How To Protect Your Computer From Spywares and Keyloggers

I've been writing articles on How to hack remote computers using key-loggers, spy-wares etc, One of my blog readers requested me to write a tutorial on how to protect your PC from key loggers and spy wares, So in today's post i will explain some of the best ways by which you can protect your computers from Spywares and Key loggers 

Windows Phone 8 - Review


Complete Guide - How To Monitor Remote Computers

In today's world, It becomes necessary for us to monitor our own computer or a remote computer to keep track of the activities going on. This may be for several reasons. Especially it is most necessary for the parents to monitor their computer to keep track of their children’s activities during their absence. Some people may also require to monitor their computer to keep an eye on the activities of their spouse or partner.

Today, with the advancement in the field of software technology, it is possible to easily monitor any given computer. For this all you have to do is, use a PC Monitoring Software.

How To Choose A Remote Keylogger /Spyware ?

Keyloggers or Sypware are software's which captures keystrokes typed by the victim and thus commonly used for hacking victims email passwords Face book, paypal accounts.. etc Remotely, If your new to keyloggers kindly read my previous article What are Keyloggers

So far i've Reviewed and recommended various remote keyloggers and spy ware, but many of my blog readers still get confused on which remote keylogger they have to choose. I get a lot of emails and comments asking me which keylogger should i choose ? Which is the best keylogger  ? etc..

Hide Data Behind Images Without Using Any software


Steganography is the art and science of hiding messages, Images, Data .etc  in such a way that no one, apart from the sender and intended recipient, suspects the existence of the Data, a form of security through obscurity. By using this trick your data will get hidden into any image of your choice without reducing its quality, In following tutorial i will show you how you can Hide Data  Behind  Images without using any software

How To Copy Music From an Apple iPod to your PC

Got Pre-Loaded Songs on your Apple iPod ? & Want to copy songs off your Apple iPod to your PC? You can use the small program SharePod to do this job for you. After installing this tool, you will be able to exchange any music file between the iPod and your Computer. This makes it easy to copy songs from your iPod and Transfer them to your PC easily.So just follow these simple steps ! and it is totally fun !


Here we Start :
You can do this by selecting the songs from a list just like in iTunes, and then clicking the ‘Copy to PC’ or ‘Copy to iPod’. Additional features include an integrated media player and an editor for ID3 tags.

Hack Email, Facebook and Myspace Passwords Using Istealers


What are Stealer's ?
It is a small software which steals passwords that are stored in our web browsers, chat apps such as yahoo messenger .etc , Stealer's then send these stolen passwords to the Hackers FTP server, Usually Stealer's  look like keyloggers but there are many differences, Stealer's steal only  passwords that stored in the web browsers they wont capture keystrokes typed by the user

TrueCrypt - Password Protect Your Files, Folders and Hard Disks

Today in a typical middle class family everyone in the family uses the same computer , There are times when we need to keep our file ,folders, Hard Drivers, usb's  private .The best way to protect your file ,folders, hard disks, thumb drives ..etc, is  by encrypting them (i.e password protect ) By this way there's no chance of the file or folder  being accessed without the password  ,To achieve this,  I use True crypt a Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux


How To Hack Email Passwords Using Winspy Keylogger

In one of my previous post i wrote a Review on Winspy Keylogger and regarded it as one of the best and easy to use Keyloggers to Hack email ,facebook , Myspace account  passwords. Winspy keylogger is a Complete Stealth Monitoring software that can be used to spy on both your Local PC and Remote PC .Many of my blog readers who are new to Key logging found it difficult to use this Keylogger. So to help them, Today i will be writing a tutorial on How you can use Winspy Keylogger to hack your friends email passwords

Create your Own Personal Web Proxy Site in 5 easy Steps

All most every one Following my blog must have Know about proxy servers , A proxy is an address ( IP address ) of a  Server (proxy server)  that is placed between your computer and the Internet , There are many advantages of using a proxy server. I've already explained that in one of my previous articles, you can  read my previous article on Proxies From Here .If your new to Proxies then i would strongly suggest  you to read the article before reading this one

How to Turn Your Home Computer Into a Web Server

Web server can refer to either a hardware or a software (of a computer) that helps to deliver content that can be accessed through the Internet.The most common use of web servers is to host web sites but there are other uses like data storage or for running enterprise applications. 


Before getting into the actual process, let's look at a couple of real-world situations that explain why you may want to turn your home computer into a web server

Situation 1. Say you have music MP3s, documents and other important files on the hard drive of your home computer. If you turn this home computer into a web server, you will be able to access all these files from office or any other Internet connected machine including your mobile phone.

Hack Remote Routers Using Telnet

Telnet is a legacy remote terminal TCP/IP application used for remote administration , Telnet is notorious for transmitting communications in plain text and has long since been superseded by SSH that uses encrypted channels so it is rare to see telnet in use on the Internet .

How to Hack Passwords Using An USB Drive

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE ,chrome and Firefox. There exists many tools for recovering these passwords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff /hack passwords from any computer.

Hack a Remote Computer Using Realtime Spy

In one of my previous tutorials we discussed how we can use ardamax key logger to hack remote computers .In this article i will explain What is Realtime spy and i will also explain How you can use  Real time spy to hack remote computers


What is Real time Spy ?
Realtime-Spy is the latest in cutting-edge remote spy software monitoring technology that allows you to monitor ANY PC you own from ANYWHERE. Realtime-Spy is remotely installable .It is one of the best and the Cheapest spying softwares which is out there in the market

Hack Windows Password Using Pwdump and John The Ripper

I have already written articles on How you can hack windows passwords Using various tools such as Ophcrack ,Chntpw and i have also written  an article on how to hack windows password using stick keys . In this article i will explain an another way to Hack/crack windows password using  Pwdump and John the ripper

Hack Windows Password Using Pwdump and John The Ripper 


John The Ripper -Tutorial

John the Ripper  is probably the fastest, most versatile, and definitely one of the most popular password crackers available. It supports six different password hashing schemes that cover various flavors of Unix and the Windows LANMan hashes also known as NTLM (used by NT, 2000, and XP). It can use specialized wordlists or password rules based on character type and placement.

I got many Emails from my blog readers requesting me to write an article on how to use john the ripper ,But  actually there are may nice tuts on the net on this subject . So i taught instead of writing i can share one such article  The following article is written by  Renegade

Password Cracker 1.1 - Download

One of  my blogging  friends (Black star) has developed password cracking tool. Password Cracker 1.1 .This tool can crack  MD5,SHA-1,.. Hash codes using Dictionary Attack Method. Password Cracker 1.1 is open source (free) , you can download the tool from the following link 



World IPv6 Day Will Test New Internet Protocol

Mark your calendars: Wednesday, June 8, is World IPv6 Day. On that date, the Internet Society will oversee the first global trial for the new Internet protocol.

The society said it will be joined by a variety of web sites and Internet service providers, including Facebook, Google, Yahoo, Akamai and Limelight Networks. In all, more than 225 organizations will use IPv6 on their main services for a full 24 hours to test the technology and motivate other organizations to prepare for the hand off from the current IPv4, which is rapidly running out of addresses.


View Blocked Websites By SSH Tunneling

I have already  written many articles on How to view Blocked websites in schools and collages by Using Proxies , TORURL Filtering ..etc .In this tutorial i will explain an another way "SSH Tunneling" By which  you can view blocked websites .


What is SSH tunneling?
SSH  tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too .If you are to curious to know more about SSH and SSH tunneling  .please have look at my guest post on SSH  from Here  

Hacking Windows Password Using Chntpw

Sorry  folks for the late Updates.... I had gone to my native place so i was not able to update my blog .In this article we will see How to hack windows Password using Chntpw - (Change NT passwords ) utility


Concept :- 
Windows Stores user accounts passwords in a file SAM . Which is located in ( C:/windows/system32/config ) With chntpw  software utility we will be able to reset or blank local passwords used by Windows NT, 2000, XP, Vista, and 7. It does this by editing the SAM database It is included in many security focused Linux distributions such as BackTrack and Knoppix STD.
© 101hacker | Design by Mukund edited by John
Powered by Blogger