Posts

Any Rar Passwords Protected File

Image
This program recovers forgotten passwords for RAR archives.  Recover  runs in the background and resumes on the next system start-up. When you have completely forgotten a password, Advanced RAR Password Recovery will run a  brute-force  attack that applies all possible combinations one by one. In such a case, you can set the minimum and maximum number of characters and the character sets you used (letters, numbers, and non-English characters). If you recall part of the password, you can restrict the search area with a mask such as  m***l . If you have used a meaningful word for your password, the dictionary attack helps. You can plug in external dictionaries and check all possible lowercase and uppercase combinations. To decrease recoverytime, the program optimizes its code for each type of processor. The trial version limits recovery to three-letter combinations, which doesn't give you the opportunity to fully evaluate performance. If you've forgotten the password for a

block site in firefox

Image
As you Know that,Mozilla Firefox is a most powerful and common browser,which is used by most of the internet users,which is containing millions of addons,which helps the browser to expand its features according to user's requirement.If you want to block some websites in your own mozilla firefox browser.Then this post is for you.Blocksite is one of the firefox add-on which is used to block a  list of website  in firefox.We can also protect it by password, so that others cannot able change the setting or delete the websites without your access.  Follow These Steps to Block any website in mozilla firefox browser 1  First of all  click here  and  Get plugin then Open Firefox browser and click “Tools” and select Add-ons. Type “BlockSite” in the search bar at the top right corner of the window and press “Enter”. 2  Wait for the page to load. In the  search result,  BlockSite will be on the first place. Click the “Install” button next to the BlockSite plugin. It will take les

hide-ip tools

Image
Hey friends, today i am going to share a hack tool that will help you to hide you identity online so that you can surf online anonymously without getting monitored. Do you actually know what your IP address means? Are you aware that your IP address is exposed every time you visit a website?  How you will feel when you come to know that some neighbour is monitoring your home every time? Many websites and hackers use IP address to monitor your home address and other personal information. Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Now as hacker you will never wish that somebody monitor you. So i got a tool called Super Hide IP that will not only hide your identity online but also help you  computer  tracing  cookies. Super Hide IP allows users to surf online anonymously, keeping your Identity and IP address hidden from the third party, protect your personal info

Dangerous Email File Attachments

Image
.reg Possible Windows registry attack .chm Possible compiled Help file-based virus .cnf Possible SpeedDial attack .hta Possible Microsoft HTML archive attack .ins Possible Microsoft Internet Comm. Settings attack .jse Possible Microsoft JScript attack .lnk Possible Eudora *.lnk security hole attack .ma_ Possible Microsoft Access Shortcut attack .pif Possible MS-Dos program shortcut attack .scf Possible Windows Explorer Command attack .sct Possible Microsoft Windows Script Component attack .shb Possible document shortcut attack .shs Possible Shell Scrap Object attack .vbe or .vbs Possible Microsoft  VB  script  attack .wsc .wsf .wsh Possible Microsoft Windows Script Host attack .xnk Possible  Microsoft Exchange Shortcut attack .scr Possible virus hidden in a screensaver .bat Possible malicious batch file script .cmd Possible malicious batch file script .cpl Possible malicious control panel item .mhtm

How To Identify the Fake E-mail ID ?

Image
Hello friends, Daily we got almost 100's of face emails ,Like in spam folder. A php script can mail you from any email address...Even from your own email address..So  How To Identify the Fake E-mail ID. Here a small guide i am going to share with my all ICA Visitors. If you like the article,then  please do a comment ..,At present it is difficult to identify the fake ID. With time more and more people are using the fake IDs which creates a bunch of trouble to thousands of people. So here detection of those fake IDs has become almost a necessity. It is also important because hackers are always looking to use the  f ack mail  IDs to get the personal information of victims. There are several techniques to identify the fake e-mail IDs. The common method you can use is to send test mail to those IDs. If you got failure  notification  then its a fake email IDs. Alternatively there is couple of web service which identify the fake e-mail IDs for the users. Email Address Checker: Email Addr

send fackmail

Image
  Sending Fake/spoofed Email -:    Fake or spoofed email means the email from any email ID. It doesn't matter whether the sender's email really exists or not. Sender's email ID can be anything@anything.com.      Read the  disclaimer  before proceeding Methods :- 1. Using Open Relay servers  :     An open relay server is that which allows people to send email by connecting to it. User connect to it via telnet and instructs server to send email. This method is outdated or simply I should say that, it doesn't work. I would not talk about it more. 2. Using Websites :   There are numberless websites that provide free service to send fake emails. But the problem is that they attach the advertisments along with your email.  But the best two, I have found that do not attach the advertisments. www.emkei.cz      {have some advance options} www.hidemyass.biz/fake-mailer/ 3. Using mail sending scripts :  The PHP contains mail sending function which allows us to s

CONVERT A TRIAL SOFTWARE INTO FULL VERSION

Image
1.  open the registry to add key by clicking on to  Start → Run , and typing in regedit  This will open the registry editor. 2.  Now, navigate to the following registry hive as shown in the picture- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ Policies\Explorer 3.  Right-click on Explorer and choose  New  and then  DWORD  Value and  name it NoDrives (it is case sensitive) 4.Now modify it’s value and set it to 3FFFFFF (Hexadecimal) . Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone…).

10 minute mail

Image
www.10minutemail.com

What are session IDs or session cookies ?

Image
Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when we click on ' Sign Out ' option. Just login to  yahoo.com . Type in browser  javascript:alert(document.cookie); You would get a pop up box showing you the cookies. Now login to your account and do same thing, you would see more elements added to the cookies. These represent  session  ids . Note:  By saying , stealing sessions or stealing cookies, I mean the same thing. Sessions are stored in our browser in form of cookies.  An attacker can steal that session by convincing victim to run a piece of code in browser. Attacker can use that stolen session to login into victim's account without providing any username/password. This attack is very uncommon because when the victim  clicks 'Sign out'

How to Know Someones Facebook Email ?

Image
1) Login To your Yahoo Mail account.                                            2) Goto contacts option. 3) Now their select tools and then you will see there is an option of import on yahoo toolbar.                                 4) Now goto your facebook account login and hit Facebook here on yahoo, Now they will ask you on facebook to import contacts, allow them. 5) After Five minutes they will import all the contacts and emails of your facebook friends they could be 10-1000, depends on your friends list. 6) Now Yahoo has successfully imports your contacts, Goto Your Yahoo Contacts list there you will see all friends email with details.

images in chat & in img A-Z code

    1. How to use  facebook profile images  in chat ? To use profile images in chat Enter this ==>  [[username]] In place of username enter username of person whose image you want to show in chat.           2. Codes of A-Z for Facebook chat. Below are codes of A-Z which you can use in. fb chat You can create your on words with this codes. I will demonstrate how to do that . [[107015582669715]]  = A [[116067591741123]]  = B [[115602405121532]]  = C [[112542438763744]]  = D [[115430438474268]]  = E [[109225112442557]]  = F [[111532845537326]]  = G [[111356865552629]]  = H [[109294689102123]]  = I [[126362660720793]]  = J [[116651741681944]]  = K [[115807951764667]]  = L [[106596672714242]]  = M [[108634132504932]]  = N [[116564658357124]]  = O [[111669128857397]]  = P [[107061805996548]]  = Q [[106699962703083]]  = R [[115927268419031]]  = S [[112669162092780]]  = T [[108983579135532]]  = U [[107023745999320]]  = V [[106678

Blank Status

Image
For single line Blank Status Copy below codes into your status @[2:2: ] Note:- the text is like  @[0:0:space]   

Boost Your Wi-Fi Signals With Fizzy Drink Cans

Image
I love a good hack, especially one that requires me to throw back a cold one before hand (or during). This simple wifi boost has actually been shown to increase signal strength by at least 2 to 4 bars. And, well, I will drink to that. For this project you are going to need scissors, a utility knife, some adhesive putty and an empty fizzy drink can. More than one empty fizzy drink can is acceptable. The first step is to wash out your empty beer can, unless of course said beer is a can of Pabst Blue Ribbon. If it is PBR, promptly go drink a better beer. You really should be ashamed of yourself. Once the can has dried, you will want to remove it’s pull tab. Only perform this next step if you have  not  been drinking. Using the utility knife, saw off the bottom of the can. Chances are your can will not have a red dotted line. If you see one, put down the knife…you’ve had too much beer. You’ll notice in the above step that the can’s pull tab has returned. Clearl