May 2011


hackers programs.exe

What is Resource HackerTM?

Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.

Viewing Resources: Cursor, Icon, Bitmap, GIF, AVI, and JPG resource images can be viewed. WAV and MIDI audio resources can be played. Menus, Dialogs, MessageTables, StringTables, Accelerators, Delphi Forms, and VersionInfo resources can be viewed as decompiled resource scripts. Menus and Dialogs can also be viewed as they would appear in a running application.

Saving Resources: Resources can be saved as image files (*.ico, *.bmp etc), as script files (*.rc), as binary resource files (*.res), or as untyped binary files (*.bin).

Modifying Resources: Resources can be modified by replacing the resource with a resource located in another file (*.ico, *.bmp, *.res etc) or by using the internal resource script compiler (for menus, dialogs etc). Dialog controls can also be visually moved and/or resized by clicking and dragging the respective dialog controls prior to recompiling with the internal compiler.

Adding Resources: Resources can be added to an application by copying them from external resource files (*.res).

Deleting Resources: Most compilers add resources into applications which are never used by the application. Removing unused resources can reduce an application's size.Licence to Use - Terms and Conditions:
This Resource HackerTM software is released as freeware provided that you agree to the following terms and conditions:
  1. This software is not to be distributed via any website domain or any other media without the prior written approval of the copyright owner.
  2. This software is not to be used in any way to illegally modify software.
DISCLAIMER: A user of this Resource HackerTM software acknowledges that he or she is receiving this software on an "as is" basis and the user is not relying on the accuracy or functionality of the software for any purpose. The user further acknowledges that any use of this software will be at the user's own risk and the copyright owner accepts no responsibility whatsoever arising from the use or application of the software.
The above licence terms constitute "copyright management information" within the meaning of Section 1202 of Title 17 of the United States Code and must not be altered or removed from the licensed works. Their alteration or removal from the licensed works, and the distribution of licensed works without all the above licence terms in an unaltered way, may contravene Section 1202 and give rise civil and/or criminal consequences.
 
   

GOGGLE HACKING TRICKS

Google hacking

Basics

Google hacking involves using advance operators in the Google to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable web applications. The following search query would locate all web pages that have that particular text contained within them. It is normal for defaulty installations of applications to include their running version in every page they serve, e.g., "Powered by XOOPS 2.2.3 Final".
The following search query will locate all websites that have the words "admbook" and "version" in the title of the website. It also checks to ensure that the web page being accessed is a PHP file.
Another technique is searching for insecure coding practices in the public code indexed by GOOGLE SEARCH or other source code search engines.
One can even retrieve the username and password list from VISIT HERE servers by inputting the given microscript in Google search field:

hacking tricks

Welcome to the web's most helpful Online Free computer tips and tricks website. This site contains all Latest and Cool Computer tricks as well as some Internet Tricks, Registry tricks, Orkut tricks, Windows tips to customize and Optimize the performance of the system by tweaking or tricking the windows registry keys. Solve your computer problems by browsing the website for related Computer solution.

All tips work well in both Windows XP as well as windows vista or win 7 operating systems. Need some Computer Help or any computer assistance in troubleshooting any errors or problems, you are almost welcome to contact hack2007. These windows registry edits and internet Hacks are safe to try and are free from any virus or Spyware. Here at Hack2007 you are going to learn from Basic Computer tips to Advanced computer tips and Computer Hacking that will help you to be a computer master on your own. All the computer tips at Hack2007 are very interesting and are mainly meant for education purpose. Visit my new Computer Tips Blog and leave your comments and suggestions.

how to hack a digital cemera.

Instructables user [Justin] generally enjoyed shooting video with his Canon 60D DSLR, though there was one small problem. The only way that the camera could be remotely triggered to shoot video was via a small IR remote with a paltry 10 foot range. Even worse, the remote had to be pointed directly at the front of the camera to work at all. To remedy the situation,

He cobbled together an Arduino with components he had sitting around, mounting it in a project box on top of the camera. A commercially available RF remote shutter release is also mounted on the top of the camera, and wired to the Arduino using a small 2.5mm plug. When he activates the RF remote, it sends a pulse to the Arduino, which in turn sends the appropriate signal to his camera via a small IR LED.

While he readily admits that he could have likely used a much simpler configuration, the Arduino does its job, and he’s quite happy with his solution. We agree with him about the Arduino, but it’s hard to argue with saving money by using components you already have on-hand.

While the Kinect is great at tracking gross body movements and discerning what part of a person’s skeleton is moving in front of the camera, the device most definitely has its shortfalls. For instance, facial recognition is quite limited, and we’re guessing that it couldn’t easily track an individual’s eye throughout the room.

No, for tracking like that, you would need something far more robust. Under the guidance of [Krystian Mikolajczyk and Jiri Matas], PhD student [Zdenek Kalal] has been working on
which has some pretty amazing

capabilities. The software uses almost any computer-connected camera to simultaneously Track an object, Learn its appearance, and Detect the object whenever it appears in the video stream. The software is so effective as you can see in the video below, that it has been dubbed “Predator”.

Once he has chosen an object within the camera’s field of vision, the software monitors that object, learning more and more about how it looks under different conditions. The software’s learning abilities allow it to pick out individual facial features, follow moving objects in video, and can recognize an individual’s face amid a collection of others.

While the software can currently only track one object at a time, we imagine that with some additional development
and computing horsepower, this technology will become even more amazing.

[Samuel Sargent] built his own lens for making stacked macro images.This project, which was completed as part of his senior thesis, utilizes a Zeiss enlarger lens. The aperture ring was broken, making it difficult to tell how much light was being let into the camera. Instead of scrapping the whole thing he turned it around, making it a macro lens when combined with a few other parts. He’s used a Nikon PB-5 belows, a PK-13 extension tube, and a body cap to provide a way to mount the lens to his camera. A hole was added to the body cap using his Dremel, and a liberal dose of epoxy putty seals all of the gaps.

After the break you can see a couple of photos that [Samuel] made of bismuth. He estimates the sharpest focal length by taking a few test shots. Next he captures a series of images, moving the bellows slightly between each shot. Finally, this set is
ate

diy_camera_stabilizer

Commercial vest-based camera stabilizer systems are quite expensive, sometimes bearing price tags in the $700-$800 dollar range. Photographer [Miguel Vicente] has a pretty well-stocked workshop and decided there was no way he would shell out that much cash for a rig,

“Simply” is a bit of a misstatement, to be honest. The system looks relatively complex, judging by the build videos embedded below. Constructed of steel tubing, custom-built springs, and a really snazzy vest, the rig is adjustable in almost every direction. He has tested its capacity up to 2.5 Kg (roughly 5.5 pounds), though he says it’s pretty unruly to manage at that weight. [Miguel] says that 1.5 Kg (3.3 pounds) is a far more reasonable limit, and that the stabilizer works quite well at or below that weight.

While it looks pretty good to us, he says that there are plans to improve the design even further. One particular point that he wants to address is the ability for the stabilizer to accept asymmetric camera setups, i.e. cameras with attached lighting and microphones.

Stick around to see a short “highlight” film of the build process, as well as a video featuring a more thorough documentation of the stabilizer’s construction.
[Vicktor] has always been fascinated by photographs of lightning and decided to try his hand at capturing a few strikes on his camera. Every time he attempted it however, he didn’t have much success. Instead of trying to operate his camera manually to take the images, he decided to

His circuit uses a large photodiode to sense when lightning strikes, triggering the camera via a hacked shutter release cable. A PIC micro controller is used to adjust the sensitivity of the device, as well as to send the actual trigger signal to the camera. His circuit is connected to the camera via a pair of opto couplers to ensure that his circuit cannot cause any harm to the camera.

When the box is powered on, it enters a calibration mode where the user can adjust the circuit to compensate for whatever amount of ambient light is present. Once armed, the box waits for a sudden change in ambient lighting, sending the exposure release signal to the camera.

A schematic is available on his site, and he will send you the code he use on request. There is currently no video of the trigger in action, but hopefully we’ll see one soon.

If you’re interested in seeing some other remote camera triggers, check out this one

how to hack digital audio system.

[Alex] tiped us off about the evil sounding noises coming from when you go there your pretty much greeted with a

wav file and if you have a quick eye on the status bar its pretty easy to get the direct link to the file and download it. Thats all great, but why would you want to?

Well if you play back the file in a program that supports spectrograms (like audacity) you will find that there is a twitter hash hidden within the audio spectrum, that presents itself as plain text in a pretty well rendered font. Of course this leads you to another part of the site where yet another puzzle awaits you.

While this is all an interesting way to stir up buzz about the upcoming (Batman) movie, we found hiding plain text in an audio file pretty wild, though its been done before or better such as the post we had not too long ago about Ham’sPink noise is somewhere in between red noise and white noise. Didn’t realize there were more colors than just white when it comes to noise? The benefit of testing

sound – white noise increases in power with each additional octave which can damage the tweeters in a sound system.

The goal in this design was to build a noise generator that fit into an XLR connector.
standalone power source. For instance, the design he based this on required two 9v batteries. The size, the choice of case, and the absence of a battery all spell WIN for this project.

contests-hackers

Rube Goldberg machines are always a fan favorite around here. They truly embody the concept of over-engineering, and are an entertaining departure from what we normally cover on Hackaday.

Back in February, engineering students from two on-campus professional associations at Purdue University teamed up to construct a
Their entry in the Purdue Regional Rube Goldberg Machine

Contest not only won them the regional title, but also potentially put them in the books as creating the most complex device of its nature.

Their contraption was dubbed “The Time Machine” and acts out events in our planet’s history. It starts with the big bang, moving through various other time periods, including the stone age, ancient Egypt, and the medieval era. It also makes several stops in more recent times, including World War II and the Cold War, before self-destructing at the Apocalypse.

All told, the machine incorporates 244 steps to water a plant, which is 14 more than the previous record holder. Continue reading to see a video that highlights some of the machine’s more interesting features, and be sure to
It’s been nearly two months since the official entry portion of the 555 timer contest came to a close, and the judges have been busy poring over the 200+ entries since. Now that the votes have been tallied, it’sThe results will be live streamed this evening at 9pm Eastern, and you can watch the results

awards given out this evening, highlighting the most complex, most minimalistic, most artistic, and most useful 555 creations. There are also “Best in Show” and “Best Under 18” awards up for grabs, the winners of which were selected by celebrity judges Forrest Mims and Hans Camenzind.

The show will definitely be worth checking out – we’ll be there at 9pm sharp, see you there!
If you want to take a look at some of the 555 Contest entries we featured throughout February, check these out:20 is only 10 days away! Great, what the heck is Ludum Dare? Well its

only the most awesome video game creation contest on the internet, thats what. While originally for the hardest of the hard core, it has recently been split up into 2 events so everyone gets to have some fun.

The Jam is pretty relaxed in the rules. Lets say you and 4 buddies want to make the ultimate zelda remix using fan sprites and free music. This is where you want to be. Its there to give people who want to join in the fun but not make serious obligations.

The Compo is the real deal for those who are insane, or really good. You are given a theme at the start of the contest and 48 hours. You must then work solo and create all original content to use within your game. You can however use premade frameworks, game engines, libraries etc to accomplish your goal, but if you really wanted to you could make a 3D engine with brain fu*k during the competition. (though I would not advise it)

Prizes include internet bragging rights, and quite possibility the best darn feeling of accomplishment possible IF you manage to come up with some form of game, based on a voted theme, by yourself, in less than 48 hours.

how to hack cnc

[Patrick McCabe] enjoys the challenge of playing chess against the computer but he wasn’t satisfied with the flat experience of on-screen gaming. No problem, he just built his own that he can play against. Don’t be confused, he stilill doesn’t have to touch the pieces, but instead uses the dedicated control board seen on the left of the image above. The robotic arm that is mounted on a gantry takes care

of moves for both players.

It’s a pretty normal CNC build, using four stepper motors to slide the moving bits along precision rod. An Arduino Mega drives the system, with a PC doing the heavy lifting using a program called

We certainly like it that [Patrick] spent a little bit of time making the cabinet and visible parts look nice. Chess is a civilized game and unfinished parts would be out-of-place. We didn’t see it in his writeup, but the one feature we’re really hoping he has implemented is the ability to have the robot automatically reset the board at the beginning of a game.

As you might have guess, you’ll find embedded video after the break.
Looking for more ways to enhance his 3D printer, [JJ

thing to make the link with his laptop.

They came as surface mount modules, so the first thing he had to do was develop a breakout board that he could patch into his

opportunity as he needed to do some level converting to make the 3.3V module play nicely with his 5V CNC electronics. The first version of the board turned out well but he had really a poor communications range. The second version, which is pictured above, hangs the module’s antenna off the edge of the breakout board and works a lot better.

We’ve embedded a clip after the break that walks through the development of this board. [JJ] shared the Eagle CAD files as a megaupload link, but we’ve also mirrored the file after the break for your convenience.

how to hack a clock

Like many electronics hobbyists, [Pete] found that he had an overwhelming desire to build a clock for himself. He didn’t want to stick a discrete real time clock IC into a boxnd call it a day

around a microcontroller instead.

After researching the specs on a few RTC ICs, he defined some accuracy requirements for his clock, and got to building. He started out using a 32,768 Hz watch crystal, but found that the accuracy was off by about 46 ppm after only 24 hours of use. That fell well beyond his self-imposed +/- 3 ppm tolerance goal, so he purchased an oscillator with about 500 times the resolution of his previous crystal.

After writing a handful of code to ensure that the clock remains stable, he calculated that his accuracy should be about 0.18 ppm – well within his acceptable tolerance range.

[Pete] says that this is just the first part of his clock construction, and that future revisions should include plenty of additional functionality, so keep an eye out for updates.
[Alex] has reduced the resolution of his timepiece as a trade-off for speedy-readability. At least that’s what he claims

ShiftBrite to slowly alter the hue of the clock based on the current time. The concept is interesting: 12:00 starts off at white and slowly fades to green at 3:00, blue at 6:00, red at 9:00, and back to white by 12:00 to start the process over again. He has gotten to the point where he can get the time within about 15 minutes just with a quick look. But he did need to spend a few days acquiring the skill by having the color clock sit next to a traditional digital clock.

The build is pretty simple and we’d bet you already have what you need to make your own. [Alex] is really just proving a concept by using the ShiftBrite and an mBed, there’s no precision RTC involved here. So grab your microcontroller of choice, and an RGB LED of your own and see if you can’t recreate his build.
If you don’t have a 9-to-5 type of job you might find yourself constantly resetting your alarm clock as your calendar commitments change. [Lucas] finally got fed up with the nightly ritual and decided to build his ownThe display itself is an LM044L 20×4 character display. This provides a viewing area that is about 3″x1″ and since it’s an HD44780 compliant LCD screen, writing data to it takes very little effort (and RAM) compared to a graphic LCD. A PIC 18F2550 drives the device, taking input from a half-dozen buttons, driving the display, and turning on the enclosed buzzer when it’s time to get up. There’s a backup battery which will keep the settings when power is lost. The daily alarms, current time, and back light brightness can all be adjusted from the four screens that make up the settings menus. The only thing that it’s missing is a precision timekeeper, but that should be easy to add either by measuring the frequency of the mains or by using an RTC chip.

classic hacks-hackers

While Boston Dynamics’ Big Dog is pretty impressive

of the US Army’s first attempt at a quadruped vehicle. Created in the early 1960s with the help of GE, this Army experiment was the first successful attempt of replicating a four-legged animal with a mechanical machine.

This “Walking Truck” was driven by a single operator who moved each of the vehicle’s legs using force-feedback hydraulic levers. Choreographing the machine’s movement was quite complicated, and during testing the Army found that the operator needed a mental break after only 15 minutes of use. As you can see in the video, the vehicle flexes some serious muscle. It kicks a Jeep out of its way with little effort, but it is still able to gently step on a light bulb without breaking it, due to the level of tactile feedback received by the operator.

If it weren’t for government budget cuts, we could be living out [George Lucas’] dream of AT-AT based combat right this minute!
How many 555 timers does it take to add up two 10 digit numbers? [Alan'sdoes it with 102 of them, he designed the machine as an extreme

entry to the 555 contest and the original plan was to make it even more complicated. This machine uses the 555′s to implement a nine decade accumulator and multiplexer, all inputs are managed by an old school dial from a rotary phone which apparently provide nicely timed outputs. Addition and subtraction are achieved using 9s compliment arithmetic which he discusses in the video after the break, for anyone who wants to brush up on 9s compliment or 555 theory.

Alan’s website has some nice pictures (We’re particularly impressed by all that minimalistic soldering) including schematics, and a very nice 33 minute video in which he discusses in detail how the machine works and even offers some history on the Pascaline, which is mechanical calculator that works on similar principles.
If you are a frequent reader, you are undoubtedly familiar with hacker [Sprite_tm]. He has been working with fellow members of the TkkrLab hackerspace to get things ready for their official grand opening on May 28th, and wrote in to share

As part of their preparations, they have been stocking the joint with all sorts of hacker-friendly goodies including plenty of tools and Club Mate, as well as a vintage ‘1943’ arcade cabinet. The game is a group favorite, though every time the power is turned off, it loses all of the hard-earned high scores. [Sprite_tm] knew he could improve on the current paper-based score register, so he pulled the machine open to see what could be done.

He used an AVR to tap into the machine’s Z80 logic board, allowing him to read and write to the entirety of the game’s RAM whenever he pleased. This enabled him to keep tabs on the high scores, restoring them to memory whenever the machine is powered back on. The addition of the AVR also allowed him to add a TCP/IP interface, which is used to send high scores to Twitter whenever someone beats the previous record.

His modular bus tap can be used in all sorts of Z80-based hardware, so if you have some vintage equipment laying around, be sure to swing by his site for a more detailed look at the build process.

how to hack black berry

Scott] was looking to source some LCD screens for an upcoming project, and was considering buying them from SparkFun. While the Nokia panels they sell are not expensive, they aren’t necessarily the cheapest option either – especially when building in volume.

He searched around for something he could use instead

Old Blackberry models were even more durable than the current offerings, plus companies are trying to get rid of old handsets by the truckload. The only problem was that he could not find any information online that would show him how to write to the screens.

It took a bit of digging, but he eventually determined which ICs were used to drive the LCD screen. He had no luck finding screen pinout information online, so after spending a few hours testing things with his multimeter, he came up with a full listing on his own.

He wired up a connector so that he could use the screen on a breadboard, then got busy writing code to display some text on the screen. Everything came together nicely as you can see in the video below, and he has released his code in case anyone else is looking to repurpose some old Blackberry screens.

All we want to know is what sort of project all these screens are going to be used in.
On the standard Web Browser, there is a fixed file download limit of 2.3MB. Many users avoid this by installing a 3rd party browser (such aexample), but there is still that bitter taste for having an extra web browser around just to download decently sized files. This limit seems to be imposed by a certain

use a different port without this restriction. Step by step walk through, links to the file required, and screen shots of large file downloads are provided. [0mie] claims that this hack works on a number of different phones and OS versions, and we are sure he would appreciate a wider audience to test this with.

[Note: This hack seems to use a Chinese provider as a proxy, so there may be privacy issues, etc. As always, hack at your own risk.]

chemistry hacks

Portal turret plushie is cute and harmless
posted Apr 25th 2011 6:49am by Mike Nathan
filed under: arduino hacks, chemistry hacks, toy hacks

turret_plushie

As many of you are probably aware, Portal 2 was released last week, and gamers have been going crazy over it. Over the years, people have constructed replicas of their favorite in-game items and “characters”, including portal guns, companion cubes, and turrets.

Portal turret plushie is cute and harmless
posted Apr 25th 2011 6:49am by Mike Nathan
filed under: arduino hacks, chemistry hacks, toy hacks

turret_plushie

As many of you are probably aware, Portal 2 was released last week, and gamers have been going crazy over it. Over the years, people have constructed replicas of their favorite in-game items and “characters”, including portal guns, companion cubes, and turrets.

After playing Portal 2 for a bit, [Jonathan] wanted a turret of his own quite badly. Rather than construct it from hard plastics and resins however, he decided he wanted to construct a cuddly turret that talked.

With the assistance of his friend [Leigh Nunan], he is now the proud owner of a plushie turret. It’s a bit smaller than you might expect, but it is packed full of turret personality. The plushie plays audio from the game, can sense motion near its face, detect if it has been tipped over, and also knows when it has been picked up. [Jonathan] added all of these features by stuffing an Arduino inside the turret, along with a wave shield for playing sounds. Proximity and motion sensing are provided via a trio of different sensors, enabling the turret to behave in the same way its in-game brethren do (minus the machine guns).

It really is a neat little toy, one we would no doubt be glad to have around. Keep reading to see a short video of his plushie turret in action.

Read the rest of this entry »

* Share this:
*
*
*
*
*
*
*
*

* Comments [16]

Powering vehicles with aluminum
posted Apr 19th 2011 12:30pm by Mike Szczys
filed under: chemistry hacks

Pop a few aluminum bits into this little RC racer and you’ll have power for around forty minutes. This concept, which has been patented, is the result of a college research project. It uses a chemical reaction between aqueous Sodium Hydroxide and aluminum. The result of that reaction is hydrogen, which is gathered and directed to a fuel cell that drives the car.

Novel? Yes. Interesting? Absolutely. But you should be raising an eyebrow at the dubious choice of fuel that is aluminum.

If you don’t know what we’re talking about let us paint you a picture. Aluminum is a metal that is refined from bauxite ore. It takes an immense amount of electricity to smelt the metal. This is usually justified because aluminum is one of the most recyclable substances on earth, capable of being melted down and reformed countless times. But dissolving it in drain cleaner breaks it down and then it’s gone. So what we have here simply must be the least efficient disposable battery so far d
After playing Portal 2 for a bit

than construct it from hard plastics and resins however, he decided he wanted to construct a cuddly turret that talked.

With the assistance of his friend [Leigh Nunan], he is now the proud owner of a plushie turret. It’s a bit smaller than you might expect, but it is packed full of turret personality. The plushie plays audio from the game, can sense motion near its face, detect if it has been tipped over, and also knows when it has been picked up. [Jonathan] added all of these features by stuffing an Arduino inside the turret, along with a wave shield for playing sounds. Proximity and motion sensing are provided via a trio of different sensors, enabling the turret to behave in the same way its in-game brethren do (minus the machine guns).

It really is a neat little toy, one we would no doubt be glad to have around. Keep reading to see a short video of his plushie turret in action.
and you’ll have power for around forty minutes. This concept, which has been patented, is the result of a c

minutes. This concept, which has been patented, is the result of a college research project. It uses a chemical reaction between aqueous Sodium Hydroxide and aluminum. The result of that reaction is hydrogen, which is gathered and directed to a fuel cell that drives the car.

Novel? Yes. Interesting? Absolutely. But you should be raising an eyebrow at the dubious choice of fuel that is aluminum.

If you don’t know what we’re talking about let us paint you a picture. Aluminum is a metal that is refined from bauxite ore. It takes an immense amount of electricity to smelt the metal. This is usually justified because aluminum is one of the most recyclable substances on earth, capable of being melted down and reformed countless times. But dissolving it in drain cleaner breaks it down and then it’s gone. So what we have here simply must be the least efficient disposable battery so far
at we have here simply must be the least efficient disposable battery so far developed. It’d probably use less resources to grow and

how to hack a cell phone

Here’s the scenario: you’re going to be traveling somewhere and you’ll be charged roaming fees if you use your cellphone. But there is free WiFi available in this place. You can save yourself money by

[Trax] is using a USB GSM modem to take cellphone calls on a PC. He leaves his sim card in this modem so that it can make and receive calls and text messages through your normal telephone number. For some reason, the USB connection only provides control of this modem and doesn’t pass bi-directional audio. To make this happen, he built an audio interface cable using two transformers and a few passive components to connect the modem to the computer’s audio card.

On the software side of things, an application written in Delphi 7 manages the modem, the audio stream, and the Skype application. When a call is incoming it sets up a Skype connection with your handset via the Internet, passing along the caller ID data in the process. If you choose to answer the Skype session the application will pick up the GSM call and you’ll be connected. It works the same way when placing an outgoing call.

Kyle] was digging through a box of junk he had lying around when he came across an old USB Bluetooth dongle. He stopped using it ages ago because he was unsatisfied with the limited range of Bluetooth communications.

He was going to toss it back into the box when an idea struck him – he had always been a fan of WiFi wardriving, why not try doing the same thing with Bluetooth? Obviously the range issue comes into play yet again, so he started searching around

He dismantled the dongle and found that the internal antenna was a simple metal strip. He didn’t think there would be any harm in trying to extend the antenna, so he soldered an alligator clip to the wire and connected the CB antenna in his truck. His laptop sprung to life instantly, picking up his phone located about 100 feet away in his house. He took the show on the road and was able to pick up 27 different phones set in discoverable mode while sitting in the parking lot of a fast food chain.

While it does work, we’re pretty sure that the CB antenna isn’t the most ideal extension of the Bluetooth radio. We would love to see what kind of range he would get with a properly tuned antenna.

Keep reading to see a quick demonstration of his improvised long-range Bluetooth antenna.

how to hack a android

[Joe] was experimenting with his Arduino when he started thinking about how he could get it to communicate wirelessly with his Android phone. Bluetooth is an option, but it requires some extra components, and Google’s ADK works as well – just not wirelessly.

Instead, he thought it would be neat to see if he could

connecting it to the Arduino via a resistor and diode. Using the Android Tricorder app, he was able to locate his phone’s magnetometer, after which he ran some tests to narrow down the best sample rate and frequency range for communications.

To transfer data between the two devices, he had to bit bang the signal in software, since the Arduino’s UART has a lower limit far faster than the 7 bps data rate he was able to achieve with the magnetometer.

While his wireless Arduino to Android bridge isn’t likely to win any awards for throughput, it is a great proof of concept project. Be sure to check out the video below to see his “poor man’s NFC” in action.

how to hack visa card

VISA HACK


You are probably wondering what I mean when I say Visa
Hack? Well actually a baby could do this, its so easy... well
you have 2 types of visa formats they are:
xxxx-xxxx-xxxx
xxxx-xxx-xxx-xxx
Now with thez formats you can generate 10 cards and they will
work and you have 1 original with the experation date.. so for
example I'll use this visa card (which worx)

4502-288-854-699
ex. date 9-92

ok this is the eazy way to do it and the only way.. now you have
thoz #'z to work with.. watch close!

4502-288-854-699
^^^


123

I numbered thoz last 3 digits 1,2,and 3... you will only change
thoz last 3 digits.. now watch

4502-288-854-699
^^^


123


590

491

392

You take #1:
you will lower that digit by 1 number each time...

You take #2:
you keep that number the same ALWAYS!

you take #3:
you raise that 1 number everytime..

Thatz all there is to it... now you are probably wondering about
the ex.date right? well, the ex. date was 9/92 on the 1st
card.. you have now generated 10 new cardz.. you should
have this.

4502-288-854-699
4502-288-854-590
4502-288-854-491
4502-288-854-392
4502-288-854-293
4502-288-854-194
4502-288-854-095
4502-288-854-996
4502-288-854-897
4502-288-854-798

thoz are the cc#'z.. now the experation date again was:
9/92 for the first card... so guess what! you keep the ex. date
the same on every card...

how to hack mobile balance

Is Mobile Phone Hacking Possible?

By Aamir Attaa · Thursday, May 22, 2008 107 Comments

Share on Google Buzz

If you like this post then you may also like receiving latest news Every Morning in your email Click here to Subscribe

Or follow ProPakistani on Twitter

Can any one hack Mobile Phone Communication ??? Below is the series of emails and discussion that may reveal instances of Mobile Phone hacking in Pakistan. I am not adding anything, as Zeeshan (the victim) has himself briefed everything.

Only one guide that i want to add is “Immediately change your SIM once you find out that someone is intercepting your communication. Don’t try experiment with any such interception”

Almost 2 weeks ago, 1 got following email from Mr. Zeeshan…

Assalamo Alaikum.

I have been facing a lot of trouble for the last many weeks. It seems as if my Ufone number has been hacked by someone. I have been receiving calls from multiple spoofed numbers which include mobile and land line id’s. My text messages are being intercepted before or after they are delivered to my friends.

The sender (Hacker) has full command over the delivery date, time and telephone number of his choice and he can read my messages and send a reply from any cell number he desires, I am really puzzled. I have sent complaints to the Ufone and PTA authorities through email but they didn’t consider heeding them.

Afterwards, the issue was taken to TGP by Babar Bhatti, and following is the crux of discussion that w

“I really wonder if this can be done by anyone else other than the Operator (at the MSC) or by the legal intercept spooks”…..”I am not going to narrate the details how they do it, as it may reveal very crucial information through which one can intercept your GSM communication”…..”To be quite fair, this sounds like a phone hack and not a sim hack”….”Most of the companies are outsourcing their call-centers now a days and there’s a high chance that the applications are misused by CSR within Operator or their partners”….”as above i would call it inside job”

Mr. Zeeshan mailed me back, with following content after the discussion…

In response to these comments I would ask your permission to let me furnish a few details. I am a student and my phone usage is purely of domestic origin. I don’t consider myself to be liable for the Legal Interception. Secondly, I am using a handset which doesn’t contain GPRS, infrared or Bluetooth facilities, so the possibilities of phone hack are out of place.

About two years ago I received a call from my sister’s cell number, who teaches at University of Karachi. There was a male on the other end who appeared to be a literate figure with an enchanting voice like most of the operators/service representatives possess. He told me that he had found the cell from the parking area and he was willing to return it back to us. I made two or three subsequent calls on the same (my sister’s) number that and it was received by the same person. But when I contacted my sister at her office, she was amazed over the whole situation since her cell was in her possession. I just couldn’t understand how could that man call me and receive my calls.

The same person made me a call from a local land line number a few days later and introduced himself as a service representative of Ufone. He further asked me to let him know three ufone numbers of my choice that I wished to be included into my free favorite list. I didn’t took him serious this time. But when I tried to recall him the number was dead. What was that?

It is for the last many weeks that I am facing similar problems more frequently. The culprit rings me miss calls from multiple mobile, local and international numbers and sends me messages from multiple mobile numbers which include almost all cellular networks of Pakistan. He has even communicated me through the numbers of my contacts via SMS. Whenever one of my contact makes me call or I call him/her during the call an SMS comes from the same number with wordings as, ”KEUN TANGG KARTAY HO ISAY.BOHAT ACHA LAGTA HAY MUJHAY PARESHAN KAR K” etc.. I am sure he can even listen our conversation since short after disconnecting the call I receive messages from the same number that are relevant to the course of the conversation. Let me tell you that most of the spoofed mobile and landline numbers belong to the Punjab region. I really am fed up of this situation and I have settled to terminate the use of a cell phone .This is a ruthless practice of Harassment and no one is there to rescue the victims. I am sure that I am not alone having such complaints. But I am the one who have raised my voice in pursuit of guidance and security.
Zeeshan

How do i hack my router password

How do i hack my router password?
My dad has blocked a blog site. When i try to open 192.168.1.2, i get the router control page, but when i click on the administration tab, i get this thing that asks me for a password and a user name. How can i hack the pass and the user. Don't tell me to talk w/ my dad. Don't tell me to reset cause then he'll know. btw, im on a wireless network and my computer doesn't have the router driver on it. I cannot change the pass and user because then my dad will know. I might have an idea of the pass, but i don't know the user. HELP and don't say ethical things PLZ cause i am a straight A student and in all Honors and AP classes so, i don't need ant bull that i should talk to my dad and see if he's unhappy w/ my grades.

3 years ago

how to hack google account

today morning i got a wierd mail that says you can hack gmail easily

here is the body of the letter

********************************
hi friends,

By continuing on down this letter you agree that Hack_Attack69
will not be held responsible for any misuse of
information within these pages. This letter is purely for educational use.
If your intentions are similar proceed
but if not you will be held responsible
for your own mistakes Hello gmail users.
There have been many attempts to hack
gmail.com. Unfortunatly all of them have failed,
EXCEPT this one. I though have found out
a revolutionary way to hack gmail.
And might I add it's az easy az ABC.
After 8 months of research we have
found the broken link. AdminPassBot to be exact. AutoPassBot[put at-character here]gmail.com
is a bot, an auto bot.
You send it a letter and within a week it will
send you one back. The ULTIMATE hack for gmail is as follows:

First send a letter to adminpasster[put at-character here]gmail.com, second
within the Subject heading place the word "Password"
(not in quotes but has to have a capital P) this way
he automated bot recognizes what you are after. Then
in the text field place the name of the person at
gmail that you want to hack (Do not put @gmail.com
after their name). No capital letters are to be put in this place.
Then skip three (3) lines and place your own gmail account
information such as: My login:My password (a smeicolon
makes it easier for the bot to recognize). This way the bot
can verify that your account actually exists. And then supplies
you with the password for the person's account that
you want it for. Here is an example:

To: adminpasster[put at-character here]gmail.com
bcc:
cc:
Subject: Password

login of the person you want to hack



yourlogin:yourpassword

*********************************

[ reformatted – Ionut]

how to hack data through bluetooth and how to protect your self

You may not realize that walking around with Bluetooth enabled on your cell phone leaves you vulnerable to hackers. They can easily connect and manipulate your phone simply by using a Bluetooth connection. We’re here to explain how it’s done and how to protect yourself from such an attack.

Bluetooth is a short-range wireless communication technology that uses the 2.4-GHz frequency range for its transmission. Most new cell phones have Bluetooth by default these days for things like wireless headsets, in-car connectivity, syncing with a computer and many other uses. While Bluetooth has proved to be a very useful tool for cell phones, many are unaware that it opens doors to hackers.

Cell phones, and the telecommunication industry as a whole, was once a “closed network,” meaning the technology used was closed from outside hackers (for the most part). Today, as cell phones become more like mini-computers, the industry has opened up, so to speak, and just like computers have always been susceptible to attacks, the same is now true for cell phones and mobile devices.

Up until Bluetooth was incorporated on cell phones, the only communication method used by the device was the carrier or network connection. Now that Bluetooth has been associated, it provides a perfect entry point for manipulation. The fact that cell phones carry a lot of private data these days, makes “Bluetooth attacks” even more scary. While simply having Bluetooth as a feature on your cell phone doesn’t make you vulnerable to attacks, walking around with the Bluetooth function enabled and “visible” does. Many people turn on Bluetooth to use a headset or sync with their computer, and then simply forget to turn it back off when they’re done. This is why Bluetooth hacking has become so prevalent and so easy to do.

When Bluetooth is enabled on your device, it’s essentially broadcasting the fact that “I’m here, and I’m able to connect” to any other Bluetooth-based devices within range. This makes using Bluetooth simple and straightforward for the consumer, but also lets hackers know which ones to target very easily. Here’s how it’s done; a hacker can simply download some special software and install it on a laptop or netbook. He can then install a Bluetooth antenna to that computer and put everything in a backpack, briefcase, etc. Now, all he has to do is walk around public places where a lot of people are concentrated, and let the computer running in his bag do all the work while no one has any idea what’s happening.

The software on the computer will constantly scan the nearby surroundings of the hacker for active Bluetooth connections, and when it finds them, can do a variety of things without the owner having any idea what’s going on. The entire process is automated for the hacker as well, so all he has to do is walk around for as long as he can and collect as much data as possible, which he can then manipulate. Some attacks are less damaging from others, but Bluetooth allows the hacker to do many things.

Once the hacker’s software finds and connects to a vulnerable Bluetooth-enabled cell phone, it can do things like download address book information, photos, calendars, SIM card details, make long-distance phone calls using the hacked device, bug phone calls and much more. There’s a myriad of software freely available that’s made specifically to attack cell phones via Bluetooth connections, and every time an update to the technology or certain cell phones becomes available there’s bound to be new hacking software for it. Certain attacks have become so prevalent that they even have names these days;

“Bluesnarfing” is the term associated with downloading any and all information from a hacked device, and can even allow the hacker to send a “corruption code” to completely shut the phone down and make it unusable. “Bluebugging” is an even scarier hack- it involves using special software to connect to a device and silently making it call another device, usually one the hacker is using, to act as a phone bug. The hacker can then listen in on anything you and anyone around you is saying. Beyond these attacks, hackers can use software to route long-distance calls to worldwide locations to your phone using Bluetooth, which in turn sticks you with the carrier roaming charges. Likewise, a hacked phone can even remotely be used to make “micro-purchases,” or purchases that show up on subscriber’s monthly bills.

The possibilities are virtually endless, and these are just a few examples of what can be done utilizing the Bluetooth connection on cell phones. Many think that they’re safe from such attacks because Bluetooth is such a short-range communication method- a hacker would have to be within a few feet to be able to do anything. With special antennae that’s been developed solely for this application, hackers can connect to cell phones that are up to a 1000 feet and more away. The entire process is just to easy for hackers, all they need is some special software, an antenna of some sort and some basic knowledge.

Luckily, not all Bluetooth-enabled cell phones are vulnerable to all attacks. Bluesnarfing and other attacks may work while bluebugging doesn’t on one make and model of cell phone, while only bluebugging and nothing else works on another. That’s why hackers generally setup a variety of hacks, and when they’re out and about performing their attacks on un-suspecting victims, the software will automatically identify the cell phone model and attack it accordingly in any way it knows how. The bottom line is any cell phone that has built-in Bluetooth can be hacked, it’s just a matter of what type of hacks can be performed.

The best way to avoid such an attack is to simply remember to turn off your Bluetooth when you’re not using it. A lot of people will simply put Bluetooth in “hidden,” or “private” mode which they think will hide themselves from attacks, but in reality, hackers have already figured out how to find them. Disabling the function altogether is the only way to curb an attack. Bluetooth hacking hasn’t become as big a problem in the US as it has elsewhere where Bluetooth is almost ubiquitous, but it will soon.

In Europe, people use Bluetooth and their cell phones to make purchases and to store very critical financial and personal information. Bluetooth hacking becomes much more serious when they have access to such delicate information. As that technology moves its way to the US, we’ll have to deal with the same issues, that’s why it’s important to know how it all works and how to proactively protect yourself.

how to hack xbox live account

ATTN. REGISTERED XBOX360/PS3/PSP-HACKS FORUM USERS

If you're a previously registered PS3-Hacks or Xbox360-hacks user and cannot currently log in, you may need to reset your password by clicking here. We apologize for the inconvenience. Should you require further assistance, please contact us via admin@dashhacks.com. New users, click here to register.

If you had two accounts - created prior to April 17, 2011 - on both PSP-Hacks, PS3-Hacks and/or Xbox360-Hacks we can merge your accounts together. Please email admin@dashhacks.com with your usernames and email addresses.

ATTN. GUESTS / UNREGISTERED USERS
Take this opportunity to register and in return you're presented with less advertisements.

Xbox360 Hacks All latest news and information regarding Xbox360 hacking, experiments, and so on...
If course it did, Hackthathoe, you just signed in with a different user name.

Unfortunately for YOU, it's against the rules, so you lose this one, and you get this warning, the next offense will be a ban.

USER ID
You may not have more than one User ID per IP address, one WILL be deleted. The only exception; if two members in the same household are logging in. You must explain this to the administration.

.....These rules are just an outline. You may be banned, or warned for a rule that does not exist here. Use common sense, and have fun! The moderator staff will warn you with minor offenses, and all you will need to do is correct, fix, or comply, to avoid an immediate ban.

how to hack zynga account

How To: Hack Zynga Poker Accounts

not written by me..FOR EDUCATIONAL PURPOSES ONLY!!

First thing I gotta tell you is that this is not a Zynga Hack. It's a tutorial/technique about getting accounts with BIG $$$. I'll try to make this as easy to understand as possible.


Step 0. Make a phisher/keylogger/RAT/ or build up some super SE skills.

Step 1. Make an account with one of the following social networking sites (MySpace, Bebo, Hi5, Tagged, Facebook) NOTE: FaceBook is the most DIFFICULT site to do this with.


Step 2. Add the application (Zynga Texas Hold Em Poker) to you'r profile. (For better results, add other apps so as they aren't to become suspicious.)


Step 3. Open the poker application and go to a big table with RICH players (DO NOT TALK TO THEM) and find their social networking site and their name.


Step 4. Go to that website, make an account if you do not already have one and search for their name. (NOTE: if it is a common name odds are it's a waste of time and you should find a partially complex name to ensure you have the correct account)


Step 5. Add them as a friend. (NOTE: if their account is set to private, send them a welcome message first to ease them up a little bit)


Step 6. Chat with them for a few days about NON-poker related stuff. (Ex. girls if it's a guy, boys if it's a girl, or sports always works too) Do NOT over do the chatting.


Step 7. If you're using a phisher to hack them, I recommend you start up ANOTHER conversation that will lead into something that you can send them a link (the phisher) and they'll fall for it.

Spoiler (Click to View)
(Ex. Ask them why they have two myspace accounts. When they say they only have one, send them the MASKED phisher link and say that is another IDENTICAL profile to theirs. This technique works well because people will be more vulnerable to trying to figure out why there is a wanna-be profile of them.)

If you're using a keylogger or RAT, lead them into a conversation about something that they'll download.

Spoiler (Click to View)
(Ex. Talk to them about how you both like video games or something and that you have the new version of a game that you downloaded off rapidshare. Then when they ask for it be a little hesitant. Then, say they owe you. It'll take their minds off it being a scam.)


If you're using your MASTER SE skills, then you're gonna have to do more conversing. I recommend you talk about different topics. Try to get one of them to lead into you getting their e-mail address. If you play smooth they'll never know what hit them. Once you have their e-mail address you'll know what secret questions you need to ask them. DO NOT ask them the secret question the same day. I usually wait like 2 days MINUMUM. Slowly but not OBVIOUSLY work your way into asking them the first secret question. Once you have that first half done do the same with the second question.



Step 8. Once you have access to their account, you have access to their chips. I recommend if you want to be safe, transfer chips to 3-4 different accounts. Not all chips to all accounts but evenly. It'll prevent a ban and it'll ensure you don't lose all the chips in one hand like I've done.



This tutorial is COMPLETELY for educational purposes ONLY.

If anyone uses this tutorial for illegal purposes it is in THEIR hands NOT mine.


If you liked my LONG tutorial that took roughly 15 mins to write, please say thanks.

how to hack zynga account

How To: Hack Zynga Poker Accounts

not written by me..FOR EDUCATIONAL PURPOSES ONLY!!

First thing I gotta tell you is that this is not a Zynga Hack. It's a tutorial/technique about getting accounts with BIG $$$. I'll try to make this as easy to understand as possible.


Step 0. Make a phisher/keylogger/RAT/ or build up some super SE skills.

Step 1. Make an account with one of the following social networking sites (MySpace, Bebo, Hi5, Tagged, Facebook) NOTE: FaceBook is the most DIFFICULT site to do this with.


Step 2. Add the application (Zynga Texas Hold Em Poker) to you'r profile. (For better results, add other apps so as they aren't to become suspicious.)


Step 3. Open the poker application and go to a big table with RICH players (DO NOT TALK TO THEM) and find their social networking site and their name.


Step 4. Go to that website, make an account if you do not already have one and search for their name. (NOTE: if it is a common name odds are it's a waste of time and you should find a partially complex name to ensure you have the correct account)


Step 5. Add them as a friend. (NOTE: if their account is set to private, send them a welcome message first to ease them up a little bit)


Step 6. Chat with them for a few days about NON-poker related stuff. (Ex. girls if it's a guy, boys if it's a girl, or sports always works too) Do NOT over do the chatting.


Step 7. If you're using a phisher to hack them, I recommend you start up ANOTHER conversation that will lead into something that you can send them a link (the phisher) and they'll fall for it.

Spoiler (Click to View)
(Ex. Ask them why they have two myspace accounts. When they say they only have one, send them the MASKED phisher link and say that is another IDENTICAL profile to theirs. This technique works well because people will be more vulnerable to trying to figure out why there is a wanna-be profile of them.)

If you're using a keylogger or RAT, lead them into a conversation about something that they'll download.

Spoiler (Click to View)
(Ex. Talk to them about how you both like video games or something and that you have the new version of a game that you downloaded off rapidshare. Then when they ask for it be a little hesitant. Then, say they owe you. It'll take their minds off it being a scam.)


If you're using your MASTER SE skills, then you're gonna have to do more conversing. I recommend you talk about different topics. Try to get one of them to lead into you getting their e-mail address. If you play smooth they'll never know what hit them. Once you have their e-mail address you'll know what secret questions you need to ask them. DO NOT ask them the secret question the same day. I usually wait like 2 days MINUMUM. Slowly but not OBVIOUSLY work your way into asking them the first secret question. Once you have that first half done do the same with the second question.



Step 8. Once you have access to their account, you have access to their chips. I recommend if you want to be safe, transfer chips to 3-4 different accounts. Not all chips to all accounts but evenly. It'll prevent a ban and it'll ensure you don't lose all the chips in one hand like I've done.



This tutorial is COMPLETELY for educational purposes ONLY.

If anyone uses this tutorial for illegal purposes it is in THEIR hands NOT mine.


If you liked my LONG tutorial that took roughly 15 mins to write, please say thanks.

how to hack lan

I am Sure u guys Know All these commands…. I want to Help The Beginers.. So i am Posting This….

Useful Things to do on CMD!

First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.

Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.

This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.

First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).

In case you don’t know how to get CMD open in your box, then click on Start, then Run, then type “cmd” (no quotes, off course… you know the drill).

Back to commands:

CODE

nslookup
net view
net use
net user
ping
tracert
arp
route
nbtstat
netstat
ipconfig

In case you don’t know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does.

Lets start easy…

1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the “ping” command.

CODE
ping x.x.x.x (x is the IP address)

or

ping www.whatever.com (www.whatever.com is the website you want to ping, but you don’t know the IP)

OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) nslookup : This command has many functionalities.
One is for resolving DNS into IP.
Lets say you know the website URL but you don’t know its IP(and you want to find out).

nslookup www.whatever.com (www.whatever.com is the website you want to find out the IP)

Now, another really nice function of nslookup is to find out IP of specific Mail Severs.

QUOTE
nslookup (enter)
set type=mx (enter)
yahoo.com

This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn’t it?

OK, now why would you want to have an IP of a mail server?
To send spoofed mail to your friends or even for SE.
In case you looking for “How to spoof email”, then look for my “How to spoof email tutorial” http://www.infowar.com/forums/showthread.p…p;threadid=2360

3) tracert : This command will give you the hops that a packet will travel to reach its final destination.

OBS: This command is good to know the route a packet takes before it goes to the target box.

CODE
tracert x.x.x.x (x is the IP address)

or

tracert www.whatever.com (www.whatever.com is the website you don’t know the IP)

4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.

QUOTE
arp -a

5) route : This command will show you the routing table, gateway, interface and metric.

CODE
route print

6) ipconfig : This command will show tons of very helpful things.
Your IP, gateway, dns in use.

CODE
ipconfig

or

CODE
ipconfig /all

this command will give all that info but for all networks you might have it.

Also, in case you have a dynamic IP and want to change it, then type…

CODE
ipconfig /release (this will release your IP)

ipconfig /renew (this will renew your iP)

OBS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don’t do anything stupid.

7) netstat : This command will show you connection to your box.

CODE
netstat

or

CODE
netstat -a (this will show you all the listening ports and connection with DNS names)
netstat -n (this will show you all the open connection with IP addresses)
netstat -an (this will combined both of the above)

8)nbtstat : This command will show you the netbios name of the target box.

CODE
nbtstat -A x.x.x.x (x is the IP address)

nbtstat -a computername

net view x.x.x.x or computername (will list the available sharing folders on the target box)

Now some hints:

CODE
net use \ipaddressipc$ “” /user:administrator

(this command will allow you to connect to the target box as administrator)

Now if you want to connect to the target box and browse the entire C drive, then use this command:

CODE

net use K: \computernameC$

(this will create a virtual drive on your “my computer” folder)

OBS: Keep in mind that this will only works if the target box doesn’t have an administrator password set.

And least but not last, the “help” command.

CODE
whatevercommand /help

CODE
whatevercommand /?

This command will help you to understand what it does and all the switchs available for each command.
Very useful if you know the command, but forgot the right switch.

how to hack kinect

How To Hack Kinect
You've seen the kind of cool stuff people can get up to when they hackheir Kinect. Now you can too, with this simple rather complex guide.Adafruit, the have posted an in-depth and incredibly technical guide on how to get the cameradoing your bidding rather than Microsoft's.Be warned when we say it's technical: this is not the kind of thing your average person, comfortable with a console dashboard and Firefox, could pull off. But if you fancy yourself as a bit of a whizz with computer code, have at it! And if you get some cool stuff working, be sure to let us know.

how to hack joomla

How this script works
Using injection it gives the abuser full access to all of your files in a semi-shell environment. The user has the ability to execute any commands such as 'ls', 'vi', or even 'rm'. This means they can read all of your configuration files which contain all of your SQL passwords.

The call function replaces mosConfig_absolute_path in your Joomla! configuration.
Solution
The easiest solution is to turn on the SEO feature of Joomla! in your Global Configuration of the Administration Panel. Don't forget to rename htaccess.txt to .htaccess. This will cause a call like above to error 403 Forbidden.

how to hack skype password

How To Hack Skype Account Passwords

How To Hack SKYPE Account Passwords

A very common question that many people is how they can hack and retrieve a SKYPE password. First of all, why would anyone except a pervert want to hack into someone else's SKYPE account?
The most important reason would be a cheating spouse or other significant half; in that case, hacking into their SKYPE account becomes "legitimate". So how is it done? A mere search about "SKYPE hacking", "How to hack SKYPE passwords" or "Hack SKYPE account" will yield 10s of thousands of results if not more, the question is, how do you sort through this entire maze? This is where this article comes in, I am going to review how SKYPE hacking is actually done and how you can do it on your own - always for legitimate reasons.

There are two main ways via witch you can hack into accounts:

Method #1 : A keylogger

A keylogger is a program that is installed on your computer and it will secretly record all keystrokes typed on your keyboard, this will allow you for example if you share a computer with your loved one; after they login into their account; to see the password they typed. There are many drawbacks to this technique, such as you cannot see the password if your loved one uses another computer remotely to login into his or her account. Another drawback is the technical knowledge required to setup such a keylogging system properly and have it running within a reasonable amount of time.

Method #2 Hiring a Hacker

This second method, although slightly more costly is also the most reliable and speedy way to retrieve a SKYPE account password. These services will actually either retrieve the password itself for you which takes less than 24 hours or alternatively they will provide you with an easy to use software that will allow you to retrieve an unlimited amount of SKYPE (and other) passwords for a very reasonable onetime fee.

How do these services work?

They exploit vulnerability in the SKYPE database that allows them to hack and retrieve any SKYPE account password within a very short amount of time, usually less than 3 minutes per account when using their software. Two such hacking services that I have tried and can vouch for their reliability and discreetness are:

Service #1 http://www.Hacks4Sale.com - Very reasonable pricing, phone support available, fast service - it offers software packages that will allow you to hack your way into any SKYPE account of your choice, allowing you to hack SKYPE passwords in less than 60 seconds per account.

Service #2 http://www.hackscenter.com - Fairly ok pricing, no phone support, relatively fast service although with very choppy English as the hackers are Vietnamese in this case. This is a password retrieval service, meaning that you have to pay for retrievals on a per account basis.

I really hope this article has helped you to get a step closer to actually hacking SKYPE account passwords for legitimate reasons

how to hack ufone number

Confirm network Charges before calling…!!!

**Use this at your own risk** Charges applies….!!!

Great secret Exposed which people were selling….Hide your identity

(Ap Kisi be Network per call kerain apka number show nai ho ga. Na he ap ko Koi Extra Charges Pay kernay Perain Gay.Call charges hon gay or miscall nae day sakty, neechy de gae tareeqa apane…)

‘The calling private code’, people talk lot, is some sort of connecting call procedure.

When you dial the number, basically you’re calling to England where your call is transferred to Pakistan (I think some call forward technique or some thing).

Other person will get call from +888888888+ or +4444444444

Well… important thing is… It’s better to use the Ufone because it provides the cheapest call rates (Rs 2 +/-) per minute. One thing more, when you’ve dialed the number, you’ve been charged and your call will be connected to your required number after (more than) ½ minute.

Code is

00448700360413p0092(number here)

*Don’t add 0 of your number. Example 00448700360413p0092321xxxxxxx

*p can be obtained by pressing * key three times.

Hope that my information will be helpful.

Do pray for good people,Wish you best of luck.

Works in Pakistan, Other country users may check it

Read more: http://a.com.pk/private-your-number-code-hide-your-identity/#ixzz1MWLudtDa

how to hack a router password

My dad has blocked a blog site. When i try to open 192.168.1.2, i get the router control page, but when i click on the administration tab, i get this thing that asks me for a password and a user name. How can i hack the pass and the user. Don't tell me to talk w/ my dad. Don't tell me to reset cause then he'll know. btw, im on a wireless network and my computer doesn't have the router driver on it. I cannot change the pass and user because then my dad will know. I might have an idea of the pass, but i don't know the user. HELP and don't say ethical things PLZ cause i am a straight A student and in all Honors and AP classes so, i don't need ant bull that i should talk to my dad and see if he's unhappy w/ my grades.

how to hack wifi connection

A Wifi network is as safe as the person who installs it is knowledgeable. There are three basic levels of protection: WEP, WPA, and WPA2 keys. Most attacks target WEP keys, because they're the least secure. To hack a WPA key, more sophisticated material is sometimes necessary. Generally, the longer the password is, the harder it is to steal.

First you have to spy on the network, which we call ‘sniffing'. You survey the traffic and try to find the password. To do that you can launch an attack by what's called the ‘dictionary'; a programme that tries out various names that exist in the dictionary. There's also a ‘brute force' attack, which tries all character combinations possible. To find a password that's more than eight characters long can take over a week to find.

It's sometimes the internet provider that is at fault. Just recently hackers realised that the default passwords given out by Bbox, [a three-way wireless box offered by French mobile telecoms company Bouygues Telecom], were automatically generated using the network name. As most people don't bother to change their password, it meant that their networks were left exposed. This vulnerability is mainly due to a lack of education on the part of the users, which is then taken advantage of by hackers, making their work all the more easy.

Open networks, or ‘hotspots' that you can log on to in airports or train stations, are also affected. Internet providers are setting up increasing numbers of these hotspots. And although they require identification, there are ways of getting around the checkpoint. One technique is to put in place a ‘fake hotspot' in order to trick users into entering their user details into the fake portal. It then saves the data, and enters it into a database owned by the hackers. They can then be used to connect to the internet, or share it with others.
If you put all of this in the context of the Hadopi law, which enforces, amongst other things, the punishment of individuals who do not secure their connection, you soon realise, that actually applying the law, is very difficult. Firstly, we need to define exactly what a secure computer or network is..."

how to hack question papers

Anyone interested in a career in this field must have strong talent survey and analysis. They must also be able to work well in teams with other employees, and relate to customers. They often deal with multiple tasks simultaneously (multi-task) must also be able to focus on details. A game programmer is a computer programmer who built mainly video games and related software (such as flight simulators for the government). Video programming has much the same function as the developer uses the computer regularly, but the GUI is a big difference. The design of the programs that create these games can be a rewarding and make money. Why is that? Well, the video game market is a real growth industry for most of the last decade. If do not know nothing or very little about programming or game programming, just go to this site: GameDev dot net. You'll find an excellent reference for principles that wants to get into the business of programming games. It answers many basic questions about how to start and where more information on programming Games.

The question of whether video games to improve brain function has not been tested clinically with some degree of scientific certainty. However, the empirical evidence leads us to say yes, and my personal experience, I agree that video games can improve brain function. My children have grown up playing video games from the time they are three years. When video games began production around 1978, I offered my three children and played and learned to write programs. During the observation that children are better things in technology than adults is because I told the familiarity with using a computer for games. I also noted that the use of hand-eye coordination couple of my children than their peers.

The military uses flight simulators video for training and which have greatly improved the ability to fly a real tactical standpoint. The army has done a very good reason, because it is a cost very emotional. The military use of video games is also used to teach the fighting tactical situation. Video games like Nintendo's Wii to provide realism to game that must be experienced to be appreciated. The graphics associated with one standard Wii games, but not perfect is very well done photographically reproduced and in the substantive scope of real places.

Most professional programmers started programming games when they were young. Many of them had computers at home and spent much time behind a screen of "piracy" of programs. You will also find most developers potential more interested in reading a paper searching for a cartoon. Some of them take courses related to computers in high school, but end with a postgraduate degree in an engineering related computer software. The fifty-half percent of software engineers earned between $ 67,000 and $ 105,000 in 2006. Those who are weaker ten percent of the group earned less than $ 53,000 per year, while the highest paid ten percent made more than $ 126,000 per year. The number of computer workstations, software engineer is expected to increase much faster than average, as companies seek more ways to stay against competition and make more relevant operations. Another factor that determines the interest of this group is the problem of cybersecurity. However, job growth work in this area can not be as fast as it has been the past two decades, as part of the work is outsourced to foreign countries.

how to hack cpanel

I was wondering whether one could hack his way into cPanel and exploit the security loopholes.

Okay, first of all I would like to clarify my intentions. I have no malicious intention whatsoever and I'm not a hacker, i.e. I dunno any programming languages at all. I have a hosting account at a certain post to host forum, meaning to say, the admin helped me create a cPanel hosting account. I know the username but I dunno the password so I requested it from the admin. He told me and I tried it, but still I can't log into my account. I guess the password's wrong.

Now I'm getting a bit impatient so I wondered if there is a way to basically force my way into MY own cPanel account and change the password from inside out so I could access my cPanel properly the next time I log in. I tried the Brute Force exploit but not sure how that works. I just need to get inside. My question is whether there's a way to force myself inside, more so like a 'thief' trying to break into his own 'house' and opening the lock from inside out.

I hope you get what I mean. Plus, its my own website so I see no harm in trying to hack my own website. Technically speaking, its not even a website yet since I can't log in to cPanel to do anything!
0

how to hack bank account

Security on the Internet is just a dream and you know it. If a hacker wants to do something, he or she can do it. If one system is secure and cannot be hacked, then they will steal the data of someone who has access to it, and then, do the "work" from the inside. Do you think you're safe just because some sites ask you for
authentication? Let me tell you that not even CAPTCHA is secure. Nothing is.

Have you noticed that when you want to do an online transaction the bank site asks you a lot of stuff so that they properly identify you? They go very deep with these questions. Indeed, this is a good thing, otherwise, anybody that would know a little something about you could easily get into your account. This just makes it a little harder for you to be a victim of cyber-fraud, but it does not make it impossible...

Of course, there is the classic way with the hoax site. The hackers get your data by making you visit a clone page of your bank and all the data you enter will be sent to them. But that's for gullible users, you're much smarter than that. Well, so are some hackers. Some browsers store your data, such as passwords, usernames and stuff like that. If you get infected with malware, the data on your PC will be recorded by that certain virus and sent to the hacker without you even knowing it. And sometimes you don't even need to get a virus, you just need to download some JavaScript from some page. Apart from the code that the site requires, it will also have some code that will make the hacker get access to your cookies, thus using them to transfer money, change a password and stuff like that.

It isn't easy for the average Joe to hack your account, but hackers can do it, if they strive hard enough. So what to do? Well, first thing is to be careful what you click on and the second is to deploy good security measures on your computer!

how to hack free internet

Explains how to ethically hack a wifi wireless internet connection using free hacking software.

Have a laptop, or a wireless internet card in your PC? Have you ever been in the position that where you lost your WEP / WPA key, and you interested on retrieving it back? Well with Aircrack you can.

Aircrack is a set of tools for auditing wireless networks. It consists of: airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

I have used aircrack to try and hack my own wireless network and I happy to say I am as secure as I can get wirelessly. Again Aircrack comes with the four following pieces of software to help you secure your wireless internet connection

airodump (an 802.11 packet capture program)
aireplay (an 802.11 packet injection program)
aircrack (static WEP and WPA-PSK cracking)
airdecap (decrypts WEP/WPA capture files)

how to hack domain

A domain hack (sometimes known as a domain name hack) is an unconventionalthat combines domain levels, especiallythe(TLD), to spell out the full "name" or title of the domain.[1] Examples of this hack include(http://del.icio.us/) and (http://goo.gl/).In this context, the hack represents a trick, not an exploit or break-inDomains such asa name is chosen so that the last few characters match an existing top-level domain, such as "inter.net", so that every character is used in

orming the common name.

Domain hacks offer the ability to produce extremely short domain names. For example, blo.gs has a total of only five letters (versu
blogs.com, at eight letters), as every letter is taken into account as the site's title. Similarlyin, a commonmimic, isepresented through the domain http://2et.in.This makes them potentially valuable as redirectors (like i.am, which redirects to FortuneCity's V3 service), as and as base domains from which to delegateAlso short domains are useful forservices.

best hacking software

 
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIi6sJjKwTLQr27IDNr7Iawjqzp7D3gqeksmsUNwSnh8pzTHQaPx-nj6HxA7mnVLmniooI0i67os7cOU9aUvStVxJcWHhHGuiQFy5qgkDzWH6L15kFOBukMhijCneADrycKzDUn18v1VxF/s320/download12.gif

data doctor passworld unmask

 

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIi6sJjKwTLQr27IDNr7Iawjqzp7D3gqeksmsUNwSnh8pzTHQaPx-nj6HxA7mnVLmniooI0i67os7cOU9aUvStVxJcWHhHGuiQFy5qgkDzWH6L15kFOBukMhijCneADrycKzDUn18v1VxF/s320/download12.gif

download hacking softwares

get the phone numbers of girls

You know what also works... hey can I have your phone # I wanna text you.
08-25-2009, 11:22 PM
What I don't understand is why everyone here seems to find it nessicary to SE girls. Like seriously, come on. I think when you find the right person you won't need to manipulate them.
This technique is a bit easier for people who feel a little too awkward in directly asking for the number. While she is busy writing down her e-mail address (Facebook, etc...), you don't have to make direct eye contact with her. Making direct eye contact while asking for the number can make asking for the number much more difficult and unnerving.

I also use a technique where I say, "It's been fun, we should talk later..." as I'm about to leave the conversation with her. When she nods or says yes, I pull out my cell and tell her to "go ahead." This way I don't ask for her number, but imply with body language and signaling that I want her number. I call her right there, and tell her my name so she can type my name into her phone, and it also prevents fake numbers.Well I guess this could become useful some day?Wouldn't you come across as being insecure by calling her right there as if you're expecting her to give you a fake number though?Useful, yes indeed. If one day you aspire to get laid. LOL

You call her right there so she knows your number and has a name to go along with it, that way she won't freak out when you call and she thinks it's a random strange person. "Who is this?!?!?!?" Moreover, you don't have to reintroduce yourself, "Hey, it's Chris, remember me from the club??"

Some guys also give themselves funny nicknames to put into her phone like PIMPDADDY because it increases call back percentage from her.How to you expect to get laid if you get nervous looking a girl in the eyes. ^ Lol
I say just get over your shyness. If you get rejected there is always more out there.Yeah, one of the known techniques by PUA's ...
I would go with a different approach, but as u said, this method is probably easier for the shy and insecure guys.facebook = cell phone number guys, its simple to dox. if they give you a fake number, that means there not interested take a hint!

how to hack the girls phone numbers

very effective technique for getting a girl's phone number is using the compliance technique called foot-in the-door technique.

It's where you ask your target for a small request that you know your target will comply to, and then immediately afterward ask the target for a large request (the thing that you want).

Homeless guys do this technique all the time, they first ask for a small amount of money (56 cents for example), then when you give it to them, they ask for a dollar or more.

In the phone number situation, you want to initially ask the girl for her e-mail, Facebook, or Myspace address (small request) and get her to write it down on paper, as she is writing this down, TELL her to also write down her phone number too (large request that you want).

I usually say, "Write down your number too." I never ask her to write down her phone number, I feel that if I tell her to do it, she complies better and it puts me into the dominant role.

I've had a huge success rate with this technique, and it's just WAY easier to get her Myspace, e-mail, or Facebook address first because it is a small investment for her.

start online hacking program

how to hack

how to hack online facebook account

how to use free internet on mobile

You need a PC or a Laptop and the required connectivity tools ,ie.,Serial/USB cable OR Infrared Device OR Bluetooth dongle1) Activate Airtel Live! ( It’s FREE so no probs)2) Create TWO Airtel gprs data accounts (yep TWO) and select theFIRST as the active profile.3) Connect your mobile to the PC (or Laptop) and install the driver foryour mobile’s modem.4) Create a new dial-up connection using the NEW CONNECTIONWIZARD as followsConnecting Device : Your mobile’s modemISP Name : Airtel (or anything you like)Phone Number : *99***2# / Try 99***1Username and Password : blank5) Configure your browser and download manager to use the proxy100.1.200.99 and port 8080.( My advice is to use Opera since youcan browse both wap and regular websites)6) Connect to the dial-up account. You will be connected at 115.2kbps (but remember, that is a bad joke).7) Pick up your mobile and try to access any site. You will get “AccessDenied…”(except for Airtel Live!). IT DOES NOT MATTER.Keep the mobile down.8 ) On the PC ( or Laptop) open your browser, enter any address ,press ENTER and…….WAIT9) After a few seconds the page will start to load and you have theWHOLE internet at your disposal. ***************************************************************************************************************TWOUnder DATA COMM~~~~~~~~~~~~APN : airtelfun.comUSERNAME : blankPASSWORD : blankPASS REQ : OFFALLOW CALLS : AUTOMATICIPADDRESS :DNSADDRESS :DATA COMP : OFFHEADER COMP :OFFUnder INTERNET PROFILES~~~~~~~~~~~~~~~~INTERNET MODE : HTTP or WAP (both worked for me)USE PROXY : YESIP ADDRESS : 100.1.200.99PORT : 8080USERNAME :PASSWORD :No Risk Here, Try it and EnjoyalternateFor All Airtel UsersRequirements:1. Airtel live (available 4 free)2. Nokia series60 handset eg 6600,6630,n series,7610,6670 etc3. Opera wap browser 4 mobileProcedure:-1. Go to ur connection settings and make a new internet profile using the default settings of airtel live. name that new profile as nething(for eg masala); change the home page of that profile to

d set the default connection as AIRTEL LIVE. this is the original settings u received thru airtel.3. Go to the services(in n6600) and Web(N6630) and change the default profile for connection as masala (newer one).**Note: always make sure that ur access point is airtelfun.comApply:-1. Open Opera and u will see that homepage of Airtel Live is opened. Minimize the application.2. Now open web using the duplicate Profile and u will see that two gprs connections will work simultaneously and at the web or the services page it will show "Unable to connect" or any error. well thats the signal of ur success.3. Simply go on the Opera with web on and open any site u want for free. No Charges No nothing.U can also use it through ur computer..........

how to hack xp passworld

1. Open command prompt (Start->Run->cmd),2. Enter the following command, then press ENTER3. Enter the followin command, then press ENTER:compmgmt.mscThis should open the computer management console.4. Go to local users & groups->users. Right click on any user and select "set password".If you get a "access denied" do the following:start>run>cmdthen use following commands1) net user test /add (this command will make test named user)2) net localgroup administrators test /add (this command will make test user as administrators rights)and use net user command to reset your admin. passwordAlternativeWhat if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..Start >> Run >> [type]cmd // this will open your command prompt[type] net(space)user(press enter)[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)// for e.g. : net user HOME *(press enter)[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works// for e.g. : password changed successfully.

Back to Top