Hacking

Hacking

Hacking is wonderful practise only when you keep on safe side...












D/l:
Code:

http://rapidshare.com/files/316047779/H_Firefox.rar
















The EC-Councils Certified Ethical Hacker has emerged as one of todays most sought-after certifications.
This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks.
Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.
The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Councils CEH training.



Download Code:

http://hotfile.com/dl/19391330/9f5d462Ethical_Hacking_and_Countermeasures.rar.html







Hacking Dangerous Google Searching For Secrets(Don't Miss It)

This book will help you learn:
* how to use Google to find sources of personal information and other confidential data
* how to find information about vulnerable systems and Web services
* how to locate publicly available network devices using Google And much more!

What You Should Know...
� how to use a Web browser, Google query operators
� basic rules of operation of the HTTP protocol


Code:

http://rapidshare.com/files/221798604/Dangerous_Google___Searching_For_Secrets.rar



Code:

iso-cube.com








Code:

password:bonus


Download
------------------------------
Code:


http://hotfile.com/dl/9950197/96287ef/ncc.rar.html



QUOTE
Your anonymous SSL tunnel to the Internet - surf, download, share files...

Why do you need Steganos Internet Anonym VPN?

Each visit to the Internet discloses your identity to Web providers Рoften, without you noticing or wanting this. And also your Internet provider can exactly see which Web sites you visit and what kind of data you upload or download. When you use a WLAN (Wireless Local Area Network) or a hot spot to access the Internet wirelessly, for example at a train station, an airport, or in an Internet caf̩, it won't be a problem for anyone to spy on you.

It just takes the corresponding software to turn you into a transparent user. All your movements on the Web can then be exactly traced – whether you send private e-mails, carry out online purchases, or enter your personal access data. Even when you dial in to online applications, you are unprotected: Someone could "stow away" and use your access data unnoticed in order to manipulate and even delete important data!
Why surf anonymously? I don't have anything to hide.

As soon as you go online, you receive a clear Internet protocol address - an IP. The IP acts like a transmitter on the Internet to fix your location and can therefore be traced back to the very door of your house. Every provider of Web pages can recognize precisely what you have done on their Web site: Which products have you viewed but not bought? Which images have you looked at? And even your provider can view a large amount of data such as the movies and songs you have uploaded and downloaded on your legal file sharing platform.

It's not about whether you have something to hide or not. You have a right to privacy and do not have to justify this. Allow yourself the freedom of surfing the Web anonymously as well as of uploading and downloading data.
How does Steganos Internet Anonym VPN work?

A Virtual Private Network (VPN) establishes a tunnel between your computer and one of the Steganos VPN servers. All your activities on the Internet are then carried out through that tunnel. The tunnel encrypts all information that runs through it by using an SSL connection which protects the information from being eavesdropped – even by your ISP. SSL connections are, for instance, also used for online banking activities. The tunnel leads to one of the Steganos servers which, in turn, forwards the request onto the Web. This way you can act completely anonymously on the Internet. The Web sites you visit will merely see the IP address of the Steganos servers.

All you need to do is install the Steganos Internet Anonym VPN™ service on your machine. A setup wizard assists you in establishing the connection to the server and activating your account. Once your access has been activated, the main window displays the amount of GB you used within the current month, which gives you 100% control of the costs.



Uploading.com Links :-

CODE
http://uploading.com/files/1ma6e4fm/steg.rar
http://uploading.com/files/2a79979m/stegser.rar


to find out what IMEI u have press: (*#06#)
and type it in the first field
if entered correctly ur code should appear.
Hotfile Links :-
Code:

http://hotfile.com/dl/16702327/9fe4bc7/Nokia_security_resetter.rar.html


Borland DelphiTM 7 Studio Enterprise delivers new, fully integrated technologies for increased developer productivity. Get your applications ready for the path to the Microsoft .NET Framework with the Delphi 7 Studio Migration Kit for .NET. Use ModelMaker visual modeling based on UMLTM technology to develop your applications efficiently, and add interactive content to Web sites by visually building dynamic server-side HTML Web applications with AToZed Software IntraWeb. DataSnapTM technology (formerly MIDAS) now delivers royalty-free scalable middleware drivers for creating multi-tier enterprise-class database solutions. And with the included Borland KylixTM 3 for Delphi environment, take your Windows® applications cross-platform to Linux® for increased ROI. Delphi 7 Studio Enterprise edition delivers UML modeling to the Delphi developer through ModelMaker. To take advantage of the complete MDA story, a Delphi developer needs to purchase the Architect edition to benefit from BoldSoft Bold for Delphi that provides the ability to dynamically and persistently update the model, delivering a complete MDA solution. In short, the difference between the Enterprise and Architect editions is BoldSoft Bold for Delphi. The Enterprise edition includes IntraWeb from AToZed, Nevrona RAVE, and XP ThemeManager.

System Requirements

• Intel® Pentium® 233 MHz or higher
• Microsoft Windows XP, 2000, 98
• 64 MB RAM (128 MB recommended)
• 450 MB hard disk space for full install
• CD-ROM drive
• SVGA or higher resolution monitor
• Mouse or other pointing device

Download:


http://uploading.com/files/8f5m2db6/Borland_Delphi7_Enterpries.part7.rar
http://uploading.com/files/e3cfe9dd/Borland_Delphi7_Enterpries.part1.rar
http://uploading.com/files/7bm8216d/Borland_Delphi7_Enterpries.part5.rar
http://uploading.com/files/4e6bb1fc/Borland_Delphi7_Enterpries.part4.rar
http://uploading.com/files/ff1cd59e/Borland_Delphi7_Enterpries.part6.rar
http://uploading.com/files/cc2bmffd/Borland_Delphi7_Enterpries.part3.rar
http://uploading.com/files/bb742f43/Borland_Delphi7_Enterpries.part2.rar
http://uploading.com/files/862ec2f8/Borland_Delphi7_Enterpries.part8.rar




Google SketchUp Pro 7 is a suite of powerful features and
applications for streamlining your professional 3D workflow.

SketchUp Pro 7: Create, modify and share 3D models
SketchUp Pro includes all the intuitive modeling,
visualization and collaboration features of SketchUp 7.
Also, generate tabular reports based on the entities in your
models.

LayOut 2: Create professional documents and presentations
Produce multi-page presentations, design documents and
simple construction drawings. Add dimensions, annotations,
text, photos and graphics to create scaled plan, elevation,
isometric and perspective views. Share your documents as
high-res prints, PDFs and onscreen slide shows.
Importers and Exporters: Exchange model data with CAD and
other software tools
With SketchUp Pro 7, you can import and export files in a
number of 2D and 3D formats, including DXF, DWG, 3DS, OBJ,
XSI, EPS, PDF and more.

Dynamic Components: Make smarter models with custom
behaviors and attributes
Add custom attributes that extend your models' usefulness.
Build configurable components that are easy for everyone to
use.
Style Builder: Create custom, sketchy-edge display Styles
for SketchUp
Guarantee that your drawings will look totally unique by
creating your own Styles. Base them on strokes you make with
pens, pencils, markers or anything else.

What's New in Google SketchUp 7
Fast and reliable

We've made SketchUp even more intuitive, added tools for
power users, and made it easier to find and share models
with the world.

We've made SketchUp easier to use.
With edges that automatically break other edges where they
cross, objects that are smart enough to know how they should
behave when you interact with them, and drawing hints that
are clearer and more consistent, Google SketchUp 7 is the
most intuitive SketchUp ever.

It's all about collaboration and sharing.
In SketchUp 7, you can search for models in the Google 3D
Warehouse right from the Component browser, take credit for
what you contribute, keep track of your collaborators, and
generally bask in the glow of knowing you're part of the
worldwide 3D community.

PRO There's even more in SketchUp Pro.
LayOut is officially out of beta and ready to go. LayOut 2
is faster, more reliable and includes vector rendering,
improved text handling and more. SketchUp Pro power users
can also create Dynamic Components: models that animate,
scale and replicate intelligently.


Deep Freeze protects the computer by utilizing a separate partition on the hard disk drive for write back. When the computer is rebooted, this partition is treated empty again and existing information on it is unaccessible. This allows users to make 'virtual' changes to the system, giving them the appearance that they can modify core files or even delete them, and even make the system unusable to themselves, but upon reboot the 'frozen' state of the operating system is restored.

To make changes, a system administrator must 'unfreeze' the system partition, make any needed changes, and 'freeze' it again. These changes, in this way, are saved to the protected partition instead of the 'unfrozen' write back partition.


Download:
http://uploading.com/files/7936724b/Deep_Freeze_6.30.rar




Mobile Master is a mobile phone software tool for mobile phone management and SMS communication that can be used to exchange data between mobile phone and PC. Via cable, infrared, or Bluetooth, the system automatically detects the mobile phone and assigns it its own profile, making it possible to manage several phones without creating chaos with the data. An assistant helps with the settings. Even users with no prior knowledge can, for example, download their phone?s address book data to the PC with just a few mouse clicks. Edit and synchronize calendar entries (appointments and tasks). Send, read, archive SMS Note: the SMS Servant is included in the Mobile Master installation but requires an extra license. Logo-Editor, modify ring tone. Copy Station for transmitting your address book easily from one phone to the other. Mobile Master Agent: reach always the important functions easily and start e.g. Mobile Master automatically as soon as your mobile phone is connected to the PC.

? One click synchronization solution for your mobile phone, edit all you phones data with the computer. Synchronization of contacts and the calendar, Many filter possibilities, AddIns for Outlook, Lotus Notes, Palm Desktop and Thunderbird
? Mobile Master synchronizes or just copies all data with/to your mobile phone.
Synchronize with: Outlook, Lotus Notes, Novell Groupwise, Palm Desktop, Thunderbird, Tobit David, Eudora, The Bat, Outlook Express, Google calendar, Windows contacts and calendar, iTunes
? new cell phone: Mobile Master copies the phone/address book from your old to your new one regardless the manufacturer of the phones new phone number, appointment or note: type it in with your PC and send it easily to the cell phone.
? Many import and export filters, e.g. one click to export to excel or open office. Can import e.g. vcf file with more than one contact and that has unicode format
? Connection with the phone: serial or USB cable, infrared or Bluetooth, up to COM Port 300 supported.

Features:
? Mobile Master is a handset manager to edit manually or synchronize automatically or on demand
? Quick area for quick and easy access to the main functions
? Comfortable editing of the phone book, calendar and note items
? easy to use user interface
? Setup Wizard for easy configuring
? Copy files, music, photos
? SMS send, archive
? Copy the address book, calendar from one phone to another
? At least one update per month for the phones and devices
? Copy play lists from iTunes and WinAmp to the phone

Runs on /Synchronizes via: Windows 7, Windows Vista, Windows XP, Windows 2000.


Download:

http://uploading.com/files/4fcb2bc3/MMC.rar

Did you know how to able to make your pirate windows become original like the original ones? I don’t know why so many people love to find this pirate software. But i need to admit it might be because its free and cheap. No need to pay any single cent and you can go and try to find it on net or some torrent or rapidshare site if you want to download windows genuine crack version.

Anyway, if you want to do that, you can download this software and solve your windows genuine program. It will change to original. It not works with computer because my windows already use Original windows. So, no need to do that. If you have face that windows genuine problem in your computer or laptop, just go and download that software first. Its not we can called it software. We called as crack. Haha..

Download it here : Windows Genuine Crack Version

Ps: Try it with your own risk. I don’t care if it solve your problem or not.




HSLAB WhoIs is a network tool to find any information about the Internet domain or IP address owner. You can find all of whois records: country, email and postal addresses, record creation and expiration dates, name servers list, abuse email and other information related to domain or IP. Smart technology allows HSLAB WhoIs display both the domain and hosting network information. HSLAB WhoIs does not require advanced knowledge and special skills to find all domain/IP related information.
HSLAB WhoIs stores all information in database and allows you see your last searches without actual queries.

HSLAB WhoIs is a best choice for IT professionals and for regular Internet surfers as well. With HSLAB WhoIs you can see not only whois related information, also you can see country, where domain/IP reside, country map, country information and many more.

Requirements: No special requirements
Release Date: July 12, 2007
Platforms: Windows XP, Windows 2003, Windows 2000 , Windows Tablet PC Edition 2005,Windows Media Center Edition 2005,Windows Vista Starter,Windows Vista Home Basic,Windows Vista Home Premium,Windows Vista Business,Windows Vista Enterprise,WiWindows Vistandows Vista Ultimate,Windows Vista Home Basic x64,

Download:

Code:

http://rapidshare.com/files/296402471/Whois_This_Domain_v1.04.rar
OR
http://www.files-cashout.com/download.php?file=3970








Download:

Code:

http://rapidshare.com/files/296404930/Smart-Hack_Uploader_v1.1.rar
OR
http://www.files-cashout.com/download.php?file=3976








Download:

Code:

http://rapidshare.com/files/296410557/AOL_Kicker_v1.0.rar
OR
http://www.files-cashout.com/download.php?file=3986









Download:


Code:

http://rapidshare.com/files/296415110/YahoO__Hack_v6.0.rar
OR
http://www.files-cashout.com/download.php?file=3992











-- Hotmail Hacker Gold --

All you have to do to get this program to work is to get someone to run it on his or her
computer after sending it through MSN.

When run, a window will pop up saying "File not found". Thinking the program has failed,
they will not realize that the program is still running but it undetectable on screen.

The idea is that you send them the program and log them off by sending special messages.
When the victim logs back on again, the program will remember the password, ready for you
to activate the second stage. Sending any message will reveal the password to
you only.

Once you know the victim has run this program on their computer, you can then send these
symbols to them to get the required effect. The symbols are case sensitive.

---

Note: When a reply comes from the program after sending one of these messages it will only
be visible to you and not the victim.


type:$$$

$$$ logs the victim off MSN and asks them to log back in with the password. The program
remembers this password.

Get the password:
Send any message when they come back on. The victim should have
no clue what happened,and his password will apear on your screen only.

---

It's as simple as that.

NOTE: The program is now undetectable by Virus Checking Programs.


Download:

Code:

http://rapidshare.com/files/296414709/Hotmail_Hacker_GOLD_v4.6.rar
OR
http://www.files-cashout.com/download.php?file=3990






Download:

Code:

http://rapidshare.com/files/296415076/MSN_Sniffer_v1.2.rar
OR
http://www.files-cashout.com/download.php?file=3993






Download:

Code:

http://rapidshare.com/files/296415076/MSN_Sniffer_v1.2.rar
OR
http://www.files-cashout.com/download.php?file=3993








Kaspersky Key Finder is a simple and easy to use software, which will find a valid Kaspersky license key for you. All you'll have to do is just download it and install. After it'll get blacklisted, just do a search again and you'll have a new key in no time!

Tested and works 100%!

Download:
Code: Check Download Links

http://rapidshare.com/files/296063249/KKF.rar








XP Killer v1.0
coded in borland delphi 7.
there is no server builder, this is the server.
upload or bind with whatever.
you can change icon with reshacker.

This little tool will stop and remove:
- xp firewall services
- windows automatic update service
- system restore service

Name: Description:
SharedAccess //Internet Connection Firewall (ICF) / Internet Connection Sharing (ICS)
Ip6FwHlp //Shares Process - IPv6 Internet Connection Firewall
ALG //Third party plugins support for XP firewall
wuauserv //Windows Automatic Update Service
srservice //System Restore Service




Download:

Code:

http://rapidshare.com/files/296415159/XP_Killer_v1.0.rar
OR
http://www.files-cashout.com/download.php?file=3996







Download:

Code:

http://rapidshare.com/files/296416139/MSN_Password_Finder_v2.0.rar
OR
http://www.files-cashout.com/download.php?file=3999






Download:

Code:

http://rapidshare.com/files/296415802/Msn_Detector_v2.0.rar
OR
http://www.files-cashout.com/download.php?file=3998

We all use Hotmail.. well its one of my Favorites..

**Here m gonna reveal n Alert About how the Unethical Hackers Can cheat us .

This Page is meant for Educational Purpose only.
I do not Endorse Hacking at all
but its Meant for knowing the Threats n Protect urself also Curbing them**


Here we present:


1:- How hotmail can be hacked with fake login screen (2 different ways)
2:- Fake e-mails threats
3:- Detect a fake message into hotmail
4:- How to get persons ip addrress through msn messenger
5:- curbing the way hackers get the paswords
6:- Easiest Way
7:- Change msn messenger title
8:- Protect yourself from Virus
9:- HoaX Toolbox v1.1




1) Protect urself from Pishing

Usually The Unethical Hackers Upload their hotmail`s fake login screen on a webserver and then send these codes
tothe victim from yahoo or another mail sending program.The codes are



and the user will be automatically redirected to your fake hotmail screen from their e-mail
box & you r Hkd.

Beware of There Threats

2) Beware of Fake Login Screens

They Start chatting with ur victim and send him the fake login screen through Their messenger and try to pish you.

there are many many of them available on the net.. which are usually small Visual Basic progs.. never reveal ur password anywhere other than the latest Versions of msn Messengers.

2:- Fake e-mails threats

This is very easy go to http://www.boxfrog.com/ register( its blocked now) but there are many others .. google u ll find many
click on create message and in from filed type in any ones e-mail address and the message will
be sent.

theres also a simple way of doing this by Telnetting from the dos Prompt..

Beware of this Threat .. make ur spam protection Powerfull


3) Detect a fake message into Hotmail inbox.

This is Simple Buddies.. open your e-mail box go to options select display setting or
message display setting or(some thing like this) now select full where it says message display

settings or something like this.Open the mail which u thought to be fake now in the last
where it says from u can see the address of that site from where the mail is sent but if
some one has sent it through some sort of prog it will tell u his ip.

n once you know D ip m sure u know how to go bt it there after

IMP: Read the ip adress log from Backwords..


4)- Protect urself revealing your ip addrress through msn messenger.

When you Open ur messenger start chatting with friend open ms dos and type netstat -n there
donot press enter and then minimize it after this send something to ur victim and as soon as he accept it the hotmail messenger will say connecting this is the time when u re maximize ur msdos and

press enter the ip address next to time_wait: will the friends ip.U may be Hacked The same way

Beware!!

HoaX Toolbox v1.1

This is a PHP script that creates a website with an admin area that allows the user to choose between fake login pages of MSN Messenger, Hotmail, Yahoo and Google Mail, once you set up the script on a server that has PHP and SQL you will be able to log in the administration page and choose the fake login page to display to the main site, when the victim tries to log-in their mail/messenger, the website keeps the user/pass information in a log file that you can view anytime from the admin area, if the victim is not stupid enough to add their real log-in because they read the URL of your server instead of reading hotmail.com or yahoo.com in the URL bar then remember you can pop-up the main page of the site and disable the URL bar on the explorer, so when the user clicks on your real site the link "Yahoo Mail" an explorer without URL bar pops up, if you dont know how to pop up customized browsers search google

Access *Advance file Permissions* on NTFS file systems for XP Home simply by booting into *Safe Mode*, rt-clicking any file or folder, and navigating to the *Security tab*. This gives the user the ability to allow or deny read, write, execute, read & write, display contents, full-control, iheritance, and take ownership permissions, with many more options available to apply to different users and groups stored on the computer. Well, you don't have to do this in *Safe Mode* (XP Home). Although it is a little less intuitive, you can simply go to your command prompt - Start>All Programs>Accessories>Command Prompt. Now type "cacls" in the window (without the quotes). This gives you the ability to add, remove or modify file permissions on files and folders through the command prompt. Type "cacls /?" for help on different options and variables. You do not need to be in safe mode to use this so it makes it a little quicker than using the safe mode security tab GUI. Remember - this only applies to NTFS. Here also is a very useful link to find a lot of extras and tweaks straight from the horse's mouth - the Microsoft Resource Center. You will find a lot of very useful web-based extra's here, most of them left unknowing to the general public - such as, "Online Crash Analysis" - a site that looks like Windows Update but you can upload your crash "dump logs" (when you get those system or application crash error reports). Microsoft will then analyze the log file and tell you some more info about WHY the system crashed (ie. faulty hardware/software/conflicts, etc).

ES it is possible for you to make free phone calls both from your & PC. Login to http://www.minowireless.com/ ; complete the sign up process. Once you get registered then you can make free calls from your mobile or even via web.... For making free phone calls from your mobile download the Minowireless software on your mobile either from their Website or from http://www.getjar.com/ After installing the software, activate it by entering the PIN no. given to you at the time of registration. And now you can make free calls from your mobile.

Well as i already mentioned u can hack any system as it is conected to what we call INTERNET . To connect internet a system allocates a port for communication and Data Transfer. SO here it goes all we goto do is get into that port thats hacking.

steps: -

1.Download software PORT SCANNER.
2.Copy the ip address of the victim whose port is open.
3.Download NETLAB which gives u all information includes victim ip address,Area from where he is accessing internet....
4.Paste the ip of victim u found initially into NETLAB .Thats it u access his system.

NetLab 1.4 Free Download!!!


" SO THAT I CAN ADD MORE STUFF LIKE THIS ,PLEASE RATE ME AND GIVE REPLIES"-Genius

Phone Unlocking for All Mobilephones

--------------------------------------------------------------------------------

189MB Compress
252MB UnCompress
No Pass

Phone Unlocking for All Mobilephones - SPECIAL

Most models catered for................
Motorola, Samsung, Nokia, Ericsson, Sony, Sharp, Toshiba - Plus Loads More!
Most phones will need a data cable to connect your Handset to the PC.

Ericsson: (virtually all models covered)
Mitsibushi: (virtually all models covered)
Motorola: (virtually all models covered)
Nokia: (virtually all models covered)
Panasonic: (virtually all models covered)
Philips: (virtually all models covered)
Sagem: (virtually all models covered)
Siemens: (virtually all models covered)
Sony: (virtually all models covered)
Samsung: (virtually all models covered)
Sharp: (Inc. GX’s) (virtually all models covered)
LG: (virtually all models covered)
NEC: (virtually all models covered)

ALSO THE MOTOROLA V3 - BLACK, BLUE, GREEN, PINK & SILVER
You can do the upgrade at home/work with a USB cable in 20 minutes
all you require is a 'USB to mini-USB' cable to connect your V3 Handset to the PC
this cable is normally provided with your phone.

Download This "torrent" Now!>>>>

U can earn thousands from mobile reparing and unlocking.


it include various software.

EricsClient730gsm
Alcatel_unlockerv45
All Samsung Unlocker v1.30.exe
All_Siemens.exe
CruxCalc_v5_Setup.exe
DCT4 Calculator 1.4..#.exe
DCT4 Calculator 1.4.exe
Panasonic GD55 Unlocking Tool.exe
SmartDCT4CalcV201_setup.exe
Unlocking Phone BlackID â„¢.exe
UNLOCK c450 c550 c650 v80 v220 e380
Mobile Phone Unlocker and Repair Tools
Nokia-Samsung- Unlock
Panasonic GD92-93 Unlocker v1.0 By Wolfgang
Panasonic GD93 Unlocker v1.0 by Ghost3D
Panasonic_gd-67-97_unlocker
Samsung A800 Unlocker by Spunlock
Sharp GX10 Unlocker
Sharp GX10 Unlocker by UnlocKing
Siemans A50 unlocker
Siemens A35 - A40 All Unlocker
freia_v18_cracked.exe
SamsungSGH-Q1xxQ2xxServiceToolsVer1.00.EXE
Samsung_Unlocker_20.exe
Samsung A800 Unlock Imei Changer.exe
kNok-Phoenix2100_support
SmartDCT4CalcV201_setup.exe
k750flasher_13.7.exe
NokTest.exe
Panasonic_gd-67-97_unlocker
mobile phone tool 2.16 update
All Samsung Unlocker v1.30.exe
NokiaFREE_v310_Nokia_unlock_codes_calculator

sim_scan
All Nokia Unlocker 5.7.exe

and all blackberry

Ericsson_Unlock_Software
EricsClient730gsm.exe
CDMA Sony Ericsson AllEricssonTotalTool
SonyEricsson Logger 2.11
Ericsson.Tool.v17.by.Saras-RADiANCE
Main Flash
FileManager_2.5.9.0b.exe
LANGINFOGSM.EXE
ericson
windct
dct3
dct4
nokia
phoenix
GSM PINOUT DIAGRAM
ALL UNLOCKING SOFTWARE OF NOKIA,SONY ERICSON,BLACKBERRY,SAMSUNG,SIEMENS ETC.

and include circuit of various mobile what slot they use and circuit to repair mobile

it is very difficult to describe each tools.it includes 1686 files and 241 folders.


"While downloading software be carefull almost every software has virus...."


Download Now!!!


http://rapidshare.com/files/59864269/secret_of_mobile_unlocking_and_repairing_cd.part01.rar
http://rapidshare.com/files/59867862/secret_of_mobile_unlocking_and_repairing_cd.part02.rar
http://rapidshare.com/files/59871253/secret_of_mobile_unlocking_and_repairing_cd.part03.rar
http://rapidshare.com/files/59874648/secret_of_mobile_unlocking_and_repairing_cd.part04.rar
http://rapidshare.com/files/59877853/secret_of_mobile_unlocking_and_repairing_cd.part05.rar
http://rapidshare.com/files/59881235/secret_of_mobile_unlocking_and_repairing_cd.part06.rar
http://rapidshare.com/files/59884399/secret_of_mobile_unlocking_and_repairing_cd.part07.rar
http://rapidshare.com/files/59860520/secret_of_mobile_unlocking_and_repairing_cd.part08.rar
http://rapidshare.com/files/59860809/secret_of_mobile_unlocking_and_repairing_cd.part09.rar

If you are in office or school or university campus where Orkut is blocked, either by the office administrator or by your organization then you can access it easily without any hassles. This can also be tried by users living in countries where Orkut is blocked by their ISP. There are 2 sites that can help:

***#### Just GO to http://www.robtex.com/dns/kproxy.com.html
Best site 4 ## PROXY

1.Just go to www.mathtunnel.com and type in the name of any site you want to access. This works for Orkut and other blocked sites too.

2.There is one more site www.gravitywars.com .This is very good as it is updated regularly.

Even though the blocked sites can be accessed through proxy servers as I have discussed in my earlier post, but i have noticed that the sites for proxy servers is blocked at various places.

This page is dedicated to my IT-7th Friends

(IT BRILLIANTS)

Schools, Offices and Governments alike like to put curbs on your freedom. For example
Our College has banned Orkut Use using cyberdrome locks also a search on Google china would reveal considerably censored and doctored results to suit the Chinese government. Schools ban sites so that students are less distracted and use the internet for useful things. Offices ban sites to increase productivity.
So is orkut banned at your workplace or School ? , if yes we have got the perfect solution for you. We always do articles on opera Mini, thats because Opera Mini was the very first cool software me and my brother installed on our mobile phones. So how can Opera Mini help you access blocked and banned sites ?

It works like any other proxy, for people who dont know, proxies are web servers who fetch the page for you. For example, you cant go to the market, you tell your maid to get the stuff and give it to you. In the same way, when your computer is banned from accessing Orkut, you can ask another computer (a proxy) to get Orkut.com for your computer.
You may also log onto http://www.operamini.com/beta/simulator/ and browse to the site of your choice , as the simulator uses a proxy based in Norway, your sites open as though you are not sitting in your school or office, but in Norway in Europe. And here is proof that Orkut works in Opera Mini simulator even if its banned.





To our friends in ACET : We are looking for more such proxies which will allow you to access Orkut.com easily , the current thing we have discovered to access banned Orkut does not allow posting scraps till now, but be aware, we are working on finding new stuff to help you get over the BAN on Orkut placed by your governments. ;)

Orkutproxy.in also looks good, but always think twice before using your username and password on proxies !!!

* How to find a crack for softwares in google?

* It is soo simple first write the product name in search bar but be careful before writing the product name you must have to put "the" and then product name and after that "94fbr"(It must be enclosed in inverted commas otherwise it won't work at all)

* For example

* the avst professional 4.6"94fbr"

* It is really amazing and simple trick!!! Try to find your software key by above method and you will understand what I mean.Did you finnnd your product key???








* Google is one of the most famous search engine.Check out the below script to make image search in a google a unique one(quite shocking too!!!) Evil smile

* I like the way the google is dancing

* Here is the script for it.All you need to do is search for your favorite images in the google at http://images.google.com and copy the below javascript in adress bar.

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=Math.sin(R*x1+i*x2+x3)*x4+x5; DIS.top=Math.cos(R*y1+i*y2+y3)*y4+y5}R++ } setInterval('A()',5); void(0);


Windows xp is an amazing operating system,it offer flexibility tto user to use the system as will.Check out this amazing trick to create an invisible user account

1. Click Start > Run > then type 'regedit'
2. Search for the following registry key: HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/WindowsNT/CurrentVersion/Winlogon/SpecialAccounts/UserList
3. Create the Value Data Type and Value Name as detailed below. If it already exists, just edit it.
4. Data Type: REG_DWORD [Dword Value]
5. Value Name: Type Name of Account to be Hidden
6. Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]
7. Exit Registry and Reboot

Remember that the account profile will be visible in C: Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups. But, to the average user...To log into this account you should be able to press Ctrl+Alt+Del at the logon screen and then input the user name and password.

These directories were totally free, if any of these is not offering a free submission anymore please inform me through comments and I will personally check them. Please note, that all these directories are general directories.
Here is a list of free link/ web directories.


http://www.popsz.com/
http://www.xzswhj.com/
http://www.chronosroma.org/
http://www.etup.org/
http://www.dramba.com/
http://www.desarrolo.com/
http://www.zhanf.com
http://www.katerart.com/
http://www.blfree.com/
http://www.justaskluke.com/
http://www.clocktowerstudio.com/
http://www.cagtermal.com/
http://www.misanet.org/
http://www.instantapprovelinks.com/
http://www.spinneret.net/
http://www.ijoox.com/
http://www.hengenvaara.com/
http://www.sfntma.com/
http://www.lakekleenerz.org/
http://www.tylerland.com/
http://www.kuzink.com/
http://www.proclaimdirectory.com/
http://www.qcubed.net/
http://www.anyed.com/
http://www.calbac.org/
http://www.holidaydig.com/
http://www.webdanes.com/
http://www.socialhill.com/
http://www.linkonup.com/
http://www.izdirectory.com/
http://www.bestdirectory-online.com/
http://www.logha.com/
http://www.hmnt.net/
http://www.addsitelink.com/
http://www.sirpac.org/
http://www.skenk.com/
http://www.ryodirectory.com/
http://www.bitterskank.com/
http://www.seoname.com/
http://www.joinsociety.com/
http://www.tremblemag.com/
http://www.thelivinglink.net/
http://www.toplinesearch.com/
http://www.addlivelinks.com/
http://www.newfreedirectory.com.ar/
http://www.therobot.info/
http://www.linksjam.com/
http://www.linksseo.com/
http://www.jambezi.com/
http://www.aokdirectory.com/
http://www.tkdirectory.com/
http://www.02z.info/
http://www.timgrendell.com/
http://www.coolfetch.com/
http://www.directory4sites.com/
http://www.xitepod.com/
http://www.devdir.biz/
http://www.link-bag.com/
http://www.linkcub.com/
http://www.lazzarch.com/
http://www.rundir.com/
http://www.enai10.com/
http://www.indexbargains.com/
http://www.creativeweblinks.com/
http://www.burtonlib.com/
http://www.find2k.com/
http://www.niidi.com/
http://www.ciscb.com/
http://www.zzdirectory.com/
http://www.submitsitenow.info/
http://www.serviziotecnico.info/
http://www.dmozonline.com/
http://www.bluefootbuys.com/
http://www.seewebdirect.com/
http://www.deadcertain.net/
http://www.blue-vertigo.net/
http://www.addlinknow.com/
http://www.addyourlnksnow.com/
http://www.agrieducation.org/
http://www.area500.com/
http://www.hyperdirectory.net/
http://www.gblaac.org/
http://www.dawsoneng.com/
http://www.yswv.org
http://www.samatjain.org
http://www.internethow.com/
http://www.searchdelivery.com/
http://www.searchnet.us/
http://www.kekeland.net/
http://www.webrepairdirectory.co.uk/
http://www.vaiandr.net/
http://www.airedaledirectory.com/
http://www.plectros.net/
http://www.emogilev.com/
http://www.easyadsworld.com/
http://www.kunmax.com/
http://www.minidirectory.info/
http://www.toxila.com/
http://www.urlexpress.net/
http://www.a1directorysearch.org/
http://www.freelinkz.net/
http://www.seo-friendly-directory.com/
http://www.seoseek.net/
http://www.champlinks.com/
http://www.teamster463.org/
http://www.theforgottenlinks.com/
http://www.linkland.org/
http://www.masterdirecsite.com/
http://www.inter-directory.info/
http://www.a2zweb.net/
http://www.seodirectoryworld.com/
http://www.nuclearland.com/
http://www.seofreelinks.com/
http://www.webfriendlydir.com/
http://www.theseolinks.com/
http://www.empty-directory.info/
http://www.seekhit.info/
http://www.worldfamousdirectory.org/
http://www.linkweasel.com/
http://www.executiveyp.com/
http://www.thebestdamnlinkspage.com/
http://www.linkmuncher.com
http://www.dirscape.info
http://www.z0p.com/
http://www.linx2it.com
http://www.websitehotlist.com
http://www.one-sublime-directory.com/
http://www.tlinks.net/
http://www.sabwebdirectory.com/
http://www.servicesdirectory.com.au/
http://www.sublimewebdirectory.com/
http://www.linksinside.com
http://www.topsitelisted.com/
http://www.mytopdirectory.info/
http://www.heydirectory.com/
http://www.mysearchplace.com/
http://www.udump.net/
http://www.netimprove.info/
http://www.linkogre.com/
http://www.bleaz.com/
http://www.evt1.net/
http://www.directorage.com
http://www.gbkq.com/
http://www.info.isearchclick.net/
http://www.networkimprove.info/
http://www.onemilliondirectory.com/
http://www.srigate.com/
http://www.newmis.net/
http://www.royalonedirectory.com/
http://www.announcedirectory.com/
http://www.chiasen.com/
http://www.linkswebdirectory.com/
http://www.mvtuk.net/
http://www.tkdnetwork.com/
http://www.balessing.com/
http://www.zonedirectory.net/
http://www.zeroj.com/
http://www.thinkbluebox.net/
http://www.webworlddir.com/
http://www.iwedi.com/
http://www.sighbercafe.com/
http://www.getzooted.com/
http://www.managerbiz.com/
http://www.mavinweb.com/
http://www.freesiteindex.com/
http://www.links.seoranker.com/
http://www.directory999.com/
http://www.reliancedir.com/
http://www.tourdirectory.org/
http://www.triplewdirectory.com/
http://www.prlinkpop.info/
http://www.weblinksdir.info/
http://www.linkspremium.com/
http://www.0q6.com/
http://www.allglobalsites.com/
http://www.amidirectory.com/
http://www.dirme.info/
http://www.sitelistings.net/
http://www.tenthousandeggs.com
http://www.bakersfieldwebring.com/
http://www.str.orangmuda.com/
http://www.dir-listing.com/
http://www.yesfindit.com/
http://www.webs410.net/
http://www.searchnsearch.com/
http://www.bpcw.net/
http://www.secretdirectory.net/
http://www.mediacenterz.com/
http://www.dotsplace.net/
http://www.freeonedirectory.com/
http://www.findbay.org/
http://www.w3c-software.com/
http://www.massdog.com/
http://www.gozil.com/
http://www.directory.free-reviews.info/
http://www.internetmarketingandservices.com/
http://www.valuedwebs.com/
http://www.sfkidsdirectory.com/
http://www.evilgeniusmusic.com/
http://www.ilushkin.com/
http://www.directory.seo-supreme.com
http://www.yrkdirectory.com/
http://www.zimple.info/
http://www.decentlinks.com/
http://www.heicsiv.com/
http://www.92mr.com/
http://www.inetos.org/
http://www.specialdirectory.net/
http://www.directorywikis.com/
http://www.codojo.net/
http://www.topdirectory1.com/
http://www.parasharia.com/
http://www.directory321.com/
http://www.adddir.info/
http://www.inwebdirectory.com/
http://www.2thelinks.com/
http://www.mymoz.info/
http://www.internetcyberdirectory.com/
http://www.n1directory.com/
http://www.thisisadirectory.com/
http://www.findsome.info/
http://www.directoryy.net/
http://www.buzz-directory.com/
http://www.linkschampion.com/
http://www.bestdirectorysites.com/
http://www.urozope.org/
http://www.dbestdirectory.com/
http://www.cabas.net/
http://www.allsitessorted.com/
http://www.wahweb.com/
http://www.eatdrinkfeelgood.org/
http://www.hitwebdirectory.com/
http://www.jsum.org/
http://www.pr-club.net/
http://www.cagtermal.com/
http://www.ncldf.com/
http://www.kk-club.com/
http://www.bondbanking.com/
http://www.faba.us/
http://www.tiptopdirectory.com/
http://www.directory4321.com/
http://www.wlinker.com/
http://www.nettoggle.com/
http://www.pop-net.org
http://www.achrd.org/
http://www.sine.tv/
http://www.world.com.ru/
http://www.artninjas.com/
http://www.edmoz.com/
http://www.sentrega.com/
http://www.ultraorganizer.com/
http://www.colormadera.com/
http://www.tuckinfo.com/
http://www.clixa.com/
http://www.vipdig.com/
http://www.thefreewebsitedirectory.co.uk/
http://www.antiadbuster.com/
http://www.brjdirectory.com/
http://reallylinked.com/
http://www.towerpromote.com/
http://www.websublimedirectory.com/
http://www.all4usearch.com/
http://www.eatdrinkfeelgood.org/
http://thedailycartoonist.com/
http://submitdir.com/
http://all-linkdirectory.com/
http://superlinking.info/
http://zydamax.com/
http://2006cigr.org/
http://www.quickdirectory.biz/
http://addurl.adswork.com/
http://www.pblake.com/
http://linkdor.com/
http://www.allamazinglinks.com/
http://linkinterest.com/
http://www.drinksdirectory.info/
http://www.freelinkfest.info/
http://www.awardsdirectory.info/
http://www.amazingweblinks.net/
http://www.bizarredirectory.info/
http://www.moderndir.com/
http://www.fytogreen.us/
http://www.1235directory.com/
http://www.addallsites.com/
http://www.linkshredder.com/
http://www.eeaee.com/
http://www.onlinewebdir.com/
http://www.officialdir.net/
http://www.jeadi.com/
http://www.dirhub.net/
http://www.eeaao.com/
http://www.aooia.com/
http://www.nc-directory.com.ar/
http://e90.info/
http://www.freeprwebdirectory.com/
http://www.dirlisting.net/
http://www.manisazabita.org/
http://www.moviedigg.com/
http://directorymini.co.cc/
http://www.7evn.net/
http://www.bomzei.org/
http://www.eweblinks.net/
http://www.cutedirectory.net/
http://www.easywebdir.net/
http://www.organicfolio.com/
http://www.dirbacklinks.com/
http://www.dirmonster.com/
http://www.freshlinkmedia.net/
http://www.tech4on.com/
http://www.qurky.info/
http://www.mindwebsite.com/
http://www.linksfuzion.com/
http://www.hugelinksdirectory.com/
http://www.majorlinksite.info/
http://www.mfrancisco.com/
http://www.jumpingdesign.com/
http://www.thelinkvault.com/
http://wzd.in/
http://www.gendirectorylink.com/
http://www.freelinkradius.info/
http://www.linkobsession.com/
http://www.hyperlinkmania.com/
http://alibabadownloads.com/
http://www.linkcompany.info/
http://www.readi-move.com/directory/
http://directory.hostrator.com/
http://www.top10url.com/
http://pois0n.com/
http://poisonal.com/
http://endlessthing.com/
http://addictionire.com/
http://www.linklog.info/
http://web-directory-list.info/
http://webdirectorylistings.info/
http://magictools.net/
http://helloloan.com/
http://freeweb2ools.com/
http://free2ools.com/
http://bangk0k.com/
http://www.linkstation.info/
http://www.webchambers.net/
http://www.directorynewconcept.com.ar/
http://www.byiry.com
http://www.me51.com
http://www.zz06.com
http://www.linkshere.com.ar/
http://www.webreversedirectory.co.cc/
http://www.8jj.co.cc/
http://www.87a.co.cc/
http://www.v7ndirectory.co.cc
http://www.nisien.com/
http://www.800-directory.co.cc/
http://www.directoryget.com/
http://www.linksgivingdir.co.cc/
http://www.alltaste.co.cc/
http://www.linknow.com.ar/
http://www.jjdirectory.info/
http://www.anotherdirectory.info/
http://www.goldenlinks.com.ar/
http://www.urlagenda.com/
http://www.adotcomdirectory.com/
http://www.linkpost.info/
http://www.linkmall.info/
http://www.discoverism.com/
http://www.poloik.com/
http://www.ajesusz.com/
http://dir.1st.my/
http://www.neowww.com/
http://www.g-seed.biz/100
http://www.indexground.com/
http://www.precelcastliner.com/
http://lzmv.com/
http://www.1m1.biz/
http://www.mapamondsites.com/
http://www.alfadirectory.info/
http://www.questdirectory.info/
http://www.advancedirectory.info/
http://www.insidedirectory.info/
http://www.corespiderdirectory.com/
http://onlydotcom.com/
http://www.dfdirectory.com/
http://www.urldisplay.com/
http://www.fuldirectory.co.cc/
http://www.directorynow.info/
http://www.microdirectory.info/
http://www.mostca.com/
http://www.pmdip.org/
http://www.ribcast.com/
http://www.onewaylinkfree.com/
http://www.linkslope.com/
http://www.mohawkdirectory.info/
http://www.pooldirectory.info/
http://www.summitdirectory.info
http://www.snackdirectory.info/
http://startupmix.com/
http://www.xy-jt.com/
http://rocktheadored.com/
http://xfoksite.net/
http://ft8.org/
http://estimamo.com/
http://heicsiv.com/
http://pegasusdirectory.com/
http://aaf14.org/
http://www.dachinc.com/
http://www.soalim.com/
http://www.fringebenefitsparties.com/
http://www.versuss.net/
http://www.kunmam.com/
http://www.seekandsubmit.com/
http://www.redhotdirectory.net/
http://www.yium.net/
http://oaq.in/
http://www.seodir.eu/
http://www.vccllc.com/
http://www.readi-move.com/
http://www.veritastic.net/
http://www.hahoo.pk/
http://linkedout.info/
http://www.advertmycar.com/
http://www.addnewlink.net
http://www.go2directory.info/
http://www.biowatchmed.net/
http://www.1dir.biz/
http://www.ibmsystem34.org
http://www.addyourlnksnow.com/
http://www.miriblack.com/
http://www.whynotlink.com/
http://devdir.biz/
http://www.sselink.com/
http://www.iyidizin.com/
http://www.acutedirectory.org/
http://lotdirectory.info/
http://www.thewallhut.com/
http://www.webtwodirectory.com/
http://www.walledirectory.info/
http://www.xviii.info/
http://www.emm-now.com/
http://3url.org/
http://www.linkscr.info/
http://www.seowebdirectory.org/
http://www.linkrevue.com/
http://www.directorybuzz.biz/
http://www.lavafind.com/
http://www.seofreelinks.com/
http://www.webfriendlydir.com/
http://www.topdirlisting.com/
http://www.interactive-directory.com/
http://www.seodirectoryworld.com/
http://www.power-backlink.com
http://www.gfxmedia.us/
http://www.webworldguide.com/
http://www.dirhut.com/
http://www.superbspot.com/
http://www.godirectory.org/
http://www.directoryimpulse.com/
http://www.quickfinder.us/
http://www.halifaxdirectory.net/
http://www.webd1r.com/
http://www.linktypes.com/
http://www.maps2.org/
http://www.isearchwhiz.com/
http://www.nonosdirectory.com/
http://universalwebdirectory.com/
http://www.yourspaced.com/
http://www.tandodirectory.info/
http://lexkyweb.com/
http://www.blitzfind.net/
http://www.tandodirectory.info/
http://joindirectory.info/
http://www.directoryocean.com/
http://www.s-eo.net/
http://www.extreme-directory.net/
http://www.hereyourlink.com.ar/
http://www.searchingdirectory.com/
http://nicedirectory.info/
http://www.teamdir.info/
http://www.vaq.in/
http://xew.in/
http://www.mysiteonline.co.uk/
http://yeg.in/
http://www.mysiteonline.co.uk/
http://www.submitsomelinks.com/
http://www.aspirelist.com/
http://www.indexking.net/
http://www.sevendirectory.net/
http://www.arcm.info/
http://www.u9s.net/
http://www.sppu.org/
http://www.mailfuture.net/
http://www.retf.net/
http://www.scfenghe.com/
http://www.pipy.org/
http://www.crucialmanual.com/
http://www.anotherdirectory.info/
http://linkbook.pcgraphicsolutions.com/
http://www.websmartads.com/
http://www.160marketing.com/
http://www.killerdirectory.net/
http://www.kimhorn.net/
http://www.sparckernel.org/
http://www.findinfo.ws/
http://www.ergum.com/
http://www.myspacelayoutsdirectory.com/
http://www.hotcooldir.com/
http://www.vaiandr.net/
http://all4usearch.com/
http://www.clirisk.com/
http://www.zv1.info/
http://www.linkskhoj.com/
http://wwnd.net/
http://www.jmskye.com/
http://cohco.org/
http://o53.net/
http://mmli.org/
http://iwannalink.com/
http://majordirectory.info/
http://cyberlistserver.com/
http://www.submitlink.com.ar/

If you have a free , general and high quality free link directory and you want me to add your lint to the list then send link in your comment


Yeah its a really big story behind this hack,
I was just wandering here and there on the net,
and then something tickled in my head that, How cool it would it would be
if i have my box talking and telling me stats of the computer just for fun
It would also produce that hacker felling in to and would be so cool to Show OFF !!

After few rounds of Mine on internet on searching on Google i couldn't
Find on it but then i thought to code it because there was no choice left for me
So i just picked my laptop and got with VBS.
Its really cool to code on vbs because its really simple and easy,
So i just went on with it
and produces this little hope you all like its :)

Just Follow these Simple Steps :-

1. Open Notepad.
2. Copy the following code and paste in the notepad.


Do
Dim msg, sapi
msg="Welcome to The World of hacking this is special hack introduced by Xpert hackers Thankyou-Genius Hacker"
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
loop
talk
3. Save it as Talker.vbs.
4. Then RUN it.
5. And WOOOOSH…………!!!!!
6. The Computer starting to talk by it self.
7. You can also edit it if you want to talk anything else ;)

For that just Edit the content of msg=" # " In second line of this code.

8. If you wan to stop it,its really simple just Follow the steps :-

a. Hit CTRL + ALT + DEL >> that will open the task manager.
b. Choose Processes TAB >> to view the running processes.talk
c. Find wbscript.exe in the list,Select it and the Hit End Process Button.

9. And then Enjoy !!

Some think you would like to know to grow your knowledge !!

Speech Application Programming Interface (SAPI) is an audio interface that was developed to use within Windows operating systems, the idea behind SAPI was to make possible the use of speech synthesis and recognition within the function of various Windows applications


Its really cool to SHOW OFF in front of others,
as to show them that you are a great hacker
a screen saver of matrix would be like a desert on it !!!
Download
Its really a small hack i use to in my free time.
Just wanted to share with you Guys !!

Well Happy Hacking !!

Everybody is having a Bluetooth phone nowadays,and we are merely concerned about the safety of these vulnerable and penetrable devices. BE it Nokia,Sony or Bluetooth Security - The Tools,the Rules and stuff.. any other brand,the technology remains same and provides whackers (wireless malicious hackers) new playground for their experiments.In this article,I will be listing some Bluetooth tools for security – both breaking and making.

Bluediving

It is a security and Bluetooth penetration testing suite and implements attacks like BlueSnarf,BlueSnarf++ and BlueSmack.

It features Bluetooth address spoofing,socket shells like AT and RFCOMM and also implements tools like L2CAP packet generator and connection resetter and RSCOMM scanner which are a must for any Bluetooth security enthusiastic.

Download BlueDiving


Blooover

Blooover (and Blooover 2) is a tool that is intended to run on J2ME enabled cell phones that appear to be comparably seamless.It serves as an audit tool that people use to check if their phones and phones of friends :P are vulnerable or not.



Also there is also a tool “Super Bluetooth Hack” which is quite popular nowadays to hack into Bluetooth devices.

Download Blooover


Medieval Bluetooth Network Scanner

This program can analyze and scan your Bluetooth network, giving detailed information about local and remote devices found. You can also browse supported services of each device in a clear and straightforward user-interface. If you have a Bluetooth dongle installed on your PC, download "Medieval Bluetooth Network Scanner" now, it's totally free of charge and very handy!



It can deep scan all services of your Bluetooth device using this software.

Download Medieval Bluetooth Network Scanner

These software are free to use and quite handy to audit.However you,you ought to follow some basic rules of Bluetooth security for maximum protection-

* Switch off Bluetooth when not in use.
* Purchase only devices having long PIN codes.
* Refrain from entering the PIN into Bluetooth device for pairing.
* Limit the electric power itself to keep range of network within physical area (for Bluetooth enabled routers and devices other than cell phones).
* Always generate initialization keys when 2 Bluetooth devices meet for the first time.
* Never allow auto connection (Big loophole in Cell phone devices,easily exploited by a bit of social engineering).



Keep Learning



First of all..I would like to say that Gmail is out of Beta..yep..After a long time when they have integrated the best of world in their email system,Recover Password Using SMS - rdhacker.blogspot.comit was the right time to rip off the tag,and they did it.Further,with the world going mobile,they took some of the steps to better enhance the security even a notch above than other email services
. It helps to know that even the best of us forget our passwords from time to time and In fact,the sheer amount of people visit Gmail help center everyday just to recover their passwords. To help with these situations, Google went a step ahead by adding the ability to recover your password via text message.


In order to access this feature,sign in to your account and select ' Change Password Recovery
Options ' enter your cell phone number and click ' Save '
The Next time you forget your password, enter your username on the password-assistance page, and Google will text you a recovery code. No need to check another email account or even leave the page.
In general, it's a good idea to add as many password recovery options to your Google Account as possible, like a secondary email address and security question. And don't forget to keep them up-to-date.
Afterall,we all make mistakes :P

Cheers and Keep Learning


Tired of trying breaking into that Linux box which pesks you with its password screen ? Well,your day is saved when Kon Boot comes to rescue . Apart from the stupid logo,Kon-Boot is an fantastic prototype software which can change contents of a Linux kernel and Windows kernel while booting.It will you to log into a Linux system as “root” user without even typing the correct password or to elevate privileges from current user to root. For Windows systems it allows to enter any password protected profile without any knowledge of the password.Entire Kon-Boot was written in pure x86 assembly in TASM 4.0.

Yeah..you read it right..it works !

Kon boot was mainly created for Ubuntu,but now it supports more Linux distributions. Kon Boot can crack an array of Windows and Linux operating systems
ranging from Windows XP to even Windows 7,which makes it one of the first tools to break Windows 7 passwords.On the Linux from it supports Gentoo,Ubuntu,Debian and Fedora flavors.

Here is how you can Hack Linux Passwords using Kon-Boot-

1. Boot with Kon-boot CD or Floppy
2. When Linux is fully booted go to the console mode
3. Type 'kon-usr' as login, if it works you should be now in the system
4. Remember to restore the system when you are leaving, you can do this by typing 'kon-fix' as login again.

Here is a Sample Console output of what it will look like -

Ubuntu 8.04 torpeda tty1
torpeda login: kon-usr
# id
uid=0(root) gid=0(root)
# whoami
root

Here is how you can Hack Windows Passwords using Kon-Boot-

No special usage instructions are required for Windows users, just boot from Kon-Boot CD/Floppy, select your profile and put any password you want. You lost your password? Now it doesn't matter at all :P

You can Download Kon-Boot from here -Thats the stupid Kon-Boot logo :P

Floppy Image – FD0-konboot-v1.1-2in1.zip
CD ISO Image – CD-konboot-v1.1-2in1.zip







Keep Learning..


A bootkit is a type of boot virus that is able to hook and patch Windows kernel , and thus getting unrestricted accessAS usual..Windows is Ownd Again to the entire computer
hence compromising it . The "Stoned" bootkit, a MBR rootkit was presented by Austrian software developer Peter Kleissner at the Black Hat Technical Security Conference USA 2009 and has been taken quite seriously at the circles at Redmond. It is even able to bypass full volume encryption, because the master boot record (MBR) (where Stoned is stored) is not encrypted and as the master boot record contains the decryption software which encrypts and decrypts the harddrive using a password. This is a potential weak point as MBR if compromised,can be used to pwn your whole system. Forget your antiviruses..No one’s secure!

Who is interested in Stoned Bootkit ?

1. Black Hats
2. Law enforcement agencies
3. Microsoft

Why is Stoned something new? Because it is the first boot-root-kit that -

* Attacks Windows XP, Sever 2003, Windows Vista, Windows 7 with one single MBR
* Attacks TrueCrypt full volume encryption (forget about data security :P)
* Has integrated FAT and NTFS drivers
* Provides support and an integrated structure for plugins and boot time applications
(for future development,ethical or unethical)

As Robert Hensing quotes about bootkits -

“A bootkit is a rootkit that is able to load from a master boot record and persist in memory all the way through the transition to protected mode and the startup of the OS. It’s a very interesting type of rootkit.”

You can download Stoned Bootkit here:

Open Source
Framework – Stoned Bootkit Framework.zip
Infector file – Infector.exe


gOS or "good OS" is an Ubuntu-based Linux distribution created by 'Good OS LLC', a Los Angeles-based corporation.


Its CIO Dave Liu described that after meeting Enlightenment and open source people he realized that his dream to bring Web 2.0 applications into mainstream use could be realized by creating a Linux distribution that made it easy for users to access Google and other Web 2.0 applications
gOS 3.1 Gadgets

gOS 3.1 Gadgets was launched on January 3, 2009 as an upgraded bug fixed version of gOS 3.0 gadgets. This version fixes some bugs in gOS 3.0, but isn't a obligatory update for gOS 3.0 as most bugs in gOS 3.0 will be fixed using the built in updater automatically (but do not manually try to upgrade from Ubuntu 8.10 repositories as they are incompatible with gOS 3.0). gOS 3.1 is not an "upgrade package" but a new Linux distro, you can download from the good OS site the old version is no longer available.


Download Links



Hotfile

http://hotfile.com/dl/13520500/397426d/gos-3.1-costibardash.part1.rar.html

http://hotfile.com/dl/13520607/83e455b/gos-3.1-costibardash.part2.rar.html

http://hotfile.com/dl/13520672/77c1e61/gos-3.1-costibardash.part3.rar.html

http://hotfile.com/dl/13520756/47ed30b/gos-3.1-costibardash.part4.rar.html

http://hotfile.com/dl/13520832/0294fa5/gos-3.1-costibardash.part5.rar.html

http://hotfile.com/dl/13520929/1393a53/gos-3.1-costibardash.part6.rar.html

http://hotfile.com/dl/13521090/3a0d503/gos-3.1-costibardash.part7.rar.html

http://hotfile.com/dl/13521132/94e9d00/gos-3.1-costibardash.part8.rar.html



Uploading

http://uploading.com/files/44b7amc8/gos-3.1-costibardash.part1.rar/

http://uploading.com/files/51ed9a73/gos-3.1-costibardash.part2.rar/

http://uploading.com/files/466c5a61/gos-3.1-costibardash.part3.rar/

http://uploading.com/files/2623db3c/gos-3.1-costibardash.part4.rar/

http://uploading.com/files/3238edda/gos-3.1-costibardash.part5.rar/

http://uploading.com/files/1f78b822/gos-3.1-costibardash.part6.rar/

http://uploading.com/files/c2fa62a7/gos-3.1-costibardash.part7.rar/

http://uploading.com/files/37a56364/gos-3.1-costibardash.part8.rar/


Now !! Windows Vortex Vista Third generation 3G "Red" 8.2009 USB Edition with full components and functions run directly form USB Flash .
Boot your computer form the USB Flash and the computer will boot and load Windows Vortex 3G with full functions and components and working as normal without a Hard Disk .

How to Use:
1- Decompress all files .
2- You will get ISO image .
3- Write your ISO image to USB Flash by Ultra ISO 9.3.3.2685 .
enjoy ..

Informations about Windows Vortex 3G USB Edition :
# Vortex third generation takes the form of "Windows XP" operating system with service pack three (SP3) with the latest updates which officially issued by Microsoft corporation including programs and security updates.
# The latest version includes many of new updates & creative enhancement s specialized from Vortex to be easy and more efficiency.
# The design of this version is inspired of "Vista red" operating system but with a new & different beautiful & attractive vision.
# The new issued version is more secure, easier & flexible also you can simply specify all choices and settings such as merging or deleting auto setup programs before or meanwhile setting up, including language & user information settings.
# The most remarkable thing in this version is security & protection with the security tools updates.
# This third compact issue from vortex tools achieved a great progress and offers multi active functions not only a group of tools but also a protection &safe shield.
# To make this version faster &more secure was a difficult matter we could achieve it in this issue; it's also fits old systems and works with a high efficiency on new ones.
# If you are interested in Secure, beauty, speed in additional to specification facilities and auto run, you can find this in one solution which is Vortex third generation which offers all these requirements in one simple step.

system features :
* Windows XP version 5.1 (build 2600.xpsp_sp3_qfe.080814-1300:service pack 3)
* Microsoft Windows Genuine
* All Microsoft Windows Official Updates until March 2009
* Ability to run from DVD
* vortex windows tools version 3.0

Integrated software :
* windows media player 11 with all updates
* Internet explorer 7 with all updates
* DirectX 9.c (4.09.00000.904) for WinXP Post-SP3 November Update
* Microsoft Silverlight v2.0.31005
* flash player 10.0.12.36
* Windows Side bar

built-in software :
* windows live messenger (2009)-(14.0.8050.12012)
* yahoo messenger 9.0.0.2128
* real alternative 1.90
* Divx,K-Lite Codec Pack Standard 4.5.3
* winrar 3.8 final
* winamp 5.541
* Ultreiso 9.3.1

excluded :
* msn explorer
* tour xp
* Sample Music
* IIS

main add-ons :
* foxit reader "pdf reader"
* tera copy
* ISO Recorder

graphics :
* setup screen
* boot screen
* login screen
* wallpapers
* themes
* user pictures
* screen savers
* icons
* cursor
* dialog box
* animation
* sounds
* run, system properties,others

vortex tools v3.0 security :
* autorun protection
* autorun remover
* smitfraudfix- spyware fix
* internet cookies cleaner
system
* advanced systemcare 3
* ccleaner
* everest ultimate
* revo uninstaller
* shutdown timer
* autoruns
* procexp
* diskcleaner
* driverupdate
* registrydefrag
* smartram
* contextmanager
* hd tune
* hw monitor
* mem test
* tweak ui
* win update list
* windrvexpert
tools
* ftp wanderer
* mp3 cut
* pandora recovery
* powermenu
* dexpot
* sound rec
* traktor
* xnview
* notepad2
* search and replace
* siteshoter
* win me startup disk
* diskexplorer
appearance
* vista drivers
* vista start
* top desk 3d
* true transparency
* trans bar
* visual task tips
* windows side bar
* styler toolbar
* l clock
* viorb

extra control panel features :
* BootSafe v2.0.1000
* Bootvis v1.3.37.0
* ClearType PowerToy
* CPU-Z v1.50
* Dial-a-Fix v0.60.0.24
* Expired Cookies Cleaner v1.02
* GPU-Z v0.3.1
* HD Tune v2.55
* HWmonitor v1.13
* MemTest v3.8
* Microsoft AutoPlay Repair Wizard
* Microsoft TimeZone <-- Requires .NET Framework
* Microsoft Virtual CD-ROM Control Panel v2.1
* MSI CleanUp Utility 4.4
* New MSConfig
* Regedit
* Startup v2.8 CPL
* Services and Devices v2.7
* Smart Driver Backup v2.12
* TweakUI PowerToy v2.1
* Windows Task Manager
* WinUpdatesList v1.23
* User Accounts 2 CPL

updates list :
* KB281981 - Disconnected sessions retain the original variable
* KB887606 - FIX: The Microsoft XML Parser (MSXML) uses cached credentials incorrectly
* KB889320 v2 - When you disable the Windows Firewall service on your Windows XP Service Pack 2-based computer, the Computer Browser service stops after five minutes and Event ID 7023 is logged in the Event Viewer
* KB898461 - Software update 898461 installs a permanent copy of the Package Installer for Windows version 6.1.22.4
* KB909520 v1 - Description of the software update for Base Smart Card Cryptographic Service Provider
* KB915800 v4 - A hotfix is available for Windows Desktop Search document IFilters in Windows XP and Windows Server 2003
* KB917275 - How to obtain Windows Rights Management Services with Service Pack 2
* KB922120 v6 - Network Map in Windows Vista does not display computers that are running Windows XP
* KB927436 v2 - Error message when you attach a device that loads the Serscan.sys driver to a computer that is running Windows XP SP2, Windows XP SP3, or Windows Server 2003: "DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)"
* KB932521 - A Windows XP-based client computer uses an archived certificate for network authentication after a new certificate is auto-enrolled in a wireless Active Directory domain
* KB932578 - Event ID 55 may be logged in the System log when you create many files on an NTFS partition on a Windows Server 2003-based or Windows XP-based computer
* KB932716 v2 - Description of the Image Mastering API v2.0 (IMAPIv2.0) update package that is dated June 26, 2007
* KB934401 - When you run the "Ipconfig /displaydns" command in Windows Server 2003, the results are incomplete


Uploading.com Links :-

http://uploading.com/files/749e32fb/Vortex3G.USB.8.2009_.part08.rar
http://uploading.com/files/df31a65f/Vortex3G.USB.8.2009_.part07.rar
http://uploading.com/files/f2b9dda3/Vortex3G.USB.8.2009_.part06.rar
http://uploading.com/files/79amc4e5/Vortex3G.USB.8.2009_.part03.rar
http://uploading.com/files/967a99ab/Vortex3G.USB.8.2009_.part01.rar
http://uploading.com/files/9462e644/Vortex3G.USB.8.2009_.part05.rar
http://uploading.com/files/me6f38dd/Vortex3G.USB.8.2009_.part02.rar
http://uploading.com/files/6fa83344/Vortex3G.USB.8.2009_.part04.rar
http://uploading.com/files/38d63b1b/Vortex3G.USB.8.2009_.part09.rar















Download :

http://rapidshare.com/files/220062062/M4sT3r_Trojan_v2.0.rar








Rapidshare Account :

http://rapidshare.com/files/224367741/AccountLocker.rar

Uploading Account :

http://uploading.com/files/OFDAQIHV/AccountLocker.rar.html

BroadBand hacking
REQUIRED
For hacking BroadBand you will require
*Angry ip scanner
* Asterix Key 7.11
* A Computer
*An internet connection
Download AngryIPScan and Asterix key
http://rapidshare.com/files/251859527/SC.rar

http://www.megaupload.com/?d=TZEI7HFM

HOW TO
1. Go to http://www.whatismyip.com/
2. Let’s assume your ip is 59.94.133.57 so now go to Angry IP scanner and in IP range enter 59.94.133.0 to 59.94.133.255 now go to options->Select Ports… and in “ports”
enter “80″(without the inverted commas), click on ok.
3. Click on “Start”
4. Now when the scan is over……..right click on the green ip’s and select IP->clipboard
5. Goto internet explorer and press Ctrl+V in the adress bar
6. Hit enter
7. Enter admin as the username and admin as the password
8. Search for the wan settings page somewhere.(Most Password r in WAN PAGE)
9. When you have arrived at that page open asterix key and click on Recover
10.Now you have the username (from the wan settings page) and the password (from Asterix key).
And also guys i am giveing a extra tool in the above link also and it help to go inside a pc or laptop through internet whose ip is open. (+) this symbol means that u can enter to his pc…..

sometimes it may not work coz
1) New Routers ke configuration pages dont have saved passwords
2) Only noobs keep the admin-admin stuff
3) PORT BINDING

but still you may try coz who knows if you are lucky??

Dream Weaver CS4
Adobe Dreamweaver software is the ideal tool for web designers, coders, and application developers of all levels.
Enhanced coding functions make it a breeze to navigate through complex site pages at design time. Improved layout
tools bring expedited workflows, from comp conception to client approval. Innovations throughout the Dreamweaver beta
can help teams and individual developers alike reach the next level in performance and functionality. Download the
prerelease of the next version of Dreamweaver now and send us your feedback. The Dreamweaver beta will expire soon
after the next version of Dreamweaver is available for purchase.

Direct Rapidshare Download:

http://rapidshare.net/files/267130923/Backup.A.D.CS4.v.10.part1.rar
http://rapidshare.net/files/267132838/Backup.A.D.CS4.v.10.part2.rar
http://rapidshare.net/files/267135136/Backup.A.D.CS4.v.10.part3.rar
http://rapidshare.net/files/267136351/Backup.A.D.CS4.v.10.part4.rar

Download Manager Links:

http://rapidshare.com/files/267130923/Backup.A.D.CS4.v.10.part1.rar
http://rapidshare.com/files/267132838/Backup.A.D.CS4.v.10.part2.rar
http://rapidshare.com/files/267135136/Backup.A.D.CS4.v.10.part3.rar
http://rapidshare.com/files/267136351/Backup.A.D.CS4.v.10.part4.rar


RapidDowner is a software application designed to bypass the 110 minute waiting time limit when downloading from Rapid Share hosting service.This is not a hack just a manager to help backup your files and download them as quick as you upload them.RapidDowner is very easy to use. All you need is the download link and you can start downloading. Moreover, the application comes with a proxy grabber if you want to change your IP.

Requirements:
· Microsoft .Net Framework

What’s New :
· Auto-image Rec.,
· Grid-View,
· Auto-Updates,
· Error Logging,
· Link Library


Download Links:

http://uploading.com/files/17f69eb8/RapidDowner.2.0.4.19.rar

or

http://hotfile.com/dl/13020185/21b5c82/RapidDowner.2.0.4.19.rar.html

or

http://depositfiles.com/files/e51hkn8hy

or

http://rapidshare.com/files/282504828/RapidDowner.2.0.4.19.rar


Info:
BumpTop is a prototype of a desktop environment, designed to improve the functionality of traditional computers to emulate the normal behavior of a real world desk. Is controlled by the interaction of the pointer, making it more suitable for Tablet PCs and palmtops. It was created at the University of Toronto by Anand Agarawala as Master's degree. Anand Agarawala made a presentation at the TED conference this idea. He is currently in private beta version can be obtained by registering on the site.

In BumpTop, documents behave as three-dimensional blocks lying on a virtual table. The user can position the blocks on the desktop using the stylus or mouse. Makes extensive use of the physical effects of launch and blows that are applied to documents when they interact in a more realistic experience. The blocks can be stacked in ways defined. Multiple selection is via a LassoMenu, making this tool is used with a line around the item and then the most common tasks are displayed in a menu type cake. BumpTop is currently compatible with Windows XP / Vista, with versions for Mac / Linux are planned for the future.

System Requirements:
* Operating System: WinXP/Vista/7
* Processor: 1.8 GHz
* Memory: 1.0 GB
* Video: 128 MB
* Free Disk Space: 15MB
* Screen resolution: 800 x 600
* OpenGL 2.0
* Internet connection

Download:

http://rapidshare.com/files/282797935/BumpTop_1.0_Build_2861.rar

Counter

Followers

Blog Archive

Subscribe Via Email &Sms

Enter your email address:

Expert Hackers

Also Subscribe Via Sms Just click here to follow via
SMS