Earn through sms sending

i founda new trick to get free mobile recharge
through bellow link you gen earn money by sending sms
you can recharge your mobile with that money
sing up now and start earning

Earn money by sms sending

Earn money online

It is very easy way to earn money just click bellow and learn
               CLICK HERE

Get free recharge

Just signup and get free recharge 100% true allso used by me
Click here for signup

How to hack wifi

WI-FI CRACKING
Required Tools
1. You will need a computer with a
wireless adapter , Backtrack 4 and
burn it's image to a CD or make
bootable usb stick...
BACKTRACK is a bootable live cd
with a myriad of wireless and tcp/ip
networking tools.
you can download Backtrack 4 from
here
Tools Overview
* Kismet - a wireless network
detector and packet sniffer
* airmon - a tool that can help you
set your wireless adapter into
monitor mode (rfmon)
* airodump - a tool for capturing
packets from a wireless router
(otherwise known as an AP)
* aireplay - a tool for forging ARP
requests
* aircrack - a tool for decrypting
WEP keys
* iwconfig - a tool for configuring
wireless adapters. You can use this
to ensure that your wireless adapter
is in "monitor" mode which is
essential to sending fake ARP
requests to the target router
* macchanger - a tool that allows
you to view and/or spoof (fake) your
MAC address
Glossary of Terms
* AP: Access Point: a wireless router
* MAC Address: Media Access
Control address, a unique id
assigned to wireless adapters and
routers. It comes in hexadecimal
format (ie 00:11:ef:22:a3:6a)
* BSSID: Access Point's MAC address
* ESSID: Access Point's Broadcast
name. (ie linksys, default, belkin etc)
Some AP's will not broadcast their
name but Kismet may be able to
detect it anyway
* TERMINAL: MS-Dos like command
line interface. You can open this by
clicking the black box icon next to
the start key in backtrack
* WEP: short for Wired Equivalency
Privacy, it is a security protocol for
Wi-Fi networks
* WPA: short for WiFi Protected
Access. a more secure protocal than
WEP for wireless networks. NOTE:
this tutorial does not cover cracking
WPA encryption
Since Backtrack is a live CD running
off your cdrom, there is nowhere
that you can write files to unless
you have a linux partition on your
hard drive or a usb storage device.
Backtrack has some NTFS support
so you will be able to browse to
your windows based hard drive
should you have one, but it will
mount the partition as "read-only".
I dual boot windows and ubuntu on
my laptop so I already have a linux
swap partition and a reiserfs
partition. Backtrack had no problem
detecting these and mounting them
for me. To find your hard drive or
usb storage device, just browse to
the /mnt folder in the file manager.
Typically a hard drive will appear
named something like hda1 or hda2
if you have more than one partition
on the drive. Alternately hdb1 could
show if you have more than one
hard disk. Having somewhere to
write files that you can access in
case you need to reboot makes the
whole process a little easier.
Steps To Be Followed
STEP 1
Monitoring Wireless Traffic With
Kismet
Place the backtrack CD into your
cd-rom drive and boot into
Backtrack. You may need to change
a setting in your bios to boot from
cd rom. During boot up you should
see a message like "Hit ctrl+esc to
change bios settings". Changing your
first boot device to cdrom will do
the trick. Once booted into linux,
login as root with username: root
password: toor. These are the
default username and password
used by backtrack. A command
prompt will appear. Type startx to
start KDE (a 'windows' like
workspace for linux).
Once KDE is up and running start
kismet by clicking on the start key
and browsing to Backtrack-
>Wireless Tools -> Analyzers -
>Kismet. Alternatively you can open
a Terminal and type:
kismet
Kismet will start running and may
prompt you for your wireless
adapter. Choose the appropriate
adapter, most likely 'ath0', and sit
back as kismet starts detecting
networks in range.
NOTE: We use kismet for two
reasons.
1. To find the bssid, essid, and
channel number of the AP you are
accessing.
2. Kismet automatically puts your
wireless adapter into monitor mode
(rfmon). It does this by creating a
VAP (virtual access point?) or in
other words, instead of only having
ath0 as my wireless card it creates
a virtual wifi0 and puts ath0 into
monitor mode automatically. To
find out your device's name just
type:
iwconfig
While kismet detects networks and
various clients accessing those
networks you might want to type 's'
and then 'Q' (case sensitive). This
sorts all of the AP's in your area by
their signal strength. The default
'autofit' mode that kismet starts up
in doesn't allow you much flexibilit
y. By sorting AP's by signal strength
you can scroll through the list with
the arrow keys and hit enter on any
AP you want more information on.
(side note: when selecting target AP
keep in mind this tutorial only
covers accessing host AP's that use
WEP encryption. In kismet the flags
for encryption are Y/N/0. Y=WEP
N=Open Network- no encryption 0=
other: WPA most likely.) Further
reading on Kismet is available here.
Select the AP (access point) you
want to access. Copy and paste the
broadcast name(essid), mac address
(bssid), and channel number of your
target AP into a text editor.
Backtrack is KDE based so you can
use kwrite. Just open a terminal and
type in 'kwrite' or select it from the
start button. In Backtrack's terminal
to copy and paste you use shift+ctrl
+c and shift+control+v respectively.
Leave kismet running to leave your
wireless adapter in monitor mode.
You can also use airmon to do this
manually. airmon-ng -h for more
help with this
STEP 2
Collecting Data With Airodump
Open up a new terminal and start
airodump so we can collect ARP
replies from the target AP.
Airodump is fairly straight forward
for help with this program you can
always type "airodump-ng -h" at the
command prompt for additional
options.
airodump-ng ath0 -w /mnt/hda2/
home/ryan/belkin_slax_rcu 9 1
Breaking down this command:
* ath0 is my wireless card
* -w tells airodump to write the file
to
/mnt/hda2/ryan/belkin_slax_rcu
* 9 is the channel 9 of my target AP
* 1 tells airodump to only collect
IVS - the data packets with the WEP
key
STEP 3
Associate your wireless card with
the AP you are accessing.
aireplay-ng -1 0 -e belkin -a
00:11:22:33:44:55 -h 00:fe:22:3
3:f4:e5 ath0
* -1 at the beginning specifies the
type of attack. In this case we want
fake authentication with AP. You can
view all options by typing aireplay-n
g -h
* 0 specifies the delay between
attacks
* -e is the essid tag. belkin is the
essid or broadcast name of my
target AP. Linksys or default are
other common names
* -a is the bssid tag(MAC address).
00:11:22:33:44:55 is the MAC
address of the target AP
* -h is your wireless adapters MAC
addy. You can use macchanger to
view and change your mac address.
macchanger -s ath0
* ath0 at the end is my wireless
adapters device name in linux
STEP 4
Start packet injection with aireplay
aireplay-ng -3 -b 00:11:22:3
3:44:55 -h 00:fe:22:33:f4:e5 ath0
* NOTES: -b requires the MAC
address of the AP we are accessing.
* -h is your wireless adapters MAC
addy. You can use macchanger to
view and change your mac address.
macchanger -s ath0
* if packets are being collected at a
slow pace you can typeiwconfig
ath0 rate auto to adjust your
wireless adapter's transmission rate.
You can find your AP's transmission
rate in kismet by using the arrow
keys up or down to select the AP
and hitting enter. A dialog box will
pop up with additional information.
Common rates are 11M or 54M.
As aireplay runs, ARP packets count
will slowly increase. This may take a
while if there aren't many ARP
requests from other computers on
the network. As it runs however,
the ARP count should start to
increase more quickly. If ARP count
stops increasing, just open up a new
terminal and re-associate with the
ap via step 3. There is no need to
close the open aireplay terminal
window before doing this. Just do it
simultaneously. You will probably
need somewhere between 200-500k
IV data packets for aircrack to break
the WEP key.
If you get a message like this:
Notice: got a deauth/disassoc
packet. Is the source MAC
associated ?
Just reassociate with the AP
following the instructions on step 3.
STEP 5
Decrypting the WEP Key with
Aircrack
Find the location of the captured
IVS file you specified in step 2. Then
type in a terminal:
aircrack-ng -s /mnt/hda2/home/
belkin_slax_rcu-03.ivs
Change /mnt/hda2/home/belkin_slax
_rcu-03.ivs to your file's location
Once you have enough captured
data packets decrypting the key will
only take a couple of seconds. For
my AP it took me 380k data
packets. If aircrack doesn't find a
key almost immediately, just sit
back and wait for more data
packets. More Simple....
client less attcak..
here are all commands............
airmon-ng stop wlan0
ifconfig wlan0 down
macchanger -m 00:11:22:33:44:55
wlan0
airmon-ng start wlan0
airodump-ng wlan0
Pick your target, copy it's BSSID,
press ctrl + C to end airodump.
airodump-ng -c (channel) -w wep --
bssid (paste AP's mac here) wlan0
Open a new KONSOLE:
aireplay-ng -1 0 -a (paste AP) -h
00:11:22:33:44:55 wlan0
aireplay-ng -5 -b (paste AP) -h
00:11:22:33:44:55 wlan0
A packet will pop up, verify that the
MAC is the same MAC of your
target.
Press Y if it is, N if it's not.
packetforge-ng -0 -a (paste AP) - h
00:11:22:33:44:55 -k 255.255.25
5.255 -l 255.255.255.255 -y
( the .xor filename, starts with
fragment..) -w ARP
aireplay-ng -2 -r ARP wlan0
Press Y.
Will start injecting, data packets will
rise like crazy. When enough data is
obtained..

Password Hacking

Password cracking is the process of
recovering secret passwords from
data that has been stored in or
transmitted by a computer system.

A common approach is to
repeatedly try guesses for the
password.
Most passwords can be cracked by
using following techniques :

1) Hashing :- Here we will refer to
the one way function (which may be
either an encryption function or
cryptographic hash) employed as a
hash and its output as a hashed
password.

If a system uses a reversible
function to obscure stored
passwords, exploiting that weakness
can recover even 'well-chosen'
passwords.

One example is the LM hash that
Microsoft Windows uses by default
to store user passwords that are less
than 15 characters in length.
LM hash breaks the password into
two 7-character fields which are
then hashed separately, allowing
each half to be attacked separately.
Hash functions like SHA-512, SHA-1,
and MD5 are considered impossible
to invert when used correctly.

2) Guessing :-

Many passwords can
be guessed either by humans or by
sophisticated cracking programs
armed with dictionaries (dictionary
based) and the user's personal
information.
Not surprisingly, many users choose
weak passwords, usually one related
to themselves in some way.
Repeated research over some 40
years has demonstrated that around
40% of user-chosen passwords are
readily guessable by programs.
Examples of insecure choices
include:
* blank (none)
* the word "password", "passcode",
"admin" and their derivatives
* the user's name or login name
* the name of their significant other
or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard
keyboard layout (eg, the qwerty
keyboard -- qwerty itself, asdf, or
qwertyuiop)
* a simple modification of one of
the preceding, such as suffixing a
digit or reversing the order of the
letters.
and so on....
In one survery of MySpace
passwords which had been phished,
3.8 percent of passwords were a
single word found in a dictionary,
and another 12 percent were a word
plus a final digit; two-thirds of the
time that digit was.
A password containing both
uppercase &  lowercase characters,
numbers and special characters too;
is a strong password and can never
be guessed.
Check Your Password Strength

3) Default Passwords :- A
moderately high number of local
and online applications have inbuilt
default passwords that have been
configured by programmers during
development stages of software.
There are lots of applications
running on the internet on which
default passwords are enabled. So,
it is quite easy for an attacker to
enter default password and gain
access to sensitive information. A
list containing default passwords of
some of the most popular
applications is available on the
internet.

Always disable or change the
applications' (both online and
offline) default username-password
pairs.

4) Brute Force :- If all other
techniques failed, then attackers
uses brute force password cracking
technique. Here an automatic tool is
used which tries all possible
combinations of available keys on
the keyboard. As soon as correct
password is reached it displays on
the screen.This techniques takes
extremely long time to complete,
but password will surely cracked.
Long is the password, large is the
time taken to brute force it.

5) Phishing :- This is the most
effective and easily executable
password cracking technique which
is generally used to crack the
passwords of e-mail accounts, and
all those accounts where secret
information or sensitive personal
information is stored by user such
as social networking websites,
matrimonial websites, etc.
Phishing is a technique in which the
attacker creates the fake login
screen and send it to the victim,
hoping that the victim gets fooled
into entering the account username
and password. As soon as victim
click on "enter" or "login" login
button this information reaches to
the attacker using scripts or online
form processors while the user
(victim) is redirected to home page
of e-mail service provider.
Never give reply to the messages
which are demanding for your
username-password, urging to be e-
mail service provider.
It is possible to try to obtain the
passwords through other different
methods, such as social engineering,
wiretapping, keystroke logging,
login spoofing, dumpster diving,
phishing, shoulder surfing, timing
attack, acoustic cryptanalysis, using
a Trojan Horse or virus, identity
management system attacks (such as
abuse of Self-service password
reset) and compromising host
security.

However, cracking usually
designates a guessing attack.(this trick is only for learning purpose dont misuse of it)

Remove Recycle Bin icon from Desktop

How to remove Recycle Bin Icon from Desktop

If using XP Pro Go to

START > RUN Type GPEDIT.MSC

Navagate to USER CONFIGURATION >ADMINISTRATIVE TEMPLATES >Click on DESKTOP,

On the right hand pane find ” Remove Recycle Bin icon on the desktop ” ,

double left click on it to ENABLE it. Sorted!

If using XP Home Create or modify the following

registry entry HKEY_CURRENT_USER/Software /Microsoft/Windows/CurrentVersion /Explorer/HideDesktopIcons /NewStartPanel(to open registry open run and type regedit)
{645FF040-5081-101B-9F08-00AA002F954E}
REG_DWORD 0×00000001/

Boost your computer RAM

Follow the steps given below Break' button at the top right of your keyboard. Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..!

Folder Lock With password Without Any Software

Folder Lock With Password
Without Any Software-

Paste the code given below in
notepad and 'Save' it as batch file
(with extension '.bat').
Any name will do.
Then you see a batch file. Double
click on this batch file to create a
folder locker.
New folder named 'Locker' would
be formed at the same location.
Now bring all the files you want to
hide in the 'Locker' folder. Double
click on the batch file to lock the
folder namely 'Locker'.
If you want to unlock your
files,double click the batch file again
and you would be prompted for
password.
Enter the password and enjoy access
to the folder.

if EXIST "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}" goto
UNLOCK
if NOT EXIST Locker goto
MDLOCKER
:CONFIRM
echo Are you sure u want to
Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
attrib +h +s "Control
Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to
Unlock folder
set/p "pass=>"
if NOT %pass%==type your
password here goto FAIL
attrib -h -s "Control
Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
ren "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}" Locker
echo Folder Unlocked
successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created
successfully
goto End
:End

shutdown your pc with command prompt

The 'Shutdown' Command Becomes More Flexible and Automated when used from the Command Prompt.

To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'. In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command.

You have to use at least one switch for the shutdown command to work.

The Switches :- The 'Shutdown' command has a few options called Switches. You can always see them by typing 'shutdown -?' in the command prompt if you forget any of them. -i :

Display GUI interface, must be the first option -l : Log off (cannot be used with -m option) -s : Shutdown the computer -r : Shutdown and restart the computer -a : Abort a system shutdown -m
\\computername : Remote computer to shutdown/restart/abort -t xx : Set timeout for shutdown to xx seconds -c “comment” : Shutdown comment (maximum of 127 characters) -f :

Forces running applications to close without warning

-d [u][p]:xx:yy :

The reason code for the shutdown u is the user code p is a planned shutdown code xx is the major reason code (positive integer less than 256) yy is the minor reason code (positive integer less than 65536)

Note :- I’ve noticed using a switch with a '-' sign doesn’t work sometimes.

If you are having trouble try using a '/' in place of '-' in your switches.

Examples :- shutdown –m \\computername –r –f This command will restart the computer named computername and force any programs that might still be running to stop.

shutdown –m \\computername
–r –f –c “I’m restarting your computer. Please save your work now.” –t 120

This command will restart the computer named computername, force any programs that might still be running to stop, give to user on that computer a message, and countdown 120 seconds before it restarts. shutdown –m

\\computername –a This command will abort a previous shutdown command that is in progress.

Using A Batch File :- You can create a file that performs the shutdown command on many computers at one time.

In this example I’m going to create a batch file that will use the shutdown command to shut down 3 computers on my home network before I go to bed.

Open 'Notepad' and type the shutdown command to shut down a computer for each computer on the network.

Make sure each shutdown command is on its own line. An example of what should be typed in notepad is given below- shutdown –m \\computer1 –s shutdown –m \\computer2 –s shutdown –m \\computer3 -s

Now I’ll save it as a batch file by going to file, save as, change save as type to all files, give the file a name ending with '.bat'.

I named mine 'shutdown.bat'. Pick the location to save the batch file in and save it. When you run the batch file it’ll shutdown computer 1, 2, and 3 for you.

You can use any combination of shutdown commands in a batch file.

Rename a folder without any name

This trick will allow you to create files and folders without any name. Just follow the steps as given below For this you will have to rename the file with 2 spaces. Just follow the steps given below :-

1) Select file, Press 'F2'. 2) Hold 'Alt' key and type '0160' from the numpad.

3) Release the 'Alt' key. Now without doing anything else, again hold 'Alt' key and type '0160'.

4) Press 'Enter' and you will have second nameless file in the same directory.

5) Repeat step 3 to create as many nameless files or folders in the same directory.

(We have a problem with deleting these folders, to do so, start your computer in 'Safe Mode' and delete it from there.)

what is computer virus? diffrent types of computer virus

What is a Computer Virus?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :- The different types of viruses are as follows

1) Boot Sector Virus :-
Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it.
They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot- sector virus, any non-write- protected disk accessed by this system will become infected. Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :-
Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS . Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :-

A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector. This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated. Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989. Other examples are Invader, Flip, etc.

4) Stealth Viruses :-
These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :-
A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e- mail virus. Well-known examples are Concept Virus and Melissa Worm.

How to chat with your friend with command prompt

1) All you need is your friend's IP
Address and your Command
Prompt.

2) Open Notepad and write this code
as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as
"Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to
Command Prompt and press Enter.

6) You would then see something
like this:

7) Now, type the IP Address of the
computer you want to contact and
press enter
You will see something like this:

8) Now all you need to do is type
your message and press Enter.
Start Chatting.......!

how to hack anyones gmail account

Gmail is one of the most widely
used email services across the world
and it’s no wonder why many
people want to hack gmail. So if you
are curious to know how to hack a
gamil account then this article is for
you.
Here in this article, I will show you
some of the real and working ways
to hack gmail and will also make you
aware of the common scams and
myths associated with hacking
gmail.
Before I discuss how to hack gmail, I
want to make our readers aware of
the common scams and myths
associated with hacking gmail or any
other email. So here we go
I. There is no ready made software/
program that will hack gmail just
with a click of a button. So never
get fooled by something called gmail
hacking software. If there exists
such program to hack gmail then it’s
no more than a scam.
II. Most of the email hacking
services on the internet claim to
hack gmail password for just a small
fee. many of the services have been
tested by our team and found that
most of them are scams. So we
make aware you that don't be
fooled by such services if any one
offers.
At this point you may be wondering
what are the other ways to hack
gmail then. So here are the working
ways to hack gmail.
With my experience in the field of
hacking and security I can tell you
that there are three ways to hack
gmail account.
1. Keylogging
2. Phishing
Any other method to hack gmail
other than these two are simply
scam or don't work.
Easiest Way to Hack Gmail
The easiest way to hack gmail is
through keylogging . It is done
using a small program/software
called keylogger. This keylogger
when installed on any computer will
capture each and every keystroke
including passwords. Also it works
in complete stealth mode by
completely hiding itself. So
installing a keylogger on the
computer is the easiest way to hack
gmail. Once the victim logs into his
gmail account from this computer
his gmail username & password are
captured and stored instantly. The
stored logs are sent to you via
email. But what if you do not have
physical access to the computer?
Well, still you need not worry. there
are some keylogger you can install
remotely also.
For more details on how keylogger
is used read book HACKING MADE
EASY
Other ways to Hack Gmail
The other most commonly used
trick to hack Gmail is using a Fake
Login Page (which is called as
Phishing). Today, Fake login pages
are the most widely used techniques
to hack Gmail. A Fake Login page is
a page that appears exactly as a
Login page of sites like Yahoo, Gmail
etc. But once we enter our password
there, we end up loosing it.
However creating a fake login page
and taking it online to successfully
hack a Gmail password is not an
easy job. It demands an in depth
technical knowledge of HTML and
scripting languages like PHP, JSP
etc. So if you are new to the concept
of hacking passwords, then I
recommend using the keyloggers to
hack Gmail since it’s the easiest
way.
(this trick only for learning purpose please dont misuse of this trick)

earn by sms sending

i founda new trick to get free mobile recharge
through bellow link you gen earn money by sending sms
you can recharge your mobile with that money
sing up now and start earning

Earn money by sms sending