29)Computer And The Methods To Solve The Errors


If you are using the computer very much then you will easily learn how to do and play with all the things and features available in computer. When you are learning about computer then you surely will get faced with lots of pop up windows showing some information the this was the error and do you want to do this or do that and all.
Whenever you get to face any errors using a computer you don’t need to panic. You need to relax get calm and read the message shown in window. Once you read the message you can only fix the error caused. Everything will be mentioned in the pop up window.
Try to act accordingly whenever you face an error. Some people think computer will get burst if I click any button. There is no threat from doing any operations. If you don’t get it please contact the owner of the computer or the person who has knowledge about the computer in your house. Don’t hit press button as a beginner. Do not hit yes if you are not sure about what it does.
If you are doing any operation and some message pops up saying there is some problem. Just hit cancel button, if not hit the “X” button present at the right hand corner of the window or you can hit escape button in your keyboard as well. All performs the same operation.
If you are not working with any software related to your family persons then you can try using the option in the list or menu. By trying, nothing will happen to your computer. In fact you can learn what happened for that selection. One basic thing what you have to do is not to try anything inside C drive (C :\\)

28)How to Protect an Email Account from being hacked.

Today in this post I’ll teach you how to protect your email account from being hacked.Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”.Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”.The single answer to these two questions is “Absolutely NOT!”.It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
If this is the case, then what is the reason for many people to loose their accounts?
The answer is very simple.They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping.They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them loose their passwords.I’ll also mention how to protect your email account from these scams.


1. WEBSITE SPOOFING

Website spoofing is the act of creating a website, with the intention of misleading the readers.The website will be created by a different person or organisation (Other than the original)especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website.So most of the people believe that it is the original site and loose their passwords.The main intention of spoofed websites is to fool users and take away their passwords.For this,the spoofed sites offer fake login pages.These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc.Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.

Solution:

Never try to login/access your email account from the sites other than the original site.
Always type the URL of the site in the address bar to get into the site.Never click on the hyperlink to enter the site.

2. BY USING KEYLOGGERS

The other commonly used method to steal password is by using a Keylogger.Keylogger is nothing but a spyware.The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account.If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program.If you just access your email account from a computer installed with keylogger, you definitely loose your password. This is because the keylogger records each and every keystroke that you type.

Solution:

Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly.This keeps your PC secure from a keylogger.Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers.You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.


3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES

Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes.For the owner of the cyber cafe it’s just a cakewalk to steal your password.For this he just need’s to install a keylogger on his computers.So when you login to your email account from this PC, you give away your password to the cafe owner.Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet.I know,all the cyber cafe owners will not be so wicked but it is recommended not to use cafes for accessing confidential information.If it comes to the matter of security never trust anyone,not even your friend.I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked.

27)How to hack a Youtube account?

Today we will focus on the easiest way i.e Fake login page
A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmailyoutube,friendster etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.


First of all download,youtube fake login page.
http://www.ziddu.com/download/8117844/Youtubefakeloginpagebyhackingaday.rar.html

[Image: image_thumb2.png]

PROCEDURE:

1.once you have downloded youtube fake login page,now extract contents in a folder
2.In that ,find (CTRL+F) ‘http://hackingaday.com’ then change it to your destined URL but don’t forget ‘\’.
Save it .
3.Open Fake page in wordpad
4.Now press ctrl+F and search for the term “action=” now change its value to pass.php i.e. action=pass.php
5.Create an id in http://www.110mb.com , because i know about that site quite well.

6.Then upload the contents into a directory

7.For that,after creating an id you should go to file manager and upload all these files.

8.Then just got to youtube.htm and try out whether its working .
After you type in the file , a password file named pass.txt will be created in the same directory.Then you can see what username and password you have entered.

26)Web Phishers [PayPal, Steam, eBay, AlertPay etc.

The CSS, Javascript and images are included in the RAR Archives so they shouldn't die when the websites updates. I say shouldn't, I'm not 100% sure, Opera saved them.

The default text file is called "b9d42sd45f2sf5w2s1.t xt".
For n00b:
UnRAR and upload one of these to a webhost, when a person tries to log in, the login details will be saved in the text file. If the text file is not there, it will be created upon recording a new set of details. If you wish to change the text file's name (recommended), then find "b9d42sd45f2sf5w2s1.t xt" in post.php and change it to your desired name.

So, here are the download links:
Bebo
Code:
http://www.megaupload.com/?d=R0Y4FY4X
eBay
Code:
http://www.megaupload.com/?d=MB201HY2
Facebook
Code:
http://www.megaupload.com/?d=DN8AT1N3
Gmail
Code:
http://www.megaupload.com/?d=DHFKNXJM
MySpace
Code:
http://www.megaupload.com/?d=4MOFLJMI
PayPal - Grabs IP as well as user/pass.
Code:
http://www.megaupload.com/?d=SIWJXMKR
http://www.mediafire.com/download.php?deo9f7i279qz0ow
Twitter
Code:
http://www.megaupload.com/?d=EMUAGSOQ
YouTube
Code:
http://www.megaupload.com/?d=VU41KWRY
Habbo
Code:
http://www.megaupload.com/?d=5M2HCAZ5
Steam
Code:
http://www.megaupload.com/?d=LEPIKQMJ
RuneScape
Code:
http://www.megaupload.com/?d=3LCUXOK9
World of Warcraft
Code:
http://www.megaupload.com/?d=V1BZVXG7
MegaUpload
Code:
http://www.megaupload.com/?d=63S6HS6C
ShareCash (Uploader Accounts)
Code:
http://www.megaupload.com/?d=6H3SCHZC
Minecraft
Code:
http://www.megaupload.com/?d=C4NEGHT3
AlertPay
Code:
http://www.megaupload.com/?d=SJRKJNLO
SwagBucks
Code:
http://www.megaupload.com/?d=SB51F19E
Super Phisher
Code:
http://www.ziddu.com/download/6966159/SUPERPHISHER.rar.html%20
PASSWORD:-hackingguide

25)Social Engineering

   


Introduction :

"Social engineering" is an act of psychological manipulation, it was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage caught on among computer professionals and it is now a recognized term of art.



How to social engineer a person ?

First to social engineer a person, you need to have as many information as you can about him, the most important ones are:

1- What makes him mad?

2- What makes him sad?

3- What does he really like?

4- What is his job?

5- What makes him always exited?



And sometimes, age helps. (You'll see that in the examples later on)

You need to have a special goal when you social engineer a person, I'm gonna first talk and give examples about social engineering and computer hacking, like to get information about everything related to accounts and things into the computer. Then, I'll talk and give examples about real life social engineering and mind manipulating.



Social engineering and Hacking a person:

Example 1 :

slave : Male, 13 years old, he really likes playing online games and especially poker, winning in poker makes him always exited.

Goal : Get his poker chips.

Plan : Add him on IM or chat with him somewhere, say that you sell online poker chips i.e on Facebook ( Now, because you said that you are a seller, he will talk to you seriously). He will probably ask for the price, let's say a very low price for a big quantity, but add to your reply that you need at least 24h before you get the poker chips. Ask him if he can wait because you will double them (" you will double them" --> makes him exited) so now he will probably ask you :how much will you double them?" You say there is a secret cheat site, it's undetectable, and that you can double your chips in 24h ( You must create a site with this form asking for Facebook mail and password, with some additional details like "What was your last server on poker, on Facebook?" etc.. and you should work on the design..) so he will probably ask for it, you should not give it directly..just wait till he asks for it twice and give it to him asking/begging him to not spread it and share it wtih others. And here you go, wait a second and check the results of your forms. Then, you'd have his account.



Example 2 :

slave : Male, 28 years old, Business man.

Note that you should always think about if the info you have can give you more tips and abilities to do in your plan. Like here, you will see that the plan will work simply because a business man is always busy and wont think an hour or two of your plan, since he has work, so you may need to know that this will help.

Goal : Accessing his Paypal.

Plan : Getting his mobile number, calling him from a public phone with a strange voice, ( first you must call paypal to see what words they may say and you may use them..its better to be more real ) So, you will say here : Hi it's paypal customer services department we got your mobile number regarding the account " his paypal email " and we're sorry to bother you but we had a database problem with our servers so we're trying to reset everything and get all the information back. You can get your paypal online as before, we're sorry for any inconvenience this may cause, can you please provide us with your old password ? We will email you a reset link so you can change it later on for more security.

This should work, also remember to call him in a time where he cant be online so he wont go and check if he's paypal is online and working fine etc..





Example 3 :

slave : Girl.

Goal : Her Facebook.

Plan : add her on IM ( or if you already have her ) Create a fake Facebook login page, talk with her a bit and tell her that she has a really ugly picture on Facebook and link her to it ( your link .. the fake log-in one ) and she will definitely go there because this always works on girls.



Example 4 :

slave: Anyone.

Goal : His e-mail.

Plan : Talk with him for a while .. check for his mail security question and ask him that question. When you see that he's taking and giving with you in his conversation, try to answer his secret question before he does. He will go for it, like if the question is " What is your first pet? " you can say in your conversation with him that your first pet died it was a fish and than ask him about his first pet etc..



I'm done with the " personal " part now we still in the hacking part but we will talk about social engineering a group of people together.



Social engineering and Hacking a group :

I'm not going to give a lot of examples, i'll just write a few lines about it. Like.. A group of Texas-Hold Em' players will get exited on chips, so just make a public phisher and spread it with social networks or whatever, for football fans you may talk about a player's secret that is well-known and link them to your phisher etc, for noobs trying to hack you can use your fake programs.

You need to know that when you're social engineering groups, its like one person but there is no sorry for a mistake because if one of this group knows that you're trying to hack/engineer them you will be done. So, you need to create a story in which they will all believe, or whatever you need in imagination here on each subject and everything depends on your goal.



Social engineering and manipulating minds :

Okay let's be honest, this is really really hard to explain but Ill try my best to give you the best examples and tips =).

Okay in "manipulating", you need someone to do what you want him to do. So lets say you want your friend (a girl) to leave her boyfriend, you need to put that screen in her mind that will push her to leave him directly without any thinking about before or even memories, you need a lie or a pretext that will end the story. For example, telling her that he asked you if your sister was single and asked your for her phone number and e-mail.. etc and it seems he wants to leave her etc.. but remember you should be acting before saying anything like you're sad and you're hiding something. If she is your friend, she will probably ask "Why?" and you'll say "No, I do not want to hurt you.." etc.. When she just asks twice, tell her in a sad voice the example before, you just manipulated your friend.



Other example about manipulating, I'll give an example on how to let someone buy your products, okay so you need to know what he wants to buy, you need to make your product the most perfect thing on Earth. Also remember that repeating things in many ways of talking really helps like "The car is accident resistant" and "Remember that you're safe with this car " .

Another and the last example about manipulating, is how make yourself the slave when you're the one who did the mistake. You need pretexts. Those pretexts should be real and not taken from movies, like if you didn't want to reply to your girlfriend all the day and you simply did not! You will call her at night after your day is done saying that you fell on the floor and you were really hurt so you just went and slept since you couldn't even walk and you're sorry because your phone was silent and not beside you when you were sleeping, you will see her from the angry face becoming the one who cares about you saying: "Oh I'm sorry baby hope everything is okay now and you're feeling better" etc..



How to convince someone :

Okay so lets say you need to convince someone about a bank that is really not good and secure but you will get the % of money if you can get referrals. So you need to see the positive parts even if they're small and makes him look large and minimize the negative parts not giving them importance in your talks, and maybe sometimes adding things to the positive part that are normal in any bank but simply enumerating good things will convince them. (No need to give examples you just need to get the idea of convincing)





How to get information about someone :

You may try the internet like reversing his name, email or phone number to get some information or sometimes his Internet protocol address, or you may search in social networks and search engines for information about him.

Or simply get them via your new SE skills like via IM talking to him asking him in an indirect way about his birthday or his preferred things, hobbies etc. just note that you need to share with him good things before and make him like you in a way even if you still a stranger ( that's true only on internet, in face to face you need to make something wrong to connect to the person like acting that you did not see him and push him than say sorry etc and try to develop contact with him ) .

24)Bluetooth hacking tools

There are some tools essential for bluetooth hacking purpose:

1. BlueScanner: In this the tool hacker searches for bluetooth enable device. After that it will try to extract as much information as possible for each newly discovered device .

2. BlueSniff: Blue Sniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices.

3. BlueBugger: The buggers exploit the vulnerability of the device. The bluebugger is set for the bluetooth security holes found in some bluetooth- enabled device. They can access the images, phone-book , messages and other personal information.

Bluetooth hacking tools

4. Bluesnarfer: Bluesnarfing is a serious problem which is discovered in several Bluetooth-enabled mobile phones. If a Bluetooth of an device is switch on, then it is possible to connect to the phone without alerting the owner, and gain to access to restricted portions of the stored data .

5. BlueDiving: Bluediving is a Bluetooth penetration testing. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack. While also has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, L2CAP ,packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode .

6. Transient Bluetooth Environment Auditor : T-BEAR is a security-auditing platform for the Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and also various cracking tools.

Their also some more hacking tools such as the BTBrowser, BTCrawler,
Can I hack With Bluetooth (CIHWB), BTcrack, BlueTest, BTAudit.

22)Password Hacking











Password cracking 
is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:



* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

21)What to do if locked out of Gmail ?







What to do if you're locked out of Gmail ?
It's a question too many users ask, after they are already locked out and are attempting to recover their account. Given the incredible amount of personal and financial information we keep in our inboxes, gaining access to a compromised Gmail account is incredibly important. Here's how to recover your Gmail account, and what you can do now, to make a future recovery easier.

If you are already locked out of your Gmail account, like one of our writers recently was, the first thing to do is visit the Gmail help page that tells youwhat to do if you cannot access Gmail. From here, choose, "My account has been compromised" and you will be directed to the Gmail account recovery form.
The recovery form asks for very detailed information about your Gmail and Google usage in order to verify that you are actually the owner of an e-mail account. If you're already locked out, be prepared to start thinking long and hard about what Google services you use and when you started using them.



For example, when did you start using: Google Docs, Google Checkout, YouTube, Blogger and several other Google tools? You'll also need to know the account creation date, last successful login and the last password you remember.

If this sounds like a lot of info, it is. But it is in place to protect your account from being stolen using the Google account recovery tool. Luckily in this case our writer was able to get his access back, after a morning of being disconnected from his e-mail, contact lists, order numbers, financial data and more. He has taken the first step toward account safety, adding a phone number and an alternate e-mail to his account.

If you're as alarmed about losing access to Gmail as you should be, you'll want to follow these steps to make sure you can recover your account if it is compromised in the future.

First off, remember all that information we just said you would need access to? Find it and write it down someplace safe. Don't store it in your Gmail account.

Finding some of the information is a bit tricky, but thankfully Digital Inspiration has listed a few ways to help you find the details by using the searchoperators in Gmail. It is much easier to figure out the five people you e-mail the most, your custom tags, who invited you to Gmail and when you started various Google services when you still have the ability to search Gmail.

In all, the process might take 15-20 minutes, but the effort will be well worth it if your account is ever compromised. While you're thinking about security, make sure you have a strong password that you don't use on other websites as your Gmail password.

20)INTERNET DWONLOAD MANAGER v5.18










Internet  Download Manager
 is a tool to increase download speeds by up to 500 percent, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. 
Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. 

Here are some key features of "Internet Download Manager :

· All popular browsers and applications are supported! Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications.
· Download with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP and HTTPS protocols.
· Download Speed. Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology.
· Download Resume. Internet Download Manager will resume unfinished download from the place where they left off.
· Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager
· Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
· Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.
· Built-in Scheduler. Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.
· IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
· IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
· Download All feature. IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature. 

DOWNLOAD SIZE : 3.08 MB

TORRENT : 6.1  MB
INFO :- [ SEEDERS=427 ] [ LEECHERS =8 ]

PASSWORD  :  maknrare