Showing posts with label hacks. Show all posts
Showing posts with label hacks. Show all posts

Saturday, 9 March 2013

Facebook Account Temporarily Locked or blocked?

Facebook Account Temporarily Locked or blocked:::....

Isn't frustrating????

Reason:

A) May be Facebook making an improvement in the database and the account get "Locked" are stored on. During this time,it may not be able to gain access to the account. It may last for an hours. If this doesn't work, try submitting Facebook form.

B) May be Facebook has detected suspicious activity and has temporarily suspended due to security precaution.


C) Randomly adding large number of friends and sending continuously message to your friend list. Due to which unknown friend has detected as a spam or reported abuse. If in a bulk large number of people report abuse or spam then it may also get locked temporarily.


D) May be randomly using different devices to open a Facebook account.
How to recover::::...
A) Don't Open your Facebook account up to 96 hrs. Then after that clear cache and everything and may it will back to normal.


B) Go through automated security verification process if it has detected some suspicious attack.


C) Email Facebook at disabled@facebook.com. It may took 2-3 days for a response. It ask about your name, date of birth and a brief description of problem. They most likely ask you to confirm your identification with a DL or passport. After that they will send a reactivation link, assuming may you haven't violated any policies.
Preventive Measure:
Friends are too valuable and means to us, so we never want to lose it and suppose one morning by waking up it came to known that Facebook account is blocked or locked, it would be very disastrous.


A) Don't use proxy servers - As we know, proxy server use anonymous ips in order to access blocked sites. By doing so,it might create negative impact on Facebook account. Actually proxies are unknown to Facebook and it may affect the security network. So, its better not to use them.


B) Don't use too many devices - Try to prevent using too many devices for your Facebook account. Previously it not the case, it allows sign in to your account from different devices. But now, security level of Facebook is increasing day by day, so preventing the use will definitely keeps you in safer side.
Based on my speculations, I think this are the common issues Facebook user are facing right now. There is no hand to hand solution from Facebook side and some process as per their concern took long time with no result. Hope this would help Facebook user and it would be updated with the time if any changes occur in future. Moreover you can find more interesting article that really differentiate the way of communication effect your relationship in Facebook.













Sunday, 3 June 2012

MAC SPOOFING


Protect Personal and Individual Privacy.  Some companies track users via their MAC Addresses...  In addition, there are more and more Wi-Fi Wireless connections available these days, and Wireless network security and privacy is all about MAC Addresses...
Perform Security Vulnerability Testing, Penetration Testing on MAC Address based Authentication and Authorization Systems, i.e. Wireless Access Points. (Disclaimer: Authorization to perform these tests must be obtained from the system owner(s).)
Build "TRUE" Stand-by (offline) systems with the EXACT same CompterName, IP, and MAC ADDRESSES as the Primary Systems.  If Stand-by systems should be put online, NO arp table refresh is necessary, which eliminates extra downtime.
 Some online Game Players (Gamers) require changing the MAC addresses to fix IP problems for some reason...
Build High-Availability solutions.  For example, some firewalls that run on multi-port NIC's (i.e. quad port NIC) require the same MAC address for every port.
Troubleshoot Network problems.  Arp Tables, Routering, Switching, ...
Troubleshoot system problems
Test network management tools
Test incident response procedures on simulated network problems
Test Intrusion Detection Systems (IDS), whether they are Host and Network Based IDS.
If for whatever reason you need to keep the same MAC address as your old NIC, but your old NIC failed...
Some software can ONLY be installed and run on the systems with pre-defined MAC address in the license file.  If you need to install one of these software to another system with a different Network Interface Card (NIC) because your NIC is broken, SMAC will come handy.  However, you are responsible to comply with the software vendor's licensing agreement.
Some Cable Modem ISP's assign IP addresses base on the PC's MAC addresses.  For whatever reason, if you need to swap 2 PC's  regularly to connect to the cable modem, it would be a lot easier to change the MAC addresses rather than to change Network Interface Card (NIC).  (You need to check with your ISP and make sure you are not violating any service agreements.)
Over 1,500,000 downloads by users from major corporations and from around the world, making SMAC the most stable and popular Windows MAC Address Modifying utility.


 How is it done?

SMAC took advantage of the NdisReadNetworkAddress function in the Microsoft Device Driver Development Kit (DDK.)
NdisReadNetworkAddress(...) is called by the network adapter driver to obtain a user specified MAC address in the registry. After the driver confirms that there's a valid MAC address specified in the registry key, the driver then programs the MAC address to its hardware registers to override the burn-in MAC address.

Caution on changing MAC Addresses
 
Make sure you DO NOT assign one MAC address to multiple NIC's on a local area network (LAN).  If you do that, you will create a lot of problems.  MAKE SURE YOU HAVE ONE UNIQUE MAC ADDRESS PER NIC!!!
Make sure you DO NOT use Multicast or invalid MAC addresses.  You can check out the Multicast MAC addresses athttp://www.iana.org/assignments/ethernet-numbers.  Note:  "00-00-00-00-00-00" is not a valid MAC address.
MAKE SURE YOUR INTENTION AND PURPOSE IS LEGAL AND ETHICAL!!!

Tool for changing MAC Address  

SMAC is a Windows MAC Address Modifying tool, and is based on this research article.  SMAC is developed by KLC Consulting Security Team.  URL of SMAC is http://www.klcconsulting.net/smac

Getting Started

Before we get into the technical details, if you are not comfortable of changing MAC Address via registry entries, please use the User Friendly SMAC MAC Address Changer.  It will be less risk and it will make your life a lot easier. 
There could be couple ways to do change (spoof) MAC Addresses on Windows 2000, XP, 2003, and VISTA.  Make sure you read through the steps first.  If my explanation does not make sense to you, please use SMAC.  
The following information is provided “AS IS.”  If you have any inputs, please feel free to send me an email.
*** Disclaimer: Try these steps at your own risk!!!  These steps will work, but they are not supported by Microsoft.
*** I will not be responsible for any damages that might occur on your system.
*** Please don't try the steps below if you do not agree with this disclaimer!
Before we start:  KLC Consulting Security Team has developed a Windows MAC Address Modifying tool, SMAC.  SMAC is developed based on this research article, and it has many functionalities.  SMAC allows Windows 2000, XP, 2003 Server and VISTA users to change MAC address regardless of whether manufacturers allow this option or not.  URL of SMAC is http://www.klcconsulting.net/smac.  
 
Method 1:
This is depending on the type of Network Interface Card (NIC) you have.  If you have a card that doesn’t support Clone MAC address, then you have to go to second method.
Go to Start->Settings->Control Panel and double click on Network and Dial-up Connections.
Right click on the NIC you want to change the MAC address and click on properties.
Under “General” tab, click on the “Configure” button
Click on “Advanced” tab
Under “Property section”, you should see an item called “Network Address” or "Locally Administered Address", click on it. (See figure below as an example)


On the right side, under “Value”, type in the New MAC address you want to assign to your NIC.  Usually this value is entered without the “-“ between the MAC address numbers.
Goto command prompt and type in “ipconfig /all” or “net config rdr” to verify the changes.  If the changes are not materialized, then use the second method.
If successful, reboot your systems.
 
Method 2:
This method requires some knowledge on the Windows Registry.  If you are not familiar with Windows Registry, just use the simple-to-useSMAC MAC Address Changer to change the MAC addresses (the easiest and safest way,) or consult with a technical person before you attempt on the following steps.  Also, make sure you have a good backup of your registry.
1.     Goto command prompt and type “ipconfig /all”, and
    I. Record the Description for the NIC you want to change.
    II. Record the Physical Address for the NIC you want to change.  Physical Address is the MAC Address

2.     Goto command prompt and type “net config rdr”, and you should see something like

        
 
3.     Remember the number between the long number (GUID) inside the { }.  For example, in the above “net config rdr” output, for MAC address “00C095ECB793,” you should remember {1C9324AD-ADB7-4920-B02D-AB281838637A}.  You can copy and paste it to the Notepad, that’s probably the easiest way.  (See figure 2.)
4.     Go to Start -> Run, type “regedt32” to start registry editor.  Do not use “Regedit.”
5.     Do a BACKUP of your registry in case you screw up the following steps.  To do this
Click on “HKEY_LOCAL_MACHINE on Local Machine” sub-window
Click on the root key “HKEY_LOCAL_MACHINE”. 
Click on the drop-down menu “Registry -> Save Subtree As” and save the backup registry in to a file.  Keep this file in a safe place.
6.    Go to “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}.  Double click on it to expand the tree.  The subkeys are 4-digit numbers, which represent particular network adapters.  You should see it starts with 0000, then 0001, 0002, 0003 and so on.  

   
7.     Go through each subkey that starts with 0000.  Click on 0000, check DriverDesc keyword on the right to see if that's the NIC you want to change the MAC address.  The DriveDesc should match the Description you recorded from step (a.-I.).  If you are not 100% sure about the DriverDesc, then you can verify by checking if the NetCfgInstanceID keyword value matches the GUID from step (c).
If there is no match, then move on to 0001, 0002, 0003, and so on, until you find the one you want.  Usually 0000 contains the first NIC you installed on the computer.
In this demonstration, 0000 is the NIC I selected. (See figure 3.)
8.     Once you selected the subkey (i.e. 0000), check if there is a keyword "NetworkAddress" exist in the right side of the window. (See figure 3.)
    I. If "NetworkAddress" keyword does not exist, then create this new keyword:
        i. Click on the drop down menu “Edit -> Add Value”.
        ii.  In the Add Value window, enter the following value then click OK.  (See figure 4.)
            Value Name: = NetworkAddress
            Data Type: = REG_SZ 
                 
           
        iii.  String Editor window will pop up at this time (see figure 5.)  
        iv.  Enter the new MAC address you want to modify.  Then click OK.
        (There should not be any "-" in this address.  Your entry should only consist of 12 digits as seen in the figure 5.)
    II. If "NetworkAddress" keyword exists, make sure it shows the keyword type is REG_SZ, and it should show as NetworkAddress:REG_SZ:  .  This keyword might not have a value at this time.  
        i. Double click on the keyword NetworkAddress and the String Editor window will pop up. (See Figure 5.)
        ii.  Enter the new MAC address you want to modify.  Then click OK.
        (There should not be any "-" in this address.  Your entry should only consist of 12 digits as seen in the figure.
           
      
The Simple-to-Use SMAC MAC Address Changer (Spoofer) is definitely a lot SAFER and EASIER for this type of process.  Check out some SMAC screenshots. ☺

9.     There are 2 ways to make the new MAC address active.  Method I does not require a system reboot:
    I.  Goto Start->Setting->Control Panel, and double click on "Network Neighborhood".
    WARNING: Make sure you understand that you WILL lose the network connection after completing step "ii." below, and
    if you have a DHCP client, you will get a new IP address after completing step "iii."
        i.  Select the Network Adaptor you just changed the MAC address.
        ii.  Right click on the selected Network Adaptor and click "Disable."
       Verify the status column for this adaptor changes to "Disabled"
        iii.  Right click on the selected Network Adaptor and click "Enable."
       Verify the status column for this adaptor changes to "Enabled"
        iv.  If for any reason it cannot be disabled or re-enabled, you have to
        reboot your system to make the changes effective.
    II.  Reboot your Windows system. 
10.  Once completing step j (if rebooting the system, wait until the reboot is completed), go to command prompt, type “ipconfig /all” to confirm the new MAC address.

Note: SMAC 2.0 Professional Edition can do step 9 and 10 with "1-click" and that really means 1 click, on the "Activate MAC" button.
Now you have seen the whole process, it's time to see how SMAC MAC Address Changer (Spoofer) is a lot SAFER and EASIER for changing (spoofing) MAC Address on Windows 2000, XP, 2003, and VISTA .

Restore The TRUE Hardware burned-in MAC 
Address:
If you want, just download SMAC Evaluation Edition and select the Network Adapter you spoofed, then click on "Remove MAC" to simply remove the spoofed MAC address.  That simple.  Or, if you like the technical challenge, please follow the steps below:
Remove the entry you added:
If you followed Method 1, then go back to the advanced properties window and remove the entry you add.
If you followed Method 2, then remove the "NetworkAddress" keyword you added in the registry.
Use step (j) above to activate the change you make.
Once rebooted, go to command prompt, type “ipconfig /all” to confirm the original MAC address.

If MAC Address changes does not work:
If for whatever reason the MAC address cannot be changed using method 2, make sure you restore the registry setting by following the "Restore The TRUE Hardware burned-in MAC Address" instruction above.  If necessary, restore the registry you just backed-up to get your system back to the original state.  You can do this by clicking on the drop-down menu “Registry->Restore,” and restore your backup registry file.
MAC Address Spoofer:
KLC Consulting Security Team has developed SMAC, a Windows MAC Address Changer / Spoofer for Windows 2000, XP, 2003, and VISTA  Server systems, regardless of whether manufacturers allow this option or not.  SMAC has been used by many Fortune 500 companies to help enhancing their security and provide network solutions.   KLC has integrated features requested by network and security professionals, and SMAC has been published in many security books and training manuals.  SMAC URL is http://www.klcconsulting.net/smac
Reference:
Additional information:


How to Get Someone's IP Through AIM/MSN/Chat ?



Found a great website that logs IPs and gives you the lat/long./isp.
1)Create Account
http://www.chatrack.frihost.net/index-1.php
2)Get one of the links and tell someone on AIM or whatever to click it, choose any of the images and tell them you painted it or some stupid shit like that.
3)When they look at the image, it logs their IP.
4)Bonus points:
-Tell them its animated and 20 seconds in it will change, this allows the website to have time to ensure all their info is retrieved.


How to find ip adress while chat..

First you got to find out the IP address of that User.
To Do so we will be using “netstat” command in windows. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start >Run>cmd).
note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.
When command prompt opens Type the following command and hit Enter.
netstat -an
And you will get all established connections IP addresses there. Note down all the suspicious IP’s
The Next Step is to Trace that user using his IP address.
To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.
http://www.ip-adress.com/ip_tracer/
It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.

Hacker Kit - Daily Hacker Tools [56mb]



Some tools which hackers require in daily life. I personally use most of these.

Yahoo Account Locker
Acunetix Vulnerability Scanner + Crack
Admin Finder
Auto Surfer
Angry Ip Scanner
Anonymity Pack
Ardamax 28 and 2.9 + serial
Binders
Brutus
Crypters
Cookie Stealer
Debugging Tool
Email Bomber
Exploit Scanner
Ip Scanners
Irc Spammer
Md5 Cracker
Msn Freezer
MySqli Dumper
Passstealer - Istealer 5 and other fud stealers
Phishers - A to Z
Port Scanner
Shells Pack A to Z shells
Supernova 5
Telnet Tools
Xss scanner
zer0 server Attacker


Download:
http://depositfiles.com/en/files/yr3pwsuoa


Password:
The7thSage

Changing the ip address and bypassing the firewal

Proxy is changing ur ip adress.dis chapter is totally related 2 changing ur ip address,changing ip address is very much imp. bcoz by doing it, we get many benefits. 
[1st]we can download multiple files 4m rapidshare
[2]by dis we can bypass a firewall
[3] der r many sites vch allows only one account on 1 ip address,on dose sites we can make multiple ids by dis.
[4]4 being safe while doing cyber hackes,it is very much essential 2 do proxy.
[5]after of doing proxy,we can fool other person very easily.
learning proxy is very imp. bcoz while doing cyber hacks it makes u some safe .
let's start   see,suppose dt u vant 2 propose a girl nd u r very much scared about her reaction then u simpally say ur any freind 2 tell her dt u like her,this is proxy,actually this is nt proxy bt it giveS a solid idea of proxy.
wenever u send some data 2 any web server then dt server watch ur ip adress,in proxy ,first we connect 2 any proxy server,nd now we do surfing,now supose dt u r sending some data 2 any server ,nw bcoz u hv done proxy ,ur data vl be sent via dt proxy server nd dt server where u r sending d data,dt server ud nt be able nw 2 trace u bcoz now dt server can watch dt proxy server ip.
lemme tel u something about working of proxy.
U------>SENDING DATA 2 GMAIL------->GMAIL REPLYING 2 U
AFTER OF DOING PROXY THIS THING LOOKS SOMETHING LIKE DIS
U---->PROXY SERVER--->GMAIL SERVER------>PROXY SRVER-->U

NW i think u hv got d idea of proxy,if still nt got then write in help desk,i vl clear u more.
after of doing proxy we found 1 thing dt our internet speed has gone very slow.itgoes 2 70%
nw a small real hacking story.
b4 of some months a 16 year old boy in u.s.a. did dos attack on nasa website.on dt moment nasa had sent his robote 2 mangal planet[sorry,i donno english of mangal planet anyway],d moment on vch he did dos attack on dt moment d robot of nasa ws steping on mangal planet,after dos attack dt robot just stopped nd just went 2 hang.robot stopped working.
nw all de nasa scientists started looking at each other face like a stupid,de were nt getting vat is dis going on?
nw de sTarted 2 search who has done it?nd after of 14 day they got d location of d boy nd went 2 his home nd caught.
nw d question rises up,y i hv written dis story here.?
actualy d boy has chnaged his ip address 4 times. i mean first he chaNged his ip address,then he did another proxy over of d first proxy then d 3rd then 4th the 5th,he did nt chANge his mac address.
all i want 2 tell u ,if u hv done proxy then the webmaster cann't trace u vdout going 2 d proxy server 2 vch u hv connected nd if u hv done proxy flooding 4 10times then be 100% assured no1is coming 2 catch u b4 of 1 month.if u hv done proxy 4 10 times then 4 tracing d fbi vl first go 2 d 10th proxy server 2 vch u hv connected thenwards 4m der he vl get 2 knw ur 9th server then wards they vl go 2 d 9th server then 2 8th nd thus continue.nd finaly in coming 2 u they vl take 1 month.itis nt possible 4 dem 2 trace u4m comuter.they must go personally 2 d proxy server nd all dis takes time.
i think u ppl got d importaince Of doing proxy.
anyway .let' mooov 2 learn hw 2 do proxy.
let's start.

 
First of al write in google"list of proxy address" or u may search 4 "free proxy server"
nw many links will come.go on any1 of them.
now on that website u vl find many ip address nd port no.s.
these r d adress of proxy servers.now copy any1 of de address.mind it,u hv 2 copy both d things,i mean port no. as well as ip address.
now open ur internet explorer nd go in
tools>internet option>connection>lan setting
go in lan setting,der u vl see 2 blue lines.one is AUTOMATIC CONFIGURATION ND d second one is PROXY SERVER
in proxy server named tab u vl see 4 blocks.2 for ticking nd 2 for giving address.tick both of dem boxes nd in address put d ip adress u copied nd in port no. put d port no. u copied.never forget 2 tick both d boxes .now click o.k.
nw open whatismyip.com
nd u vl see dt ur ip address has been chANged.
in mozilla firefox go here
tools>options>advanced>network>settings
nd in settings put d ip address nd port no.
dis is d same operation vch is carried out in all type of browser.
der r many softwares 4 dis purpose.all of dem r shit nd nothing else.
der is anonyomous proxy list verifier named software nd many more ,all of dem do d same work.i don think any1 should use dem.
u can do d above said work in a more simple way also.
simpally open http://www.proxy4free.com/named site.
der in most left side u vl see written "proxy list"
in proxy list der vl be many lists named list 1list 2 list 3 nd many more .simpally go on list 1 nd copy ip nd port no.l 4m der.
confused

come 2 d point vch u did nt get in my previous proxy named thread.
see,doing proxy makes u more safe while doing illlegal stuffs but d problem is how 2 do proxy flooding.
proxy flooding means connectiong 2 a proxy server then again connection 2 any other proxy server then again 2 ay other server.
if u vl do proxy flooding then u vl be very much safe /
i m telling u some software's name here 4m vchg u can do proxy flooding very easily but mind it i m nt going 2 give u all de software.some of dem i vl give u nd some of dem u hv 2 search on ur own bt d one vch i vl giv u ,vl be enough 2 do proxy flooding ..anyway.
name of tools 4 doing proxy floding-->
SocksChain,happy browser tool,multiproxy,tor
these are d tools 4 doing proxy flooding,wen u r doing something highly illegal then first of all use any1 of dese softwares nd nw do vatever u vanna do .now u r very much safe/
tool "multiproxy"is a very very very good tool.itensures u police vl nt come 2 u b4 of 1 month nd tor is also very very good./
get tor 4m here.
tor.eff.com
now some extra outstanding good stuffs lolz.
use a software named "brozar".it does nt leave any log wen u do illegal stuffs .a very god software 2 make u safe ,searching it is ur duty.
use a software named "torpark browser"it also do d same work of brozar.if u r using it then it makes u sure dt der is no log u r leaving on d internet.this is a perfect tool 2 make u very very much safe.download it 4m here.
torrify.com/index.php
i know i hv told here name of many tools but all u need 2 download onlu tor nd torpark browser.
4get all d other tools name.i hv given here links also ..simpally download nd be safe ...
freinds

doing proxy helps u in many ways.
on rapidshare u can't download more than 1 file on 1 time bt vd doing proxy u can download multiple files.
all d sites vch does nt offer u 2 make more than 1 account on ur computer vl allow u 2 make many1 after doing proxy,in colleges where orkut or other sites r blocked ,u can open all d restricted sites vd doing proxy .
well, if u r trying 2 bypass d firewalll of ur coolege nd u r using proxy then it makes ur internet speed very much slow.indt case use a software named "ultra surf"
u can get ultrasurf very easily on internet .simpally write in gogle"download ultra surf"nd u vl get it.after of downloading it ,alll u hv 2 do is 2 a double click on it,a lock sign vl apear nd now no firewall can stop u by doing browsing.inmany colleges they motherfucker bind d word proxy even nd der by doing proxy u cann't surf d way bt ultra surf is 100% unstopable4m al d firewalls nd it also gives u a very goodbrosing speed there4 bettter in college use ultra surf.

http://www.hidemyass.com/
http://www.anonymizer.com/
http://www.wujie.net/
http://www.ultrareach.net/
http://surfshield.net/

those are some of proxy sites tht will provide u with access to blocked websites
 
Summary of d chapter.
=================

[1]proxy is done 4 being safe while doing illegal stuffs nd 4 bypassing firewalls.itis a very good option 2 download multiple files 4m rapidshare at any single moment.
[2]get proxy server lists nd apply these address in ur browser 2 surf d web anonymously.
[3]use software "tor" 2 do proxy flooding
 
Proxy server are of four types:
=======================

1. Transparent Proxy 
================
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

2. Anonymous Proxy
===============
This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

3. Distorting Proxy 
==============
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

4. High Anonymity Proxy 
===================
This type of proxy server does not identify itself as a proxy server and does not make available the original


INSTRUCTIONS FOR CHANGING UR IP ADDRESS IN DIFFERENT EXPLORER :  

Instructions for Internet Explorer 6.0
===========================

1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
3. In the Address box, type the IP address of the proxy server.
4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
6. Click OK to close the LAN Settings dialog box.
7. Click OK again to close the Internet Options dialog box.



Instructions for FireFox
==================

1. Select the Tools Menu
2. Select Options
3. Select Connection Settings
4. Select Manual Proxy Configuration
5. Check Use the same proxy for all protocols
6. Enter the IP address for the HTTP proxy server
7. Enter the port of the HTTP proxy server
8. Click Okay


Instructions for Netscape 7.1
=====================

1. Select the Edit Menu
2. Select Preferences
3. Maximize Advanced
4. Select Proxies
5. Choose Manual proxy configuration
6. Enter the proxy server's IP address in the HTTP Proxy field and the proxy's port into the corresponding Port field.
7. OK your way out

Opera 8.5
========

1. Select the Tools Menu
2. Select Preferences
3. Select Advanced Tab
4. Select Proxy Servers
5. Check the box next to HTTP
6. Enter the proxy server's IP address in the first box and the proxy's port in the box after "Port"
7. OK your way out

Safari 2.0.3
=========

1. Select Preferences
2. Select Advanced
3. Select Proxies: Change Settings
4. Check the box next to Web Proxy (HTTP)
5. Enter the proxy server's IP address in the first box and the proxy's port in the box after the ":"
6. Select Apply Now


Hope u like it
===========
Comments are welcome
==================

Hi Friends I am using this Hider This is Just Superb. The proxies are superfast than other Proxies. I want to Share with u all . If u already have then ignore . if u dont have then Enjoy it .
The Patch File may b detected by antivirus Because it is a patch/keygen.
See some Screens Here:


Download Here:
http://rapidshare.com/files/414598913/Iphider.rar

Saturday, 2 June 2012

My dear fnds....
Trace an email address in the most popular programs like Microsoft Outlook, Hotmail, Yahoo, Gmail, AOL, by finding the Email header .

 What`s   Email header.

      Every email you receive comes with headers. The headers contain information about the routing of the message and the originating Internet Protocol address of the message. Not all electronic messeges you receive will allow you to track them back to the originating point and depending on how you send messages determines whether or not they can trace an email address back to you. The headers don't
contain any personal information. At most, the results of the trace with show you the origination IP and the computer name that sent the email. After viewing the trace information, the initiating IP can be looked up to determine from where the message was sent. IP address location information DOES NOT contain your street name, house number, or phone number. The trace will most likely determine the city and the ISP the sender used...

How can we get the header

Each electronic messaging program will vary as to how you get to the message options. I'll cover the basics to start the trace...the rest is up to you.
Outlook - Right click the message while it's in the inbox and choose Message Options. A window will open with the headers in the bottom of the window.
Windows Live - Right click the correspondence while it's in the inbox, choose Properties, then click the Details tab.
GMail - Open the correspondence. In the upper right corner of the email you'll see the word Reply with a little down arrow to the right. Click the down arrow and choose Show Original.
Hotmail - Right click the memo and choose View Message Source.
Yahoo! - Right click the note and choose View Full Headers.
AOL - Click Action and then View Message Source.

You can see that no matter the program, the headers are usually just a right click away....

How do you start the Tracing.......

Find the first IP listed in the header. This is most likely the IP initiating point. However, there are exceptions to this. You'll have to look at the information logically to deduce the originating IP.....

Brutus Password Cracker [Download]


Hi Friends,
Brutus is one of the fastest, most flexible remote password crackers you can get your hands on – it’s also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 370,000 downloads. Development continues so new releases will be available in the near future.

Brutus was written originally to check routers etc. for default and common passwords.

Features



Brutus version AET2 is the current release and includes the following authentication types :
  • HTTP (Basic Authentication)
  • HTTP (HTML Form/CGI)
  • POP3
  • FTP
  • SMB
  • Telnet
Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples.

The current release includes the following functionality :
  • Multi-stage authentication engine
  • 60 simultaneous target connections
  • No username, single username and multiple username modes
  • Password list, combo (user/password) list and configurable brute force modes
  • Highly customisable authentication sequences
  • Load and resume position
  • Import and Export custom authentication types as BAD files seamlessly
  • SOCKS proxy support for all authentication types
  • User and password list generation and manipulation functionality
  • HTML Form interpretation for HTML Form/CGI authentication types
  • Error handling and recovery capability inc. resume after crash/failure.
You can download it here:


Brutus AET2

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More