Friday, 1 March 2013

HOW TO REMOVE YOUR MIDDLE AND LAST NAME FROM FACEBOOK


Facebook is the most used Social network ever. Almost everybody has a Facebook account. In fact one can get loads of information about somebody from their Facebook account. When it comes to privacy, Facebook might not be the best platform. As it is said that there are all kinds of workaround for everything, therefore there is a workaround for removing the middle name and last name from your Facebook profile as well.


In order to create a Facebook account the user has to pass through various security checks, this is because Facebook does not want any scam or fake profile. To ensure this, one of the measures which Facebook takes into consideration is that it does not allows anybody to miss out the last name. Hence one cannot create his/her profile only by first name and middle name, it is mandatory to fill out your last name as well.


. See the steps below if you want to hide your last name from your Facebook profile, and believe me it’s quite simple.
Remove Your Last Name from Facebook :

1. If you have Mozilla Firefox installed then run it, else download it.
2. Now go to  Firefox > Options > Options.

                                         

3. Now select  Advanced > Network > Settings…

                                     


4. Select Manual proxy configuration and enter 202.70.136.142 or 124.81.117.114 in HTTP Proxy field and 8080 in Port. Also mark “Use this proxy server for all protocols”. In the “No Proxy” box type 202.70.136.142 and press ok.

                                         


5. Now login to your Facebook account, go to account settings and remove your last name and see the magic. Facebook allows you to save your name without the last name.If u can't save your name then change language in indonesia in account setting last tab same like........

                                        

P.S. This trick is for those people those who need to hide their last name, this can be due to any reason like security or any other. But anyone can remove the last name and show that they can do it and their friends can’t.



Friday, 17 August 2012

How to Hack Facebook accounts using FUD Keylogger..


First Download Project Neptune Keylogger

Open the program 
Double click on the program where you downloaded it


First check the button that says “Use Email for Storing Logs” Then change the amount of time the Keylogger sends logs.
In the Email settings tab keep the “smpt.gmail.com” and the port number 587 where it says “Email to Send Keystroke Logs” put your email in that box and in the box under that put the password to your email. 
If you want you can change what email it send the logs too, but otherwise use the same email that you put above. 

Then, Click Test Email Account Information, and if you get an email saying that it works, then you can move onto the next step.


Keep all the settings the same, unless you want to disable task manager or block websites now will add some online virus scanning sites to block them —this means that the sites can’t scan the tool for virus.



Go to the installation tab and check the first box in “Startup Settings” Then Choose a place to install in the Installation Directory.
In the Installation Directory I would put it in the “AppData Folder
Then go to Original File Check “Do Nothing with Original File after Install” to keep suspicion level none.
If you want File downloading enabled then type in the link of your exe or other file, but if not then do nothing with this box.


Now go to ‘Server Creation‘ tab and press ‘Generate New Server’ under ‘server creation’, and give name of your Keylogger and that it… You are done.



You have successfully created a Keylogger server file. Now, simply send this file to your victim via email, once the victim runs our Keylogger, we will key logs every 20 min via email

Ardamax Keylogger v3.8.9 Latest [Full] [Free] [Crack] [Serial Key]



Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.



Keylogger Features:

* Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!
* FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.
* Network delivery - sends recorded logs through via LAN.
* Clipboard logging - capture all text copied to the Windows Clipboard.
* Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 2000/XP/2003/Vista/Windows 7 Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.
* Visual surveillance - periodically makes screenshots and stores the compressed images to log.
* Chat monitoring - Ardamax Keylogger is designed to record and monitor both sides of a conversation in following chats:
o AIM
o Windows Live Messenger 2011
o ICQ 7
o Skype 4
o Yahoo Messenger 10
o Google Talk
o Miranda
o QiP 2010
* Security - allows you to protect program settings, Hidden Mode and Log file.
* Application monitoring - keylogger will record the application that was in use that received the keystroke!
* Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
* Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
* Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
* It records every keystroke. Captures passwords and all other invisible text.

Other Features:

* Windows 2000/2003/XP/Vista/Windows 7 support
* Monitors multi-user machines
* Automatic startup
* Friendly interface
* Easy to install

Enjoy;)

Download: This file is full Ardamax (Latest) Keylogger with no activation needed, downloaded from their official site. Just Downlaod and ENJOY ;)

ARDAMAX 3.8.9 ::: HERE (without remote package)


ARDAMAX 3.7.8 ::: http://www.box.net/shared/lidooniyjv (FULL)


Ardamax 3.7.6:::http://www.box.net/shared/dzp1m8koen (FULL

SERIAL KEY :
==========

Name: Luiz Ricardo P Oliveira
serial: 3F1A-54F8-032C

REFOG Keylogger v5.1.8.934 + Serial [ Full Version ] [Crack]



Concerned About Your Children Safety? 

If your kids spend time chatting or playing computer games, they can be approached or threatened by the strangers. Internet has anonymity, and anonymity means impunity in the minds of molesters. The solution? Violate their anonymity by monitoring your kids’ activities! 
REFOG Personal Monitor is designed to deal with extended families, but it fits small families just as easy. Allowing you to monitor your children activities remotely over the Internet, REFOG Personal Monitor does not even require your close presence in order to be alerted about suspicious activities of either your children or someone they chat with. 

Easy To Install and To Use 
REFOG Personal Monitor can be set up and used by anyone. The monitor does not involve a steep learning curve and does not demand a degree in Computer Science to configure and operate. Simply download your free trial version and get yourself going! 
Remote Monitoring 
REFOG Personal Monitor provides the necessary degree of interactivity, allowing you to monitor your kids’ actions remotely over the email. There’s no need to rush home during the launch hour just to check the logs. See what your kids are doing with their computer without leaving your office! 
Real-Time Alerts 
Should you be worried now or later? If you want constant protection of your family, simply logging keystrokes and storing screen captures is not enough. Often, an immediate action is required to get your kids out of trouble. 
REFOG Personal Monitor is highly flexible, allowing you to configure multiple alerts on harmful or offensive keystrokes sent or received on their computer. Set your alarms, and get notified instantly with real-time alerts if a pre-defined event happens on their PC. 
You can easily set REFOG Personal Monitor to alert you by e-mail. Templates are available to filter keystrokes that contain pre-defined trigger phrases, making false alerts hardly possible. 
Save Screens and Key Presses 
REFOG Personal Monitor keeps a list of all activities you specify it to log. It records all visited Web sites, keeps logs of chats and instant messenger conversations as well as other things typed or received by your kids in chats, messengers, blogs, forums and other online and offline applications. 
REFOG Personal Monitor saves each key pressed and every phrase typed, and makes periodic captures of the computer screen to better illustrate what was going on at that moment. 
Capture Chats and Instant Messengers 
REFOG Personal Monitor captures every key that they press, but does not stop there. Individual keystrokes are of little use when analyzing your kids’ behavior. REFOG Personal Monitor can detect popular chats and instant messengers, and forms clearly legible and readable logs containing chats and instant messenger conversations formatted in a manner that is convenient to read. 
Stealth Operation 
For even better protection, REFOG Personal Monitor can be completely hidden from your kids’ eyes. It runs silently and unobtrusively on their PC while taking screen shots and recording every key that they press, logging applications that they use and Web sites that they visit. You can access these logs either locally or remotely at any time, even if you are not at home! 

Keystroke recording 
Once installed and running, Refog registers all keys pressed by a user, thus acting as a keylogger. This function captures all data that has been entered by your children or an employee using a keyboard, including chats, usernames, passwords, emails, search queries and other content. In addition to key logging, Refog is also able to log clipboard text. 
Web history logging 
Even if users delete their browser's history, the informaton is retained in Refog's log database and always available via the reports function. All relevant information is collected including URLs visited, page titles and the timestamp. 
Screenshot history 
With customizable capability, Refog takes full color screenshots of a desktop screen. This ensures that the log of what is being typed by the user is backed up with visual evidence of exactly what they are doing. Without being monitored, it is often the case that employees get carried away with excessive web surfing, shopping and other personal tasks. With screenshot history, it is always possible to gather evidence if an employee is wasting the company's time. Multiple monitor configurations are supported! 
Invisible mode and password protection 
You may not want to disclose the act of PC monitoring, so Refog can work in special stealth mode, making it completely invisible even to a skilled PC user. It cannot be found in the program folder, control panel or tray. When required, the program can be revealed using a special command or hotkey. In addition, it is possible to protect Refog with a password, so users are unable to erase their logs. 
Application monitoring and file tracking 
Refog is able to record all programs executed on your PC, so it is possible to establish if your kid is playing games instead of doing his homework, an employee is wasting time offline (e.g. playing solitaire instead of working). In addition to programs, Refog stores all file operations (e.g. open, edit, copy, delete), and can reveal inappropriate interest in specific confidential documents. 
IM monitoring 
Refog is also compatible with all major instant messaging software (e.g. AIM, Facebook®,Yahoo! messenger, Skype, ICQ, Google Talk, MSN). It is not only able to log outgoing messages by a local user, but also incoming messages too. 
Email reports 
It is not necessary to gain physical access to monitored computers in order to view their logs. All reports can be delivered via email, and can be read anywhere. 
Comprehensive settings and reports 
It is possible to set the control levels of monitoring, enable/disable monitoring for given users, setup alert keywords and reports delivery, easily filter log files and much more. With this armory of tools, Refog comes preconfigured so it can be installed in just a few clicks and run with default settings, requiring no tech skills at all! 

Refog Personal Monitor works great with all modern Windows OS releases: Windows XP®, Windows Vista®, Windows 7® 

Installation Notes 
Run setup file 
Enter the serial 
Enjoy

DOWNLOAD FROM::
http://ca.isohunt.com/download/295579713/refog.torrent

Break Windows Admin Password (Ophcrack Live CD)


Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.
Features:
  • Runs on Windows, Linux/Unix, Mac OS X, …
  • Cracks LM and NTLM hashes.
  • Free tables available for Windows XP and Vista.
  • Brute-force module for simple passwords.
  • Audit mode and CSV export.
  • Real-time graphs to analyze the passwords.
  • LiveCD available to simplify the cracking.
  • Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
  • Free and open source software (GPL).
First Download Ophcrack
2 Break Windows Admin Password (Ophcrack Live CD)

3 Break Windows Admin Password (Ophcrack Live CD)

Boot your pc with ophcrack LiveCD

Now your Password will be Automatically Bracked


How to Hack Windows Admin Password Using Pc LOgin Now


Download the
 PC Login Now software and burn the ISO file to a CD.
Insert the PC Login Now disc into your CD/DVD/BD drive and then restart your computer. After the initial startup of your computer and loading of Linux is complete, click next to continue
Now process is to Select the SYSTEM” Select it and click next


Next, it lists all local Windows accounts in the system. Select the account you want to reset the password. Then, check on “password is empty” and click next.
is Administrator: if the account has the administrator privilege and rights.
password is empty: if the password of the account is empty or blank.
is disable: if the account has been disable due to the operation of administrator or the system rules.
is lockout: if the account has been locked due security breach such as too many unsuccessful login attempt.
password never expire: if the account has to set password on a specific expiry date or the password will expire after a set period
It asks you if you want to reset another user. Select No.
Click OK to reboot the system


How to use ERD Commander 2007 (Break Administrator Password)


First Download ERD COmmander
Start your computer and enter into Bios Setup.
Change your boot preferences to boot from CD /DVD.
Insert your ERD Commander Bootable CD.
Once the ERD Commander starts booting it will ask you for Windows Installation, select appropriate installation for which you need to reset passwod

Once ERD is loaded it will present you a interface similar to windows.Click the START button, Select System Tools > and then select Locksmith.

Enter you new password and close Click Start Button again and restart the PC



 
Tricks and Tips