Followers

Search This Blog

About Me

My photo
I like to exercise my knowedge of computers at extreme

Blog Archive

Popular Posts

2012/03/28

FBI Forensic Field Kit

FBI Forensic Field Kit - Bootable


This is the ultimate bootable Disk for the agent, (or wannabe agent).

Forensics Tools:
Sleuth Kit -Forensics Kit
Py-Flag - Forensics Browser
Autopsy - Forensics Browser for Sleuth Kit
dcfldd - DD Imaging Tool command line tool and also works with AIR
foremost - Data Carver command line tool
Air - Forensics Imaging GUI
md5deep - MD5 Hashing Program
netcat - Command Line
cryptcat - Command Line
NTFS-Tools
qtparted - GUI Partitioning Tool
regviewer - Windows Registry Viewer
X-Ways WinTrace
X-Ways WinHex
X-Ways Forensics
R-Studio Emergency (Bootable Recovery media Maker)
R-Studio Network Edtion
R-Studio RS Agent
Net resident
Faces 3 Full (600 megs)
Encase 4.20




Field Kit Manuals


Incident response - Computer Forensics
Computer Crime investigation
Forensic Pathology
Internet Forensics
Forensic interpretation of Evidence
Windows Forensics
Computer Forensics -An Illustrated Dictionary
Computer Forensics - jumpstart


Additional programs on Boot DVD:


Gentoo Linux 2.6 Kernel - Opyimized for Forensics Use
XFCE - GUI
Apache2 - Server
Mysql PHP4
Open Office
Gimp - Graphics Program
KSnapshot - Screen Capture Program
Mozilla
Gnome CD Master
K3b - CD Burner
XMMS - media player
Porthole - Gentoo Graphics Package Manager
Karchiver - GZIp GUI




Security Tools:
Etherape - GUI Network Traffic Monitor
Clamv - Anti Virus
snort - Command Line
John the Ripper - Command Line password cracker
rkhunter - Command Line
Ethereal - Network Traffic Analyzer
FWBuilder - GUI Firewall App
nessus - network scanner


Download here FBI Tool Kit:

Hacking Online Banking and Credit Card Transactions

20,
2008

 Hacking Online Banking and Credit Card Transactions

Here is process for hacking online banking and credit cards transactions and also a process to prevent from them .
The Scenario
You go to a coffee shop for a cup of coffee and to utilize the shop’s Wi-Fi HotSpot to surf the web. You connect to the hotspot network and decide to perform some online banking or to purchase something online. By the way, this could happen to you at home, as well. As an end-user, you feel quite secure, as you see the lock in the bottom corner of your Internet browser, symbolizing that the online banking or online credit card transaction is safe from prying eyes. Your data, including username, password, credit card info, etc. will be encrypted with 128-bit encryption. So it's secure, right?
It is not uncommon to perform banking and to purchase products online with your credit card. It is also a common thought that doing so is secure, as this is done via SSL. For the most part, this is true and the sessions are secure. Discover Card, for example, posts the following statement on their website:

Figure 1
The problem is that it is not “virtually impossible” for someone else to see your data, such as login information or credit card numbers. It can actually be relatively easy, as you’ll see, if you as an end-user are not knowledgeable about how you can be exploited and know the signs that this is occurring.

Figure 2
(Indicates a Secure SSL Session)
Continuing with the scenario, what you didn’t realize is that a hacker has intercepted your Online Banking login credentials and credit card information and can now log into your Online Banking Website or purchase items with your credit card. How is this possible, since SSL was used and is hard to break? The answer is that you made a fatal mistake that subjected you to an SSL Man-in-the-Middle (MITM) attack.

The Attack

The fatal flaw that enabled the sensitive information to be stolen is possible when an end-user is not properly educated on an easy to do and well-known SSL exploit – SSL MITM.
Here’s how it’s done:
The hacker goes to coffee shop and connects to the same Wi-Fi network you are connected to. He runs a series of utilities to redirect other user’s data through his machine. He runs a number of other utilities to sniff the data, act as an SSL Certificate Server and to be the Man-the-Middle. The following diagram shows a very simplified graphic of how your SSL Banking session should work under normal conditions, then how it would work during an attack:

Figure 3

Figure 4
An important concept to grasp here is that a certificate is used to establish the secure SSL connection. This is a good thing, if you have a good certificate and are connecting directly to the website to which you intended to use. Then all your data is encrypted from your browser to the SSL website where the bank’s website will use the information from the certificate it gave you to decrypt your data/credentials. If that is truly the case, then it is pretty darn hard for a hacker to decrypt the data/credentials being transmitted, even if he is able to sniff your data.
This is a bad thing if you have a “Fake” certificate being sent from the hacker, and you are actually connecting to his machine, not directly to the bank’s website. In this case, your credentials are being transmitted between your browser and the hacker’s machine. The hacker is able to grab that traffic, and, because he gave you the certificate to encrypt the data/credentials, he can use that same certificate to decrypt your data/credentials.
Here are the exact steps a hacker could use to perform this attack:
The first thing he would do is turn on Fragrouter, so that his machine can perform IP forwarding

Figure 5
After that, he’ll want to direct your Wi-Fi network traffic to his machine instead of your data traffic going directly to the Internet. This enables him to be the “Man-in-the-Middle” between your machine and the Internet. Using Arpspoof, a real easy way to do this, he determines your IP address is 192.168.1.15 and the Default Gateway of the Wi-Fi network is 192.168.1.1:

Figure 6
The next step is to enable DNS Spoofing via DNSSpoof:

Figure 7
Since he will be replacing the Bank's or Online Store’s valid certificate with his own fake one, he will need to turn on the utility to enable his system to be the Man-in-the-Middle for web sessions and to handle certificates. This is done via webmitm:

Figure 8
At this point, he is setup and ready to go, he now needs to begin actively sniffing your data passing through his machine including your login information and credit card info. He opts to do this with Ethereal, then saves his capture:

Figure 9
He now has the data, but it is still encrypted with 128-bit SSL. No problem, since he has the key. What he simply needs to do now is decrypt the data using the certificate that he gave you. He does this with SSL Dump:

Figure 10
The data is now decrypted and he runs a Cat command to view the now decrypted SSL information. Note that the username is “Bankusername” and the password is “BankPassword”. Conveniently, this dump also shows that the Banking site as National City. FYI, the better, more secure banking and online store websites will have you first connect to another, preceeding page via SSL, prior to connecting to the page where you enter the sensitive information such as bank login credentials or credit card numbers. The reason for this is to stop the MITM-type attack. How this helps is that if you were to access this preceeding page first with a "fake" certificate and then proceeded to the next page where you were to enter the sensitve information, that page where you would enter the sensitive information would not display. That is because the page gathering the sensitive information would be expecting a valid certificate, which it would not receive because of the Man-in-the-Middle. While some online banks and stores do implement this extra step/page for security reasons, the real flaw in this attack is the uneducated end-user, as you'll soon see:

Figure 11
With this information, he can now log into your Online Banking Account with the same access and privileges as you. He could transfer money, view account data, etc.
Below is an example of a sniffed SSL credit card purchase/transaction. You can see that Elvis Presley was attempting to make a purchase with his credit card 5440123412341234 with an expiration date of 5/06 and the billing address of Graceland in Memphis, TN (He is alive!). If this was your information, the hacker could easily make online purchases with your card.

Figure 12

Also Real Bad News for SSL VPN Admin

This type of attack could be particularly bad for corporations. The reason for this is that Corporate SSL VPN solutions are also vulnerable to this type of attack. Corporate SSL VPN solutions will often authenticate against Active Directory, the NT Domain, LDAP or some other centralized credentials data store. Sniffing the SSL VPN login then gives an attacker valid credentials to the corporate network and other systems.

What an End-User Needs To Know

There’s a big step and end-user can take to prevent this from taking place. When the MITM Hacker uses the “bad” certificate instead of the “good”, valid certificate, the end-user is actually alerted to this. The problem is that most end-users don’t understand what this means and will unknowingly agree to use the fake certificate. Below is an example of the Security Alert an end-user would receive. Most uneducated end-users would simply click “Yes”… and this is the fatal flaw:


Figure 13
By clicking “Yes”, they have set themselves up to be hacked. By clicking the “View Certificate” button, the end-user would easily see that there is a problem. Below are examples of the various certificate views/tabs that show a good certificate compared to the bad certificate:

Figure 14

(Good Certificate) (Bad Certificate)

Figure 15

(Good Certificate) (Bad Certificate)

Figure 16

(Good Certificate) (Bad Certificate)
 How an End-User Can Prevent This
  • Again, the simple act of viewing the certificate and clicking “No” would have prevented this from happening.
  • Education is the key for an end-user. If you see this message, take the time to view the certificate. As you can see from the examples above, you can tell when something doesn’t look right. If you can’t tell, err on the side of caution and call your Online Bank or the Online store.
  • Take the time to read and understand all security messages you receive. Don’t just randomly click yes out of convenience.
 How a Corporation Can Prevent This
  • Educate the end-user on the Security Alert and how to react to it.
  • Utilize One Time Passwords, such as RSA Tokens, to prevent the reuse of sniffed credentials.
  • When using SSL VPN, utilize mature products with advanced features, such as Juniper’s Secure Application Manager or Network Connect functionality.
 Conclusion

This type of attack is relatively easy to do in a public Wi-Fi hotspot environment. It could also easily happen on a home Wi-Fi network, if that Wi-Fi network isn’t properly configured and allows a hacker to connect to that home network. An educated end-user and sound security practices by corporations can protect your valuable data.

The credit goes to the Ethical Hackers.

Reset Your Mobile Memory Card Password 2 minutes

Reset Your Mobile Memory Card Password 2 minutes



We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it. There is a way to break the security wall. If you are a Symbian device lover then no need to worry about the password. You can crack them in few minutes.



In this tutorial I am going to teach you how to reset your memory card password in easy step. Before we start you need to have X-plore (application used to explore your system files and folder even the hidden folders in your device)



Step1: Install X-Plore in your mobile. If you want to download X-Plore search around internet you can download free trail.

Step2: Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"

Step3: Once you done that now go to the following path C:/Sys/Data/Mmcstore

Step4: Once you reached there you need to press "3" under option to set it in the Hex-viewer

Step5: See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6). Just check the character between the "?" it is your password ie: 62626



Note: If you have not set the password, then you will not able to gain access to C:/Sys/Data

2012/03/20

Crack Any Adobe Software Manually – The Genuine Way [Windows]

Crack Any Adobe Software Manually – The Genuine Way [Windows]

Crack-Any-Adobe-Product_thumbWhenever we download any cracked software from the internet, or download a crack for the application, it usually consists of viruses, and also it can never be updated. So to overcome these issues we have a genuine way to crack any Adobe product. This is simply done by stopping the requests from Adobe to check if everything with our Adobe account is valid or not. The trick is simple and can be implemented easily . You just need to edit a simple notepad file.
Steps To Crack Any Adobe Software :

1. Download or install any Adobe software which you want to crack from the original site (ignore if you have already installed it).
2. Now press Windows Key + R (or go to START and select RUN).
3. Copy “ C:\Windows\System32\drivers\etc ” to the blank space and press enter.
Crack-any-adobe-software-manually-the-genuine-way-open-hosts-file_thumb
The window will look like the screenshot shown below
Crack-any-adobe-software-manually-the-genuine-way_thumb%25255B1%25255D

4. You will sea a file named “hosts” , open it in Notepad.
Copy all the codes give from this file, exactly at the end of the “hosts” file.

Now your hosts file will look like below
Crack-any-adobe-software-manually-the-genuine-way-hosts-file-edited_thumb

5. Now open your installed software and try registering it with the given keys in this file. You can also use any other serial from the internet.

Folder Lock Without Any Software

Folder Lock Without Any Software

Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.



if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Reveal *****(Asterisk) Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.


javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox.

Bypass the security of Facebook

Facebook Hack – View photo albums of non-friends

A new facebook exploit allows anyone to access any photo album of non-friends as long as you have the link.
Facebook Photo Exploit
By following the simple steps shown in above image, you can bypass the security of Facebook and view photos of others online.

2012/03/16

Google Gravity

Google Gravity











just type "google gravity" in google and then open the first link and view the gravity!!!!!

How to Jailbreak the iPhone, iPad, iPod touch, and Apple TV

How to Jailbreak the iPhone, iPad, iPod touch, and Apple TV

This page is our ultimate guide to jailbreaking. Along with information and frequently asked questions about everything jailbreak related, you will find some detailed tutorials on how to jailbreak your iPhone, iPod touch, iPad, and Apple TV.

If you already know a lot about jailbreaking and you’re just looking for guides and tutorials, then scroll down to find instructions on how to jailbreak. If you are new to jailbreaking and want to learn more, we suggest you spend a few minutes reading more about this simple process.
At the bottom of this page, you will find information about various jailbreak methods. Simply look for the iOS version you want to jailbreak and the type of iOS device you have, then click on the link to see a detailed tutorial about jailbreaking the iPhone, iPod touch, iPad, and Apple TV.

What is Jailbreaking?

Jailbreaking is the process by which Apple’s mobile operating system, iOS, is modified to run unsigned code in order to gain access to files that Apple wouldn’t normally let you access.
Jailbreaking adds unofficial application installers to your iOS device, such as Cydia, which let you download many 3rd-party applications, tweaks, and extensions that are unavailable through the App Store. These packages open up endless possibilites to do things on your iOS device that a non-jailbroken iOS device would never be able to do.
You can install extensions that give you instant access to your system settings from anywhere on your iOS device, bypass certain restrictions set in place by Apple and the carriers, and find packages that give you more control over your iOS experience.
Jailbreaking is about freeing your iOS device from Apple’s restrictions to let you install anything you want.

What are the Benefits of Jailbreaking?

The main reason why you’d want to jailbreak is to have the ability to install third party applications and tweaks that Apple doesn’t or wouldn’t approve in the App Store. There are tons of applications that don’t meet Apple standards and do things that Apple doesn’t want you to do on your iOS device for various reasons.
For example, Apple doesn’t allow you to customize your iPhone by changing app icons or the general user interface of your device. Thanks to the jailbreak community, there are several ways to completely change the way your iPhone looks, WinterBoard being the most popular one.
Besides applications, jailbreaking also gives you access to tweaks, mods, and extensions. These not exactly considered applications. They bring subtle improvements to the way your iOS device operates. For instance, Five Icon Switcher is a tweak that lets you have 5 icons in the iPhone app switcher at once, instead of the default 4.
A lot of people jailbreak their iOS device in order to unlock it to work on a different carrier. When you want to unlock your iPhone, the first step is to jailbreak it to then run and run software that will let you have other carriers work on your iPhone. For for information on unlocking, visit or dedicated unlock page.

Is Jailbreaking Legal?

Its illegal in india and apple will do anything to sue you. 

Does Jailbreaking Void my Warranty?

Yes and no. Yes, because if you go to the Apple store and show your jailbroken iPhone to an Apple employee, you will be told that you can’t receive customer support because you voided your warranty the minute you jailbroke. Apple of course acknowledges the US government’s DMCA exception ruling that makes jailbreak legal, but that doesn’t mean that Apple has to allow jailbreak in its customer agreement.
From Apple’s support article on jailbreaking:
“Apple strongly cautions against installing any software that hacks the iOS. It is also important to note that unauthorized modification of the iOS is a violation of the iPhone end-user license agreement and because of this, Apple may deny service for an iPhone, iPad, or iPod touch that has installed any unauthorized software.”
If you really have to take your iOS device to an Apple store, you can always restore it to its factory settings in iTunes. This will bring your iOS device back to the way it was when you first bought it, and Apple will have no way of telling that you ever jailbroke.
Many people have taken previously jailbroken devices to Apple several times before that were restored beforehand. Apple is usually not able to tell will provide full and normal customer support.

Can I Brick My iPhone if I Jailbreak?

You might have heard a few horror stories about people who tried to jailbreak their iPhone and ended up turning it into a brick. While this could have happened in the early days of the iPhone, this is now completely impossible.
The worst thing that could happen when trying to jailbreak is that it might get stuck and become unresponsive, in which case some people may automatically think that there’s no hope. You’re always able to restore your iOS device’s firmware back to the stock version, and following these simple steps will make sure your iPhone goes back to its original state.

Is Jailbreaking the Same as Unlocking?

No, jailbreaking and unlocking are two different things. To unlock your iPhone, you usually have to jailbreak first. As noted previously, jailbreaking an iPhone lets you install third party applications and mods, while unlocking allows you to use your iPhone on a different carrier.
You can learn more about the difference between jailbreaking and unlocking if you’re interested.

Can I Still Use iTunes and the App Store After Jailbreaking?

People often ask this question. Yes, you can use iTunes and the App Store after jailbreaking your device. As a matter of fact, nothing will really change. The only notable change to your iOS device will be that, after jailbreaking, you will have a new application installed on your device called Cydia.

What is Cydia?

In short, Cydia is like the App Store of jailbreak applications. Just like the App Store, you can browse Cydia for apps, tweaks, and mods. Just like the App Store, you can download and install Cydia apps effortlessly. Most apps and tweaks in Cydia are free, but it is not unusual for a jailbreak app to sell for a few dollars.

Will Jailbreaking Prevent Me from Updating iOS?

If your iOS device is jailbroken and you decide to update it to the latest version of iOS, doing so will overwrite the jailbreak and restore your device to its factory settings. This might not be a big problem for most people, but it can become an issue for people who rely a lot of jailbreak apps and tweaks.
Every time Apple releases a new iOS update, hackers generally aren’t too far behind with an update for the tools that let you jailbreak. When a new iOS version and accompanying jailbreak are released, the preferred method is to backup your device first, update to the latest iOS version, and jailbreak again using one of the updated tools.
It’s important to note that it sometimes takes a while for hackers to develop a jailbreak following an iOS update, which is why we usually recommend jailbreakers to hold off on updating when a new iOS version is made available.

What are the different types of jailbreaks?

The are 3 types of jailbreaks: tethered, semi tethered, and untethered. Read this article to learn more about the differences between these kinds of jailbreak.

Can Jailbreaking Allow Me to Get App Store Applications for Free?

Yes, but we do not recommend installing pirated apps on your jailbroken device. Not only are you doing something illegal, but you’re also stealing money from hard working developers. We do not help troubleshoot or give support on app piracy.

Is Jailbreaking Easy?

These days, jailbreaking is very easy. Usually, you just need to download a piece of software, plug your iOS device into your computer, and run the software. There is no specific knowledge or skills required.
You will find some very useful tutorials on how to jailbreak at the bottom of this page. If you don’t feel completely comfortable jailbreaking your iOS device, make sure to have a look at our tutorials, they will guide you through the process with step-by-step instructions and illustrations.

What is the Best Jailbreak Tool?

There isn’t a “best” jailbreak tool, as tools are constantly being updated and replaced with new and improved methods. Performing an actual jailbreak can be a very different experience depending on your iOS device and software version. What tool you use is also determined by if you use a Mac or Windows computer.

Does it Cost Anything to Jailbreak?

No. You should never pay for a jailbreak.
Hackers that develop jailbreaks do it for free, sometimes (rarely) asking for donations. Some people may charge you to jailbreak your iOS device for you. If it makes you feel better to pay someone, you can do that, but why pay when you can do it yourself for free?

How to Jailbreak Your iPhone, iPod touch, iPad, and Apple TV

iOS 5.0.1:

iOS 5:

iOS 4.4.4:

iOS 4.3.5:

iOS 4.3.4:

iOS 4.3.3:

iOS 4.3.2:

iOS 4.3.1:

iOS 4.2.8

iOS 4.2.1

Jailbreak iPhone iOS 4.1

Jailbreak iPhone iOS 4.0.2

Jailbreak iPhone iOS 4.0.1

Jailbreak iPhone iOS 4

Jailbreak iPad 3.2.1

Jailbreak iPad 3.2

Jailbreak iPhone 3.1.3

Jailbreak iPhone 3.1.2

Jailbreak iPhone 3.1

Jailbreak iPhone 3.0.1

Firmware 3.0 Jailbreak

Enjoy!!!!!!!

2012/03/14

Bypass any Firewall or Throttling ISP with SSH

Bypass any Firewall or Throttling ISP with SSH

On some networks it’s impossible to use BitTorrent. For example, if you’re at work, school, or connected to Comcast or a public hotspot. But there’s an easy solution to overcome this problem. By using a secure connection (SSH), you can bypass almost every firewall or traffic shaping application.
Here’s a relatively simple 3-step guide that will show you how to set it up.
I wouldn’t recommend BitTorrent over SSH as a permanent solution since it will cripple the servers of the SSH providers. If you’re looking for a long term solution check out a VPN service such as BTGuard.

1. Get an SSH account.

You need an SSH account in order to get this working. You can try one of these free shell providers from this list.

2. Download, Install and Configure Putty

Download Putty, store it somewhere on your computer and run it. In the session screen enter the host name, the port number (22), and tick the connection type box (SSH).
ssh putty tunnels
Next, go to SSH –> Tunnels, enter a source port and tick the dynamic box. I’m using port 23456, but you are free to choose any post you like as long as it’s available.
ssh
When you’re done, it might be a good idea to save the session so you don’t have to enter the info next time you run Putty. If you’re ready, hit the “open” button in the session screen. A command-line interface will pop-up so enter your username and password that you received from your shell-provider, and you’re done.

3. Configure your BitTorrent client.

The last step is to configure your BitTorrent client. I will show you how it’s done in uTorrent and Azureus but other BitTorrent clients use a similar setup.
uTorrent: go to Options > Preferences > Connection. Enter your port number (I use 23456), socks 4 or 5 as type, and localhost in the proxy field.
Azureus: go to Tools > Options > Connection > Proxy Options. Tick the “Enable proxying of tracker communications” and “I have a SOCKS proxy” box. Next, enter your port number in the port field (I use 23456) and localhost in the host field.
utorrent ssh configuration
When you’re done, restart your BitTorrent client and you’re ready to go. BitTorrent over SSH tends to be a bit slower than your normal connection, but it’s a great solution when BitTorrent connections are blocked or throttled.

2012/03/13

Bypass Firewall At School,College Or Office With UtraSurf

Bypass Firewall At School,College Or Office With UtraSurf

Is Orkut,Facebook,Yahoo blocked on your school,college or office?Then,dont worry I have a solution for you that will not only unblock all the websites that have been blocked but also make your internet surfing anonymous so that nobody can trace your orignal ip address.As you know that most of the proxy websites are blocked with your school,college or office firewall and even if you find some new proxies they even them block them out.So,why not to move something that is almost a permanent solution.
We will be using a very small and free software called ultrasurf.It will not only allow you to surf blocked websites but it will also give you freedom to stream videos,download and upload files.
Now Here is the step by step tutorial with screenshots on Trick Bypass Firewall At School,College Or Office With UtraSurf
  1. First you need to Download Ultrasurf.Click here to download ultrasurf
  2. You will get a zipped file with a .exe file in it.Click on it
  3. It will start ultra surf and automatically connect to its server.
  4. 0427011 Bypass Firewall At School,College Or Office With UtraSurf
  5. Even it will open your Internet explorer automatically.Now you can have an unblocked and secure to internet.
  6. If you want to use ultrasurf with you need to download the firefox plugin also.You can download firefox plugin by clicking here
If you are connected to internet through a proxy server then ultrasurf will detect it.If somehow it doesnot detect the proxy server then you can manually enter your proxy server
To manually enter proxy server
Click on Option > Proxy Setting > Manual Proxy Settings

0427012 Bypass Firewall At School,College Or Office With UtraSurf
0427013 Bypass Firewall At School,College Or Office With UtraSurf
Note:-If you want to use ultrasurf with other applications you need to configure them to use ultrasurf as their proxy client. The Proxy IP address is 127.0.0.1 and the Port is 9666.

Enjoy!!!!!!!!!!

FUD Crypter

FUD Crypter

FUD is acronym for fully undetectable.It is a software that can be used to encrypt your exe files.
What is the use of FUD Crypter?
FUD crypters can be used to encrypt viruses,RAT,keyloggers,spywares etc to make them undetectable from antiviruses.You can also read my post on spywares,viruses and worms or How to fool Keyloggers.When these exe files are encrypted with Fud crypters they become undetectable with antiviruses
How Does FUD Crypter Work?
The Basic Working Of FUD Crypter is explained below
The Crypter takes the original binary file of you exe and applies many encryption on it and stores on the end of file(EOF).So a new crypted executable file is created.
Original Exe Crypted Exe
001————- 010 101————-110
100|Original File|000-> Cryptor ->010|Original File|110
010————- 111 110————-010
The new exe is not detected by antiviruses because its code is scrambled by the crypter.When executed the new .exe file decrypts the binary file into small the data small pieces at a time and injects them into another already existing process or a new empty one, OR it drops the code into multiple chunks in alternative data streams(not scanned by most a/v) then executes it as a .txt or .mp3 file.
Why Most FUD Crypters Donot Work?
As a FUD crypter becomes popular it also get the eyes of antivirus companies.The antivirus companies update their software and employ detection mechanism that detect the encryption’s by the crypter.So, most of the popular FUD crypter are easily detected by antiviruses.
Where can I test Whether my Crypter is FUD or not?
To test you crypter encrypt any virus with it and test it on http://vscan.novirusthanks.org and make sure you check the box Do not distribute the sample .

Note:-Donot test your crypter on virustotal.com as it distributes the samples and your crypter will not remain FUD if you scan with virustotal.
Where can I Download a Free FUD crypter?
As I already mentioned that as the crypter becomes popular it doesnot remain FUD.So the only FUD crypter available are those made by indivuals and they can be found by spending a little time on google by searching.It will not make profit to anybody if I share my FUD crypter here as it will not remain FUD for long as some noobs will surely scan it with virustoal.So,its better you search your own and keep it to yourself.
Download Free FUD Crypter
I am giving you a link to a free crypter so that you can play it with and test whether it is FUD or not.
Click here To Free Download FUD Crypter

Hack Administrator Password In Windows 7

Hack Administrator Password In Windows 7

Most of us might have experienced a situation when we forget our Windows administrator password.And we are not able to login into windows and access our all necessary data and programs.At that time the only solution that comes into or mind is the installation of fresh copy of windows but this will lead to loss of all data and files that are in the windows drive.There is also another way around using which you don’t need to install a fresh copy of windows and without losing any data.We are providing here the method to reset windows administrator password.This tutorial is only for the purpose of recovering your windows 7,xp or vista password.This should be used only when you forgot or lost your password and not for hacking into somebody else’s system.Using this hack you can reset your administrator password or leave it blank.

By using this tutorial

  • You donot need to know anything about your old password.
  • You can unlock locked or disabled accounts.
  • Also edit the registry.

The requirements for using this method are:-

  • Blank CD/floppy disk.
  • Access to Internet.
  • Cd or floppy writer
These requirements can be easily fulfilled by spending 15 minutes in cybercafe or at friends computer

Now here is the step by step tutorial with screenshots on how to hack administrator password in windows 7.

Download this small utility. Click Here To Download
  • You will get an zipped file with ISO image in it.Extract his image using winrar or inbuilt windows software.
  • Put your blank cd in CD-ROM and burn this using Nero or any other image burner software.this is most important step and make sure you burn the ISO image properly.
  • Now put this CD in the system whose password is to be reset.
  • Restart your system and when prompted press enter to boot from the CD.
offlinentpassword05upd Hack Administrator Password In Windows 7,Xp And Vista
Note:If you do not get prompt of boot from CD.Then restart you system and press f2 or f6 or f8 or Esc key(anyone of them should work for your system) before the booting of the windows start.Now you will enter into bios and you should change the boot order from here with the first preference as CD-ROM.And again restart your system
  • Now the software will load automatically.It will ask you to select the windows drive and after that provide you with the option of resetting password.

Add OS X Styled Stacks to Your Computer with 7Stacks

Add OS X Styled Stacks to Your Computer with 7Stacks

Do you love how Stacks look in Mac OS X and want to add that kind of functionality to your Windows system? Here we look at 7Stacks which gives you a similar experience.
Note: Stacks attach to the Taskbar in Windows 7 and to the Quick Launch Toolbar in Vista and XP.
Setting Up Your New Stacks
Installation of 7Stacks is simple and straightforward. As soon as you start the app you can immediately begin creating stacks using this window. Notice that you will need to choose between two browsing options to “add” the appropriate folder for your new stack.
The “SF Button” is for “special folders” and the “… Button” is for adding any regular folder that you desire. We decided to begin with a regular folder first.
Note: The default “Stack Type” is “Vertical Stack”.
7-stacks-01
We browsed until we found the Internet Browsers folder from our start menu, selected it, and clicked “OK”.

As you can see more details are filled in now such as “Target Path” and the “Caption/Name” for this particular stack. Once you have things sorted click on “Create Shortcut on Desktop”.
Note: You may want to deselect the “Show Explore Item” option if you do not want to access the “stack’s originating folder” using Windows Explorer and wish to cut down on “clutter” in your stacks.

Here is our new “Stack Shortcut” on the Desktop…

In Windows 7 right click on the shortcut and select “Pin to Taskbar”. For those using Windows Vista and XP drag the shortcut to your “Quick Launch Toolbar”.

There is our first stack full of browser shortcut goodness.

If you want access to the shortcuts in one of the folders in the stack click on it and it will open (“shift into focus”) as shown here.

Whenever you are ready to create a new stack right click on any existing “stack icons” and select “Create a new stack”.

This time we decided to create a stack for a “special folder” and use “Grid” as the “Stack Type”.

When you click on the “SF Button” you will see a “classic start menu styled” menu. You can choose one of the preset choices in the main area or browse through the “Start Menu, Common Folders, & Other” sub-areas. Here we chose “My Pictures”…

Once again click on “Create Shortcut on Desktop” to finish your new stack and add it to your “Taskbar or Quick Launch Bar”.

Here is our “Pictures Stack” using the “Grid Setting”. Looking good…

For our final addition we created a stack for “My Documents” using the “Menu Stack Type”.

Not bad at all. Notice how the folders are set up for easy content browsing.

A look at our three stacks pinned to the “Taskbar”.

Preferences
There are only a few preferences to sort through for 7Stacks…”Text Appearance, Behavior, & Stack Closing Style”.

Conclusion
If you have been wanting Mac OS X Stacks style functionality in your Windows system then 7Stacks is definitely worth taking a look at.
Links
Note: Download link has been updated to reflect changes at the 7Stacks homepage.
Download 7Stacks