Archive for March 2012

RapidShare hack for free account(rapidshare premium account)



Step#1 Go to www.awsurveys.tk by clicking the link.And "Create A Free Account"
Step#2 Take small surveys for up to 6$ a survey

Step#3 Go to www.paypal.com and sign up for a "premierpaypal account".

If it asks for your bank or credit card, just cancel (yes, premieraccount is 100% free also)


Step#4 Receive your money once you reach the minimum payout.

Step#5 Start spending!!!


warning:-
Your Account can be barred...

This can be for any of the followingreasons:

- Same IP Address (All of your referrals signed up from the same
computer)

- Low or no Survey taking ratio (Your referrals took 0 surveys)
Now, just go to Rapidshare and register your 1 year premium account!



Try it out yourself, you don't risk anything and this is 100% real! Have Fun with it......

Leave a comment

Send Fake Email – Fake Email Pranks





Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain. But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorised access.

Also many of the websites offer you to send fake email from their sites where none of them work. So we have to run our own SMTP server on our computer to successfully send a fake email. SMTP server is a simple software program which can be installed on your computer in few seconds. SMTP server allows you to send fake email right from your desktop easily and effectively.

Download QK SMTP server HERE. This is the SMTP server i am using in my tutorial. Once you download and install the server on your comp then you are all set to send fake email successfully.
PART A: CONFIGURING SMTP SERVER
Once you have installed the QK SMTP server on your comp you must perform the following configuration.
1. Click on “Settings” button on the main screen,the Settings window pops up
2. On Settings window click on “Basic Parameter” tab
3. Set binding IP to “127.0.0.1″
4. Set port to “25″
PART B: SENDING FAKE EMAIL (EMAIL FORGING)
1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running). If it is already running then this step can be ignored
2. Goto command prompt(Start-Accessories-Command prompt)
3. Type exactly as follows
C:\>telnet 127.0.0.1 25
Here 127.0.0.1 is the default IP of every computer.25 is the port number. SO you are connecting to the SMTP server running on your own computer. This step is very importand to send fake email.
NOTE: The IP 127.0.0.1 should not be substituted by any other IP.
Heres the snapshot of what you see after step 3. Click on it to enlarge
4. After typing the telnet command in the command prompt you get entry to the server which displays the following message. The response of a OK SMTP server is given below.Message within Green color is only explanation.
220 Welcome to QK SMTP Server 3
helo hacker (Type helo & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email ID can be anything of your choice. This is the ID from which fake email appears to have come from)250 billg@microsoft.com Address Okay (Server gives a positive response)rcpt to:admin@gmail.com (Type any valid recipient email address)250 admin@gmail.com Address Okay (Server gives a positive response)data (type this command to start input data)354 Please start mail input
From:Gates <billg@microsoft.com>
To:admin@gmail.com
Date:Sat Jan 5,2008 9:45 PM
Subject:Test to send fake email
You can create as many headers followed by the “:” symbol.
NOTE: HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data
End the body of email by pressing [ENTER] .(dot) [ENTER]
250 Mail queued for delivery (Sever indicates that the email is ready for sending)quit (Type this command to quit from server)221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing “quit” command)
(Your fake email is sent to the recipient)
*****END OF EMAIL FORGING*****
Here’s the screenshot for your convenience

NOTE: THE ABOVE METHOD HAS A VERY LOW SUCCESS RATE. FOR A COMPLETELY WORKING METHOD PLEASE REFER MY NEW POST -
 How to Send Anonymous Emails – A New Working Way

Leave a comment

How to delete a virus without using antivirus



Often a virus like kinza really makes a an unwanted entry in our computers and performs some activities  which results in a malfunction of the machine.So in this article i am giving a way to permamently delete the virus from the computer without using an antivirussoftware.. 

First of all copy these codes in a notepad and save it as .bat(bat is an extension file) file. Then execute it.. then puff kinza.exe is gone..for eg u can save it as blitz.bat.
Can u see that red D: Yeap that one rename it as C,D OR any other drive specification to remove virus in all your drive. For example if you want to remove it in ur USB drive , F: then replace F: instead of D:

cd\
D:
taskkill /f /im wproxp.exe
taskkill /f /im isetup.exe
taskkill /f /im imapd.exe
taskkill /f /im dxdlg.exe
taskkill /f /im imapdb.exe
taskkill /f /im imapd.exe
taskkill /f /im imapdb.exe
taskkill /f /im scvvhsot.exe
taskkill /f /im wscript.exe
taskkill /f /im Kinza.exe

reg add "HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon" /v Userinit /f /d "%windir%\system32\userinit.exe",
reg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /f /d "explorer.exe"


reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /t Reg_Binary /v NoDriveAutoRun /f /d ffffff03
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /t Reg_dword /v NoDriveTypeAutoRun /f /d 36
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /t Reg_dword /v NoFolderOptions /f /d 0

reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /t Reg_dword /v DisbleRegistryTools /f /d 0
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /t Reg_dword /v DisableTaskMgr /f /d 0

del /a /f /s boot.vbs
del /a /f /s wproxp.exe
del /a /f /s isetup.exe
del /a /f /s imapd.exe
del /a /f /s ActMon.ini
del /a /f /s dxdlg.exe
del /a /f /s imapde.dll
del /a /f /s imapdd.dll
del /a /f /s imapdc.dll
del /a /f /s imapdb.exe
del /a /f /s imapd.exe
del /a /f /s imapdb.dll
del /a /f /s imapdb.exe
del /a /f /s Kinza.exe
del /a /f /s autorun.ini

Leave a comment

Google Search Hacking





1) Google Search:- "Active Webcam Page" inurl:8080

Description- Active WebCam is a shareware program for capturing and sharing the video streams from a lot of video devices. Known bugs: directory traversal and cross site scripting.



2) Google Search:- "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
Description- This search gives hundreds of existing curriculum vitae with names and address. An attacker could steal identity if there is an SSN in the document.


3) Google Search:- intitle:"index of" finance.xls
Description- Secret financial spreadsheets 'finance.xls' or 'finances.xls' of companies may revealed by this query.

4) Google Search:- intitle:"index.of" robots.txt
Description- The robots.txt file contains "rules" about where web spiders are allowed (and NOT allowed) to look in a website's directory structure. Without over-complicating things, this means that the robots.txt file gives a mini-roadmap of what's somewhat public and what's considered more private on a web site. Have a look at the robots.txt file itself, it contains interesting stuff. However, don't forget to check out the other files in these directories since they are usually at the top directory level of the web server!

5) Google Search:- intitle:index.of.admin
Description- Locate "admin" directories that are accessible from directory listings.

6) Google Search:- inurl:"nph-proxy.cgi" "start browsing"
Description- Returns lots of proxy servers that protects your identity online

Google’s Advance Search Query Syntaxes

Below discussed are various Google’s special commands and I shall be explaining each command in brief and will show how it can be used for critical information digging.

Google Search:-[ intitle: ]

The “intitle:” syntax helps Google restrict the search results to pages containing that word in the title. For example, “intitle: login password” (without quotes) will return links to those pages that has the word "login" in their title, and the word "password" anywhere in the page.

Similarly, if one has to query for more than one word in the page title then in that case “allintitle:” can be used instead of “intitle” to get the list of pages containing all those words in its title. For example using “intitle: login intitle: password” is same as querying “allintitle: login password”.


Google Search:-[ inurl: ]

The “inurl:” syntax restricts the search results to those URLs containing the search keyword. For example: “inurl: passwd” (without quotes) will return only links to those pages that have "passwd" in the URL.

Similarly, if one has to query for more than one word in an URL then in that case “allinurl:” can be used instead of “inurl” to get the list of URLs containing all those search keywords in it. For example: “allinurl: etc/passwd“ will look for the URLs containing “etc” and “passwd”. The slash (“/”) between the words will be ignored by Google.


Google Search:-[ site: ]

The “site:” syntax restricts Google to query for certain keywords in a particular site or domain. For example: “exploits site:hackingspirits.com” (without quotes) will look for the keyword “exploits” in those pages present in all the links of the domain “hackingspirits.com”. There should not be any space between “site:” and the “domain name”.


Google Search:-[ filetype: ]

This “filetype:” syntax restricts Google search for files on internet with particular extensions (i.e. doc, pdf or ppt etc). For example: “filetype:doc site:gov confidential” (without quotes) will look for files with “.doc” extension in all government domains with “.gov” extension and containing the word “confidential” either in the pages or in the “.doc” file. i.e. the result will contain the links to all confidential word document files on the government sites.


Google Search:-[ link: ]

“link:” syntax will list down webpages that have links to the specified webpage. For Example: “link:www.securityfocus.com” will list webpages that have links pointing to the SecurityFocus homepage. Note there can be no space between the "link:" and the web page url.



Google Search:-[ related: ]

The “related:” will list web pages that are "similar" to a specified web page. For Example: “related:www.securityfocus.com” will list web pages that are similar to the Securityfocus homepage. Note there can be no space between the "related:" and the web page url.


Google Search:-[ cache: ]

The query “cache:” will show the version of the web page that Google has in its cache. For Example: “cache:www.hackingspirits.com” will show Google's cache of the Google homepage. Note there can be no space between the "cache:" and the web page url.

If you include other words in the query, Google will highlight those words within the cached document. For Example: “cache:www.hackingspirits.com guest” will show the cached content with the word "guest" highlighted.


Google Search:-[ intext: ]

The “intext:” syntax searches for words in a particular website. It ignores links or URLs and page titles. For example: “intext:exploits” (without quotes) will return only links to those web pages that has the search keyword "exploits" in its webpage.


Google Search:-[ phonebook: ]

“phonebook” searches for U.S. street address and phone number information. For Example: “phonebook:Lisa+CA” will list down all names of person having “Lisa” in their names and located in “California (CA)”. This can be used as a great tool for hackers incase someone want to do dig personal information for social engineering

Leave a comment

PESEdit 2012 Patch + KONAMI 1.03 (patch for PES 2012, version 2.6)






The next version of the patch from the German team PESEDIT for Pro Evolution Soccer 2012. The patch includes all changes to previous versions of the patch.

Game Name: Pro Evolution Soccer 2012
Year: 2012
Developer: PESEDIT
Type of distribution: Patch
Web Developer: http://pesedit.com/
Program Version: 2.6
The required version of the game: It does not matter
Language: It does not matter
Required language game: It does not matter


List of changes: (2.6)

Sewn official patch KONAMI PES 2012 Patch 1.03> Compatibility online

New faces: more than 200 new people are added and optimized

New Form: Cottbus, Croatia, Eintracht Frankfurt, Furth, Freiburg, Gladbach, Ingolstadt, Inter, Italy, Kaiserslautern, Karlsruhe, Newcastle, Nurnberg, Paderborn, Rostock, St. Pauli, Stuttgart, Tunisia, Union Berlin, West Ham
Transfers: A lot of winter transfers to 7.1.12, created more than 30 new players (see screenshots)

Fixed bugs and crashes in the ONLINE mode known in previous versions of the patch

Installation: Installing the patch:
- Delete the folder kitserver in your game folder and PESEdit.com 2012 Patch from the Start menu - if you install the patch first, then do not delete.
- Run the patch and install it in the folder where you installed the game.

Changing the official patch KONAMI 1.03
- Improved goalkeeper move
- Review of the effectiveness of card indexes - Activist. Its effectiveness is reduced because it was too high
- Changed the principles of search rivals - the mode of "friendly match" will be replaced by the regime, "Correction of the pass"
- The various modes of changes aimed at improving the gaming experience

Posted in | Leave a comment

Game Booster v3.2.0.1417






Game Booster - a powerful utility that will configure your computer for maximum performance in games, by optimization of many characteristics of the operating systems Windows. A combination of several options to optimize (defragmentthe RAM and hard disk diagnostics configuration DirectX, etc.) will help unleash the potential of one hundred percent of your kompa. In the arsenal of any experienced player can find a lot of tools that allow to improve the performance of a gaming PC. Many of these applications does not mean "acceleration" of the hardware components and provide a performance boost by the release of system resources and optimize your OS. Game Booster can add a designated collection of useful programs.

Manufacturers point out that Game Booster is not a tool for "overclocking", does not make any modifications to the registry, Windows, and does not assume responsibility for changing options sistemy.Pri utility Game Booster you can specifically when playing the game with one mouse click off a number of uselessness of system services Windows, make high-spirited treatment ofmemory RAM, and finish the work programs that are running in the background, freeing up system resources specifically on the time at which you intend to play the game.

Game Booster boasts the most common and intuitive user interface, which enables to take all the measures envisaged at the touch of a button. Despite the fact that the tool initially developed for the gaming audience, it may not be the least useful in some cases, have no connection with computer games. The user can use this utility to complete the background when you run all the action-intensive applications.

Changelog:
+ Added more languages
+ Updated the driver database
+ Improved the list of "Processes" and "Services"
+ Improved UI
* Fixed general bugs

Year: 2012
OS: Windows 2000/XP/Vista/7
The house. Home: iobit.com
Language: Ml (Russian)
Crack:
Size: 5.5 MB

Posted in | Leave a comment

Dragon Age 2 + 16 DLC (2011/RUS/ENG/RePack by Fenixx)






Information about the game
Year: 2011
Genre: RPG / 3D / 3rd Person
Developer: BioWare
Publisher: Electronic Arts
Language: English / Russian
Language: English
Publication Type: RePack
Tablet: enclosing (THETA)
Platform: PC
File Size: 5.09 Gb

On the game: In a new journey of mystery and full of dangers Dragon Age fantasy world player will act as a simple refugee named Hawk, doing its utmost to protect his family from an unforgiving Mora. Fates decreed it was he who will be the main protector of the city Kirkvolla.
The plot covers an entire decade history of a harsh world, whose inhabitants fiercely opposed the invasion of the creatures of darkness. The player will have to make difficult decisions to enter into mutually beneficial alliances with the very dangerous individuals, acquire wealth and fame and, of course, sword and sorcery tirelessly to fight the numerous enemies.
How will the story that will forever change the universe of Dragon Age, - depends only on the player.

Features:
• Travel will extend for a decade. Thanks to this new way of opening the original storyline of the player, moving in time, will be provided in different places and circumstances - this kind of surprise will make the gameplay even more exciting.
• Fans of Dragon Age will take a long way from the ragged beggar to a legendary warrior, and in this way always have to make hard choices and take fateful decisions.
• What would be the game class is not chosen by the user - a wizard, rogue, or warrior - a new, improved combat system ensures high dynamics of battle, not allowing to relax for a second.
• With the improved graphics engine world of Dragon Age much prettier and became more vivid - the game is not as spectacular as inferior quality kinoblokbasterov. In addition, it is so fascinating and full of surprises that will keep players in suspense until the very end.

System requirements:
• Operating system: Windows XP/Vista/7;
• Processor: Intel Core 2 Duo (1,8 GHz) or AMD Athlon X2 64 (2.4 GHz);
• Memory: 1 GB (for XP) / 1,5 GB (for Vista / Seven);
• Video Card: Radeon HD 2600 Pro / nVidia GeForce 7900 GS with 256 MB of video memory;
• Free space on your hard disk: 8.2 GB
• Items for the magician's number 1 \ Mage Pack № 1
• Items for the Rogue number 1 \ Rogue Pack № 1
• Items for the soldier number 1 \ Warrior Pack № 1
• Black Shop \ The Black Emporium
• The Prince in exile \ The Exiled Prince
• Awards Signature Edition
• Antivanskaya garrotte \ The Antivan Garrote
• Ring whisper \ The Ring Of Whispers
• Items for the magician's number 2 \ Mage Pack № 2
• Items for the robber number 2 \ Rogue Pack № 2
• Items for the number 2 soldier \ Warrior Pack № 2
• Heirlooms \ Legacy
• Stamp killer \ Mark Of The Assassin
• Dark green \ Deep Green
• Suspension of morning frost \ Pendant Of The Morning Frost
• Belt of the Supreme Lords \ High Lords Belt

• The strength of Stan \ Might Of The Sten
• Courage Renegade \ Apostate's Courage
• Antivanskaya viper \ Adder Of Antiva
• Bastion finder \ Seeker's Bulwark
• oltso resistance \ Ring Of Resilience
• Blade Haider \ Hayder's Razor
• Boots the frozen wastelands \ Boots Of The Frozen Wastes
• Looking back \ Hindsight
• The distant cliffs Kirkvolla \ The Far Cliffs Of Kirkwall
• zhelezyaki \ The Irons
• Crying for Lotering \ Lothering's Lament
• Amulet of dust \ Amulet Of Ashes
• The fact that it is not lost \ Of Things Not Lost
• Tenerez \ Fadeshear
• Orlesiansky Lion \ The Lion Of Orlais
• Staff Partalana \ Staff Of Parthalan
• ospeh bloody dragon \ Blood Dragon Armor
• Sir Isaac Armor \ Ser Isaac's Armor
• family coat of arms Iwo \ Ivo Family Crest
• Blue Flame gifts \ Dura's Blue Flame
• Confident form \ Air Of Confidence
• Power of Evry \ Evra's Might
• Trophy Time Evry \ Evra's Trophy Belt
• Antivanskaya garrotte \ The Antivan Garrote
• Dark green \ The Deep Green
• oltso whisper \ The Ring Of Whispers
• Suspension of morning frost \ Pendant Of The Morning Frost
• Belt of the Supreme Lords \ High Lords Belt


Features RePack:
• Audio quality 100%
• Video quality is 100%
• Exclusive installer
• Installation of additional Softa (DirectX, VisualC + +)
• all the way registry maintained
• Installation requires 512 MB of RAM
• Approximate install time 15 minutes
• version of the game: 1.04
• Game archives are not touched
• The manual is stored on the game - Manual \ Manual.Dragon Age 2.pdf
• the opportunity to break into 2xDVD5 or 1xDVD9
• RePack by Fenixx

Is divided into 2xDVD5:
• 1xDVD5 - Info (folder), autorun.inf, setup.exe, setup-1.bin, game-1.bin, game-2.bin, game-3.bin, game-4.bin, soft.bin.
• 2xDVD5 - video-1.bin.

Posted in | Leave a comment

Syndicate - Rip от R.G. UniGamers






In 2069. Developed countries do not control the government and megacorporations - syndicates, divided the world into spheres of influence. Syndicates have revolutionized the field of data management: users are now looking forward and the information and control technology with chips implanted into the nervous system.

Features:
▪ Millions of people have contacted the representative syndicates to get the chips, along with housing, medical care, employment, education, banking and entertainment. Instead syndicates have an unprecedented control over people's lives. Government lost influence, and the syndicates began the war with one another, striving for total domination of the market.
▪ On the front of this war are agents, reinforced by means of genetic modification and new technologies. Play the role of Miles Kelo - a syndicate of agents' Evrokorp ": Enjoy a risky venture, full of cruelty, treachery and revenge.
System requirements:
"Operating system: Windows XP / Vista / 7
"Processor: Pentium Core 2 Duo 2,9 GHz / Athlon X2 3000 +
"Memory: 2 GB
"Hard diske: 9.5 GB
"Sound Card: Sound Card compatible with DirectX 9.0
"Graphics: Nvidia Geforce 9800 or Radeon H1900

Features Rip'a:
- It is based on license by Electronic Arts
- Removed the coop, logo development, demo trailers, clips repeated
- Do not recoded
- Ability to burn to DVD5 disc
- Installation time ~ 7 minutes
- Game Version: v1.0
- To install you will need 512 MB of RAM
- Repak Group: RG UniGamers
- Author Format: SEYTER

Information about the game:
Release Date: February 21, 2012
Genre: Action (Shooter) / 3D / 1st Person
Developer: Starbreeze Studios
Publisher: Electronic Arts
Publisher in Russia: Electronic Arts
Publication Type: Rip
Language: Russian $  English
Language: English
Tablet: Enclosing "SKIDROW"
Size: 4,31 Gb  
Download

Posted in | Leave a comment

vHome v3.70 S60v5 S^3 unsigned eng






Pkb000170.jpgvHome is the most powerful desktop UI onNokia phones.Give you HTC Sense andiPhone style UI onS60 , and totally free! Powerful home screen features include:
1) Beautiful big retro clock or analog clock
2) News feeds and weathe
3) Put all your apps into neat pages to flick through,like iPhone
4) one click on/off widgets: bluetooth, silent profile,phone lock.
5) send twits from home screen  

 





Posted in | Leave a comment
Twitter Bird Gadget