Sunday, March 21, 2010

WiFi Hack AIO 2010




This time we bring you the best software to hack the WiFi networks 2010. El compilado incluye potente software en detecci?n y cifrado de redes ideal para hackear Redes WiFi. The compilation includes powerful encryption software in network detection and ideal for hacking WiFi networks. Descargar Programas para Hackear Redes WiFi Full Gratis. Download Programs to hack Free Full WiFi networks.


This AiO contains:
Windows Tools 1
WiresHark
AirSnare
WirelessKeyView
Wifi Monster
NetStumbler
Easy Wifi Radar
SmartSniff
Ettercap
WinPcap
CommView

Windows Tools 2
Nmap
Wirelessmon
PocketWarrior
Inssider
RemoteAnyWhere
PmoniPacketMon
ApTools
WiFiFoFum
Advanced Port Scanner
NetSurveyor

Backtrack
Enlace de descarga para BackTrack 4 Pre Release
Enlace de descarga para BackTrack 4 Beta Release
Enlace de descarga para BackTrack 3 VmWare Image
Enlace de descarga para BackTrack 3
Enlace de descarga para BackTrack 3 USB Version

PDF s and Tutorials
Hacking Wireless Networks
Cracking WEP and WPA WiFi
Wifi Hacking
Hacking Asus WL520gU
BackTrack PDFs
WiFi Advanced Fuzzing
Wifi Security
Wireless Sniffing WiresHark
Wireless Hacking Tools

Bonus Software
Net Tools
WepGen
Cantennator
Anchorfree
Cain and Abel
Wifi Drivers
Brutus
VmWare Keygen
LanHelper


here is the link:

http://hotfile.com/dl/27443546/027c035/b1u3eyes.AIO.Wifi.rar.html

Windows Keygen Pack




Microsoft Business Network Professional v1.0 SP1 -kEyGeN-
Microsoft CRM Server v1.2 -kEyGeN-
Microsoft ISA Server v2004 Enterprise -kEyGeN-
Microsoft ISA Server v2004 -kEyGeN-
Microsoft kEyGeN 2000
Microsoft Office Communicator 2005 v1.0.559 -kEyGeN-
Microsoft Office Professional v2003 -kEyGeN-
Microsoft Operations Manager 2005 -kEyGeN-
Microsoft Plus! Digital Media Edition -kEyGeN-
Microsoft Visual FoxPro v9.0 -kEyGeN-
Microsoft Windows Longhorn -kEyGeN-
Microsoft Windows Media Center Edition 2005 -Activator-
Microsoft Windows Server 2003 -kEyGeN-
Windows Multi kEyGeN
Windows Server 2003 Enterprise VLK -kEyGeN-
Windows Server 2003 x64 Edition VOL -kEyGeN-
Windows XP Activation Patch
Windows XP Activator
Windows XP Product Key Viewer and Key Changer
Windows XP Professional -kEyGeN-
Windows XP Professional x64 Corporate -kEyGeN-
Windows XP Service Pack 1a -kEyGeN-
Windows XP Service Pack 2 -kEyGeN-
Windows XP SP2 Home and Pro Activation -cRaCk-
Windows.Genuine.Advantage.Validation.v1.5.526.0.CR ACKED-ETH0


here is the link:
http://hotfile.com/dl/21332215/79098c7/WinKeygens.rar.html

How to Bypass Windows Verification to Install Windows Media Player 11



Well, there are many programs which we can download by micrososft, but we can't really install them, because some of our Windows XP versions aren't original and therefore do not pass the Windows verification test.
Here's a TUT on how you can install Windows Media Player 11 on your PC and bypass Genuine Advantage verification.

1)First, download windows media player. Download it through THE LINK BELOW, because the microsoft link will verify BEFORE letting you download.
Windows Media Player 11


2) Once the download is completed, use WinRAR to unzip the .exe file, onto a new folder.

3) Go inside the unzipped folder. You will find the whole .exe package here.


Now goto
And download LegitLib.dll
^^ That's the main file that will trick your system into thinking that you have an original copy.
Download that , and replace it inside the unzipped .exe folder.

5) Hit "setup_wm".
And that's it!

You just bypassed Genuine Windows Advantage check and installed Windows Media Player 11 on your XP.


link for legitlib.dll
http://www.multiupload.com/K1W6DT19DH

Add A Photo To My Computer Properties




Here is simple windows tip, which will show you how to add a photo and name to my computer properties.
To do it, open notepad and type the following
[General]
Manufacturer=Your Name Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here

Save as OEMINFO.INI in the C:\WINDOWS\system32 folder.
Then create a .bmp photo and save it the System32 folder as oemlogo.bmp


The size of the image should be 180 x120 pixels.
Make a right click on my computer, Properties and you’ll see the changes.
It looks like this:

Ardamax KeyLogger Tutorial









Hello and welcome to my Ardamax KeyLogger Tutorial. This tutorial is for the keylogger starters. I will be showing you how to send your logs using Email/Ftp



follow the pictures from bottom to top..

Saturday, March 20, 2010

About Hackers: Hackers – Who r they? What do they do? What they r looking for?




The Term Hacker has several definitions. Habitually Hacker is a person who are enthusiasts in digital computing, they have more knowledge than that of the normal user. It doesn’t matter that a hacker should master only in computers, they may master any thing like mobile phones, PDA’s, Digi- Cam’s, Signals, Hand held devices and so on.

In Computing hackers are clever programmers. In Security Terminology Hackers are the person who really enjoys computing, Programming and the one who deals more with any electronic devices, most often computers by exploring new techniques and tweaking them.

Hackers are skilled person who are good programmers with a good attitude but, Nowadays the term hacker is used with negative connotation because of media’s. Lemme make it clear why the term ‘Hacker’ Such a bad impression among public or its vague.

In security terminology hackers are further classified into three main types based upon how they use their skills in the real world.

1. White Hat
2. Black Hat
3. grey hat


White Hat:

They are skilled programmers who knows more about computer security. They know both the good and evil, Pros and cons in security aspect and more over these guys will use their positive attitude to fix a bug or security loopholes that can be exploited by bad guys. They were good in network troubleshooting and use their skills in a positive way to protect and guard nodes in a network. These guys are basically pen testers and also can be called as ‘Ethical Hackers‘, since they do it legally.

Black Hat :

These guys are mere opposite to White Hat Hackers who creates havoc in a network by spreading malwares, breaking into computers by compromising the security, gaining unauthorized access, defacing websites, stealing credentials, money from victim’s credit cards and these guys will do some other clumsy stuffs, also can be referred as a ‘Cracker‘. Even these guys knows what the White Hat knows, but will have a poor attitude and will use their skill in darkside.

Grey Hat :

It doesn’t require much technical skill to become a Grey Hat hacker, and these guys often are not good in programming but, will search and use someone’s program or coding from the internet to exploit a known vulnerability, also can be referred as ‘Script Kiddies‘. They often try trial and error method to exploit or compromise the security and are ‘wannabe hackers’. Incase of grey hat, they will try to deface websites only upto their level and will not try to learn new techniques, and mostly their attempt will be unsuccessful, where as this is not the case with the black hat, they are ambush attackers who waits even for years to deface the target site and the target’s are most often a reputed and esteemed corporation.

Even hackers can be classified into more crew’s like cyber terrorist, script kiddies but, all of them comes under the three main category thats given above.

Why Hacking ?

Just for Fun :

Most of them will hack just for fun by exploiting the known vulnerabilities and will be script kiddies. Novice hackers will some times steal their comrades E-mail credentials for fun using some key loggers and other techniques for playing pranks, fun and so on.

Raise their status in Communities :

Since there a mushrooms of underground communities available on the internet, just a defacement of any reputed or well known site will fetch them respect among the underground crew.

Political Purpose :

Cyber terrorists will deface victims website, shutdown power, create havoc and outrage in the country and they will get paid for this.

Revenge :

This occurs often by a disgruntled employee of any organization and may try to disclose company’s confidential information and will deface the company’s web resource to degrade its reputedness.

Self-testing :

These guys are Novice hackers who have started learning new techniques from the web or other source and will test themselves whether they are capable of compromising the security or defacing a web resource.

Accidental :

Hacking that occurs without any intention or without their knowledge, and this is due to the poor security policies that’s been followed in that organization or what ever it may be.

Financial Gains :

Hackers might crack into a system for financial gains hence forth they steal credit card informations, Social security numbers and might construct a phishing site to trap victims to make them believe that they are using a legitimate resource for money transaction.

Further Attack :

Hackers Might take over computers all around the world to spread malware, make them as zombies, botnets which can be later used to launch a DDOS ( Distributed Denial of Service ) attack, which may down the victim’s website down by eating up its bandwidth.

IP Theft :

They crack into computers to launch another attack by spoofing their identity by stealing the victim’s identity such as IP Address, E-Mail address, MAC Address, organizations name and stealing bandwidth and so on.

You might be thinking that you know everything about your mobile but there few things that you don’t know. I have made a list all these secret codes that can be Used on your Nokia Mobile for Different Purpose.

1. *3370# : Activate Enhanced Full Rate Codec (EFR) – Your phone uses the best sound quality but talktime is reduced my approx. 5%
2. #3370# : Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )
3. *#4720# : Activate Half Rate Codec – Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.*#4720# : Deactivate Half Rate Codec.
4. *#0000# : Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )
5. *#9999# : Phones software version if *#0000# does not work.
6. *#06# : For checking the International Mobile Equipment Identity (IMEI Number).
7. #pw+1234567890+1# : Provider Lock Status. (use the “*” button to obtain the “p,w”and “+” symbols).
8. #pw+1234567890+2# : Network Lock Status. (use the “*” button to obtain the “p,w”and “+” symbols).#pw+1234567890+3# : Country Lock Status. (use the “*” button to obtain the “p,w”and “+” symbols).
9. #pw+1234567890+4# : SIM Card Lock Status. (use the “*” button to obtain the “p,w”and “+” symbols).
10. *#147# : (vodafone) this lets you know who called you last.
11. *#1471# : Last call (Only vodofone).
12. *#21# : Allows you to check the number that “All Calls” are diverted to
13. *#2640# : Displays security code in use.
14. *#30# : Lets you see the private number.
15. *#43# : Allows you to check the “Call Waiting” status of your phone.
16. *#61# : Allows you to check the number that “On No Reply” calls are diverted to.
17. *#62# : Allows you to check the number that “Divert If Unreachable (no service)” callsare diverted to.
18. *#67# : Allows you to check the number that “On Busy Calls” are diverted to.
19. *#67705646# : Removes operator logo on 3310 & 3330.
20. *#73# : Reset phone timers and game scores.
21. *#746025625# : Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible.
22. *#7760# Manufactures code.
23. *#7780# Restore factory settings.
24. *#8110# Software version for the nokia 8110.
25. *#92702689# Displays – 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again. ( Favourite )
26. *#94870345123456789# Deactivate the PWM-Mem.
27. **21*number# Turn on “All Calls” diverting to the phone number entered.
28. **61*number# Turn on “No Reply” diverting to the phone number entered.
29. **67*number# Turn on “On Busy” diverting to the phone number entered.
30. 12345 This is the default security code.
31. press and hold # Lets you switch between lines NOKIA 5110/5120/5130/5190 IMEI number: * # 0 6 #
32. Software version: * # 0 0 0 0 #
33. Simlock info: * # 9 2 7 0 2 6 8 9 #
34. *#746025625#This shows if your phone will allow sim clock stoppage