Friday, September 17, 2010

NOKIA Phone Secret Codes for YOU ?

This Codes Are For Nokia Phones Only.
- Show IMEI Code

If you want to know what's the IMEI code of your phone, press:


*#06#
- Sim Lock Information


To check if the Sim-Clock can be stopped type:


*#746025625#
- Software Version


This code shows you software version, date of manufacture and hardware model number of your phone.


* # 0000 #


- Show Service Menu


To get additional information from your phone you can use the so called "warranty codes", try typing:


*#92702689#
You'll get the following


serial number
manufactured date
date of purchase (if entered)
date of the last repair transfer user data (It may wok and it may not)


- Service Provider Lock


The Service provider (SP) lock is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SI M card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator. All Nokia phones (2110 and newer) have four different SIM locks which can be used to lock the phone for upto 4 different providers. But most phones with restriction only have one lock activated. ( lock 1)


The main code used in Nokia phones is:
#pw+(master code)+Y# This code is able to check, activate or remove Sim card restriction (SP-lock).


Use the * key to get the p, + and w characters.
'Y' has to be 1,2,3 or 4 - depending of what lock you what to deal with


#pw+1234567890+1# for Provider-Lock status
#pw+1234567890+2# for Network-Lock status
#pw+1234567890+3# for Provider(???)-Lock status
#pw+1234567890+4# for SimCard-Lock status (master code) is a 10 digit code, based on the phones IMEI number. (I can NOT give you the master c ode - SO DON'T ASK US FOR IT !!!!!!!)


e.g. To remove restriction on lock 1 type following code: #pw+(master code)+1


If you just want to check your phone use 10 random numbers Eg. 1234567890 as the (master code) eg. To check if phone if restricted on lock 1 type the following code: #pw+1234567890+1#


To get "p" - Press "*" three times


To get "w" - Press "*" four times


To get "+" - Press "*" two times


Enhanced Full Rate Codec (EFR):


On: Enter *3370# and EFR will be activated after a reboot of the phone
( consumes more power )
Off: Enter #3370# and EFR will be switched off after a reboot of the phone.


Half Rate Codec:
This function is NOT available on 8810
Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitati on Linear Prediction) compression technology.This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits. (but you take up more space on thenetwork, so they can charge you more) - Talk-time is reduced with about 5% Half Rate will give you bad soundquality, which gives the serviceprovider the to have more calls on the network, and you might get a lower charge from them. - Will give you 30% longer talk-time.


Unlock codes - How to enter unlock codes - process for entering unlock codes into your phone
Phone Unlocking
Accessories...k codes - process for entering unlock codes into your phone ...
http://www.mobile2mobile.net/Unlock_codes/unlock_instructions.htm
Unlocking Your Blackberry Phone Posted By: Mukul Verma
ckberry unlock , unlocking cell phone , how to unlock a phone , motorola unlock ,...
http://www.askexpertworld.com/detail/unlocking-your-blackberry-phone-p...
HTC SIM Unlock codes HTC Remote Unlock HTC Unlocking HTC SIM-Unlock
Unlock-Now.com
...e unlocking codes. Your sorce for HTC phone Unlocking. HTC SIM Unlock code...
http://www.unlock-now.com/
Unlock HTC SIM Unlock codes
SIM-Unlocker.com
... HTC phone unlock in 3 steps. Instant phone unlocking with no technical kn...IM-Unlocker.com Unlock HTC SIM Unlock codes
SIM-Unlocker.com Home Techni...
http://www.sim-unlocker.com/


Unlock HTC SIM Unlock codes
SIM-Unlocker.com
... HTC phone unlock in 3 steps. Instant phone unlocking with no technical kn...IM-Unlocker.com Unlock HTC SIM Unlock codes
SIM-Unlocker.com Home Techni...
http://www.sim-unlocker.com/en/
HTC BLACKSTONE SIM Unlock codes HTC BLACKSTONE Remote Unlock
Unlock-Now.com
... codes. Your sorce for HTC BLACKSTONE phone Unlocking. HTC BLACKSTONE SIM ...
http://blackstone.unlock-now.com/
...the Difference Between unlocking your phone by Hardware and by an Unlock C...Home / Unlock Code Unlock Code Unlock Codes - Blackberry, Motorola, LG, Sa...
http://www.cellfservices.com/store/unlock.html


HTC WINGS SIM Unlock codes HTC WINGS Remote Unlock
Unlock-Now.com
...cking codes. Your sorce for HTC WINGS phone Unlocking. HTC WINGS SIM Unloc...


http://wings.unlock-now.com/


HTC unlock codes - Terms and Conditions
Unlock-Now.com


...or HTC mobile phones, unlock your HTC phone remotely by IMEI without cable...hout cable without software, fast HTC unlocking. HTC unlock codes - Terms ...
http://www.unlock-now.com/terms.php


HTC SAPPHIRE SIM Unlock codes HTC SAPPHIRE Remote Unlock
Unlock-Now.com


...ng codes. Your sorce for HTC SAPPHIRE phone Unlocking. HTC SAPPHIRE SIM Un...


http://sapphire.unlock-now.com/

How to tell if your Facebook account is hacked ?

We all love Facebook, but if you’re not careful, your security may be compromised. From phishing, to automated spam, or simply forgetting to logout at a public terminal, there are a lot of things that might go wrong.


So, similar to what we did when we showed you how to deal with Gmail hacking, here’s a quick guide on how deal with hacked accounts on Facebook.


1. How to check for suspicious activity on Facebook

In order to see if anything is happening behind your back here’s how you check first.


First, go to Account Settings , Then go to Account Security


Then you’ll see a list of recent activity. If you see something that doesn’t look quite right, simply click the end activity button, and it remotely logs out that particular session.


2. How to get notified if a new device logs into your Facebook account


If you go to the same security menu detailed above you’ll also see an option to get notified via email or mobile phone. This allows you to have a more proactive response to potential Facebook security risks.


3. What can you do if your Facebook account is hacked


What you’d generally do on the spot would be to reset your password right away.


However,



1. If the login email address that you normally use to log in to your Facebook has been taken over by another person (i.e., you can no longer access your email account), click here.


2. If the login email address listed on your Facebook has been removed by another person (i.e., someone has replaced your login email address with one that you do not control), click here.



If your account is spamming your friends, do also do some free checks for malware and viruses.



Of course, prevention is better than cure so do take your time to read Facebook’s extensive coverage about resolving these incidents.

NOKIA Phone Secret Codes for YOU ?

This Codes Are For Nokia Phones Only.
- Show IMEI Code

If you want to know what's the IMEI code of your phone, press:


*#06#
- Sim Lock Information


To check if the Sim-Clock can be stopped type:


*#746025625#
- Software Version


This code shows you software version, date of manufacture and hardware model number of your phone.


* # 0000 #


- Show Service Menu


To get additional information from your phone you can use the so called "warranty codes", try typing:


*#92702689#
You'll get the following


serial number
manufactured date
date of purchase (if entered)
date of the last repair transfer user data (It may wok and it may not)


- Service Provider Lock


The Service provider (SP) lock is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SI M card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator. All Nokia phones (2110 and newer) have four different SIM locks which can be used to lock the phone for upto 4 different providers. But most phones with restriction only have one lock activated. ( lock 1)


The main code used in Nokia phones is:
#pw+(master code)+Y# This code is able to check, activate or remove Sim card restriction (SP-lock).


Use the * key to get the p, + and w characters.
'Y' has to be 1,2,3 or 4 - depending of what lock you what to deal with


#pw+1234567890+1# for Provider-Lock status
#pw+1234567890+2# for Network-Lock status
#pw+1234567890+3# for Provider(???)-Lock status
#pw+1234567890+4# for SimCard-Lock status (master code) is a 10 digit code, based on the phones IMEI number. (I can NOT give you the master c ode - SO DON'T ASK US FOR IT !!!!!!!)


e.g. To remove restriction on lock 1 type following code: #pw+(master code)+1


If you just want to check your phone use 10 random numbers Eg. 1234567890 as the (master code) eg. To check if phone if restricted on lock 1 type the following code: #pw+1234567890+1#


To get "p" - Press "*" three times


To get "w" - Press "*" four times


To get "+" - Press "*" two times


Enhanced Full Rate Codec (EFR):


On: Enter *3370# and EFR will be activated after a reboot of the phone
( consumes more power )
Off: Enter #3370# and EFR will be switched off after a reboot of the phone.


Half Rate Codec:
This function is NOT available on 8810
Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitati on Linear Prediction) compression technology.This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits. (but you take up more space on thenetwork, so they can charge you more) - Talk-time is reduced with about 5% Half Rate will give you bad soundquality, which gives the serviceprovider the to have more calls on the network, and you might get a lower charge from them. - Will give you 30% longer talk-time.


Unlock codes - How to enter unlock codes - process for entering unlock codes into your phone
Phone Unlocking
Accessories...k codes - process for entering unlock codes into your phone ...
http://www.mobile2mobile.net/Unlock_codes/unlock_instructions.htm
Unlocking Your Blackberry Phone Posted By: Mukul Verma
ckberry unlock , unlocking cell phone , how to unlock a phone , motorola unlock ,...
http://www.askexpertworld.com/detail/unlocking-your-blackberry-phone-p...
HTC SIM Unlock codes HTC Remote Unlock HTC Unlocking HTC SIM-Unlock
Unlock-Now.com
...e unlocking codes. Your sorce for HTC phone Unlocking. HTC SIM Unlock code...
http://www.unlock-now.com/
Unlock HTC SIM Unlock codes
SIM-Unlocker.com
... HTC phone unlock in 3 steps. Instant phone unlocking with no technical kn...IM-Unlocker.com Unlock HTC SIM Unlock codes
SIM-Unlocker.com Home Techni...
http://www.sim-unlocker.com/


Unlock HTC SIM Unlock codes
SIM-Unlocker.com
... HTC phone unlock in 3 steps. Instant phone unlocking with no technical kn...IM-Unlocker.com Unlock HTC SIM Unlock codes
SIM-Unlocker.com Home Techni...
http://www.sim-unlocker.com/en/
HTC BLACKSTONE SIM Unlock codes HTC BLACKSTONE Remote Unlock
Unlock-Now.com
... codes. Your sorce for HTC BLACKSTONE phone Unlocking. HTC BLACKSTONE SIM ...
http://blackstone.unlock-now.com/
...the Difference Between unlocking your phone by Hardware and by an Unlock C...Home / Unlock Code Unlock Code Unlock Codes - Blackberry, Motorola, LG, Sa...
http://www.cellfservices.com/store/unlock.html


HTC WINGS SIM Unlock codes HTC WINGS Remote Unlock
Unlock-Now.com
...cking codes. Your sorce for HTC WINGS phone Unlocking. HTC WINGS SIM Unloc...


http://wings.unlock-now.com/


HTC unlock codes - Terms and Conditions
Unlock-Now.com


...or HTC mobile phones, unlock your HTC phone remotely by IMEI without cable...hout cable without software, fast HTC unlocking. HTC unlock codes - Terms ...
http://www.unlock-now.com/terms.php


HTC SAPPHIRE SIM Unlock codes HTC SAPPHIRE Remote Unlock
Unlock-Now.com


...ng codes. Your sorce for HTC SAPPHIRE phone Unlocking. HTC SAPPHIRE SIM Un...


http://sapphire.unlock-now.com/

How to tell if your Facebook account is hacked ?

We all love Facebook, but if you’re not careful, your security may be compromised. From phishing, to automated spam, or simply forgetting to logout at a public terminal, there are a lot of things that might go wrong.


So, similar to what we did when we showed you how to deal with Gmail hacking, here’s a quick guide on how deal with hacked accounts on Facebook.


1. How to check for suspicious activity on Facebook

In order to see if anything is happening behind your back here’s how you check first.


First, go to Account Settings , Then go to Account Security


Then you’ll see a list of recent activity. If you see something that doesn’t look quite right, simply click the end activity button, and it remotely logs out that particular session.


2. How to get notified if a new device logs into your Facebook account


If you go to the same security menu detailed above you’ll also see an option to get notified via email or mobile phone. This allows you to have a more proactive response to potential Facebook security risks.


3. What can you do if your Facebook account is hacked


What you’d generally do on the spot would be to reset your password right away.


However,



1. If the login email address that you normally use to log in to your Facebook has been taken over by another person (i.e., you can no longer access your email account), click here.


2. If the login email address listed on your Facebook has been removed by another person (i.e., someone has replaced your login email address with one that you do not control), click here.



If your account is spamming your friends, do also do some free checks for malware and viruses.



Of course, prevention is better than cure so do take your time to read Facebook’s extensive coverage about resolving these incidents.

Wednesday, September 15, 2010

HACKING CLASS Made Easy


Hacking through keyloggers Depends on the mode which you are using
1. IF You have Physical access of the System(i.e college computers or Home PC etc..)
2. IF you Don't Have access to that system i.e Remote Computers etc..



Why I am saying these two methods because keyloggers for remote computer are mostly detectable but few  are undetectable now also..I will try to provide the Best undetectable keyloggers with Easy to use Interface... So Guys Read On....


First of all We Should Discuss basic Things About Keyloggers..i.e what are these , how they works, will i be caught doing this...and much more.. Starting From the Very First Question..



1. What is a Keylogger?
A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.
2. How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://www.gmail.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.
SAMPLE SNAPSHOTS OF KEYLOGGER DATA ..

3. How to install the keylogger?
A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.
4. Do I need any special knowledge to install and use the keylogger?
Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.
5. Once I install the keylogger can the victim come to know about it’s presence?
No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.
6. Can I be traced back if I install the keylogger on some other computer?
No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.


NOW THE METHOD 1
IF YOU HAVE THE PHYSICAL ACCESS OF THE COMPUTER..
First of all As I have Hold in the Previous Hacking class 12 that You will Need the Admin Rights to install the Applications...Hacking the Admin Account has been already discussed in the Previous class... So Read that For Hacking Admin Account.
Now You Have the Admin Rights or Previlages  Of the System... Best Method is to use the Inbuilt Keylogger of Firefox...
Note: It generally works only in the versions previous than 3.1 But I hav Edited it  and Now It can Work with Later Versions also... So Don't Work and Keep Using It..
Why I am Telling this ??  Its simply because It is absolutely Undetectable... No Antivirus can Detect It (100% safe)..
NOTE: IT ONLY WORKS WITH FIREFOX.. Its a Add on..
HOW TO USE THIS INBUILT KEYLOGGER??
Step 1 : Download The Keylogger.
Step2: After Downloading Drag and Drop It into the Firefox. After Dragging You will See Something like This...

Step 3: After That Click on Install And Then Restart the Firefox as Shown in Below Figure..

STEP 4: After Restarting the Firefox .. Now Configure the Keylogger as Shown Below ..

Go Tools --> Add Ons ---> Extensions.... Then Something Like Below Will appear..

Step 5 : Now Everything You type in the Web Browser Will be Recorded by the Keylogger... Itsn't that Easy Like 123..
Keep Enjoying...Here is sample Snapshot of Log of the Victim...

This is all About Inbuilt keylogger of Firefox... 
In Next class We will Discuss More things about Keyloggers... So keep Reading..

Hiding Yourself From being Traced ?

Hey guys as I have Already Mentioned above this is only for educational purpose so don't misuse it. I and Isoftdl is not responsible for any malpractice... Now you all thinking why I am saying this.. Itz pity simple because Its the most dangerous part i.e Hiding your identity from being traced by anyone i.e government,ISP,Raw...everything... So Read On...

Let's have a Breif Look up of Topics That we Cover Here:
1. Proxies and Anonymous Web Browsers
2. Anonymizers
3. Tools to bypass Government Censorship :P
4. Tools to Bypass Google Tracing :P
5. HTTP Tunneling for Windows
6. IP spoofing :P

Today we Will Cover First two Topics...

FIRST OF ALL ..


WHAT IS PROXY AND HOW IT WORKS???

Proxy is a network computer that can serve as an intermediate for connection with other computers .




They are usually used for the following purposes:
• As a firewall, a proxy protects thelocal network from outside access.
• As an IP addresses multiplexer, a proxy allows the connection of a number of computers to the Internet
   when having only one IP address.
• Proxy servers can be used (to some extent) to anonymize web surfing.
• Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material.
• Proxy servers can afford some protection against hacking attacks. (For Our Purpose)


HOW AND WHY  TO GET FREE PROXY SERVERS ??

~ Attacks using thousands of proxy servers around the world are difficult to trace.
~ Thousands of free proxy servers are available on the Internet .
~ Search for “free proxy  servers” in Google .
~ Using proxy servers can mask your trace .


I will recommend two sites for getting the Free Proxy servers. As these sites Daily provides Fresh anonymous Proxies...
1. http://www.tech-faq.com/proxy.shtml  (provides almost all type of Proxies)




2. http://proxy.org/   (check the Right Hand Side For Proxies)




BELOW SNAP SHOWING HOW PROXIES USED TO ATTACK..




ANONYMOUS WEB BROWSERS

Anonymous Web Browsers have inbuilt proxy finders they search for proxies by default and make our surfing anonymous...
TWO BEST ANONYMOUS WEB BROWSERS ARE:
1. Invisible Browsing v7.0
 DOWNLOAD :
http://www.isoftdl.com/2009/09/invisible-browsing-v70-hide-your-ip.html

SNAPSHOT:


2. BrowZar 2.0
DOWNLOAD:
http://www.browzar.com/download/index.html

SNAPSHOT:



You can also find more by googling it but these two are just Best.. :P


ANONYMIZERS 


Anonymizers are services that help to make web surfing anonymous. The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrel.

An anonymizer removes all the identifying information from a user’s computers while the user surfs the Internet, thereby ensuring the privacy of the user.

Why Use Anonymizer?
• Example: Google.com keeps track of all your web searches on their servers by placing a cookie on your machine.
• Every single search you entered at Google is logged.

SEVERAL ANONYMIZER TOOLS  ARE:
1. Hide Platinum IP
2. Hide My IP
3.Hide My Ip Address

Note: I am not providing the Below Three Because Almost 99% of their cracked version contains viruses and Spywares which can cause damage to your system...

The Rest Four Topics About Hiding Our Traces We will discuss Tomorrow..
Hope that You all have Like This...

 Download Unlimited From Rapidshare and Hotfile Premium Hack
Hey Guys After a Hectic Research on Rapidshare :P . I reach to a final solution and you all will be surprised to see that we can Download as many as times i.e Unlimited By using my trick. This Tricks Works 1000% . So today I will Show How to Download Unlimited Using Rapidshare. So Guys Read On...




Note: We can download 4 - 5 files Parallel simultaneously...
LIMITATION: Will Work Only With Dynamic IP broadband's like BSNL,AIRTEL etc..


THINGS YOU REQUIRE FOR RAPIDSHARE HACKING:
1. Dynamic IP broadband like BSNL.
2.Any Good Web browser like Google Chrome or Firefox.
3. My Rapidshare Batch File.
4. List of 4 Best premium Link Generators.
5. Good Download Manager Like IDM(Internet Download Manager)


STEP 1 : DYNAMIC IP BROADBAND
This is must for using this hack. This hack cannot be used using static IP's like College ,Office Computers.
For BSNL users its better than Miracle... So Enjoy Frens..
Dynamic Ip means Every Time you connect to broadband you will get New IP address.

STEP2 : ANY GOOD WEB BROWSER

Download Any Good Web Browser like Mozilla Firefox or Google Chrome.
You can Download these from www.filehippo.com


STEP3: MY RAPIDSHARE BATCH FILE
1. Open the Note Pad and Copy the Below Code:

@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release


2. Now Save this File as Rapidshare.bat (Note: You can save it as anyfilename.bat but remember to choose All Files while saving).
3. Now Every Time You want to Download From Rapidshare Double Click on It.


The task Is not finished Yet. By this method u can download One file at a time. But As In Start I have Said I will tell you the way to down load Multiple Files Simultaneously...So Read On..




STEP4: BEST PREMIUM LINK GENERATOR
We know that most premium link generators have limitation of downloading one file at a time also after download ask you to wait 2 to 3 min and ask you to visit their sponsor in mean time...
But Using My technique you can bypass that Also...


LIST of 4 Best Premium Link Generators:

SITE 1 
SITE 2

SITE3
SITE4


Now You have 4 premium  link generator and one simple manual rapidshare download Site i.e the link itself www.rapidsahre.com/files/  like... SO Now you can download 5 files at same time From rapidshare... But this will work only once..Then you have to wait again after that... But I have said Unlimited without Time Limit... hahha...
Yeah read on...

NOW AFTER ALL DOWNLOADING IS FINISHED i.e ALL FIVE DOWNLOADS .. RUN MY RAPIDSHARE.BAT FILE and repeat above process again... Every time You want to download just rum my Rapidshare.bat File by double clicking on that and enjoy free Parallel Unlimited Downloading from rapidshare, Hotfile and All sites like them...

Hotfile Rapidshare Megaupload 
Premium Account Link Generator 
100 % Working and tested




Total Downloads :
867,963
Download slots are UNLIMITED today!.

PREMIUM LINK GENERATORS !
http://www.rapid8.com/
OR

DON'T FORGET TO SAY THANKS !
 
  
FBI Inspection Tools 
World's Best hacking KIT




Posted Image
This a pack of system tools which are used by FBI to analyse and inspect other computers. These must be used only educational purpose, please don't misuse the tools.

Tools included in package :

* ADS Locator (Alternate Data Streams)
* Historian 1.4 (Browser Analyze)
* Disc Investigator 1.4 (File-Slack-Analyze)
* Live View 0.6 (System Analyze)
* MUI Cacheview 1.00 (Registry Analyze)
* Networkminer 0.85 (Network Analyze)
* Regripper 2.02 (Registry Analyze)
* Systemreport 2.54 (PC Analyze)
* USB-History R1 (USB-Stick-Analyze)
* Windows File Analyzer (File Analyze)
* Winpcap 4.02 (Network)


http://www.easy-share.com/1905565857/FBI.Internet.Tools.Pack.rar

Hackers Software AIO 2010
Latest Hack tools Collection

Ghosty's Hackers Software AIO 2010


Hackers Software AIO 2010 | 30MB


WARNING TO ALL DOWNLOADERS 
By LOKESH owner of www.isoftdl.com



Its hack tools Collection. As I am professional Hacker so I know How to handle Viruses. So I am warning all users that Please Install The Deep Freeze First Before Using this. Otherwise No Antivirus or trojan remover can Help you... As Its a Complete hacker's Package.

This Soft is 100% likely to include viruses and trojans which are so new they are not yet found by anti-virus scanners. if you want to play with very new warez and h4X0r content then you can expect this.

There are solutions to the problem. experts use a program called 'deep freeze' to lock their systems and stop the viruses from working. you can also use registry guards to stop the viruses working e.g. Sandboxie

Beware if your computer is infected with an unrecognized virus then you are also a source of infection for others and you are endangering all your private information and systems.

DO NOT TAKE THIS TYPE OF SOFT IF YOU DO NOT KNOW WHAT YOU ARE DOING

YOU ARE WARNED TO TAKE SERIOUS SECURITY PRECAUTIONS IF YOU DOWNLOAD THIS SOFT

HACKING CLASS Made Easy


Hacking through keyloggers Depends on the mode which you are using
1. IF You have Physical access of the System(i.e college computers or Home PC etc..)
2. IF you Don't Have access to that system i.e Remote Computers etc..



Why I am saying these two methods because keyloggers for remote computer are mostly detectable but few  are undetectable now also..I will try to provide the Best undetectable keyloggers with Easy to use Interface... So Guys Read On....


First of all We Should Discuss basic Things About Keyloggers..i.e what are these , how they works, will i be caught doing this...and much more.. Starting From the Very First Question..



1. What is a Keylogger?
A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.
2. How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://www.gmail.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.
SAMPLE SNAPSHOTS OF KEYLOGGER DATA ..

3. How to install the keylogger?
A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.
4. Do I need any special knowledge to install and use the keylogger?
Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.
5. Once I install the keylogger can the victim come to know about it’s presence?
No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.
6. Can I be traced back if I install the keylogger on some other computer?
No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.


NOW THE METHOD 1
IF YOU HAVE THE PHYSICAL ACCESS OF THE COMPUTER..
First of all As I have Hold in the Previous Hacking class 12 that You will Need the Admin Rights to install the Applications...Hacking the Admin Account has been already discussed in the Previous class... So Read that For Hacking Admin Account.
Now You Have the Admin Rights or Previlages  Of the System... Best Method is to use the Inbuilt Keylogger of Firefox...
Note: It generally works only in the versions previous than 3.1 But I hav Edited it  and Now It can Work with Later Versions also... So Don't Work and Keep Using It..
Why I am Telling this ??  Its simply because It is absolutely Undetectable... No Antivirus can Detect It (100% safe)..
NOTE: IT ONLY WORKS WITH FIREFOX.. Its a Add on..
HOW TO USE THIS INBUILT KEYLOGGER??
Step 1 : Download The Keylogger.
Step2: After Downloading Drag and Drop It into the Firefox. After Dragging You will See Something like This...

Step 3: After That Click on Install And Then Restart the Firefox as Shown in Below Figure..

STEP 4: After Restarting the Firefox .. Now Configure the Keylogger as Shown Below ..

Go Tools --> Add Ons ---> Extensions.... Then Something Like Below Will appear..

Step 5 : Now Everything You type in the Web Browser Will be Recorded by the Keylogger... Itsn't that Easy Like 123..
Keep Enjoying...Here is sample Snapshot of Log of the Victim...

This is all About Inbuilt keylogger of Firefox... 
In Next class We will Discuss More things about Keyloggers... So keep Reading..

Hiding Yourself From being Traced ?

Hey guys as I have Already Mentioned above this is only for educational purpose so don't misuse it. I and Isoftdl is not responsible for any malpractice... Now you all thinking why I am saying this.. Itz pity simple because Its the most dangerous part i.e Hiding your identity from being traced by anyone i.e government,ISP,Raw...everything... So Read On...

Let's have a Breif Look up of Topics That we Cover Here:
1. Proxies and Anonymous Web Browsers
2. Anonymizers
3. Tools to bypass Government Censorship :P
4. Tools to Bypass Google Tracing :P
5. HTTP Tunneling for Windows
6. IP spoofing :P

Today we Will Cover First two Topics...

FIRST OF ALL ..


WHAT IS PROXY AND HOW IT WORKS???

Proxy is a network computer that can serve as an intermediate for connection with other computers .




They are usually used for the following purposes:
• As a firewall, a proxy protects thelocal network from outside access.
• As an IP addresses multiplexer, a proxy allows the connection of a number of computers to the Internet
   when having only one IP address.
• Proxy servers can be used (to some extent) to anonymize web surfing.
• Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material.
• Proxy servers can afford some protection against hacking attacks. (For Our Purpose)


HOW AND WHY  TO GET FREE PROXY SERVERS ??

~ Attacks using thousands of proxy servers around the world are difficult to trace.
~ Thousands of free proxy servers are available on the Internet .
~ Search for “free proxy  servers” in Google .
~ Using proxy servers can mask your trace .


I will recommend two sites for getting the Free Proxy servers. As these sites Daily provides Fresh anonymous Proxies...
1. http://www.tech-faq.com/proxy.shtml  (provides almost all type of Proxies)




2. http://proxy.org/   (check the Right Hand Side For Proxies)




BELOW SNAP SHOWING HOW PROXIES USED TO ATTACK..




ANONYMOUS WEB BROWSERS

Anonymous Web Browsers have inbuilt proxy finders they search for proxies by default and make our surfing anonymous...
TWO BEST ANONYMOUS WEB BROWSERS ARE:
1. Invisible Browsing v7.0
 DOWNLOAD :
http://www.isoftdl.com/2009/09/invisible-browsing-v70-hide-your-ip.html

SNAPSHOT:


2. BrowZar 2.0
DOWNLOAD:
http://www.browzar.com/download/index.html

SNAPSHOT:



You can also find more by googling it but these two are just Best.. :P


ANONYMIZERS 


Anonymizers are services that help to make web surfing anonymous. The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrel.

An anonymizer removes all the identifying information from a user’s computers while the user surfs the Internet, thereby ensuring the privacy of the user.

Why Use Anonymizer?
• Example: Google.com keeps track of all your web searches on their servers by placing a cookie on your machine.
• Every single search you entered at Google is logged.

SEVERAL ANONYMIZER TOOLS  ARE:
1. Hide Platinum IP
2. Hide My IP
3.Hide My Ip Address

Note: I am not providing the Below Three Because Almost 99% of their cracked version contains viruses and Spywares which can cause damage to your system...

The Rest Four Topics About Hiding Our Traces We will discuss Tomorrow..
Hope that You all have Like This...

 Download Unlimited From Rapidshare and Hotfile Premium Hack
Hey Guys After a Hectic Research on Rapidshare :P . I reach to a final solution and you all will be surprised to see that we can Download as many as times i.e Unlimited By using my trick. This Tricks Works 1000% . So today I will Show How to Download Unlimited Using Rapidshare. So Guys Read On...




Note: We can download 4 - 5 files Parallel simultaneously...
LIMITATION: Will Work Only With Dynamic IP broadband's like BSNL,AIRTEL etc..


THINGS YOU REQUIRE FOR RAPIDSHARE HACKING:
1. Dynamic IP broadband like BSNL.
2.Any Good Web browser like Google Chrome or Firefox.
3. My Rapidshare Batch File.
4. List of 4 Best premium Link Generators.
5. Good Download Manager Like IDM(Internet Download Manager)


STEP 1 : DYNAMIC IP BROADBAND
This is must for using this hack. This hack cannot be used using static IP's like College ,Office Computers.
For BSNL users its better than Miracle... So Enjoy Frens..
Dynamic Ip means Every Time you connect to broadband you will get New IP address.

STEP2 : ANY GOOD WEB BROWSER

Download Any Good Web Browser like Mozilla Firefox or Google Chrome.
You can Download these from www.filehippo.com


STEP3: MY RAPIDSHARE BATCH FILE
1. Open the Note Pad and Copy the Below Code:

@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release


2. Now Save this File as Rapidshare.bat (Note: You can save it as anyfilename.bat but remember to choose All Files while saving).
3. Now Every Time You want to Download From Rapidshare Double Click on It.


The task Is not finished Yet. By this method u can download One file at a time. But As In Start I have Said I will tell you the way to down load Multiple Files Simultaneously...So Read On..




STEP4: BEST PREMIUM LINK GENERATOR
We know that most premium link generators have limitation of downloading one file at a time also after download ask you to wait 2 to 3 min and ask you to visit their sponsor in mean time...
But Using My technique you can bypass that Also...


LIST of 4 Best Premium Link Generators:

SITE 1 
SITE 2

SITE3
SITE4


Now You have 4 premium  link generator and one simple manual rapidshare download Site i.e the link itself www.rapidsahre.com/files/  like... SO Now you can download 5 files at same time From rapidshare... But this will work only once..Then you have to wait again after that... But I have said Unlimited without Time Limit... hahha...
Yeah read on...

NOW AFTER ALL DOWNLOADING IS FINISHED i.e ALL FIVE DOWNLOADS .. RUN MY RAPIDSHARE.BAT FILE and repeat above process again... Every time You want to download just rum my Rapidshare.bat File by double clicking on that and enjoy free Parallel Unlimited Downloading from rapidshare, Hotfile and All sites like them...

Hotfile Rapidshare Megaupload 
Premium Account Link Generator 
100 % Working and tested




Total Downloads :
867,963
Download slots are UNLIMITED today!.

PREMIUM LINK GENERATORS !
http://www.rapid8.com/
OR

DON'T FORGET TO SAY THANKS !
 
  
FBI Inspection Tools 
World's Best hacking KIT




Posted Image
This a pack of system tools which are used by FBI to analyse and inspect other computers. These must be used only educational purpose, please don't misuse the tools.

Tools included in package :

* ADS Locator (Alternate Data Streams)
* Historian 1.4 (Browser Analyze)
* Disc Investigator 1.4 (File-Slack-Analyze)
* Live View 0.6 (System Analyze)
* MUI Cacheview 1.00 (Registry Analyze)
* Networkminer 0.85 (Network Analyze)
* Regripper 2.02 (Registry Analyze)
* Systemreport 2.54 (PC Analyze)
* USB-History R1 (USB-Stick-Analyze)
* Windows File Analyzer (File Analyze)
* Winpcap 4.02 (Network)


http://www.easy-share.com/1905565857/FBI.Internet.Tools.Pack.rar

Hackers Software AIO 2010
Latest Hack tools Collection

Ghosty's Hackers Software AIO 2010


Hackers Software AIO 2010 | 30MB


WARNING TO ALL DOWNLOADERS 
By LOKESH owner of www.isoftdl.com



Its hack tools Collection. As I am professional Hacker so I know How to handle Viruses. So I am warning all users that Please Install The Deep Freeze First Before Using this. Otherwise No Antivirus or trojan remover can Help you... As Its a Complete hacker's Package.

This Soft is 100% likely to include viruses and trojans which are so new they are not yet found by anti-virus scanners. if you want to play with very new warez and h4X0r content then you can expect this.

There are solutions to the problem. experts use a program called 'deep freeze' to lock their systems and stop the viruses from working. you can also use registry guards to stop the viruses working e.g. Sandboxie

Beware if your computer is infected with an unrecognized virus then you are also a source of infection for others and you are endangering all your private information and systems.

DO NOT TAKE THIS TYPE OF SOFT IF YOU DO NOT KNOW WHAT YOU ARE DOING

YOU ARE WARNED TO TAKE SERIOUS SECURITY PRECAUTIONS IF YOU DOWNLOAD THIS SOFT