Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit website that looks like a real (and trusted) site. It is a hacker technique of "fishing" for passwords and other secret financial info.
So now i am starting to show you how to hack someone by phishing...
1). Go to Facebook.com
Right click on the white space of the front page. Select "View Page source".
Copy the code to Notepad.
2). Now find (Press ctrl +f) for "action=" in that code.
You have to change two things in that code..first of all you have to change method from POST to Get and secondly you have to change ACTION...
Spamming
Spam can be defined as Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. Real spam is generally e-mail advertising for some product sent to a mailing list.In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.
Now how a spammer can able to get Your email id. This can be done by following ways...
1)Social networking sites.
Many people on social networking sites leave thier privacy settings to very
low.Its very easy to get E-mail id or other contact information on this
kind of sites....
Footprinting
Footprinting is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting is to learn a much you can about a system, its remote access capabilities, its ports and services,and the aspects of its security.
In order to perform a successful hack on a system,it is best to know as much as you can.
There are Mainly Two Types of Footprinting
1) DNS Footprinting
In this a hacker tries to gather information on Domain name registration on various things like,Registration details,Server Type,Ip address, Location, Contact numbers e.t.c.
There are various tools that can be used in DNS Footprinting like whois and samspade are popular tools in this category But i will recommend whois.
Let see how we can Footprint a Website by its domain.
STEP 1: GO TO http://www.domaintools.com/
STEP 2: Type website URL which you want to footprint. (i.e www.google.com , google.com or ip address of website) and...
Email Spoofing
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations.
Senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Above all is just a Small explanation on what is E-mail spoofing. these are the websites which are used to send fake emails
www.hoaxmail.co.uk
anonymailer.net
emkei.cz
above all emkei.cz is my favourite because it provide some advance option like email-header, reply to,cc etc.
You can also send from your cmd, but for that purpose you need S.M.T.P server name of your I.S.P. so use above services only for...
How To Run Android Apps On Windows

Now you can run all of the famous Android Apps on your Windows PC. This is the easiest Tutorial to all those who wants to test the apps without wasting their time.
To run Android applications on windows xp,vista or windows 7,all you need is a small android emulator which you have to install on your pc.
There are lots of android emulator exists in market but we are using one of the well known "Blue stack BETA". the earlier version is "Blue Stack Alpha" which is only compatible with Windows 7 PC’s and Windows 8. Best part of new beta edition is basically converting the ARM compatible Android apps to run on x86 platform and that too with a great efficiency....
Increase Internet Speed Of your Netsetter

Idea,Airtel,Reliance,Tata Photon,Huawei And MTS Mblaze Netsetters are the most famous high-speed wireless internet service provider. All of them promise a High speed internet connection but we all know the real truth
Here today i will tried to bring out some of the tricks by which you can able to increase your net setter speed
So lets start.
1). Updating DNS Address:
Go to your Net setter connection Setting And Update your DNS address as following.
Some of the DNS servers you can use are
Google DNS : 8.8.8.8
Alternate Google DNS: 8.8.4.4.
2). Optimize TCP/IP Settings:
The TCP Optimizer is a free, easy Windows program that provides...
Trick To Create A Empty Huge File

"Is it possible that a empty file can be huge as 1 million bytes.."?Yes, off course its possible.You can create a file of any desired size by using the utilities provided by Windows. So here's the step by step guide to create a Empty Huge File.
First we have to convert the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this. To use Windows calculator in scientific mode: Open calculator,click on view and select Scientific instead of Simple.
Suppose you want a file of 1 million bytes. Enter 1000000 in the calculator and click on...
How To Close Open Ports
Ports are the Application specific End points which provide connections in a operating system. When you are connected to internet each network process use a different port. For yahoo messenger uses a different port,your browser uses a different port to establish a connection with network.
To keep our self save from various kind of attacks we need to close our open ports.
To close open Ports..Here's The Procedure..
Go To Start And Then Run.
Type "netsh firewall delete portopening TCP PORTNUMBER" without Quotes and PORTNUMBER is the Number of your port which you want to close. If you want to close PORTNUMBER 8080 Then the command to close PORT 8080 is. netsh firewall delete portopening TCP 8080.
Now Press enter and Your are done..
If you are interested in coding then you can try using .vbs and .bat files too.
Vbs Script to close open ports..Just copy and paste below coding to notepad file and save as PortCloser.vbs
...
How To Recover Deleted Data From Computer,Pds Or Memory Cards

Sometimes we face a difficult situation when we accidentally deleted our data from computer,memory cards or pen drives and want to get it back. Many times we are lucky to get back our deleted data from recycle bin but what if the deleted data also not found in recycle bin. There are lots of freeware and as well as shareware software available in market that claims to recover deleted data from PC, pen drive or even memory cards..Some of them works great and remaining are just scraps.So First of all how data recovery software works..?When we delete a file on our...
Compile And Run Java Programs On Android Phone

AIDE is an Free integrated development environment for developing real Android Apps directly on Android devices.Means You Can Easily Compile And Run Java Programs On Android Phone.AIDE is More Than A Text Editor offering advanced features like code completion, real-time error checking, re-factoring and smart code navigation, and Also It runs your App with a single click.AIDE supports almost all features of Eclipse,So when You start Writing Code In AIDE text Editor You will Surly feel a Real Compiler Environment.
Some Features Of AIDE that Makes It Different...
Create And Run Applications In Single Click
No root...
Pen drive is not showing In my Computer...Try This

Sometimes When We Insert Our Pendrive In One Of The Port Of Our CPU...Then Pendrive Is Detected By Computer Very Easily But Not Shown In My Computer Window.
This Occurs Mostly With New Pendrives Connected With Computers For First Time..If You Are Facing Pendrive Not Detecting Problem Then Its Not Your Pendrive Fault..Its Your Windows Fault.
That Kind Of Problem Comes When Window Is Failed To Allocate A Drive Letter To Inserted Pendrive.
This Problem Is Very Easy To Fix. Lets Start
1). Click On Start.
2). Click On Run,Then Type compmgmt.msc And Then Click Ok..A Computer Management Window Will Open.
3). Click On Disk Management.Then A Disk Management Window Will Appear At Right
...
How To Compile And Run C/C++ Programs On Android

Before The Official Launch of Android Phones In India,Somebody Said me that "Android Phones Are The Future of Mobile Phone Computing..They Will Take Mobile Computing To New Heights...". Google play(Android market) also plays a important role to provide them the capability to act like Super Computer. :)If you are using android smart phone then you Probably know that what Crucial tasks a simple android phone can perform And Everything is just because of Google Play. :)Now a days Developer are busy in developing system applications for android to provide it functionality like a Computer. One Of the Handy Android System Application Is C4droid.First Of All What Is C4droid..?C4droid is a C/C++ compiler for Android.C4droid already has almost full C language support.
...
How To Recover Deleted Sms From Nokia Java Based Phones

So Here's The Trick..
1). First Download And Install A Nokia Pc Suite For Your Mobile Phone.
You Can Download It From Here.
http://www.nokia.com/in-en/support/downloads/
2). Connect Your Mobile Phone With Pc Suite.
3). Now Create A backup For Your Mobile Contents On Your Hard disk.
4). It Will Create A Huge Number Of .dat Files On Specified Directory.
5). Download And Install Software Named "Cygwin" From Here.
http://www.cygwin.com/
Cygwin Is A software Which Gives A linux Environment On Windows.
6). Open Cygwin And Open Your Backup Directory by Using Cd Command.
Syntax...
Trick To Reset Memory Card Password

If anyone Set A password In Memory Card Then It Is Not Easily Recoverable.. Even It doesn't Remove After Formatting.
off-course many of Online tools and software claims that they can able to Reset Memory Card Password..But They Are Only a Waste Of time And Money..
But Friends There Is a Possible Way By Which You Can Able To Reset Memory Card Password.. I tried This Method And Works Fine For Me.
So Lets Start..
1). If You Are Using A Java Based Or Any Other Phone Then First Of all You Have To Insert Your Memory Card In To A Symbian Phone to Reset Memory Card Password..if...
Use Cell Phone As Remote Control For Tv

Samsung Has Launched a Small FREE Android Application On Google Play by Which Anyone Can Able To use his Android Mobile Phone As A Remote Control For Tv. :)Application Have A cool user Interference Which Works Well On A Gentle Touch.You Can Able To Download Application From Google Play by Typing "Samsung Remote" In Search Bar.After Downloading..Install That Application On Your Android Phone To Use Cell Phone As Remote Control For Tv.After Installation, The all You have To Do is To Connect Your Tv and Your Cell Phone On Same Access Point.If Your Tv Still Didn't appear On Your Smartphone Then Click On "Refresh".It Will Soon Discover All The Tv Sets Which Are Connected To Same Access Point.As You Can Able To See In Image Below..
...
Post Your Message To All Facebook Groups In a Single Click

This is a trick By Which You can Able To Post Your message In All Or Selected Facebook Groups Of Your List In a Single Click.This Is a Small But Powerful Trick You Can Use This To promote Your Blog To All Facebook Groups.But Please Don't Misuse this Trick To Spam A lot.So Lets Start The Trick..1). Go To http://www.hexcolor.in/tools/multipost/2). Login To Your Facebook Account By using Fconnect Button.After That You will See Something Like This3). Put Your Message In "Your Message Field."...You Can Also Able To Put Link To Any Site Which You Want To Post With Your Message By Pasting Its URL in "Post Link (URL)" Field.If You Want To add Any Image With Your Message And Link Then You Can Do this By Pasting The URL of Image "Post Image Link (URL)" Or Alternatively You Can Upload A Picture From...
Install Windows On Pendrive
So in this post i will show You how to install windows On 4 GB Pendrive :)
You can also Use 8 GB Pendrive respectively..
The process is Very Much Simple and straight forward And the best thing is about that is You need Only A single Software To do that.
When This Will be done..You will Get a Portable Windows Xp Installed On Pendrive Or Thumbdrive,After that You can Also Able To install software On Your Pendrive :)
So Lets Begin..
1). To Install Windows XP On Pendrive First of all You Need To Download A Software Named "WinSetupFromUSB".
Download Link For Software Is winsetupfromusb.en.softonic.com/download
2). After Downloading Install The Software On Your Computer's Hard Disk.
3). Insert Your Pendrive Or Thumb drive.And Run The Software As You Can See In The Image Below.
4). If...
How To Prepare For CEH
Many Of Us Wants A career In Computer Security And Forensics. The Best To Get In This Field Is By Cracking Certified Ethical Hacker Exam Which Is Held By EC-COUNCIL.
What Is CEH?
CEH is A Certified Ethical Hacking Examination.When You Pass This Exam You Will Get A Certificate From EC-Council Which Says That You Are A Certified Ethical Hacker And Can Able To Penetrate Network And Found Vulnerabilities Present In that With The Permission Of Desired Firm.
Which Is The Most Recent Version Of CEH?
The Most Recent Version Of CEH is Ver 8.
What Is The Minimum Criteria To Appear In This Exam?
The Minimum Criteria To...
How To Spy And Trace Mobile Phone
In this post i will show you a Secrete Mobile Phone trick by which you can Spy and trace your friend,spouse or anyone's mobile phone 24 X 7 which is absolutely free..The only thing you have to do is send a sms like SENDCALLLOG To get the call history of your friend's phone.
lets Start The trick...
1). First of all go to android market from your friend,spouse,friends or anyone's phone which you want to spy.
2). Search for a android application named "Touch My life"
3). Download and install that application on that phone. Trick is Over
4). Now you can able to spy...
Use Facebook Without Internet Connection
I know title Of Post Sounds somewhat funny but friends you can use facebook with no internet connection And Even On Phones Which don't Have Internet Support.
And the best thing is that its Completely free. Facebook India has partnered with Fonetwish to bring Facebook on every mobile phone without requiring any apps or even the Internet.Now you can able to use facebook on cell...
Nokia Bluetooth trick To Keep Bluetooth ON For Forever

Using this trick you will be able to make Frustrate Your Friends by Keeping Their Blue tooth ON For Forever.We Know That When Blue tooth Remains Enable Phone Consumes Battery At A rapid Rate.So What Will Happen If You Switch On Blue tooth Of Your Friend's Phone and they will Unable To switch it Off.This Is Really A Nice Blue tooth Trick And Doesn't Need Any Software To Do That... :) Lets Take A look How We can Able To Do That.1). Just Switch On The Blue tooth Of Your Friends Phone.2). Press *#9990# .3). Done!! Anyone Can't able to Switch Off Blue tooth Now.Now If you Want To Switch off Blue tooth.Then Just Switch Off Your Phone For 5 Minutes. And then Try To switch Off...
Trick To Fresh Install Of Windows Xp in 10 Minutes

Formatting And Fresh Installation of Windows Xp is a lengthy and boring Process But we all Have To do that sometimes In a Month And Sometimes in A week.Its Approx 40-60 minutes long process.But Friends Today I will Show You how To format Or Fresh Install Xp in Just 10 minutes.So Lets Take A look.
To perform a clean installation of Windows XP, follow these steps:
Start your computer from the Windows XP CD. To do this, insert the Windows XP CD into your CD drive or DVD drive, and then restart your computer.
Note To boot from your Windows XP CD, the BIOS settings on your computer must be configured to do this.
When you see the "Press any key to boot from CD" message, press any key to start the computer from the Windows XP CD.
At the Welcome to Setup screen, press ENTER to...
Protect Your Facebook Account

First of all i will tell you how to make your facebook account more secure by changing some settings:-
Log in to your facebook account then go to account settings then after go to security tab. 1). Secure Browsing: Enable it.When You use secure browsing your Default Connection sets To Https Instead of Http.Http Stands For Hyper Text Transfer Protocol. When We use Http Our Browser And Server Create Communication In Normal Language. But On the Other Hand Https stands For Hyper Text Transfer Protocol Secure, When We Use Https Browser and Server Talks In encrypted Language. So Chances Of Man In The Middle Attack Gets Reduced. In 'MITM' a Third Person or Broadly Says Hacker Can Listen The Communication Between Browser And Server.
2). LOGIN NOTIFICATIONS: Enable Login Notifications.Note: Enable...
Send Fake SMS To Your Friend
In this world cell phone is very important device and this post is completly based on cell phone fake sms.What will you do if you want to play a prank with someone with sms. The most common way is you will buy a new sim card recharge a sms voucher in it then messaging with it but this is little bit costly.There are lots of ways to send fake sms by internet without displaying your actual contact number. This is known as sms spoofing or anonymous sms but in actual sms spoofing and anonymous sms have some difference,in sms spoofing you are free to set which number you want to display when you send a sms and in anonymous sms you send sms anonymously.In this i will teach You about Anonymous sms.SMSTI is a site which sends sms anonymously.it delivers sms instantly but sometimes not.it supports 160 character sms.The best thing about this site is no login or registration required just go to ...
How To Block And Unblock Websites
Using this method you can prevent others from opening various sites which can harm your computer. This is very basic information, for advanced blocking techniques you have to wait and keep following this blog
Blocking a website
1). Click Start Button and click “Run”
2).Type the following code in the “run” and press “ok”
notepad %windir%\system32\drivers\etc\hosts
3). A Pop Window is Opened.
4). You have to add ”127.0.0.1facebook.com” (without quotes) .Add this in the Notepad
5). Press CTRL+S to save the file and restart the browser
6). Finally you blocked the facebook website
Unblock An Website
Do the reverse of ab...
Hiding Folders and Files in Android
So first of all1: Install a file manager in your android phone,to do this go to Android market and search for file manager and install anyone.2: Open the file manager and goto into the folder which you want to hide. (If you want tohide certain specific files, the put them in a folder).3: Rename the folder starting with “.” Example: If you want to hide the “videos” folder, then rename the folder to “.videos”.4: You are done, Android gallery and video player won’t recognize that folder anymore. If you want to unhide it, then rename the folder and remove the “.” (do...
Useful Commands of Network
These are some important commands that we will used later when we perform a attack on network:-
1). Ping
Ping is a command used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not. Ping is also helpful to get ip address of domain name. You can able to see ip address of domain name in [x.x.x.x] .To ping a particular host the syntax is (at command prompt)--c:/>ping hostname.comexample:- c:/>ping google.comVarious switches used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.2). Netstat
Netstat is a dos command used to check the current network connection of our system to other Systems.it displays both incoming and...
What is a Computer Virus?
A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.By definition, a virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of itself. In most cases, if a file that contains virus is executed or copied onto another computer, then that computer will also be "infected" by the same virus.A virus program contains instructions to initiate some sort of "event" that affects the infected computer. Each virus has an unique event associated with it. These events and their effects can range from harmless to devastating. For examples:
An annoying message appearing on the computer screen.
Reduced memory or disk space.
Modification of data.
Files overwritten or damaged.
Hard drive erased.
Types of viruses :-The different types of viruses are as follows-1) Boot Sector Virus :-
The number one position on a hard drive is the...
Hacking With Keyloggers
Maximum of us have a knowledge about key loggers.for those who don't know "Keyloggers are nothing but spy software used to spy on someone and know what they are doing". Hacking with keyloggers is very much simple even a 10 years old child can do this.
The word keyloggers was named because these software record keystrokes, anyway these programs extended there features like recording audio,video,taking screen shots and many others.
There are mainly two types of keyloggers.
1). Software Keyloggers
Software keyloggers are the application programs generally written in a Programming language.The...
Hide Your IP address

Everyone these days seems to go to google by default when they want to run a search on just about anything. But were you aware that Google logs the IP address of every search done, and stores records of every search ever made from that IP
This post is very much useful for both normal users and hackers.
As a hackers point of view IP address hiding is also very much helpful to stay safe from the cyber cop.
So now i am going to tell you about some good tools and techniques which helps you to do this.
Using Proxy Servers Or Web Proxies
Proxy servers acts as a middle man between your browser(client) and the website(server). Proxy servers take request from client and forward that request to website from their ip address.
There are lots of websites which offers Proxy servers services.Some of them...
Using OllyDBG, Part 1
In this i will introduce you to using OllyDBG. Olly has many functions and the only way to truly learn them all is to experiment and practice. So, lets get started
Loading the app
The first step is to load the intended binary into Olly. You can either drag and drop the file onto Olly’s disassmebly window, or click the load icon on the top far left and choose the file. Olly will do analysis (if you can read it fast enough in the bottom bar of Olly’s display) and will stop at the programs Entry Point (EP).
The first thing to notice is that the EP is at address 401000, as we can see in the first column. This is a pretty standard starting point for an executable (at least an executable that has not been packed or obfuscated anyway). If your screen looks different and Olly has not...
Introducing OllyDBG
What is Olly Debugger?
From the author, Oleh Yuschuk, “OllyDbg is a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. ” Olly is also a “dynamic” debugger, meaning it allows the user to change quite a few things as the program is running. This is very important when experimenting with a binary, trying to figure out how it works. Olly has many, many great features, and that is why it is probably the number one debugger used for reverse engineering (at least in ring 3, but we’ll get to that later.)
An Overview
Here is a picture of Olly’s main display, along with some labels:
Olly opens with the default window, CPU, open. This is where most of the “big-picture”...