WELCOME Learn Hacking web site

With our help approve your genuine adsense account within 4 hours only. We will Help you to get maximum revenue from your website blog,wordpress .ect show contact me www.fb.com/mayur.khokhar1

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Monday, 1 October 2012

proxy servar

symbolProxy server




proxy server
Proxy server :
Hello my all friends. I will show a new tricks this is a not tricks . this is security of your internet.

What is proxy server :-
A proxy server protect the identity of your system from the wilderness of the internet by the acting as a buffer between you and host to which you are connected . instead of communicating directly with the host your system establish a direct connection with the proxy server. The proxy server is turn, establish a connection with the remote host to which you want to connect. Any message send to or from your system are routed through the proxy server as shown here
Your system -->  proxy server -->  remote host
Remote host -->  proxy server -->  your system

When a proxy server is in use .Your system is never directly connected with the remote host which mean your identity is protected form that host.
For this reason proxy server can be used to protect your  ip address from malicious users.


Different Proxy Server

proxy servar

symbolProxy server




proxy server
Proxy server :
Hello my all friends. I will show a new tricks this is a not tricks . this is security of your internet.

What is proxy server :-
A proxy server protect the identity of your system from the wilderness of the internet by the acting as a buffer between you and host to which you are connected . instead of communicating directly with the host your system establish a direct connection with the proxy server. The proxy server is turn, establish a connection with the remote host to which you want to connect. Any message send to or from your system are routed through the proxy server as shown here
Your system -->  proxy server -->  remote host
Remote host -->  proxy server -->  your system

When a proxy server is in use .Your system is never directly connected with the remote host which mean your identity is protected form that host.
For this reason proxy server can be used to protect your  ip address from malicious users.


Different Proxy Server

proxy servar

symbolProxy server




proxy server
Proxy server :
Hello my all friends. I will show a new tricks this is a not tricks . this is security of your internet.

What is proxy server :-
A proxy server protect the identity of your system from the wilderness of the internet by the acting as a buffer between you and host to which you are connected . instead of communicating directly with the host your system establish a direct connection with the proxy server. The proxy server is turn, establish a connection with the remote host to which you want to connect. Any message send to or from your system are routed through the proxy server as shown here
Your system -->  proxy server -->  remote host
Remote host -->  proxy server -->  your system

When a proxy server is in use .Your system is never directly connected with the remote host which mean your identity is protected form that host.
For this reason proxy server can be used to protect your  ip address from malicious users.


Different Proxy Server

ip change trick









Change ip address
Change IP Address
How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address.

1. Click on “Start” in the bottom left hand corner of screen.
2. Click on “Run”.
3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.
4. Type “ipconfig /release” just like that, and hit “enter”.
5. Type “exit” and leave the prompt.
6. Right-click on “Network Places” or “My Network Places” on your desktop.
7. Click on “properties”.
You should now be on a screen with something titled “Local Area Connection”, or something close to that.
8. Right click on “Local Area Connection” and click “properties”.
9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.
10. Click on “Use the following IP address” under the “General” tab.
11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).
12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.
13. Hit the “Ok” button here.
14. Hit the “Ok” button again. You should now be back to the “Local Area Connection” screen.
15. Right-click back on “Local Area Connection” and go to properties again.
16. Go back to the “TCP/IP” settings.
17. This time, select “Obtain an IP address automatically”.
18. Hit “Ok”.
19. Hit “Ok” again.
20. You now have a new IP address.

Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack. In this case you need to switch off the modem and then switch it on to get the new IP address.

NOTE: All these tricks works only if you have a dynamic IP address. But if you have a static IP address you have no option to change your IP.

Added by :Ethicalhacking1       Date:05-16-2010

by mayur khokhar

Make Invisible Password Protected Folder

Make Invisible Password Protected Folder
35  34  33 

How to Make Invisible Password Protected Folder
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.


How to create a Password Protected Folder?

Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To ->Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.


How to make it Invisible?
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
* Do not show hidden files and folders
* Show hidden files and folders

Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.

how to hack pc terajon


How To Hack A PC Using Trojan




Start-Button


How to hack a PC or remote system using Trojan & Backdoor:

Trojan:-
A trojan is a self-contained malicious program that does not replicate (as a worm would) nor infect other files (as a virus would).
Many of the the earlier Trojans were used to launch Distributed Denial of Service (DDoS) attacks, such as those suffered by Yahoo and eBay in the latter part of 1999. Today, Trojans are most often used to gain backdoor access - remote, surreptitious access - to the computer.
There are several different types of Trojans: Remote Access Trojans (RAT), Backdoor Trojans (backdoors), IRC Trojans (IRCbots), and Keyloggers. Many of these different types can be employed in a single Trojan. For example, a keylogger that also operates as a backdoor may commonly be disguised as a game hack. IRC Trojans are often combined with backdoors and RATs to create collections of infected computers known as botnets.
Here I am demonstrating using Netbus Trojan. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. I strictly recommend you to try these trojans & keyloggerson some testing system first
Description
The program can be used as a nice remote administration tool, or just to have some fun with your friends on the net. The network must support TCP/IP.
Installation
NetBus consists of a server and a client-part. The server-part is the program which must be running on the computer you wish to administrate. The client-part is the program you use to connect to another computer.
To install the NetBus server, you just run Patch.exe, on the target computer. By default it installs itself in the system, so it starts automatically every time Windows starts. In the NetBus-client you address the target with IP-numbers or host-names.
Note that you don’t see Patch when it’s running – it’s hiding itself automatically at start-up.
Parameters
There are some command-line parameters you can use with Patch:
  • Patch /noadd means that you don’t want Patch to start every Windows-session, probably most used for testing purposes.
  • Patch /remove removes itself from memory and registry.
  • Patch /pass:xxx installs the server with the given password.
  • Patch /port:xxx installs the server to use TCP-port xxx, instead of the default 12345.

What’s new?

  • Ultra-fast Port scanner.
  • Port Redirect – redirects data to another host and port.
  • Server setup – configures the server-exe with some options, like TCP-port and mail notification.
  • Application Redirect – redirects I/O from console applications to a specified TCP-port.
  • Possibility to restrict access to only a few IP-numbers.
Features
  • Open/close the CD-ROM once or in intervals (specified in seconds).
  • Show optional image. If no full path of the image is given it will look for it in the Patch-directory. The supported image-formats is BMP and JPG.
  • Swap mouse buttons – the right mouse button gets the left mouse button’s functions and vice versa.
  • Start optional application.
  • Play optional sound-file. If no full path of the sound-file is given it will look for it in the Patch-directory. The supported sound-format is WAV.
  • Point the mouse to optional coordinates. You can even navigate the mouse on the target computer with your own.
  • Show a message dialog on the screen. The answer is always sent back to you.
  • Shutdown the system, logoff the user etc.
  • Go to an optional URL within the default web-browser.
  • Send keystrokes to the active application on the target computer. The text in the field ”Message/text” will be inserted in the application that has focus. (”|” represents enter).
  • Listen for keystrokes and send them back to you.
  • Get a screendump (should not be used over slow connections).
  • Return information about the target computer.
  • Upload any file from you to the target computer. With this feature it will be possible to remotely update Patch with a new version.
  • Increase and decrease the sound-volume.
  • Record sounds that the microphone catch. The sound is sent back to you.
  • Make click sounds every time a key is pressed.
  • Download and deletion of any file from the target. You choose which file you wish to download/delete in a view that represents the harddisks on the target.
  • Keys (letters) on the keyboard can be disabled.
  • Password-protection management.
  • Show, kill and focus windows on the system.
  • Find NetBus servers with the ultra-fast Port scanner.
  • Redirect data on a specified TCP-port to another host and port.
  • Redirect console applications I/O to a specified TCP-port (telnet the host at the specified port to interact with the application).
  • Configure the server-exe with options like TCP-port and mail notification.
  • Possibility to restrict access to only a few IP-numbers (but be prepared for IP-spoofing).
The functions above (there are some logical exceptions) can be delayed an optional number of seconds before they are executing.
Password protection
If you just want to have fun with your friend’s computer yourself, and don’t want someone else to connect to it you can password protect it. To accomplish this you start the server with the parameter /pass:thepassword, or use the administration functions in NetBus.
Now everybody who hasn’t the correct password will fail when trying to connect or sending commands to that computer.
Hint
You should perhaps test the functions in NetBus against yourself before you start using it with your friends, so you know what’s happening (send text will, however, not work on yourself)! Your own machine can be addressed via ”localhost”.
Systemdemands
Windows 95, Windows NT or later versions of Windows.

how to hack pc terajon


How To Hack A PC Using Trojan
13  12  11 

Start-Button


How to hack a PC or remote system using Trojan & Backdoor:

Trojan:-
A trojan is a self-contained malicious program that does not replicate (as a worm would) nor infect other files (as a virus would).
Many of the the earlier Trojans were used to launch Distributed Denial of Service (DDoS) attacks, such as those suffered by Yahoo and eBay in the latter part of 1999. Today, Trojans are most often used to gain backdoor access - remote, surreptitious access - to the computer.
There are several different types of Trojans: Remote Access Trojans (RAT), Backdoor Trojans (backdoors), IRC Trojans (IRCbots), and Keyloggers. Many of these different types can be employed in a single Trojan. For example, a keylogger that also operates as a backdoor may commonly be disguised as a game hack. IRC Trojans are often combined with backdoors and RATs to create collections of infected computers known as botnets.
Here I am demonstrating using Netbus Trojan. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. I strictly recommend you to try these trojans & keyloggerson some testing system first
Description
The program can be used as a nice remote administration tool, or just to have some fun with your friends on the net. The network must support TCP/IP.
Installation
NetBus consists of a server and a client-part. The server-part is the program which must be running on the computer you wish to administrate. The client-part is the program you use to connect to another computer.
To install the NetBus server, you just run Patch.exe, on the target computer. By default it installs itself in the system, so it starts automatically every time Windows starts. In the NetBus-client you address the target with IP-numbers or host-names.
Note that you don’t see Patch when it’s running – it’s hiding itself automatically at start-up.
Parameters
There are some command-line parameters you can use with Patch:
  • Patch /noadd means that you don’t want Patch to start every Windows-session, probably most used for testing purposes.
  • Patch /remove removes itself from memory and registry.
  • Patch /pass:xxx installs the server with the given password.
  • Patch /port:xxx installs the server to use TCP-port xxx, instead of the default 12345.

What’s new?

  • Ultra-fast Port scanner.
  • Port Redirect – redirects data to another host and port.
  • Server setup – configures the server-exe with some options, like TCP-port and mail notification.
  • Application Redirect – redirects I/O from console applications to a specified TCP-port.
  • Possibility to restrict access to only a few IP-numbers.
Features
  • Open/close the CD-ROM once or in intervals (specified in seconds).
  • Show optional image. If no full path of the image is given it will look for it in the Patch-directory. The supported image-formats is BMP and JPG.
  • Swap mouse buttons – the right mouse button gets the left mouse button’s functions and vice versa.
  • Start optional application.
  • Play optional sound-file. If no full path of the sound-file is given it will look for it in the Patch-directory. The supported sound-format is WAV.
  • Point the mouse to optional coordinates. You can even navigate the mouse on the target computer with your own.
  • Show a message dialog on the screen. The answer is always sent back to you.
  • Shutdown the system, logoff the user etc.
  • Go to an optional URL within the default web-browser.
  • Send keystrokes to the active application on the target computer. The text in the field ”Message/text” will be inserted in the application that has focus. (”|” represents enter).
  • Listen for keystrokes and send them back to you.
  • Get a screendump (should not be used over slow connections).
  • Return information about the target computer.
  • Upload any file from you to the target computer. With this feature it will be possible to remotely update Patch with a new version.
  • Increase and decrease the sound-volume.
  • Record sounds that the microphone catch. The sound is sent back to you.
  • Make click sounds every time a key is pressed.
  • Download and deletion of any file from the target. You choose which file you wish to download/delete in a view that represents the harddisks on the target.
  • Keys (letters) on the keyboard can be disabled.
  • Password-protection management.
  • Show, kill and focus windows on the system.
  • Find NetBus servers with the ultra-fast Port scanner.
  • Redirect data on a specified TCP-port to another host and port.
  • Redirect console applications I/O to a specified TCP-port (telnet the host at the specified port to interact with the application).
  • Configure the server-exe with options like TCP-port and mail notification.
  • Possibility to restrict access to only a few IP-numbers (but be prepared for IP-spoofing).
The functions above (there are some logical exceptions) can be delayed an optional number of seconds before they are executing.
Password protection
If you just want to have fun with your friend’s computer yourself, and don’t want someone else to connect to it you can password protect it. To accomplish this you start the server with the parameter /pass:thepassword, or use the administration functions in NetBus.
Now everybody who hasn’t the correct password will fail when trying to connect or sending commands to that computer.
Hint
You should perhaps test the functions in NetBus against yourself before you start using it with your friends, so you know what’s happening (send text will, however, not work on yourself)! Your own machine can be addressed via ”localhost”.
Systemdemands
Windows 95, Windows NT or later versions of Windows.

hide to drive

Hide Drives

Hide-drive pic

How to Hide Drives Using Command Prompt(cmd) in window 7,Xp,Vista

If you have sensitive or important data stored on a particular disk drive that you don’t want anyone to see, a great way to hide it is to remove the drive letter assigned to a particular mounted volume. With Windows XP, you can achieve this easily using nothing more than the Command Prompt. Here's how:
  1. Click Start -> Run (This brings up the Run dialog box)
  2. Type cmd and press Enter (This brings up the Windows Command Prompt
  3. Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
  4. Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)



  5. Using the above picture as reference, if, for example, you would like to hide drive R
  6. Type select volume 1 (or select any other volume as where the drive is present)
  7. Now type remove letter R (Note: This sometime requires a reboot)


Diskpart will now remove the drive letter.

The drive will no longer be available via Windows Explorer or My Computer.

Don’t worry though, your data remains safe!




Unhide


Now, should you want to unhide the drive and make it accessible again, just repeat the above process. But instead of typing remove letter R, type assign letter R

  1. Click Start -> Run (This brings up the Run dialog box)
  2. Type cmd and press Enter (This brings up the Windows Command Prompt
  3. Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
  4. Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)
  5. Type select volume 1 (or select any other volume as where the drive was present)
  6. Now type assign letter R (Note: This sometime requires a reboot)


  7. The drive will be available via Windows Explorer or My Computer.

key logger

key logger






Pic-run

How KeyLoggers Works And How To Use It.

Here I explain all possible information that you need to know about keyloggers which includes how to use it, how it works etc.

How Gmail account and Ymail account or Any other mail id and password Could be known with help of keylogger

WARNING: I highly recommend that you read this post completely since every single piece of information is important.

FAQ

1. What is a Keylogger?

A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.



2. How Keylogger works?

Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://mail.yahoo.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.



3. How to install the keylogger?

A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.



4. Do I need any special knowledge to install and use the keylogger?

Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.



5. Once I install the keylogger can the victim come to know about it’s presence?

No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.



6. Can I be traced back if I install the keylogger on some other computer?

No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.



7. Which keylogger is the best?

Today there exists hundreds of keyloggers on the market and most of them are no more than a scam. So I tested some of the top keyloggers and conclude that the following is the best one.


Family-Keylogger


Pic-run

Download Family Keylogger    Click Here..
  1. Install it and then test with it,Typing any keyword will get saved in Keylogger.
  2. View log to see the Keylogging.

block unwanted website

Block Unwanted Websites
10 

Parental Control

How to Block Unwanted Websites


Sometime we want to block some websites as in case of home,Parents Wants to block some unwanted sites which is mostly visited by child then in that case we have to do some changes in operating System Host File but Today Will Show YOu how to do it using tool,Actually Want to Show you doing it without tool but will do it later,until then use this software to block websites

About Block Website Buddy

Block Websites Buddy is an essential utility to block unwanted websites.
Don't download advertising banners and prohibit browsing undesired websites to keep your privacy and speed up internet traffic.
  1. First of all download Block Website Buddy, link to download Block Website Buddy is ------> Download Block Websites Buddy
  2. Install Block Website Buddy.
  3. Now Select the Block Website Buddy Tab.
  4. Then On Right Hand Side Click Block Website,add your website.You are able to block the website.
  5. To Unblock It ,Click on Blocked Websites in Block Websites Buddy,Right Click and delete the website.
  6. You are able to unblock that website.
You are able to block any Website Using it, Others features in it like Password Protection of this software in tools tab.

How to Disable Windows Logo Key

How to Disable Windows Logo Key
32  31  30 

window logo
How to Disable Windows Logo Key
At times it becomes necessary to disable the Windows Key on the keyboard. For example when playing games this nasty Windows key keeps annoying, as we often accidently press it and this takes our game out to the desktop. So it becomes necessary to disable it when not needed an re-enable it when needed.
The following download consists of two registry scripts (.reg) one to disable windows key and the other to re-enable it.
In this download there are two files
  • disable_winlogo_key.reg - Disable Windows Logo Ley
  • re-enable_winlogo_key.reg - Re-Enable Windows Logo Key

Download this tool click this link :-

Repair Registry of Windows PC


symbolRepair Registry of Windows PC




registry
How to Repair the Registry?

The best and the easiest way to repair your registry is by using a Registry Repair Tool (Registry Cleaner) which will automatically scan the registry to find invalid entries and will repair it by removing the errors with in no time. A registry cleaner is the simple and safest solution to repair registry and bring your PC back to it’s life without the need to re-install the Windows. We recommend the following registry cleaner to repair the Windows registry

Perfect Optimizer
  1. Perfect Optimizer is one of the best and award winning registry cleaner that repairs registry to avoid PC errors such as unwanted shutdown, freezing, crashing and more.
  2. Perfect optimizer will repair registry and increases your PC performance by upto 70%
  3. Repair registry to fix DLL errors and invalid shortcuts
  4. Free up virtual memory to avoid error messages
  5. Performs Defragmentation and Compression of the registry
  6. Repair registry to fix blue screen errors, system crashes, startup errors and more…
  7. Visit Perfect Optimizer Homepage for more information on this program.

Download this Software :-
Click To Download Perfect Optimizer

Perfect Optimizer Offers

• Repair of your registry and increase in PC performance by up to70 %.
• Free up virtual memory to avoid error messages.
• Keep personal information (credit card numbers, bank accounts, passwords) secure.
• Free up disk space by removing temp files and junk files.
• Repair invalid shortcuts to enjoy quick access to your files.
• Keep Windows update to enjoy latest technology.
• Defragmentation and compression of your registry with the click of a mouse.
• The option of removing registry errors manually or automatically.
• The security of registry back-up utilities.
• Easy removal of invalid program shortcuts, duplicate files and invalid help files.
• Easy organization of startup programs.
• Easy steps to speed up startup.
• Resolution of Windows installer errors.
• Repair of DLL files.
• Repair of Internet Explorer Errors
• Removal of Windows startup errors and runtime errors.
• Stabilization of scripting errors.
• Prevention of PC crashing and system freezes.

***For free Breaking News Alerts just sms JOIN NAXATRANEWS to 567678********For free Adult Jokes just sms JOIN 18JOKES to 567678*****