><author>noreply@blogger.com (Only Hacking)</author><pubDate>Mon, 19 Mar 2012 19:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2728449491748419906.post-4271045781184691354</guid><description>&lt;div class="separator" style="clear: both; color: lime; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyoSAbBMyvxdxOvKc_2WiQmOyoxvjiNuhfA7fl7Qh8DbAtQrXOlBc5m3HlczVPmNmjyMXqwHOC2sVpblmDIlK7FpoZwRQAYYhsBYp-_WbLva0o0hUuwVQ9Mqb19YIdwosq_-lzrY9kaV6C/s1600/Fig2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyoSAbBMyvxdxOvKc_2WiQmOyoxvjiNuhfA7fl7Qh8DbAtQrXOlBc5m3HlczVPmNmjyMXqwHOC2sVpblmDIlK7FpoZwRQAYYhsBYp-_WbLva0o0hUuwVQ9Mqb19YIdwosq_-lzrY9kaV6C/s1600/Fig2.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: lime;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: lime;"&gt;&lt;span class="Apple-style-span" style="border-collapse: separate; font-family: 'Times New Roman'; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; line-height: 19px;"&gt;We have wrote several articles on Facebook Hacking, The most recent one we wrote was on&lt;b&gt;"Top 10 Ways How Hackers Can Hack Facebook Accounts In 2012&lt;/b&gt;". Which received&amp;nbsp;tremendous amount of responses. However in today's article we would like you to introduce you a software named&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;&lt;b&gt;"Facebook Hacker&lt;/b&gt;.&amp;nbsp;&lt;span style="text-align: left;"&gt;&lt;b&gt;Hacking facebook accounts&lt;/b&gt;&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;using phishing methods are out of the fashion these days. A new tool known as facebook hacker is introduced. A dangerous tool for the people in need of other’s username and passwords.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir="ltr" style="color: lime; text-align: left;"&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.blogger.com/goog_530616496"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.blogger.com/goog_530616496" name="more" style="text-decoration: none;"&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;This tool is extremely easy to connect and use. All you have to do is give an email address and a password where the stolen information is to deliver. Can’t be easier than that.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.blogger.com/goog_530616496"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;Just type in the email address and password and then click on the build button. A new&lt;b&gt;“SERVER.EXE&lt;/b&gt;” file will be created and most of the work is already done. Now the big part comes. Just send this file to the victim. Rename it, change the icon and make it more presentable so that the victim opens it for sure.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;As soon as the victim opens the file, Server.exe will get all the passwords saved and facebook account credentials and will give them to you. To avoid detection, the facebook Hacker will also look for all the processes related to a security suite and kill them upon detection. The most important thing this software does is it kills all the security suite detecting it.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivOUwFBxtbt6f6Z9G5f9PhSlmcYaddJXDOkgrG-D8BOgKoFdvySRm86eAasmIAxdkbkedWSjofvOrgX87PKMYSnTMrA0ditj9H3nNwLbjatCH6wJ3D4ldGwhRFooL1te8yvGAHMdmF08pF/s1600/Fig5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivOUwFBxtbt6f6Z9G5f9PhSlmcYaddJXDOkgrG-D8BOgKoFdvySRm86eAasmIAxdkbkedWSjofvOrgX87PKMYSnTMrA0ditj9H3nNwLbjatCH6wJ3D4ldGwhRFooL1te8yvGAHMdmF08pF/s1600/Fig5.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal"&gt;You should know how to protect yourself from such threats. BitDefender detects this as a Trojan. In order to stay safe ensure that you update your antivirus regularly. Also, remember not to run files you may receive as attachments or via IM, or at least, to scan them beforehand.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.rafayhackingarticles.net/"&gt;http://www.rafayhackingarticles.net&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyoSAbBMyvxdxOvKc_2WiQmOyoxvjiNuhfA7fl7Qh8DbAtQrXOlBc5m3HlczVPmNmjyMXqwHOC2sVpblmDIlK7FpoZwRQAYYhsBYp-_WbLva0o0hUuwVQ9Mqb19YIdwosq_-lzrY9kaV6C/s72-c/Fig2.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">49</thr:total></item></channel></rss>