Youtube hack to watch 18+ videos

There may be situations when you may get stucked in watching 18+ videos without registration. Here is a simple solution to bypass that. In this article i will show you how to bypass youtube restriction.
Step 1:

On the video you want to view, get the video code from the URL.

Example:

http://www.youtube.com/watch?v=O07u7KdRVo0

O07u7KdRVo0 would be the video code in this case.

Step 2

Now add the video code to the following link:

http://www.youtube.com/v/*VIDEO CODE HERE*?fs=1&amp

becomes

http://www.youtube.com/v/O07u7KdRVo0?fs=1&

Step 3

Now, go to that link and you will be able to view it without logging in or being over 18

Hope you liked this article, feel free to leave your comments for further doubts and clarifications.
Read more »
These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
  • Furl
  • Reddit
  • Spurl
  • StumbleUpon
  • Technorati


Anonymous is a group of people – people from all countries, all races, all religions, and all morals. Anonymous does not have a leader, does not have an infrastructure, and does not have a method of communication.  All Anonymous members are self-appointed. The only rules of Anonymous is that you have to do what you think is right. This is one of the biggest reasons why people think they are so dangerous. Once thousands of people who don’t even know each other rise up against a cause unified under the same name, people flip out. As you may have learned by watching the news, some members of Anonymous are hackers. But remember, MOST OF ANONYMOUS IS NOT COMPRISED OF HACKERS. However,  the hacker members of Anonymous have been doing a good job of “tidying” up the Internet by not allowing governments and organizations to assume control of it. It seems as though most anons (Anonymous members) nowadays are supporting freedom of information on the Internet.


Thanks to
BTHENDEL



Read more »
These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
  • Furl
  • Reddit
  • Spurl
  • StumbleUpon
  • Technorati

Gmail Privacy Attack


        You meet an old friend online on Gmail after a long time and you start chatting with that person.. and suddenly he/she says that they got to leave and goes offline...the chat box displays that the person is offline!!!
You are now left in a curiosity to know if that person had really signed out or just invisible!!!!



Heres how you can find out!!

Whenever your friend leaves the chat and goes offline.... put the chat off the record...
This can be done by going under the Actions panel on the right corner of your chat box.


Next after receiving the notice send a message to that person.

After sending a chat message, if it doesn't display anything that means the person is invisible and didn't really sign out!!!


And if the person really signed out of Gmail, then it displays a message "[name] did not receive your chat"...


Note: Do it for fun!!!! Because its not a good thing to snoop around and keep disturbing the person who isn't interested in chatting with you.

About the author: This is a guest post by ANUSHA MANNE who is interested in new technologies and wants to share knowledge with my blog readers. Usually writes articles related to latest technologies at Techie Talk

Read more »
These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
  • Furl
  • Reddit
  • Spurl
  • StumbleUpon
  • Technorati

Hack Gmail, Facebook,Yahoo with Ardamax Keylogger(Free and full version)


Today i am going to show you how to hack gmail, facebook, Yahoo! Passwords using ardamax keylogger. If you are new to keyloggers, please refer my previous articles on keyloggers for better understanding. You can read them from here.

1) An Introduction To Keyloggers
2) Hack Gmail,Facebook,Orkut accounts using REFOG keylogger.

Procedure to hack.
Step 1) First downoad Ardamax keylogger from here.  Extract the keylogger from RAR into your desired folder and open it.


Double Click  the setup file and install it as normal setup by clicking next.
Once if you complete your installation, it shows an icon at the right bottom corner of your screen as shown in the figure below..



Step 2) Now right click the ardamax kelogger icon and select  “enter registration key “ Enter the name and key which are there in the downloaded folder.


Step 3) Now right click the icon and select “remote installation”. Click next by checking all the boxes until you see the following window and then follow the following pictures.



Step 4) Once you are done with the above, you will see the following window. Selecting delivery method via FTP is the better option, but in this tutorial i am going with email delivery method.


Now fill the email options as mentioned here.
Send to- your email id
Send from- your email id
Smtp host –smtp.gmail.com
And finally your username and password.  You can test whether it is working or not by clicking the test button. And finally click next to proceed.


Step 5) Now you can change your icon by selecting change icon option and then click next.


Finally you will see the following window, if you have done everything correctly.



Now send the created server file to your victim. It logs all his keystrokes and sends them to you via email.
Note: The server file you have created will be detected as a virus by your antivirus. I will write few articles on bypassing antivirus detection in my upcoming posts.

Hope you enjoyed this article, feel free to leave your comments for further doubts and clarifications.

Read more »
These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
  • Furl
  • Reddit
  • Spurl
  • StumbleUpon
  • Technorati

How to secure yourselves from Trojans and RATs



Symptoms of a trojan:


Unusual behaviour of the system is a mere indication of a Trojan attack!!!
• Programs starting and running without the initiation of the User.
• Opening or Closing of CD-ROM drawers
• Wallpaper, background, or screen saver settings changing by themselves
• Screen display flipping upside down
• Browser program opening strange or unexpected websites.

All the above actions seem like a ghost controlling your system!!!!
The actions clearly indicate that you are under Trojan attack!

Concept behind Detecting Trojans:

The first and foremost thing you have to do is to check the applications which are making network connections with other computers. One of those applications will be a process started by the Server Trojan.

METHOD 1:


Detecting trojans using" netstat" command


An effective method to detect trojans is by using “netstat” command.


Step1: Go to Start>run and type cmd ( to open command prompt)

Step2: Go to C drive and type netstat
It displays all the Active Connections.


Now Type the command netstat –ano
It displays all the present TCP/IP and UDP ports that are being used.


The trojan could be one of the ESTABLISHED conections. But not all the ESTABLISHED connections are trojans.

Step 3: Open task manager.

(This can be done by right-clicking on task bar and start task manager)

Step 4:


Go to view-->select columns


Check the process Identifier and click ok.



Step 5: Cross check the PIDs of ESTABLISHED connections with the PIDs shown on task manager to know the name of the program or application running. For example PID 5004 is TeamViewer.exe (as shown in the image)


Step6: Whenever you find a suspicious program, copy the name and paste it in the search box of spywareguide.com
For example, one of the programs could be Backdoor.Alvgus.a.exe. Copy it and paste it in the search box of spywareguide.com
Click on it and it displays its properties…..



How To Kill A Program??


Well, you have identified a trojan. Now you have to kill it. You can kill the process using pskill.
And now you can kill the program using pskill.
You can download pskill from here. 
Store the pskill.exe application on your C drive. And now you can kill the particular process using the command C:\>pskill 5004 (PID of the program).

METHOD 2: 


Detecting and removing Trojans Using  TCPView:


If you find it difficult to do all the above stuff, just go through this method.
TCPView is a Windows program that will show you detailed listings of all TCP and UDP end points on your system, including the local and remote addresses and state of TCP connections. you can download it from here.
When you start TCPView it will enumerate all active TCP and UDP endpoints, resolving all IP addresses to their domain name versions.
Endpoints that change state from one update to the next are highlighted in yellow;
those that are deleted are shown in red, and new endpoints are shown in green.
You can right-click on active connections and check the properties.

Once you get hold of the Trojan application, you can Kill the active connection and the running process and then delete the physical application file.
This will make you recover from the attack of Trojan.


How to prevent a Trojan Attack??


The key to preventing Trojans and backdoors from being installed on a system is to not to install applications downloaded from the Internet or open Email attachments from parties you don’t know.
Most commercial antivirus programs have Anti-Trojan capabilities as well as spyware detection and removal functionality.
These tools can automatically scan hard drives on startup to detect backdoor and Trojan programs before they can cause damage. It’s important to use commercial applications to clean a system.
Also use Malwarebytes Anti-Malware to protect your computer from all kinds of viruses and trojans. You can download it from here.

NOTE: Never ever download trojans and RATs from third party websites. Always use Trojans from their official websites only.

About the author: This is a guest post by ANUSHA MANNE who is interested in new technologies and wants to share knowledge with my blog readers. Usually writes articles related to latest technologies at Techie Talk


Hope you enjoyed the article, feel free to leave your comments for further clarifications and doubts.
Read more »
These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
  • Furl
  • Reddit
  • Spurl
  • StumbleUpon
  • Technorati

Post Blank Status or Comment On Facebook | Facebook Hacking



HI guys.. Everyone wants to do something new with FACEBOOK.  Anything related to facebook will attract the people. So i came with a small trick today.
I am going to tell you how to post a blank Facebook status or How to Post an Empty Status on Facebook Wall.

STEP 1) Goto  your or  your friend’s wall


STEP 2) Type “alt+0173″  ( of numpad without quotes)


STEP 3) click “share” or Press Enter… And That’s it..


once if you are done, your blank post wil be shown on your friend's wall.


Note:- It works only With  Status and Comments.
Now play around , shock your friends and have fun..;-)

Hope you liked this, Be the first to leave a comment.


Read more »
These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
  • Furl
  • Reddit
  • Spurl
  • StumbleUpon
  • Technorati

Hack Remote Computers using PRORAT



Hi guys..today i am going to show you how to set up ProRat and how to hack a computer using it. Well, i am going to finish up RAT setup articles with this. I will give the counter measures in my next article. As i haven’t written any articles on direct connection Trojans, I decided to write the one on PRORAT.
If you are new to RATing, it is strongly recommended to read my previous articles which give you all the basic and advanced stuff about RATs.

Hack Remote Computers using EXTREME RAT
Trojans and RATs- Know The Facts
DARK-COMET v4.2 RAT TUTORIAL

procedure to setup ProRat

STEP 1. First of all Download ProRat from here. Once it is downloaded extract it. A password prompt will come up. Enter the password.The password  "pro".

STEP 2. Open up the program and You should see the following window.



STEP 3. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


STEP 4. Next put your IP address so the server could connect to you. You need not enter your IP address manually, you can do this by just clicking on the little arrow. it automatically fills your IP address.
Next put in your e-mail so that when and if a victim gets infected it will send you an email.


STEP 5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager. Just follow the steps as shown in the figure.


STEP  6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. You can select an image, text file or pdf file, So as to make the victim trust your file.


STEP  7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate.    I prefer using .exe files.


STEP  8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is.


STEP  9. After this, press Create server, your server will be in the same folder as ProRat. Start giving this file to your victim. When the victim double click the file, his computer will be in your control.


STEP  10. Now the hacker has lot of options to choose from. He can do many funny things with the victim’s computer.



NOTE: In this tutorial, i put the victim’s IP as 127.0.0.1 as i am testing it on my computer. Inorder to hack a remote computer, you need to get the IP address of your victim. If you dont  know how to find an IP address, you can read my article on finding out remote IP address from here.

How to hack an IP address of a remote computer


Hope you enjoyed the tutorial. Feel free to leave your comments for further doubts and clarifications.

Read more »
These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
  • Furl
  • Reddit
  • Spurl
  • StumbleUpon
  • Technorati

DarkComet V4.2 RAT TUTORIAL


If you are not new to RATs, you should have heard the word DarkComet. Because DarkComet is such a great tool for hacking remote computers. It has several features that many RATs do not have. I have explained the basics of RATs and Setting up Extreme RAT in my previous articles. So before proceeding into this article, you must understand the basics of RATing. So please go through those articles first. You can read them from here.



In this article i am going to show you how we can hack remote computers using DARKCOMET RAT. Here, some steps are same as Extreme RAT tutorial . But i will repeat all the steps to avoid confusion. So lets move on.

Things you require

1) DARK-COMET RAT

This is the RAT you are going to use. You can get it from HERE.

2) No-ip.biz  account

As our IP-Address is dynamic(in general), we need to make it static.

3) DUC client

We can automatically update our dynamic IP-Adress, by installing DUC client.

4) VPN (If you are behind a router)

We must enable our router to allow us to connect to a remote PC. So we need to port forward.
Instead of port forwarding we use a VPN(Virtual Private Network).
You can use Proxpn.

Procedure:

Step 1:

First you need to create an account in www.no-ip.com

Step 2:

After creating an account, login with your account and create a host. You can do this by just following the steps.

Goto this link, and login. Then follow the steps as shown in the picture.


Finally click “Create Host”.

Step 3: Setting up your server.

First install Dark-Comet RAT on your PC and run it. It opens a window as shown below.


Now click on the + button which is at left bottom corner as shown below.


 It opens a small window showing you the port number. Click on “listen” button.


Then it disappears, don’t click the “listen” button again. Now click on “edit server” button at the bottom of the window as shown in the figure. 


It opens a new window with huge amount of options. First lets move on to the main settings. You can set a password to use when listening connections. You can see the default password by checking “security password” and “show chars” in the fillowing picture.


Now we need to set up our “network settings”. Clearly follow the steps here. You need to give your domain name you got from no-ip.com
It looks like yourdomain.no-ip.biz


 We came to the funniest part of our RAT setup. Here you can choose your icon. DarkComet is providing us some beautiful icon. So that our victim can easily believe us. Just follow steps  shown in the figure. It is self explanatory.





You can bind your server file with a PDF or Image. So when the victim clicks it, it opens the PDF file and the victim will not be able to suspect you. You can follow the steps as shown in the figure.


Finally click on “Build Server” button. It creates a new server file in the same directory where your dark-comet files are stored.

You are done. your server file looks like this. 


Now give your server file to your vicyim by any means. When  he clicks the server file, he will be connected to your computer. 


Now you can do anything you want. You can see him with his web cam, downloading files and many more. Just move around the options and play with him. I put two screenshots of how it looks like when you get access to his computer.



Using RATs on remote systems without their permission is illegal. This article is for educational purpose only. Dont do anything illegal. I will not be held responsible for that.

Hope you enjoyed this article. If you have any doubts or suggestions, feel free to leave your comments. 
Read more »
These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
  • Furl
  • Reddit
  • Spurl
  • StumbleUpon
  • Technorati