
Browse » Home »
Posts filed under Windows
How To Protect Your Computer From Spywares and Keyloggers

Complete Guide - How To Monitor Remote Computers
Posted by
John ( Admin ) on 2:39 AM
| Tags :
Articles,
Downloads,
Email Hacking,
guide,
Hacking for Dummies,
How to,
Keyloggers,
Mac,
security,
softwares,
Spyware,
Windows

In today's world, It becomes necessary for us to monitor our own computer or a remote computer to keep track of the activities going on. This may be for several reasons. Especially it is most necessary for the parents to monitor their computer to keep track of their children’s activities during their absence. Some people may also require to monitor their computer to keep an eye on the activities of their spouse or partner.
Today, with the advancement in the field of software technology, it is possible to easily monitor any given computer. For this all you have to do is, use a PC Monitoring Software.
Today, with the advancement in the field of software technology, it is possible to easily monitor any given computer. For this all you have to do is, use a PC Monitoring Software.
How To Choose A Remote Keylogger /Spyware ?
Posted by
John ( Admin ) on 8:27 PM
| Tags :
Downloads,
Keyloggers,
Linux,
Mac,
softwares,
Spyware,
Windows


So far i've Reviewed and recommended various remote keyloggers and spy ware, but many of my blog readers still get confused on which remote keylogger they have to choose. I get a lot of emails and comments asking me which keylogger should i choose ? Which is the best keylogger ? etc..
Hide Data Behind Images Without Using Any software
Steganography is the art and science of hiding messages, Images, Data .etc in such a way that no one, apart from the sender and intended recipient, suspects the existence of the Data, a form of security through obscurity. By using this trick your data will get hidden into any image of your choice without reducing its quality, In following tutorial i will show you how you can Hide Data Behind Images without using any software
How To Copy Music From an Apple iPod to your PC
Got Pre-Loaded Songs on your Apple iPod ? & Want to copy songs off your Apple iPod to your PC? You can use the small program SharePod to do this job for you. After installing this tool, you will be able to exchange any music file between the iPod and your Computer. This makes it easy to copy songs from your iPod and Transfer them to your PC easily.So just follow these simple steps ! and it is totally fun !
Here we Start :
You can do this by selecting the songs from a list just like in iTunes, and then clicking the ‘Copy to PC’ or ‘Copy to iPod’. Additional features include an integrated media player and an editor for ID3 tags.

Here we Start :
You can do this by selecting the songs from a list just like in iTunes, and then clicking the ‘Copy to PC’ or ‘Copy to iPod’. Additional features include an integrated media player and an editor for ID3 tags.

Hack Email, Facebook and Myspace Passwords Using Istealers
It is a small software which steals passwords that are stored in our web browsers, chat apps such as yahoo messenger .etc , Stealer's then send these stolen passwords to the Hackers FTP server, Usually Stealer's look like keyloggers but there are many differences, Stealer's steal only passwords that stored in the web browsers they wont capture keystrokes typed by the user
TrueCrypt - Password Protect Your Files, Folders and Hard Disks

How To Hack Email Passwords Using Winspy Keylogger
Posted by
John ( Admin ) on 6:42 AM
| Tags :
Articles,
Hacking for Dummies,
Hacking tools,
How to,
softwares,
tutorials,
Windows


Create your Own Personal Web Proxy Site in 5 easy Steps
All most every one Following my blog must have Know about proxy servers , A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the Internet , There are many advantages of using a proxy server. I've already explained that in one of my previous articles, you can read my previous article on Proxies From Here .If your new to Proxies then i would strongly suggest you to read the article before reading this one
How to Turn Your Home Computer Into a Web Server
Web server can refer to either a hardware or a software (of a computer) that helps to deliver content that can be accessed through the Internet.The most common use of web servers is to host web sites but there are other uses like data storage or for running enterprise applications.
Before getting into the actual process, let's look at a couple of real-world situations that explain why you may want to turn your home computer into a web server
Situation 1. Say you have music MP3s, documents and other important files on the hard drive of your home computer. If you turn this home computer into a web server, you will be able to access all these files from office or any other Internet connected machine including your mobile phone.
Hack Remote Routers Using Telnet
Telnet is a legacy remote terminal TCP/IP application used for remote administration , Telnet is notorious for transmitting communications in plain text and has long since been superseded by SSH that uses encrypted channels so it is rare to see telnet in use on the Internet .
How to Hack Passwords Using An USB Drive
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE ,chrome and Firefox. There exists many tools for recovering these passwords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff /hack passwords from any computer.
Hack a Remote Computer Using Realtime Spy
Posted by
John ( Admin ) on 3:59 AM
| Tags :
Email Hacking,
guide,
Keyloggers,
Malware,
tutorials,
Windows

In one of my previous tutorials we discussed how we can use ardamax key logger to hack remote computers .In this article i will explain What is Realtime spy and i will also explain How you can use Real time spy to hack remote computers
What is Real time Spy ?
What is Real time Spy ?
Realtime-Spy is the latest in cutting-edge remote spy software monitoring technology that allows you to monitor ANY PC you own from ANYWHERE. Realtime-Spy is remotely installable .It is one of the best and the Cheapest spying softwares which is out there in the market
Hack Windows Password Using Pwdump and John The Ripper
I have already written articles on How you can hack windows passwords Using various tools such as Ophcrack ,Chntpw and i have also written an article on how to hack windows password using stick keys . In this article i will explain an another way to Hack/crack windows password using Pwdump and John the ripper
Hack Windows Password Using Pwdump and John The Ripper
Hack Windows Password Using Pwdump and John The Ripper
John The Ripper -Tutorial
Posted by
John ( Admin ) on 11:25 PM
| Tags :
Articles,
guide,
Hacking for Dummies,
Hacking tools,
Linux,
tutorials,
Windows

John the Ripper is probably the fastest, most versatile, and definitely one of the most popular password crackers available. It supports six different password hashing schemes that cover various flavors of Unix and the Windows LANMan hashes also known as NTLM (used by NT, 2000, and XP). It can use specialized wordlists or password rules based on character type and placement.
I got many Emails from my blog readers requesting me to write an article on how to use john the ripper ,But actually there are may nice tuts on the net on this subject . So i taught instead of writing i can share one such article The following article is written by Renegade
I got many Emails from my blog readers requesting me to write an article on how to use john the ripper ,But actually there are may nice tuts on the net on this subject . So i taught instead of writing i can share one such article The following article is written by Renegade
Password Cracker 1.1 - Download
One of my blogging friends (Black star) has developed password cracking tool. Password Cracker 1.1 .This tool can crack MD5,SHA-1,.. Hash codes using Dictionary Attack Method. Password Cracker 1.1 is open source (free) , you can download the tool from the following link
World IPv6 Day Will Test New Internet Protocol
Mark your calendars: Wednesday, June 8, is World IPv6 Day. On that date, the Internet Society will oversee the first global trial for the new Internet protocol.
The society said it will be joined by a variety of web sites and Internet service providers, including Facebook, Google, Yahoo, Akamai and Limelight Networks. In all, more than 225 organizations will use IPv6 on their main services for a full 24 hours to test the technology and motivate other organizations to prepare for the hand off from the current IPv4, which is rapidly running out of addresses.
The society said it will be joined by a variety of web sites and Internet service providers, including Facebook, Google, Yahoo, Akamai and Limelight Networks. In all, more than 225 organizations will use IPv6 on their main services for a full 24 hours to test the technology and motivate other organizations to prepare for the hand off from the current IPv4, which is rapidly running out of addresses.
View Blocked Websites By SSH Tunneling
I have already written many articles on How to view Blocked websites in schools and collages by Using Proxies , TOR , URL Filtering ..etc .In this tutorial i will explain an another way "SSH Tunneling" By which you can view blocked websites .
What is SSH tunneling?
SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too .If you are to curious to know more about SSH and SSH tunneling .please have look at my guest post on SSH from Here
What is SSH tunneling?
SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too .If you are to curious to know more about SSH and SSH tunneling .please have look at my guest post on SSH from Here
Hacking Windows Password Using Chntpw
Posted by
John ( Admin ) on 4:38 AM
| Tags :
Articles,
Backtrack tutorial,
Hacking tools,
Linux,
tutorials,
Windows

Sorry folks for the late Updates.... I had gone to my native place so i was not able to update my blog .In this article we will see How to hack windows Password using Chntpw - (Change NT passwords ) utility
Concept :-
Windows Stores user accounts passwords in a file SAM . Which is located in ( C:/windows/system32/config ) With chntpw software utility we will be able to reset or blank local passwords used by Windows NT, 2000, XP, Vista, and 7. It does this by editing the SAM database It is included in many security focused Linux distributions such as BackTrack and Knoppix STD.
Windows Stores user accounts passwords in a file SAM . Which is located in ( C:/windows/system32/config ) With chntpw software utility we will be able to reset or blank local passwords used by Windows NT, 2000, XP, Vista, and 7. It does this by editing the SAM database It is included in many security focused Linux distributions such as BackTrack and Knoppix STD.
Subscribe to:
Posts (Atom)