Tuesday, 12 July 2011

Hide Folders With A Simple CMD Command



Here is an easy trick to hide your private files or folders. But remember one thing, once you hide your file then you can not find it through simply browsing around, through the command prompt, or even if you click "Show hidden files & folders".
How To Hide A File...

1) Open DOS Prompt (Start-> Run -> cmd).

Monday, 4 July 2011

Steganography : Hide Your Confidential Data/ Files Into Image File Or Other File

Steganography is an art to hide secrete information with  any file. So many tools are available there to bind hidden texts with any file. By using which we can hide our secrete messages with any file.

    Let us consider the working of one of the best steganography tool

Saturday, 2 July 2011

Google's Image Search Engine : Search With Your Image Simultaneously On Web

   Seems to be strange but it is true that we can also search the contents with the help of an image file.
    Google provides us the facility to search by image also. We can drag & drop an image file to its search box & get relative results.

How To Search By An Image File :


We can search any content with an image file within two steps:



Friday, 20 May 2011

How To Hack Facebook Account Using Phishing Technique

          Phishing is just similar to the word fishing. As the fishermen uses net to catch fishes, similarly phishing is the process to catch the useful / private information of the victim.


         This is generally used to gather the  private information like- Username, password, contact no. etc.  Phishing page looks exactly like the original page of any website. 


How To Create Phishing Page ??

Thursday, 21 April 2011

Hack Anyone's Computer Using Trojan Server

Trojan is a program, which contains malicious codes. Which may cause loses or theft of data. To activate these programs you have to invite these programs onto your computer e.g., by downloading any mail attachment or by clicking the server send by any person.

        These servers can be made by binding with any other file type. Like - One can create a server by binding it with any picture, document, or any other kind of file.

        Once we create a server then we can send this to any person. If this server is clicked by any person, then the Trojan will start its working.

* Now, we only need to know the IP Address of that person. Then by entering this IP to the Trojan we have to click on connect option.

* If the person had clicked our server then we will get connected to the

Friday, 15 April 2011

How to Create Funny Virus using Notepad..


          A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also used to refer to other types of malware and programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer.

        Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
       
        Do you know that we can make simple viruses by using Notepad? Notepad is a simple but very powerful tool to make viruses. Let us have fun with some Viruses (developed on notepad).


Thursday, 14 April 2011

How to Know Password of Someone's Facebook or any Email Account Using a Keylogger

        Keylogger is a software, which stores the keys pressed through the keyboard i.e., it maintains the record of keys pressed by the user.

            This is very useful software, which can be used for various purposes. Like -

* To record the username & password of any person.
* To know about the activities performed by any person, through keyboard.
* Parents can also use this software to watch the activities performed by their children.

            To use this software we simply have to install it to the system. When it will be installed & start working then we can watch its records just by viewing logs.

Let see how keylogger works. Here I am explaining my favorite keylogger i.e., Family Keylogger.

Wednesday, 13 April 2011

How To Find the Sender's Original IP Address Using Email Message Headers

We can trace someone by received mail too.

        Firstly a question arises that - Why we need to trace the received mail?
As we all know about Email spoofing i.e., one can send Email to a person by Email Id of another person, without knowing his /her password.

         So, to identify about our received mail, that it is really sent by him/ her or it’s a part of Email spoofing; we can trace the location of the Email sender.




Finding the Email Header in Popular Clients...


Finding the email header is relatively simple in popular clients. In this article,

Wednesday, 6 April 2011

How to access blocked websites.......?




Generaly in colleges, schools, universities, offices & in various internet cafes some of the websites were blocked.
            But if we wanna still access these sites, then there are some tricks ..........
* Generaly, a tag 'http://' is attached with all sites. Then first try to access the site just by binding with 'https://' .Then the site will start working.

            If it doesn't open, then
* you can use internet based proxy servers.
            www.annonymizer.com
            www.bypassthat.com
or can search for internet based proxy servers, & can access the block sites from there.

Open one of the  proxy servers & enter the URL of blocked website into the input box  & click on Go. Within  few seconds the blocked website will be accessible for you..
i.e., we can access the blocked website through another website.

                        Let the above tricks get failed to work, then we have an another trick.
* We can convert the domain name into binary.
            For this you have to use ping command.

1) For using ping command, follow the path as directed--

            Run -> cmd-> ok
Syntax- ping <website URL> (enter)
For ex-
            ping  www.hotmail.com

this will through the IP Address of that website.

2) Let its IP is 167.68.4.7
Then start Windows calculator.

3) Push decimal & enter the 1st part of the IP (i.e., let 167).

4) Now push binary . This will provide its (here 167) binary form.

5) Copy & paste it to address bar of the browser.

6) Similarly convert all the octane into binary & paste them into the browser.

7) Now click on Go.

            If the http & proxy servers are blocked, then still this trick will open the blocked sites.
**************
The blocked instant messengers can be accessed with the help of -

             www.meebo.com
             www.ebuddy.com
These  provides various Instant Messengers. Like- Yahoo, RediffBol, Gtalk etc.


                                                                                                                                        Neha Chourasia

                                                                                                                                            Balaghat, Hacker

Saturday, 2 April 2011

How To Trace Someone By Using Rediff, Yahoo,Gmail....etc Accounts ?



Yea..., It is true that true that we can trace someone's location just by sending a unique link to him/her. This facility is providing by a well known site "www.shivampatel.net".


1) We have to select the location tracer option .


2) Then a form will display; where we have to enter our email-ID in required place.


3) There will be an optional place, where we can enter the link of the page which we want to display to the user.


4) Then click to the 'register me' option. Now  check your email ID .You'll  get a new mail by www.shivampatel.net(Location tracer).


5) This mail provides you a unique link with the help of this link  you can trace anyones location. 


6) When this link is visited by a person then ‘www.shivampatel.net’ sends you a mail, which specifies about its location, IP address, type of internet connection used, browsers & OS information ,latitude, longitude...etc.


You can send this unique link to the person to whom you like to trace. 


Give your valuable comments if you like this post.