tag:blogger.com,1999:blog-65120839924986040112024-03-12T21:24:06.148-07:00HACKING DESIREEnjoy hacking in life.........................freehttp://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.comBlogger164125tag:blogger.com,1999:blog-6512083992498604011.post-38554090711105303482017-07-17T22:40:00.000-07:002017-07-17T22:40:14.254-07:00MICROMAX A106 FULL BOARD IMAGES<div dir="ltr" style="text-align: left;" trbidi="on">
MICROMAX A106 FULL BOARD IMAGES<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-Op2efPiWwFg/WW2emFvsl0I/AAAAAAAAAq8/cpW4_ZX_JqAHb1_DWRpdZnK0P4JA0zYHgCLcBGAs/s1600/IMG_20170716_113738.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1200" data-original-width="1600" height="240" src="https://3.bp.blogspot.com/-Op2efPiWwFg/WW2emFvsl0I/AAAAAAAAAq8/cpW4_ZX_JqAHb1_DWRpdZnK0P4JA0zYHgCLcBGAs/s320/IMG_20170716_113738.jpg" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-FdAAFpcHAW0/WW2eml0VBdI/AAAAAAAAArA/PPG2lJkfPqgS20XU2U7saBRrHgSTs1lEACLcBGAs/s1600/IMG_20170716_120038.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1200" data-original-width="1600" height="240" src="https://3.bp.blogspot.com/-FdAAFpcHAW0/WW2eml0VBdI/AAAAAAAAArA/PPG2lJkfPqgS20XU2U7saBRrHgSTs1lEACLcBGAs/s320/IMG_20170716_120038.jpg" width="320" /></a><a href="https://3.bp.blogspot.com/-_6CiukUm-QM/WW2elafMkdI/AAAAAAAAAq4/r4-IqQgeQDkqpdPbafpG_mnfw8o5Tj5xQCLcBGAs/s1600/IMG_20170716_113725.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1200" data-original-width="1600" height="240" src="https://3.bp.blogspot.com/-_6CiukUm-QM/WW2elafMkdI/AAAAAAAAAq4/r4-IqQgeQDkqpdPbafpG_mnfw8o5Tj5xQCLcBGAs/s320/IMG_20170716_113725.jpg" width="320" /></a></div>
<br />
micromax a106 full motherboard daigram......thanks for visiting</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-50707655021248078402015-05-27T04:08:00.000-07:002015-05-27T04:08:54.173-07:00FIND OUT YOUR PHONE LOCATION , SEARCH "FIND MY PHONE " ON GOOGLE<div dir="ltr" style="text-align: left;" trbidi="on">
FOLLOW THIS SIMPLE STEPS TO "FIND YOUR PHONE"<br /><br />Step:- 1. First you need to visit GOOGLE.COM and type "FIND YOUR PHONE" keyword just like i did in the image shown below.<br /><br />Step:- 2. Google will show you a random preview of google maps. If you are not signed in with your google account(make sure that you login with the account you usedd in your smartphone) that you need to sign in to your Google account.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-4B3Sx9bvp7E/VWWji56GroI/AAAAAAAAASA/7_aKRKbohgo/s1600/findmyfone.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="248" src="http://3.bp.blogspot.com/-4B3Sx9bvp7E/VWWji56GroI/AAAAAAAAASA/7_aKRKbohgo/s320/findmyfone.jpg" width="320" /></a></div>
<br /><br />Step:- 3. Once you signed in with your google account,google will start locating your device just like the image given below.<br /><br />Step:- 4. After some seconds google will show you your phone location after detecting it.<br /><br />Step:- 5. To find out your phone, click "ring" icon just like below image.<br /><br />Step:- 6. After this your phone will start ringing for atleast 5 minutes.(Even if your phone is in silent mode, still it will rings with high volume)<br /><br /><br />SOME FUNCTIONS ARE REQUIRED FOR USING THIS TOOL:-<br />1. Your device location must be on.<br />2. Your device must have the latest version of google maps.<br />3. The phone must be connected with internet.<br />4. This " find my phone " feature only works in desktop browseer , so you need a computer to use this tool .<br />you canot grab someone's phone to locate your phone location.<br /></div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-17460850347442797992013-02-24T03:22:00.001-08:002013-02-24T03:22:08.565-08:00Wifi Cracker Tool - Hack Wireless Networks How to hack Wifi Password?<br />
About Wifi Network?<br />
<br />
Wifi network is another name of wireless network or wireless internet, that name often used by none of the technical users that just know the way to access the WLAN network wirelessly, these people know a lot besides just accessing. Wifi Cracker network is originally a short form of wireless fidelity. Although, several advance users don’t know this technology, it is basically known by the name of Wifi Cracker network. Term of WLAN network is written in several ways that are fiwi, Wi-Fi, WIFI, Hi-fi and WLAN network. The concept of Wifi Cracker network was put forward by Wi-Fi alliance in the year 1985 it was an era when people didn’t use WLAN network for commercial purposes but this Wifi network was just set for some organizations for some testing purposes. Wifi network Alliance is first design in the development of WLAN network technology. Hardware that is associated with the Wifi Hack network is usually certified by the Wifi network Alliance compliance.<br />
The WLAN network was developed and designed properly and then ultimately launched for general public usage in United States of America in ninety’s , gradually WLAN network becomes standard for a lot of communications of computer in the countless organizations all over the world. WLAN Cracker network uses every network that refers to any sort of 802.11 standards of network that is set with the help of IEEE. IEEE is the short form for Institute of Electric and Electronic Engineering. In the world of technology, there are lot of the enhancements that are made on the standards of dual network, 802.11a and 802.11b. Latest standard of the family 802.11 is the 802.11y. Some other popular standards include 802.16; they are standards of upcoming technology called WiMax. There is another popular set of the standards for the Ethernet it is called IEEE 802.3.<br />
<br />
Features of Wifi Cracker Tool :<br />
<br />
Some of the best features of our tool:<br />
Cracker the most Popular Encryption (WEP, WPA, WPA-2).<br />
<br />
The radar indicates how many networks are around!<br />
<br />
Worked in 99% in WEP, 88% in WPA, and 76% in WPA-2. Tested by our team!<br />
<br />
Upload password list in .txt with button "Search Password (.txt) only works WPA and WPA2<br />
<br />
CONSOLE: Shows all details in real time the latest information (ONLY in Version 3.40 or UP)<br />
<br />
Free UPDATES using PatchUpdate.exe and Password List Updately Month!!<br />
<br />
Worked in Windows XP, Vista, 7, 8 and MAC OS, and Linux OS!<br />
<br />
It has never been so easy to find wireless passwords of its neighbors!<br />
<br />
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-60590887326716259392013-02-10T06:02:00.001-08:002013-02-10T06:02:55.908-08:00Speed Up Your PC (Without Any Software) Hi everyone here's one more useful trick . Actually it's better to call it a process instead of trick .<br />
<br />
Your PC sometimes go slow or boots ( Start Up ) really slow . This usually happens due to the huge load of applications which are set to be started at start up . Most of them are not necessary during startup ( like your download manager , adobe products and many more ) . So today I'm gonna teach you how to remove those unnecessary applications during booting process .<br />
<a href="http://www.blogger.com/blog-this.g" name="more"></a><br />
Here we go:<br />
<br />
1) Goto Start -> Run ( win xp ).<br />
2) Goto Start -> Then type Run at the search box -> click Run ( win 7 ).<br />
3) Or you can simply use the Shortcut Key ( Start + R ) on keyboard to get to the Run box .<br />
<br />
<span style="color: red;"><u>*Note : Start key on the keyboard is the key with windows logo .</u></span><br />
<br />
4) Now in the Run box type "msconfig" ( without quotes ). And press Enter .<br />
5) The system configuration window will appear .<br />
6) Now goto Startup Tab .<br />
<br />
<br />
Here you'll find the apps starts on startup.<br />
<br />
7) Untick all unnecessary apps . ( Be carefull with your Antivirus , OS , Graphics Drivers . Do not untick them . I recommend not to untick any application which you are not sure about . Or it can cause problems . )<br />
<br />
8) Now click Apply -> Ok .<br />
9) Your pc will restart . And you can see the improvement in speed . Your boot up process will be faster .<br />
<br />
Enjoy .. And stay tuned for more usefull and cool tricks .<br />
Your one comment , share , or follow will encourage me to do more for you .<br />
<br />
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-64564309899345821792013-01-06T06:52:00.002-08:002013-01-06T06:52:44.906-08:00If any question asked me on that site <div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://aazadsingh.blogspot.in/" target="_blank">http://aazadsingh.blogspot.in/</a></div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-5296982745772142072012-11-13T22:02:00.001-08:002012-11-13T22:02:07.958-08:00<br />
<a href="http://wapboost.com/landing/10986"><br />
<img src="http://wapboost.com/resources/banners/banner1.png" alt="latest sites"/></a><br />
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-62534975725299945812012-10-17T02:37:00.000-07:002012-10-17T02:37:36.934-07:00<div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="post-title entry-title">
How to Add Adbrite Code On Blogger Blog</h3>
<h3 class="post-title entry-title">
<a href="http://4.bp.blogspot.com/--nQqtBmJlxA/UH57CMt0FFI/AAAAAAAAAKo/ZOwBtlj_qRM/s1600/h.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://4.bp.blogspot.com/--nQqtBmJlxA/UH57CMt0FFI/AAAAAAAAAKo/ZOwBtlj_qRM/s1600/h.png" /></a><span style="background-color: white; direction: ltr;">Adbrite is known
to be the best Google Adsense alternatively since last year as large
number of Adsense account disabled on daily basic due to its strict
terms and conditions. Adbrite is only a hope for such a publishers.
So Adding a Adbrite code on your website or blog is a good way to make
money from Internet here is a brief description to add Adbrite Ad code
on your blog. </span><br />
<a href="http://www.blogger.com/blogger.g?blogID=6512083992498604011" name="more"></a></h3>
<h1>
How To Add Adbrite Code To Blog</h1>
<ol style="text-align: left;">
<li>Login to your Adbrite Account.</li>
<li>Copy the <i>Ad code</i> from Adbrite.</li>
<li>Now Login to your Blogger Dashboard</li>
<li>Go to<i> Design / Page Element</i>.</li>
<li>Click <i>Add a Gadget</i><img border="0" height="181" src="http://2.bp.blogspot.com/-7aAEBqxtfOo/ThAzrGWEQJI/AAAAAAAAAFY/gkcS8T2EdZ0/s400/untitled.JPG" width="400" /></li>
</ol>
<div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-kvzDw_vjhIk/ThA1IXJCXnI/AAAAAAAAAFc/YUw88mUMY8M/s1600/untitled.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="224" src="http://3.bp.blogspot.com/-kvzDw_vjhIk/ThA1IXJCXnI/AAAAAAAAAFc/YUw88mUMY8M/s320/untitled.JPG" width="320" /></a><a href="http://1.bp.blogspot.com/-8KhEIKxDsRA/ThA2dZeVyXI/AAAAAAAAAFg/HGXZADFtfXc/s1600/untitled.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="273" src="http://1.bp.blogspot.com/-8KhEIKxDsRA/ThA2dZeVyXI/AAAAAAAAAFg/HGXZADFtfXc/s320/untitled.JPG" width="320" /> </a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<ul style="text-align: left;">
<li> New Window will pop up. </li>
<li>Now add the following gadget.</li>
<li>And click Save. </li>
</ul>
<br />
<div class="separator" style="clear: both; text-align: left;">
After
adding code on blog you will not be able to see live ad as your
application will be under process but as soon as verification completed
you will begin to live ad on your blog.</div>
<div class="separator" style="clear: both; text-align: left;">
<br />
</div>
<div class="separator" style="clear: both; text-align: left;">
Adbrite
launches new terms and conditions for publisher according to that blog
or website hosted on free domain service like Blogger or WordPress are
not eligible to display ad unit. So if you want to display Adbrite code
on blog then you have to purchase domain name. </div>
<div class="separator" style="clear: both; text-align: left;">
<br />
</div>
<div class="separator" style="clear: both; text-align: left;">
If
you like the above article then don't forget to subscribe it for latest
updates or If you have any query then clear it to make valuable
comment. </div>
</div>
<div style="text-align: left;">
<br />
</div>
</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-58560887620792164802012-10-11T20:56:00.001-07:002012-10-11T20:56:08.375-07:0010 inspirational Steve Jobs quotes <br />
<h1><div class="header5"><span id="HeadContent_FullstoryCtrl_title">10 inspirational Steve Jobs quotes</span></div></h1><div class="dateline"><span id="HeadContent_FullstoryCtrl_byline">vsharmaa12</span>, <span id="HeadContent_FullstoryCtrl_date">October 05, 2012</span> </div><div class="newslist_img"><img alt="steve_jobs_qoute.jpg" class="imgbdr" id="HeadContent_FullstoryCtrl_mainstoryimage" src="http://cdn.ndtv.com/tech/gadget/image/steve_jobs_qoute.jpg" /></div>Steve Jobs was always described as an innovator, a visionary; and rightly so. He dropped out of college at the age of 21 and started Apple with his friend Steve Wozniak from his parents' garage.Apple's first product was not a runaway success but Apple II helped the company in getting noticed. Steve Jobs became a multimillionaire by the time he turned 25. He also graced the cover of Time magazine at 26.<br />
In a surprise turn of events, Steve Jobs was ousted from Apple in 1984 when he was 30. He did not waste too much time sulking about being unemployed and went on to establish NeXT computers. In 1986, Steve Jobs bought the computer graphics arm of Lucasfilm, Ltd., and this company is knows today as Pixar Animation Studios.<br />
In the meantime, Apple struggled to keep pace with the changing times and decided to bring back Jobs in 1996 by buying NeXT. Steve Jobs returned as the CEO of Apple in 1997 and took the company to unprecedented heights.<br />
Over the years, many people have looked up to Steve Jobs as a source of inspiration and on his first death anniversary, we complied the ten best inspirational quotes by the man himself.<br />
<b>1.</b> At an Apple product event for the first Macintosh computer on January 24, 1984: "We're gambling on our vision, and we would rather do that than make "me, too" products. Let some other companies do that. For us, it's always the next dream."<br />
<b>2.</b> In Playboy magazine in February 1985: "If you want to live your life in a creative way, as an artist, you have to not look back too much. You have to be willing to take whatever you've done and whoever you were and throw them away."<br />
<b>3.</b> At the Apple Worldwide Developers Conference, May 1997: "I'm actually as proud of the things we haven't done as the things I have done. Innovation is saying no to 1,000 things."<br />
<b>4.</b> Talking about work at the Stanford University's Commencement address on June 12, 2005: "Your work is going to fill a large part of your life, and the only way to be truly satisfied is to do what you believe is great work. And the only way to do great work is to love what you do. If you haven't found it yet, keep looking. Don't settle."<br />
<b>5.</b> Talking about him being fired from Apple at the Stanford University's Commencement Speech 2005: "I didn't see it then, but it turned out that getting fired from Apple was the best thing that could have ever happened to me. The heaviness of being successful was replaced by the lightness of being a beginner again, less sure about everything. It freed me to enter one of the most creative periods of my life.[...] It was awful tasting medicine, but I guess the patient needed it. Sometimes life hits you in the head with a brick. Don't lose faith."<br />
<b>6.</b> Steve Jobs gave an interview in "60 minutes" in 2003 in which he shared that his business model was inspired by The Beatles: "My model for business is The Beatles: They were four guys that kept each other's negative tendencies in check; they balanced each other. And the total was greater than the sum of the parts. Great things in business are not done by one person, they are done by a team of people."<br />
<b>7.</b> In an interview to BusinesWeek in 1998: "That's been one of my mantras - focus and simplicity. Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it's worth it in the end, because once you get there, you can move mountains."<br />
<b>8.</b> In a statement to The New York Times, 2003: "[Design is] not just what it looks like and feels like. Design is how it works."<br />
<b>9.</b> On being the richest man in an interview to The Wall Street Journal in 1993 "Being the richest man in the cemetery doesn't matter to me... Going to bed at night saying we've done something wonderful... that's what matters to me."<br />
<b>10.</b> Talking about Death at the Stanford University commencement speech, June 2005: "Remembering that I'll be dead soon is the most important tool I've ever encountered to help me make the big choices in life. Because almost everything -- all external expectations, all pride, all fear of embarrassment or failure -- these things just fall away in the face of death, leaving only what is truly important. Remembering that you are going to die is the best way I know to avoid the trap of thinking you have something to lose. You are already naked. There is no reason not to follow your heart. ... Stay hungry. Stay foolish."http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-18573220288588803532012-09-30T06:24:00.001-07:002012-09-30T06:24:18.748-07:00cmd Format a hard drive with Command Prompt<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://4.bp.blogspot.com/-OpcxPgfDDNM/UGhFsyxIbnI/AAAAAAAAAKY/xVnxQpaS758/s1600/cmd.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-OpcxPgfDDNM/UGhFsyxIbnI/AAAAAAAAAKY/xVnxQpaS758/s1600/cmd.png" /></a>In Windows I would normally be driven to either format a drive through the Disk Management console or by right-clicking on a drive in Windows Explorer and selecting the “Format…” option, but there can be advantages to formatting a driver through Command Prompt. For example if you are reformatting a drive which previously had an Operating System on the drive you can find there are System Partitions on the drive which can’t be seen in Windows Explorer and refuse to format in the Disk Management console.<br /><br />Note this is only a quick guide for Formatting Drives from Command Line, there are many more options available at your disposal. For a detailed insight to the options available for the DiskPart tool visit Microsofts Technet. In the example I have formatted an external hard drive for use of file storage in a Windows Operating System environment.<br />
<br />
<a name='more'></a><br /><br />In order to format a drive through Command Prompt firstly lets open the prompt.<br /><br />Click Start > Run and type “CMD”, pressing Enter should open a new terminal.<br />
<img alt="Start CMD" class="size-full wp-image-161" height="280" src="http://www.techhack.co.uk/wp-content/uploads/2011/03/start_cmd.jpg" title="Start CMD" width="433" /><br />
<br />
Start CMD<br />
We need to next start the Disk Part tool, type “DISK PART” into the Command Line and press Enter.<br />
<img alt="Start Disk Part" class="size-full wp-image-174" height="166" src="http://www.techhack.co.uk/wp-content/uploads/2011/03/start_disc_part.jpg" title="Start Disk Part" width="680" />Start Disk Part<br />
Next let’s display and identify which volume we would like to format.
Type “list volume” and press Enter. You should see a list of available
volumes. Identify the one which you wish to format, be careful selecting
the wrong volume will spell disaster!<br />
<img alt="List Volume" class="size-full wp-image-177" height="315" src="http://www.techhack.co.uk/wp-content/uploads/2011/03/list_volume.jpg" title="List Volume" width="681" /><br />
List Volume<br />
Type “select volume <x>” and press Enter, where <x> is the volume you wish to focus on.<br />
<img alt="Select Volume" class="size-full wp-image-179" height="345" src="http://www.techhack.co.uk/wp-content/uploads/2011/03/select_volume.jpg" title="Select Volume" width="679" /><br />
<br />
Select Volume<br />
Type “clean” and press Enter. This removes any and all partition or volume formatting from the disk in focus.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<img alt="Clean" class="size-full wp-image-180" height="344" src="http://www.techhack.co.uk/wp-content/uploads/2011/03/clean.jpg" title="Clean" width="683" /><br />
Clean<br />
Type “create partition primary” and press Enter. This creates a primary
partition on the current disk. After you create the partition, the focus
automatically shifts to the new partition. It is possible to create
multiple partitions if you like. To do this you would add the option
size=<x> where <x> is the size in megabytes (MB) you would
like the partition to be. If no size is specified, like in my example,
the partition continues until there is no more unallocated space.<br />
<br />
<br />
<br />
<br />
<br />
<img alt="Create Partition" class="size-full wp-image-181" height="348" src="http://www.techhack.co.uk/wp-content/uploads/2011/03/create_partition.jpg" title="Create Partition" width="680" /><br />
<br />
Create Partition<br />
<br />
Type “format fs=ntfs quick label=test” and press Enter. This will now
perform a quick format, using a ntfs file system and labelling the drive
“test”. You may wish to use the file system fat32 in place of ntfs if
you would like to use the drive with other operating systems. <br />
<img alt="Format" class="size-full wp-image-182" height="345" src="http://www.techhack.co.uk/wp-content/uploads/2011/03/format.jpg" title="Format" width="678" /><br />
<br />
Format<br />
<br />
Lastly type “assign letter <x>” and press Enter, where <x> is the letter you would like to assign the drive.<br />
<img alt="Assign Drive Letter" class="size-full wp-image-183" height="347" src="http://www.techhack.co.uk/wp-content/uploads/2011/03/assign_drive_letter.jpg" title="Assign Drive Letter" width="682" /><br />
<br />
Assign Drive Letter<br />
<br />
You can close the Disk Part tool and Command Prompt using the “exit”
command. You should now see your freshly formatted drive in My Computer,
ready to use. <br />
<br /></div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-20190084900679099322012-09-30T02:40:00.000-07:002012-09-30T02:40:00.593-07:00How to use pendrive as ram memory in windows 7<div dir="ltr" style="text-align: left;" trbidi="on">
Hi friends, Windows 7 and Windows vista comes with a ready boost option. Q-What is ready boost<br />Ans- "ReadyBoost is a disk cache component of Microsoft Windows, first introduced with Microsoft's Windows Vista in 2006 and bundled with Windows 7 in 2009. It works by using flash memory, a USB flash drive, SD card, CompactFlash, external hard drive or any kind of portable flash mass storage system as a cache. ReadyBoost is also used to facilitate SuperFetch, which allows it to perform analysis of boot-time disk usage patterns and creates a cache which is used in subsequent system boots." Source<br />If you are using a high configuration PC, It doesn't show any effect on speed because if you are a normal user I think only a few times you use your full ram memory but if you are using an old pc with low ram memory(Like 512 MB or IGB) and harddisk & using vista or 7. It speed up your PC and you will see the result, reduced application data loading time, reduced shutdown and restart time and many more you can't imagine without High ram memory. How to use this feature<br />Plug in your pendrive-> Format with NTFS or FAT32<br />Now go to properties->Select ReadyBoost<br />Check Use this device->Choose maximum space to reserve system speed<br />Click on Apply and OK. Your readyboost PenDrive is ready Now to Use.<br />Here is an personal suggestion HP and Sandisk is the Best for this work so what are you waiting for. </div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-77472398942900121012012-09-30T02:27:00.000-07:002012-09-30T02:27:12.619-07:00How professional hackers hack e-mail accounts and social networking accounts<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://2.bp.blogspot.com/-LsmuD--qFC4/UGgQFTF3gYI/AAAAAAAAAKI/1l8huL1fNxU/s1600/pawan+wanted.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://2.bp.blogspot.com/-LsmuD--qFC4/UGgQFTF3gYI/AAAAAAAAAKI/1l8huL1fNxU/s1600/pawan+wanted.jpg" /></a>Hi friends, Sorry for the late , But from now i will try to publish 2 or
3 post in a week. Today i am going to reveal the secret how
professional hackers hack e-mail ids and social networking accounts.<br />
<br />
<br />
<br />
<br />
<br />
<a name='more'></a><br />
<br />
<br />
Theses professional receives upto $1000 for hacking a e-mail account.
There is no special software or hidden technology behind this work. A
normal computer user can do this with a little effort. First i want to
clear one thing any software cannot disclose password of any e-mail
address. ( Or if it can incase i don't know about it then i am sure only
few companies can afford this software) Well I know you have seen a
lot of website with advertisement " Get any e-mail account password
guaranteed , Only $50 or more". Today i am going to disclose how they do
all this.<br />
There are some steps to hack e-mail accounts, but getting password of a
e-mail user is totally depends on the user's unawareness.<br />
(1) Gather e-mail address and other details( If possible).<br />
(2)Now suppose you don't know who owns this e-mail address, Open Google
and search e-mail id if e-mail id will be on any open web page, you can
find a lot of information about that user, For example- Their name,
city, interests, hobbies, likes, dislikes and social network links also.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://lh5.googleusercontent.com/-eVIk1rDCtjE/TYLhLfep0gI/AAAAAAAAAf8/olPFT6OfGQY/s1600/g.PNG" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="134" src="https://lh5.googleusercontent.com/-eVIk1rDCtjE/TYLhLfep0gI/AAAAAAAAAf8/olPFT6OfGQY/s320/g.PNG" width="320" /></a></div>
<br />
(3)If you have got sufficient information about the user then we will
move to next step and skip this. If not open facebook and twitter or if
from India don't forget the Orkut, search that person and try to make
them friend with a fake account.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://lh6.googleusercontent.com/-P31yYWMvfuE/TYLkxVNW5DI/AAAAAAAAAgA/LnJK5qt9WIw/s1600/g.PNG" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://lh6.googleusercontent.com/-P31yYWMvfuE/TYLkxVNW5DI/AAAAAAAAAgA/LnJK5qt9WIw/s320/g.PNG" width="314" /></a></div>
<br />
(4)Now you have a lot of information about that person. Make a fake mail
advertisement with a phishing link and send to that e-mail id. Make
sure your fake mail content matches with that person's interests. Here
your social networking friendship can work , try to convince that person
for clicking on the phish link.<br />
(5)Now if 4th step doesn't work for you, trace that person's location,
operating system and browsers. Here e-mail tracker pro, wordpress blog
or readnotify can help you better. Make a remotely executable keylogger
engine and send the download link or file to victim, Here you need to
show how much you had studied at psychology classes.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://lh6.googleusercontent.com/-xHl63ldknTw/TYLmzyjs9ZI/AAAAAAAAAgM/rgzUZKjJ-Fw/s1600/screen1.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="https://lh6.googleusercontent.com/-xHl63ldknTw/TYLmzyjs9ZI/AAAAAAAAAgM/rgzUZKjJ-Fw/s320/screen1.png" width="320" /></a></div>
<br />
If you follow these five steps there are 90% chances you can hack any
normal or advanced computer users e-mail address. So hope now you know
its only a social engineering trick not anything else.</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-57112330248418278782012-09-30T02:22:00.000-07:002012-09-30T02:22:06.990-07:00CMD Fun Tricks and Useful CMD Commands<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-3fcQUoL_iXE/UGgPIl4hwyI/AAAAAAAAAKA/8_SKDH4nvY4/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-3fcQUoL_iXE/UGgPIl4hwyI/AAAAAAAAAKA/8_SKDH4nvY4/s1600/Capture.JPG" /></a></div>
Here are some fun tricks and fun virus-<br />
(1)If you are using a guest account and run is disabled you can use notepad to open regedit and cmd'<br />
open notepad and type command.com and save it as cmd.bat this batch file will open command prompt.<br />
if you cant open regedit by run open notepad type regedit and save it as
regedit.bat double click on this and regedit window will open.<br />
(2)use notepad to abort shutdown -Open notepad and type shutdown -a and
save it as shutdown.bat.next time when your computer is about to
shutdown double click on this bat file. for other cmd commands open
command prompt and type shutdown a and press enter.<br />
(3)cmd fun virus- open notepad and type shutdown -r 10 and save as
restart.bat this will restart your computer in 10 seconds if you want to
use this for fun paste this file in system 32 and see. computer will
restart in every 10 second.<br />
(4)IP command- open command prompt and type ipconfig/all .<br />
(5)How to know your friend's ip when chatting on a messenger. suppose
you are using g-talk. ask your friend for a good wallpaper you have
downloaded. send this to him .Now open your cmd and type Netstat -n
</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-41435437121888800872012-09-30T01:57:00.002-07:002012-09-30T01:57:38.567-07:00How to Jailbreak iOS 5.1.1 For iPhone 4S, iPhone 4, iPhone 3GS Users Using Redsn0w [Untethered]<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-g1Sh2zZ5IWk/UGgJcjLkWoI/AAAAAAAAAJw/H1q6hdEC40Y/s1600/redsnow-iphone3g-41.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-g1Sh2zZ5IWk/UGgJcjLkWoI/AAAAAAAAAJw/H1q6hdEC40Y/s1600/redsnow-iphone3g-41.jpg" /></a></div>
iPhone Dev team has released Redsn0w that includes support for untethered iOS 5.1.1 for iPhone, iPad and iPod touch. It includes Rocky Racoon and untethered iOS 5.1.1 jailbreak developed by pod2g and planetbeing that was used in Absinthe 2.0.x jailbreak.<br /><br />In this article, we will take you through the step-by-step procedure to jailbreak your iPhone on iOS 5.1.1 using Redsn0w for both Mac and Windows users.<br /><br />Here are some important points to note before you proceed.<br /><br /> This tutorial is meant for iPhone users. iPad users can check out this tutorial, while iPod touch users can check out this tutorial.<br /> Redsn0w 0.9.12b2 supports untethered jailbreak.<br /> Redsn0w 0.9.12b2 supports iPhone 4S, iPhone 4, iPhone 3GS running on iOS 5.1.1.<br /> Please ensure your iPhone is on iOS 5.1.1 (Settings --> General --> About --> Version should be 5.1.1) before proceeding.<br /> Please note that jailbreaking your iPhone may void your warranty and hence proceed with caution and at your own risk.<br /> Please do not forget to backup your iPhone before you proceed.<br /> Please ensure you are running latest version of iTunes.<br /> Important: iPhone 4, iPhone 3GS users who have a lot of media on your device, then you can jailbreak your iOS device by putting it in DFU mode (we'll update this guide with additional instructions for it shortly).<br /><br />You can follow these step-by-step instructions to jailbreak your iPhone:<br /><br />Step 1: Download the latest version of Redsn0w from this link and save it in a folder named "Redsn0w" on your desktop.<br /><br />Step 2: Double click the Redsn0w zip file and extract the application to the Redsn0w folder and then launch the Redsn0w application.<br /><br />Windows users should run Redsn0w as ‘Administrator’ (right-click on the Redsn0w exe and select 'Run as an Administrator').<br /><br />Step 3: After launching Redsn0w, click on the Jailbreak button.<br /><br />Step 4: Redsn0w will start the jailbreak process and go through the following three steps:<br /><br />1. Preparing<br /><br />2. Processing<br /><br />3. Finishing up<br /><br />Step 5: Once the three steps are completed, Redsn0w will inform you that the jailbreak was successfully installed. But please wait, leave your device alone. Your iPhone will reboot on its own. After it has rebooted, wait for it respring again.<br /><br />After the respring, your iPhone will be successfully jailbroken and you should be able to find the Cydia icon on the Home screen (please note that the Cydia icon may not be on the first page, so don't assume that your iPhone hasn't been successfully jailbroken, use Spotlight to search for it).<br />After the jailbreaking process is complete, do not forget to checkout our article on tips to keep your iPhone secure.<br /><br />If you're new to the jailbreaking world and wondering what to do after jailbreaking your iPhone, checkout our jailbreak apps category page to find out the apps you can install on your iPhone using the Cydia app.<br /><br />Hope this helped. Please don't forget to let us know how it goes in the comments and drop us a line if you hit any issues.<br /><br />If you want to show your appreciation for iOS 5.1.1 Jailbreak team's hard work, then don't forget to give them a donation using the link on the Redsn0w application.</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-6383804226255428382012-09-30T01:52:00.001-07:002012-09-30T01:52:15.850-07:00How to Become a Hacker<div dir="ltr" style="text-align: left;" trbidi="on">
There is a community, a shared culture, of expert <a href="http://www.wikihow.com/Become-a-Programmer" title="Become a Programmer"></a>programmers and <a href="http://www.wikihow.com/Find-a-Short-Term-Course-in-Computer-Networking" title="Find a Short Term Course in Computer Networking"></a>networking
wizards that traces its history back through decades to the first
time-sharing minicomputers and the earliest ARPAnet experiments. The
members of this culture originated the term ‘hacker.’<br />
<br />
There is another group of people who loudly call themselves hackers, but
aren't. These are people who get a kick out of breaking into computers
and phreaking the phone system. Real hackers call these people
‘crackers’ and want nothing to do with them. Real hackers object that
being able to break security doesn't make you a hacker any more than
being able to hotwire cars makes you an automotive engineer.<br />
<br />
There are people who apply the true hacker attitude to other things,
like electronics or music — but in the rest of this article we will
focus the skills and attitudes of software hackers, and the traditions
of the shared culture that originated the term ‘hacker.<br />
<br />
<h2>
<span>Steps</span></h2>
<h3>
<span>Thinking Like a Hacker</span></h3>
<h3>
<span> </span><b class="whb">Adopt the mindset of a hacker</b>. Hackers solve problems
and build things, and they believe in freedom and voluntary mutual
help. To be accepted as a hacker, you have to behave as though you have
this kind of attitude yourself. And to behave as though you have the
attitude, you have to really believe the attitude. So, if you want to be
a hacker, repeat the following things until you believe them:</h3>
<ul>
<li>The world is full of fascinating problems waiting to be solved.
Successful athletes get their motivation from a kind of physical delight
in making their bodies perform, in pushing themselves past their own
physical limits. Similarly, you have to get a basic thrill from solving
problems, sharpening your skills, and exercising your intelligence.</li>
<li>No problem should ever have to be solved twice. The thinking time of
other hackers is precious — so much so that it's almost a moral duty
for you to share information, solve problems and then give the solutions
away just so other hackers can solve new problems instead of having to
perpetually re-address old ones.</li>
<li>Boredom and drudgery are evil. When hackers are bored or have to
drudge at stupid repetitive work, they aren't doing what only they can
do — solve new problems. To behave like a hacker, you have to want to
automate away the boring bits as much as possible.</li>
<li>Freedom is good. The authoritarian attitude has to be fought
wherever you find it, lest it smother you and other hackers. Not all
authority figures are authoritarian. However, authoritarians thrive on
censorship and secrecy, and they distrust voluntary cooperation and
information-sharing.</li>
<li>Attitude is no substitute for competence. Hackers won't let posers
waste their time, but they recognize competence — especially competence
at hacking, but competence at anything is valued. Competence at
demanding skills that few can master is especially good, and competence
at demanding skills that involve mental acuteness, craft, and
concentration is best.<b class="whb"> </b></li>
<li><b class="whb"> </b></li>
<li><b class="whb">Earn respect as a hacker</b>.
Like most cultures without a monetary economy, hackerdom runs on
reputation. You're trying to solve interesting problems, but how
interesting they are, and whether your solutions are really good, is
something that only your technical peers or superiors are normally
equipped to judge. This is why you aren't really a hacker until other
hackers consistently call you one. Specifically, hackerdom is what
anthropologists call a "gift culture." You gain status and reputation in
it not by dominating other people, nor by being beautiful, nor by
having things other people want, but rather by giving things away: your
time, your creativity, and the results of your skill.
</li>
<li>Write open-source software.
Write programs that other hackers think are fun or useful, and give the
program sources away to the whole hacker culture to use. Hackerdom's
most revered demigods are people who have written large, capable
programs that met a widespread need and given them away, so that now
everyone uses them.</li>
<li>Help test and debug open-source software. Any open-source author
who's thinking will tell you that good beta-testers (who know how to
describe symptoms clearly, localize problems well, can tolerate bugs in a
quickie release, and are willing to apply a few simple diagnostic
routines) are worth their weight in rubies. Try to find a program under
development that you're interested in and be a good beta-tester. There's
a natural progression from helping test programs to helping debug them
to helping modify them. You'll learn a lot this way, and generate good karma with people who will help you later on.</li>
<li>Publish useful information. Another good thing is to collect and
filter useful and interesting information into web pages or documents
like Frequently Asked Questions (FAQ) lists, and make those generally
available. Maintainers of major technical FAQs get almost as much
respect as open-source authors.</li>
<li>Help keep the infrastructure working. The hacker culture (and the
engineering development of the Internet, for that matter) is run by
volunteers. There's a lot of necessary but unglamorous work that needs
done to keep it going — administering mailing lists, moderating
newsgroups, maintaining large software archive sites, developing RFCs
and other technical standards. People who do this sort of thing well get
a lot of respect, because everybody knows these jobs are huge time
sinks and not as much fun as playing with code. Doing them shows
dedication.</li>
<li>Serve the hacker culture itself. This is not something you'll be
positioned to do until you've been around for a while and become
well-known for one of the four previous items. The hacker culture
doesn't have leaders, exactly, but it does have culture heroes and
tribal elders and historians and spokespeople. When you've been in the
trenches long enough, you may grow into one of these. Beware: hackers
distrust blatant ego in their tribal elders, so visibly reaching for
this kind of fame is dangerous. Rather than striving for it, you have to
sort of position yourself so it drops in your lap, and then be modest and gracious about your status.</li>
</ul>
<a href="http://www.blogger.com/blogger.g?blogID=6512083992498604011" name="Learning_Programming"></a><br />
<h3>
<span>Learning Programming</span></h3>
<ol class="steps_list_2">
<li class="steps_li final_li"><div class="step_num">
1</div>
<a href="http://www.wikihow.com/Become-a-Programmer" title="Become a Programmer"><b class="whb"></b></a><b>Learn how to program</b>.
The best way to learn is to read some stuff written by masters of the
form, write some things yourself, read a lot more, write a little more,
read a lot more, write some more, and repeat until your writing begins
to develop the kind of strength and economy you see in your models. To
be a real hacker, however, you need to get to the point where you can
learn a new language in days by relating what's in the manual to what
you already know. This means you should learn several very different
languages. Besides being the most important hacking languages, the
following represent very different approaches to programming, and each
will educate you in valuable ways:
<ul>
<li>Python is a good language to start off with because it's cleanly designed,
well documented, and relatively kind to beginners. Despite being a good
first language, it is not just a toy; it is very powerful and flexible
and well-suited for large projects. Java is an alternative, but its value as a first programming language has been questioned.</li>
<li>If you get into serious programming, you will have to learn C, the core language of Unix (C++
is very closely related to C; if you know one, learning the other will
not be difficult). C is very efficient with your machine's resources,
but will soak up huge amounts of your time on debugging and is often
avoided for that reason (unless machine efficiency is essential).</li>
<li>Perl is worth learning for practical reasons; it's very widely used for
active web pages and system administration, so that even if you never
write Perl you should learn to read it. Many people use Perl to avoid C
programming on jobs that don't require C's machine efficiency.</li>
<li>LISP is worth learning for a different reason — the profound
enlightenment experience you will have when you finally get it. That
experience will make you a better programmer for the rest of your days,
even if you never actually use LISP itself a lot. You can get some
beginning experience with LISP fairly easily by writing and modifying
editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.</li>
</ul>
</li>
</ol>
<a href="http://www.blogger.com/blogger.g?blogID=6512083992498604011" name="Familiarizing_Yourself_With_Unix"></a><br />
<h3>
<span>Familiarizing Yourself With Unix</span></h3>
<ol class="steps_list_2">
<li class="steps_li final_li"><div class="step_num">
1</div>
<b class="whb">Get one of the open-source Unixes and learn to use and run it</b>.
Unix is the operating system of the Internet. While you can learn to
use the Internet without knowing Unix, you can't be an Internet hacker
without understanding Unix. For this reason, the hacker culture today is
pretty strongly Unix-centered. So, bring up a Unix (like Linux
but there are other ways and yes, you can run both Linux and Microsoft
Windows on the same machine). Learn it. Run it. Tinker with it. Talk to
the Internet with it. Read the code. Modify the code.
<ul>
<li>There are other operating systems in the world besides Unix. But
they're distributed in binary — you can't read the code, and you can't
modify it. Trying to learn to hack on a Microsoft Windows machine or
under any other closed-source system is like trying to learn to dance
while wearing a body cast. Under Mac OS X it's possible, but only part
of the system is open source — you're likely to hit a lot of walls, and
you have to be careful not to develop the bad habit of depending on
Apple's proprietary code.</li>
<li>Download Linux online or (better idea) find a local Linux user group to help you with installation.</li>
<li>While other distros have their own areas of strength, Ubuntu is far and away the most accessible to Linux newbies.</li>
<li>A good way to dip your toes in the water is to boot up what Linux
fans call a live CD, a distribution that runs entirely off a CD without
having to modify your hard disk. This is a way to get a look at the
possibilities without having to do anything drastic.</li>
</ul>
</li>
</ol>
<a href="http://www.blogger.com/blogger.g?blogID=6512083992498604011" name="Learning_HTML"></a><br />
<h3>
<span>Learning HTML</span></h3>
<ol class="steps_list_2">
<li class="steps_li final_li"><div class="step_num">
1</div>
<b class="whb">Learn how to use the World Wide Web and write HTML</b>.
Most of the things the hacker culture has built do their work out of
sight, helping run factories and offices and universities without any
obvious impact on how non-hackers live. The Web is the one big
exception, the huge shiny hacker toy that even politicians admit has
changed the world. For this reason alone (and a lot of other good ones
as well) you need to learn how to work the Web. This doesn't just mean
learning how to drive a browser (anyone can do that), but learning <a class="mw-redirect" href="http://www.wikihow.com/Write-an-Html-Page" title="Write an Html Page"></a>how to write HTML,
the Web's markup language. If you don't know how to program, writing
HTML will teach you some mental habits that will help you learn. So
build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML.<div class="wh_ad">
<div class="wh_ad_inner" id="wikihowad_1">
<div class="adunit adunitp0">
<div id="adunit1" style="padding-top: 3px;">
<br /></div>
</div>
</div>
</div>
</li>
</ol>
<a href="http://www.blogger.com/blogger.g?blogID=6512083992498604011" name="Video"></a><br />
<div id="video">
<center>
<div class="article_inner editable" id="video">
<center>
<span class="template">
</span></center>
<a href="http://www.blogger.com/blogger.g?blogID=6512083992498604011" name="Tips"></a><br />
</div>
</center>
</div>
<h2>
<span>Tips</span></h2>
<div class="article_inner editable" id="tips">
<ul>
<li>Work as intensely as you play, and play as intensely as you work.
For true hackers, the boundaries between "play," "work," "science," and
"art" all tend to disappear, or to merge into a high-level creative
playfulness.</li>
<li>Don't be content with a narrow range of skills. Though most hackers
describe themselves as programmers, they are very likely to be more than
competent in several related skills — system administration, Web
design, and PC hardware troubleshooting are common ones. Hackers don't
do things by halves; if they invest in a skill at all, they tend to get
very good at it.</li>
<li>You don't have to believe that you're obligated to give all your
creative product away, though the hackers that do are the ones that get
most respect from other hackers. It's consistent with hacker values to
sell enough of it to keep you in food and rent and computers. It's fine
to use your hacking skills to support a family or even <a href="http://www.wikihow.com/Get-Rich" title="Get Rich"></a>get rich, as long as you don't forget your loyalty to your art and your fellow hackers while doing it.</li>
<li>Contrary to popular myth, you don't have to be a nerd to be a
hacker. It does help, however, and many hackers are in fact nerds. Being
something of a social outcast helps you stay concentrated on the really important things, like
thinking and hacking. If you can manage to concentrate enough on hacking
to be good at it and still have a life, that's fine. Mainstream culture
is much friendlier to techno-nerds now.</li>
<li>To be a hacker, you have to enter the hacker mindset, and there are
some things you can do when you're not at a computer that seem to help.
They're not substitutes for hacking (nothing is) but many hackers do
them, and feel that they connect in some basic way with the essence of
hacking (hackers need to be able to both reason logically and step
outside the apparent logic of a problem at a moment's notice).<br />
<br />
<ul>
<li>Write your native language well. Though it's a common stereotype
that programmers can't write, a surprising number of hackers are very
able writers.</li>
<li>Read science fiction. Go to science fiction conventions (a good way to meet hackers and proto-hackers).</li>
<li>Train in a martial art.
The kind of mental discipline required for martial arts seems to be
similar in important ways to what hackers do. The most hacker-ly martial
arts are those which emphasize mental discipline, relaxed awareness,
and control, rather than raw strength, athleticism, or physical
toughness. Tai Chi is a good martial art for hackers.</li>
<li>Study an actual meditation discipline. The perennial favorite among hackers is Zen (importantly, it is possible to benefit from Zen without acquiring a religion or discarding one you already have).</li>
<li>Develop an analytical ear for music. Learn to appreciate peculiar kinds of music, and to <a href="http://www.wikihow.com/Learn-to-Play-an-Instrument" title="Learn to Play an Instrument"></a>play some musical instrument well, or <a href="http://www.wikihow.com/Sing" title="Sing"></a>how to sing.</li>
<li>Develop your appreciation for puns and wordplay.</li>
<li>Master creative thinking. The hacker mentality is driven by
creatively solving problems. This creativity gives you the ability to
solve problems others see as unsolvable.</li>
</ul>
</li>
<li>If you don't speak English, it might be a good idea to learn it. English is the working language of the hacker culture and the Internet,
and you might need to know it to function in the hacker community.
Translations of technical books written in English are often
unsatisfactory (when they get done at all). Being a native
English-speaker does not guarantee that you have language skills good
enough to function as a hacker. If your writing is semi-literate,
ungrammatical, and riddled with misspellings, many hackers will tend to
ignore you.</li>
<li>Read older pieces, such as the Jargon File or Hacker Manifesto by
The Mentor. They may be out of date, but the attitude and spirit come
through very clearly.</li>
</ul>
<a href="http://www.blogger.com/blogger.g?blogID=6512083992498604011" name="Warnings"></a><br />
</div>
<div class="wh_ad">
<div class="wh_ad_inner" id="wikihowad_2a">
<div class="adunit adunitp2">
<div id="adunit1" style="padding-top: 3px;">
<span>Warnings</span></div>
</div>
</div>
</div>
<br />
<ul>
<li>Cracking is an illegal activity which can result in major penalties. It is a major offense and is punishable under the law.</li>
<li>Doing any of the following will earn you a bad reputation in the
hacker community. Hackers have long memories — it could take you years
to live your early blunders down enough to be accepted. And also, what's
on the Internet stays on the Internet. Don't think nobody will stumble
across what you did three years ago.
<ul>
<li>Don't use a silly, grandiose user ID or <a href="http://www.wikihow.com/Choose-a-Safe-Screen-Name" title="Choose a Safe Screen Name"></a>screen name.</li>
<li>Don't get in flame wars on Usenet (or anywhere else).</li>
<li>Don't call yourself a ‘cyberpunk,’ and don't waste your time on anybody who does.</li>
<li>Don't post or email writing that's full of spelling errors and <a href="http://www.wikihow.com/Avoid-Colloquial-%28Informal%29-Writing" title="Avoid Colloquial (Informal) Writing"></a>bad grammar.</li>
<li>Don't blindly believe the advice given here or anywhere online is true and the only path to embracing the mindset of a hacker.</li>
</ul>
</li>
</ul>
<h3>
</h3>
</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-7112874308166388482012-09-30T01:26:00.002-07:002012-09-30T01:26:42.483-07:00How to become a professional hacker | career in Ethical Hacking<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-rfkCQwrZ9_w/UGgCIl3fAXI/AAAAAAAAAJg/04Pogt9EfKU/s1600/experts.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-rfkCQwrZ9_w/UGgCIl3fAXI/AAAAAAAAAJg/04Pogt9EfKU/s1600/experts.png" /></a></div>
Hi friends, Like others I will not talk about going to launch a magazine, please subscribe this, In the world of computer and Internet i will not make a plan to sell a paper made magazine. I am very angry with people who call themselves hacker, even they don't know coding, Everyone is a hacker who can exploit something. I will not say i have created a hacking videos toolkit, this is awesome and available at discounted prizes for some days, Making people fool before first April is not my hobby. I will not use mumbai terrorist attack photos to get traffic,I will not promote a worst product to earn affiliate commission, or write a paid review about a product or company.<br />Don't you people think all this is sucking and you are fed up with all this.<br /> I'll disclose only secrets that no one disclose. Not in this post but in my next post, truth about the security and hacking business.<br /> I got a lot of questions from my readers that they worked hard on Internet to get deep knowledge about hacking and security but don't have a certification in hacking. They worked hard but unable to find which job profile suit them best.First of all if you talk about working in a security firm as a professional hacker, you need to know how to become a professional hacker.<br />There are some steps to do this--<br />(1) Need a mindset/premindset to exploit things even its a human mind, computer or electric appliance<br />(2) Sound knowledge of operating systems, application software, Internet and hardware<br />(3) Every wanna be professional hacker should be perfect in at least one programming language<br />(4) They should have basic knowledge of networking, routers and servers.<br />(5) Knowledge of database management is must<br />(6) knowledge of One web designing language and one server side srcipting language.<br />(7) CEH certificate or a local vendor certification can also work.<br />(8) Over confident, Rude behaviour and Attitude, use of abusive words can help you finding a good job( Ha...Ha...Ha)<br />If you have these seven things no one can stop you becoming a hacker, now your skills depends on your hard work but when you are going to join a organization as a professional hacker or security expert these basic things are needed, other professional techniques you will learn in the company's training room only.At that place a hardcore hacker get to know he knows nothing about hacking.<br />Now the question comes in which field i can make my career. Here i want to present an example, some of my friends was good in electronics, but at the time they was going to take admission in B.Tech they thought It market is growing day by day, providing attractive salary packages and have a glamours career. So they took computers and now you can understand in which situation they are living....Jobless, Hopeless and aimless.<br />So friends never study subject in demand, study which you find interesting.<br />(1) If you work good as a web developer , make yourself perfect in that type of hacking techniques.<br />(2) If programming, take a move to pen-testing<br />(3) If networking, take a move to network security<br />(4) If you feel you can hack human minds easily, go to social engineering<br />(5) Having security approach in your mind can also make you a good programmer<br />(6) If you are operating system worm, that can make you system security engineer<br />(7) Other than that if your area of interest are mobile, bluetooth or voip they also have a hot career.<br />Choose one , make a group and start Hacking</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-7031016342079457392012-09-30T01:22:00.002-07:002012-09-30T01:22:45.613-07:00Ankit Fadia : “To become a hacker, you need to know how to think like a criminal”<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-pYScCtGStpo/UGgA5pL0bMI/AAAAAAAAAJY/3SuQH2t2QWw/s1600/GifRencontre-Antik-inter.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-pYScCtGStpo/UGgA5pL0bMI/AAAAAAAAAJY/3SuQH2t2QWw/s1600/GifRencontre-Antik-inter.jpg" /></a></div>
Let’s start with this question: who is Ankit Fadia?<br /><br />I define myself as an ethical hacker.<br /><br />Why ‘ethical hacker?’- does the word ‘hacker’ on its own have a pejorative connotation?<br /><br />Traditionally, a hacker was somebody who knew everything about technology and understood how to work the computer, internet etc. in ways s/he wanted to. Over the years, the term hacker has come to have a negative connotation. Whenever some cybercrime happens, they say that somebody has ‘hacked’ into the system. So to separate hackers from cybercriminals, the term ‘ethical hacker’ was devised.<br />
<a name='more'></a><br /><br />And what exactly are the parameters within which you operate?<br /><br />An ethical hacker is usually somebody hired by a company and given permission to hack into their network and in the process get to know what the security loopholes are. In the process, they will create a report saying “Hey these are your problems and this is how you can fix them”. So this is what an ethical hacker does. He takes the knowledge of the criminal and uses it against him.<br /><br />But if you have that knowledge, what prevents you from putting it to any other use?<br /><br />To be honest it’s a very fine line. Knowledge is powerful but it comes with great responsibility. One has to be very careful.<br /><br />As an ethical hacker, where would you stand in relation to WikiLeaks, for example?<br /><br />I personally feel that some information is confidential for a reason. So I don’t agree with the ideology of wikileaks, of putting every thing up online, especially confidential information.<br /><br />So you think its okay for government officials to be using secret information behind our backs?<br /><br />It’s difficult to have a strong stand on the issue either way but I still personally lean on the side that some information is confidential for a reason. An ordinary citizen hacking into government military computers and stealing information is not acceptable.<br /><br />When you talk about ethical hacking, don’t you actually mean legal hacking?<br /><br />Yes. It also means that you are not going to harm anybody. For example, the most common example of hacking is using the photographs and data of innocent women to set up fake profiles for putting up obscene messages. It’s not just illegal but it also harms somebody and their reputation.<br /><br />Did wikileaks harm anybody or did it free the world of all these secrets which happened behind closed doors?<br /><br />Wikileaks actually started out as something quite interesting. What ended up happening was that once it got so big, you had all these people trying to hack into government computers to try to steal information. Also existing government employees started feeding false information to wikileaks, so when they are receiving millions of submissions, it’s very difficult to determine whatis genuine and what’s not. Initially they had control over how they got the information. Now they don’t.<br /><br />You’ve written so many bestselling books about hacking - what makes your books such a big success?<br /><br />Basically I grew up in India we had no books on hacking. When I wrote the first one, the response was fantastic. We sold something like 40 or 50,000 copies before the book was even released. Usually books are first published in the U.S and the U.K then local Indian editions are released. With my books, it was the reverse. We had the Indian edition out first and then global editions came out.<br /><br />Though you wrote 14 other bestsellers translated into several languages, you never managed to beat that record, did you?<br /><br />No, I think that my first book was raw and I did not think much about the consequences. It was not a controlled logic. I was perhaps a little immature and presented essentially raw information which is what I think made a lot of people like it.<br /><br />It was more spontaneous, you mean?<br /><br />Yes, because when you’re 14 you don’t think about the consequences of giving information.<br /><br />What does one need to become a hacker?<br /><br />To become a hacker you need four things: You need to know about programming, you need to know networking,the basics of Linux and, most importantly, you need to know how to think like a criminal.<br /><br />So what’s the percentage of people excluded already?<br /><br />(Laughs) A lot of people. The first three things can be learned but the fourth thing you have to learn on your own. It’s a talent you have to develop, and I classify thinking like a criminal as a talent which you definitely require if you want to be successful as a hacker.<br /><br />When you say you have to develop the capability to think like a criminal, how does a criminal actually think?<br /><br />A criminal is thinking about how to take advantage of the system, how to break it, find a loophole or bypass it for his/her own personal benefit. This could be put to positive as well as negative use. Hacking for me is a concept: it’s being able to use information to do things that most people don’t know.<br /><br />What did your workshop teach those who could afford you?<br /><br />Practical demonstrations of hacking into everything from the passwords that you use everyday, your cell phone, your ATM machine or any kind of machine that you use. I did live demonstrations on how it can be done.<br /><br />What’s the point of teaching people how to think like criminals?<br /><br />Most people don’t realize how vulnerable they are. When you put them in a room and hack into something that’s personal to them, they suddenly realise how vulnerable they, their organisation and their kids really are. Suddenly they start taking cyber protection seriously. So yes I do show them how to hack, but the idea is not to teach them how to be criminals. It’s not like you attend a seminar and come out criminals the next day. What I do on stage is simple and exciting, but hacking is not that easy to learn.<br /><br />Will you teach me how to hack into a bank for example?<br /><br />(Outburst of laughter) No.<br /><br />But you could hack into a bank’s system if you wanted to.<br /><br />Yes.<br /><br />If you did not teach our CEOs how to do that, what did you teach them?<br /><br />I explained to them that the biggest risk in an organisation is its own employees…<br /><br />Well, thanks!<br /><br />(Loud chuckles)… Because they are already inside the system, they have access to sensitive data and have plenty of opportunities to steal it . So how do you protect yourself from your own employees? There are certain measures that a company could take. For example, have a fire wall, security measures such as disabling USB drivers and forbidding the use of personal emails because documents could be sent to a competitor from a personal email account. Personal email accounts cannot be monitored, only official email accounts are.<br /><br />Does that mean that all the companies are sitting there reading all the emails that we are sending out from the company account?<br /><br />Of course. In the U.S, employees have to sign a document authorizing the company to look into their email accounts whenever they wish. I don’t know about Mauritius but in India they don’t make employees sign anything but go through the employees’ emails nevertheless.<br /><br />What about government? Are the secret services having fun reading our emails too?<br /><br />Yes, the government has access to everything that is happening online including what emails we are sending, what we are chatting about, what websites we visit. However, they don’t sit and actively read all this data. They only refer to it or look at it when and if they need to. They have the power to spy on everything, though.<br /><br />So, our CEOs now know how to spy on us properly.<br /><br />(Laughs) Well, I didn’t teach them that! I only taught them how to better protect their organisations. For example, a lap top is company property, and employees should not be doing certain things. What I recommend to companies is to have a recreational room or something for employees to use computers there for leisure time that is unrestricted. This is a price that companies have to pay.<br /><br />How much of all this is paranoia?<br /><br />Most companies think it’s paranoia until something goes wrong. It’s like insurance: one could ask why get fire insurance if the last fire in their building was 100 years ago. But we still need to have it in case one does take place. I’m sure you must have heard about the Sony case, where the credit cards and identity details of customers worldwide were stolen just a month ago. Even Blackberry was attacked and the android platform of Google. Just the other day, government officials in the U.S alleged that Chinese hackers were targeting the emails of top government officials.<br /><br />How many such hackers do you think there are out there?<br /><br />Nobody knows. They stay underground. Most don’t even want to be known. Most just want to have fun and have regular lives and jobs which will obviously be IT related.<br /><br />How much fun can you derive from prying into people’s private details?<br /><br />Go to any college student and ask them why they’re on Facebook. It’s not like Facebook is the first way to stay in touch with people. You could stay in touch with people on chat. But why Facebook? There are photos and videos. Young people put pictures of nicely dressed people in a party. That’s what people want to see. And many people may not have the confidence to, say, go up to a cute girl and talk to her. Now, sitting in the comfort of their room, they don’t have to dress up, they could be in bed, but they can still see what that cute guy or girl is up to. That is what drives Facebook. So comparing that to computer hacking, sitting in my room, I can see what you are doing in your life and you have no idea about the sense of power and rush that I get. You know, wow, I’m able to do this.<br /><br />Apart from what I’m doing in my life, what’s the big deal about this whole hacking thing?<br /><br />The other day, the NASA network was attacked by a kid from Russia who managed to control a spaceship in space. So imagine being able to do something like that! More recently, there’s something called the Stuxnet Worm. Everybody says that the US government created the virus and what the virus did was that it attacked only the Iranian nuclear department computer. So the next world war, if it ever happens, may actually be through the internet. You don’t necessarily need to go with tanks and bombs and airplanes to take over a country anymore.<br /><br />At what point did you realise that you had this talent of thinking like a criminal?<br /><br />I first hacked when I was 13. My favourite computer magazine was a magazine called the Chip Magazine, in India. So one Friday afternoon, I hacked the Chip India website and put my photograph in the place of the website. And I got super excited like “Wow, my favourite magazine and I put my photograph on the website.”<br /><br />And presumably your first book was about giving advice to young people about how to do the same thing?<br /><br />It was about how to hack and how to protect yourself.<br /><br />You mean at that age, you were already thinking corporate protection?<br /><br />Not as much as my more recent books. The first book was more about how to hack and less about how to protect yourself.<br /><br />If I acquired your book, would I learn how to get into your bank account and sweep it clean?<br /><br />(Laughs) No!<br /><br />Do you know how to do that?<br /><br />It can be done, but in reality what happens is that it’s traceable. The money would have to be transferred to some other account in some other bank. Usually the criminal has to be fast, withdraw the money immediately in cash and then leave the country.<br /><br />Oh, why leave the country? Can’t you transfer it to an account abroad?<br /><br />You can, but as long as it is in a bank account, it can be recovered and there can be legal action. Ideally, if you don’t want to get caught, or if you don’t want any litigation happening, you should take the money and leave the country.<br /><br /> Is this the advice you have given our CEOs?<br /><br />(Laughs) No, I did not talk about this at all!<br /><br />They didn’t pay enough?<br /><br />(More laughter) Yes! A smart criminal will not only be able to hack in but also delete the traces he has left behind. In most banks in most countries, you need to show proof of identity to open a bank account but there are countries where you can forge documents or create an account using a false name. If you do that, then there’s no way to get caught again because it’s a fake account and you’ve withdrawn the cash and there is no link between that account and you. For regular kind of hacking, not talking about banking at all, if I wanted to hack into someone’s network and not leave any trace behind, I would connect to the proxy server in Russia and then hack in. I could be sitting in the same room as the person whose computer I’m hacking but when he investigates the matter, he will see that someone in Russia hacked him and the police here will spend all their time investigating in Russia! But I am here in the same room.<br /><br />Is hacking a good career?<br /><br />It is. It’s very exciting. It’s not like having some boring programming job where you do the same thing over and over again for the rest of your life. It’s something new and you get the rush of protecting, of fighting it’s almost like a game you are playing in real life and you are getting good money to do it.<br /><br />What’s the hackers’ age group?<br /><br />The best hackers are young people aged between 12 to 25.<br /><br />What happens afterwards? Do people get bored with hacking?<br /><br />I think life interferes between them and their passion. A marriage takes place and suddenly you realise that you need to pay the bills and you need to earn money…<br /><br />Can’t you pay the bills through hacking?<br /><br />You can, but not everybody can be that successful. Also technology changes so fast that, if you’re stuck with life, you don’t have time to upgrade your skills.<br /><br />Do you, then, feel that you are left behind?<br /><br />Well, yes but, by that time, you are also doing other things. I personally feel that the main reason why the best hackers are young people is that they have a lot of free time and they pick up technology really well. The younger generation will always be better hackers because of the time.<br /><br />Because of the time not because of the mindset?<br /><br />Mindset also, because young people are less conscious of the consequences. Someone who creates a virus that brings down the entire internet is likely to be a young person because when you’re older you’re more conscious.<br /><br />So you would never put your photo up on your favourite magazine today?<br /><br />Oh no, I would never do that again.<br /><br />What else would you not do?<br /><br />When I was at school, there was this cute girl that I liked and I hacked into her email account. I would never do that again.<br /><br />What did you find out?<br /><br />(Laughs) Nothing very interesting. But she found out I had done that.<br /><br />So you weren’t very good then?<br /><br />No, it’s just that I was the only hacker she knew, and she knew I had a thing for her. Today, I wouldn’t do that because I respect people’s privacy and I think everyone has skeletons in their closet and it’s best to leave them alone. In the last 10-12 years, I have learned that you can make a good living by staying on the right side of the law and even if I’m tempted, I prefer to stay there.<br /><br />What’s the ideal age to learn how to hack?<br /><br />Probably fifteen or sixteen because that’s when children know enough about the internet and technology and that’s when they will get that kick and excitement about doing something that someone else cannot.<br /><br />Aren’t you worried that they might misuse it?<br /><br />Anything that you know may be misused. Yes, there is going to be a percentage of people who misuse the knowledge. But if anyone wants to commit a crime, there are other ways to do that.<br /></div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-42363042707619563172012-09-30T01:19:00.001-07:002012-09-30T01:19:22.041-07:00So You Want to Be a Hacker?<div dir="ltr" style="text-align: left;" trbidi="on">
I. Introduction<br /><br />So you want to be a hacker? Many people want to be a hacker, but they don't know where to start, or what hacking really means. Hopefully this text will clear some things out and help you on your path to become a true hacker.<br /><br />II. What is a hacker?<br /><br />Everyone seems to have their own little definition of what a hacker is. The press views hackers as people who cause computer mischief, AOLers think hackers who are people who can push buttons on their downloaded proggies, computer nerds and rejects from society claim to be hackers because it makes them feel united and part of a group, crackers who write viruses and crash computers think they're hackers, and all thoses kewl people in those IRC chat rooms call themselves hackers, and so on. So what exactly is hacker? Here's the definition that I think most people would agree with:<br /><br />hacker 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. (taken from The Hacker's Dictionary)<br /><br />What exactly does this mean? A hacker is someone who is fascinated by computers, wants to learn more about them and then go beyond that. Hackers seek knowledge, especially forbidden or "secret" knowledge. One thing about being a hacker is to remember that knowledge is good, and should be shared with other hackers.<br /><br />III. Why do people want to become a hacker?<br /><br />Press, hyped up movies, and the huge growth of the Internet is drawing new hacker wannabes in everyday. It this good? Yes and no. It's mostly good, but it's also bad because some people don't really understand what a hacker is. They think hacking is sending out viruses, crashing computers and stealing passwords from some 12 year old girl off AOL. These things are definitely not cool.<br /><br />But what about the inside force that really makes people want to become a hacker? Hackers are the "elite" of the Internet. They know far more things than the average user, and can do things to computers that most people wouldn't even know were to start. There is a certain "ego satisfaction" to be a hacker.<br /><br />IV. How do be a hacker<br /><br />So, now that you know what a hacker is, and why some people want to become a hacker, here's what I have to say on how to be a hacker. First of all, it takes time to become a hacker. You can't just decide you want to be a hacker and then become one overnight. Second, there are no teachers (unless you're lucky and find a mentor). Most hackers taught themselves. They learned by reading, asking and doing. Now, a note about asking questions. Do not ask stupid questions like "HOW DO I HACK?" Ask questions that have an answer in a couple of sentences. If you do, your question will be answered most of the time. And third, to be a hacker, you have to hack. You can't just sit around and pretend to be a hacker. Do something with your newfound knowledge. But try to follow these two simple rules:<br /><br /> Don't damage or screw up another system. You will get in trouble.<br /> Try not to piss people off. Make friends, not enemies.<br /><br />V. Gaining Knowledge<br /><br />1). Read. Read everything you can about hacking. Articles, texts, books, magazines, message boards, anything with the word "hack" in it. Of course, anything computer related will also help. You're already doing a good job reading this text. Here are some hacking related books and magazines that I suggest you read:<br />2600 magazine - Very good source of hacking info. You can find it at your local bookstore, at the magazine rack. Just look for the number 2600.<br />CYPERPUNK - A book about three different hackers.<br />Cuckoo's Egg - Informative book about some guy tracking down a hacker who broke into his computer. Definitely not boring and can be informative to those with hardly no knowledge of how hacking into a computer is actually done.<br /><br />2). Learn to Program. A hacker who can't program is like a skater who can't skate. This is one of the more devious parts of becoming a hacker because it takes time and patience. Why should a hacker know how to program? Because by learning how to program, a hacker can make a computer do whatever the hell he wants it to. And that's power. Have you ever found yourself saying "I wish I had a program to do that..." Well, if you learn to program, you can just make that program. So, where to start? First, you need to choose a programming language. The two most popular out are Visual Basic (VB) and C/C++. The difference between them? VB is easy to use and learn, but its programs aren't that fast and they require a runtime DLL file. C++ compiles fast programs, but is hard to learn and get started. Another difference between them is compatibility. VB is for Windows operating systems only (Win 3.11, Win95/98, WinNT), while C++ code can be made to run on practically any operating system (Windows, Unix, even Mac). Where can you get VB or C++? You buy it (or...ahem, cough, warez, cough, cough, friend with CD burner, cough, cough). Once you learn the basics of the programming language, learn Windows API. It's the guts of Windows.<br /><br />3). Hack. Like I said before, in order to be a hacker, you have to hack. Hanging around in chat rooms won't help you. Hacking lets you "practice" your hacking skills. The more you practice, the better you get. After you're an experience hacker, contribute something to the hacker community. This could be a simple text file, a web page, or a [free] program. Oh, and help out those newbie hackers. You were one once.<br /><br />VI. Knowledge is Power<br /><br />The most frequent questions people ask me are how to get someone's password and how do get someone's IP address.<br /><br />Getting someone's password<br /><br />There are three main ways to get someone's password.<br /><br />1). Social Engineering. By talking to someone who knows the password, you can try to "trick" them into giving you it. Be creative. The AOL equivalent is phishing (posing as an AOL technician or something, claiming to need the person's password), though phishing takes no skill and is hardly considered social engineering.<br /><br />2). Password Stealers or Sniffers (PWS). A program installed on the user's machine that literally gets the password as it is being typed in. Some PWS also search for stored passwords. After a PWS obtains a password, it usually stores it or sends it out through email. You would probably have to make your own (learn to program!) if you want it to be effective, though sometimes there are pre-made ones. Those AOL PWS are mostly crap, most of them only steal the password from the Change Password Window, which is not very effective.<br /><br />3). Password Cracker. A program on your machine that guesses passwords from a list. This can take some time, and would not be able to crack a user's password if it's not on the password list.<br /><br />Getting someone's IP Address<br /><br />First, you need to understand what an IP address is. Every computer connected to the Internet has an IP address, which is, in simple terms, equivalent to a phone number. It identifies the computer on the Internet. The IP address is where data is sent to and from. If the person is signing on through a dial up account, the IP address is usually different at each login. To find your IP address, click on the Start button, Run, and then type in winipcfg. And for you AOLer's who think who don't have an IP address, make sure that the listbox says "AOL Adapter," not "PPP Adapter." So, why get someone's IP address? Hell if I know. Maybe to do something lame, like nuke (crash) a computer, or maybe because a backdoor like NetBus or BackOrifice is installed. Anyway, IP addresses can be obtain through these methods:<br /><br /> Email - It's in the header<br /> IRC - A simple /whois [nick] will return the IP address<br /> ICQ IP Sniffer - Due to a bug in the ICQ software, it is possible to type in an UIN and get the user's IP address.<br /> ICQ Software Bug - Another software bug? Yup, only this time you don't need an external prog. If you have someone on your contact list, you can disconnect and then check their info. Their IP address will be in the Last IP box! Works for older versions of ICQ.<br /> IP Stealer - I haven't seen one of these, but there should be some around. It would work like a Password Stealer, except it would get the IP address instead of the password.<br /><br />VII. Seek, and ye shall find.<br /><br />One of the most annoying questions I hear are "Do you have this?" or "Can you send me this?" or "Where can I get this?" Well, I'm going to tell you this TOP SECRET thing I found called a SEARCH ENGINE. You type in what you what you're looking for, and it gives you links to web pages that have the words in it! WOW!<br /><br />Okay, that was lame, anyway, any experienced web surfer will tell you that you can find anything on the web your heart desires. Whether that would be XXX pics, games, or how to be a hacker, its all there. You just need to know how to find it. Now, for search engines, I prefer www.yahoo.com and www.infoseek.com. When typing stuff in the search box, be sure you use + (plus sign) in front of words that you want combined. For example, let's say you're looking for an ICQ IP sniffer program. Now, if you just typed in "ICQ IP sniffer" (without the quotes), it would give you web sites like ICQ reviews, what IP addresses are, and pages about your mom (heh, j/k). But if you typed in "+ICQ +IP +sniffer," it will look for pages that have all those words. Understand?<br /><br />Also, another web browsing technique that I like to use is opening multiple windows. This is especially useful when you're like me, stuck with a 33.6 modem. Okay, so, let's say Infoseek found 15 page results that have to do with ICQ IP Sniffers. When I find a link I want to open, instead of just clicking on it, I would click the right mouse button to bring up that pop-up menu, and then click Open Link in New Window. This would open another browsing window. And then when I find another link I want to go to, I do the same thing. The purpose of all this? To view one page while another is loading.<b> </b><br />
<br />
<b>Congratulations, this concludes the <i>So You Want to Be a Hacker? </i>
text. You have now earned your CHW (Certified Hacker Wannabe). So,
one last question remains: How do you know when you're a hacker? Well,
the answer is when someone tells you.</b></div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-18215317731892815822012-09-30T01:15:00.000-07:002012-09-30T01:15:49.386-07:0010 things every Perl hacker should know<div dir="ltr" style="text-align: left;" trbidi="on">
Perl is the expert system administrator's scripting language of choice, but it is also a lot more than that. As a language designed for file and text processing, it is ideally suited to UNIX system administration, Web programming, and database programming, among dozens of other uses.<br /><br />As one of the easiest programming languages to use for whipping up quick, effective code for simple tasks, Perl attracts new users easily and has become an important and popular tool for getting things done. Before jumping fully into Perl programming, though, there are a few things you should know that will make your life easier, both when writing code and when asking for help from Perl experts.<br />
<br />
<br />
<a name='more'></a>1. Perl is not an acronym<br /><br />Perl is sometimes known as the Practical Extraction and Report Language, because it's very practical, and it is very good at extracting data and creating reports using that data. It is also known humorously as the Pathologically Eclectic Rubbish Lister, for reasons that might become obvious after you've used it for a while. Both of these phrases are equally "official" and equally correct, but the language is not PERL. It was named Perl before either of those phrases was invented, and the language is in fact not technically an acronym at all. When speaking of the language, call it Perl, and when speaking of the parser (the interpreter/compiler), it is acceptable to call it perl, because that is how the command used to run it is spelled. One of the quickest ways to get identified as a know-nothing newbie when talking to Perl hackers is to call it PERL.<br /><br />2. There is more than one way to do it<br /><br />One of the main mottos of the Perl language and community is TIMTOWTDI, pronounced "Tim Toady". This one really is an acronym, and it stands for There Is More Than One Way To Do It. It's true of Perl on many levels, and is something important to keep in mind. While some ways to do something are often better than other ways to do the same thing, you can be sure that for pretty much everything you can do with Perl, there is more than one way to do it.<br /><br />3. Use warnings and use strict<br /><br />Warnings and the strict pragma are important weapons in the Perl hacker's arsenal for debugging code. Warnings will not prevent a program from executing, but will give helpful information on how the code can be fixed up.<br /><br />The strict pragma will actually prevent the code from executing if a strict approach to programming style is not used, such as lexically scoping variables. Once in a while, a program might be better off without the strict pragma, but if you're new to Perl it will surely be a long time before you learn to recognize such situations, and until then you should just use it.<br /><br />A Perl script with warnings turned on in the shebang line and the strict pragma used, on a standard UNIX system, would start like this:<br />#!/usr/bin/Perl -w<br />use strict;<br /><br />Warnings can also be turned on with a use statement, like this:<br />#!/usr/bin/Perl<br />use strict;<br />use warnings;<br /><br />A pragma, in Perl, is a preprocessor directive. In other words, it's an instruction sent to the compiler before the code is compiled for execution. Pragmas change how the compiler parses code.<br /><br />4. Use taint checking<br /><br />With the -T option on the shebang line of your program, you explicitly turn on taint checking. This is a security measure that checks all input for your program for "tainted" data, to help ensure that incoming data will not allow arbitrary code execution if a malicious user is trying to crack security on the system running your code. This is especially important in circumstances where you are using Perl/CGI scripts to process data from an HTML form on the Web. It can be combined with the -w option as -wT.<br /><br />5. Use lexically scoped variables<br /><br />You can use the my() operator to create variables using lexical scoping. In brief, this means that the scope of the variable is limited to the current context: if you declare a variable using my() inside a subroutine, the variable only exists inside that subroutine. The value of lexical scoping is that it protects different parts of modular code from one another.<br /><br />For instance, if you're using a Perl module or library without knowing exactly what the code inside it looks like, using lexical variables can help to prevent accidentally assigning new values to variables that need to remain unchanged until later. It is especially important to use lexical scoping for your variables when writing modules and libraries in Perl. For those coming to Perl from other languages, you may know of the concept of lexically scoped variables as "private variables".<br /><br />6. How to name your programs<br /><br />Perl programs should have the appropriate file extension in their names. Many lower-quality Perl howtos simply use the .pl extension for everything, naming Perl scripts something like foo.pl. Technically, the .pl extension should be used for Perl libraries, not for executable Perl programs. For executable files, you should either use .plx or, if your operating system will allow it, no file extension at all. Perl modules, meanwhile, should use the .pm file extension. It is also considered good practice to use only alphanumeric characters and underscores in Perl script filenames, and to start those filenames with a letter (or underscore), similar to how you would start variable names.<br /><br />7. How to use CPAN<br /><br />The Comprehensive Perl Archive Network (CPAN) is a rich resource for finding freely available, reusable code. In particular, CPAN is where you'll find legions of Perl modules that can be used to enhance the functionality of your programs and reduce the time you spend writing them. The options you have for using CPAN vary from one operating system and Perl parser implementation to the next, but you can always browse CPAN using your Web browser. Perl implementations generally come with at least a command-line tool for installing Perl modules from CPAN.<br /><br />8. How to use Perldoc<br /><br />The online documentation for Perl is extensive and comprehensive, in the form of Perldoc. With Perldoc installed on your system, you can use it to access documentation on any of the standard Perl functions, installed modules, variables, and a slew of other things -- even Perldoc itself! It's like having one of the most complete programming reference books available right at your fingertips, for free, and searchable since it's in electronic format.<br /><br />On some systems, Perldoc will be installed by default with Perl itself, and on others the process for installation should be self-evident. If you have problems getting Perldoc installed, you can always access the online Perldoc Website. Make sure you know how to use Perldoc, because it can make you a more effective Perl hacker in ways that just might surprise you.<br /><br />9. Don't reinvent the wheel<br /><br />You should use subroutines, modules, and libraries often. The point is to help you write code faster and keep that code from becoming unmanageable if you need the same functionality in multiple programs, or more than once in the same program. This is accomplished by separating blocks of code from the rest of your source code using subroutines, modules, and libraries. You're better off using a design for the wheel that already exists, rather than reinventing the wheel from scratch, most of the time. In addition, when you're reusing code from a subroutine, module, or library, and you need to improve that code somehow, you only need to change it in one place.<br /><br />The term "subroutine" in Perl means roughly the same thing as "function" in C.<br /><br />10. Regular expressions are your friends<br /><br />Perl's regular expression syntax can help to make your source code look intimidating to the uninitiated, and as a result sometimes people new to Perl programming avoid regexen. This is, really, a mistake. Regular expressions add a great deal of power to the Perl programming language, often allowing the programmer to do something in three lines that might otherwise take fifty lines of code. Regular expressions are expressions made up of abbreviations for matching patterns in strings that can be used to find and manipulate smaller strings inside larger strings. It behooves the Perl hacker to learn regex syntax and learn it well.<br /><br />Often Perl hackers and other programmers who use regular expressions will refer to them as "regexen" or "regexes" in the plural ("regex" singular). An alternate version of "regex" is "regexp", though why anyone would want to add that extra letter, making it more difficult to pronounce clearly, is beyond me.<br /><br />Once you've internalized the lessons of this list, you're ready to really start learning Perl, and how to program with it. Some good resources for beginners (and experts, too) include Learning Perl for an excellent introductory text, the PerlMonks community for tutorials and discussion, and Ovid's CGI Course for Perl/CGI Web programming.<br /></div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-18125481998978077132012-09-30T00:20:00.005-07:002012-09-30T00:20:52.529-07:00How to Backup a SIM Card<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-tT3cjW2qyrA/UGfxdemsiyI/AAAAAAAAAJI/RshXffvCoYU/s1600/hjg.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://3.bp.blogspot.com/-tT3cjW2qyrA/UGfxdemsiyI/AAAAAAAAAJI/RshXffvCoYU/s1600/hjg.jpg" /></a></div>
I wanted to know how I could backup all of the phone numbers on my cell
phone. I searched the internet for products that would do this task. I
found a few devices that ran anywhere from $25-$70 plus shipping and
handling. I decided to put off buying one of the devises until I could
do some more research on what I was buying. I mentioned this situation
to a co-worker (Mike G.), and he told be that I didn't have to spend a
dime if I could get a hold of an older Nokia cell phone. Just my luck I
had an old Nokia phone in my closet that was about 4 years old and was
not being used. Read on to see how easy this task is. Besides backing up
your SIM card you can also copy numbers from one SIM card to another
and merge numbers from multiple SIM cards.<br />
<br />
<br />
<br />
<a name='more'></a><br />
<header>
<h4 class="header Heading5">
<span>Things You'll Need</span></h4>
</header>
<ul class="UnorderedTitleList">
<li class="FLC"><span class="title">Old Cellular Phone (Nokia).</span></li>
<li class="FLC"><span class="title">One or more SIM cards that you want to either backup or copy.</span></li>
<li class="FLC"><span class="title">A boat load of telephone numbers stored on one or more SIM cards. </span><br /><h2 class="Heading2">
Instructions</h2>
</li>
<li class="step ">
<span class="stepNumber">1</span>
<div class="stepMeat">
<div itemprop="step">
Install the SIM card that you want to copy or backup into the older Nokia cell phone.<br />
<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">2</span>
<div class="stepMeat">
<div itemprop="step">
Turn on your old Nokia cell phone and press "contact" in the lower right corner<br />
<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">3</span>
<div class="stepMeat">
<div itemprop="step">
Scroll down till you see "copy" on the menu<br />
<br />
<ul>
<li class="step ">
<span class="stepNumber">4</span>
<div class="stepMeat">
<div itemprop="step">
Scroll down till you see "copy From SIM card to phone"<br />
<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">5</span>
<div class="stepMeat">
<div itemprop="step">
Follow the prompts till all the numbers from the SIM card are copied to the phone<br />
<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">6</span>
<div class="stepMeat">
<div itemprop="step">
Now turn off the phone and insert the destination SIM card.<br />
<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">7</span>
<div class="stepMeat">
<div itemprop="step">
Repeat steps 2-3<br />
<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">8</span>
<div class="stepMeat">
<div itemprop="step">
Scroll down till you see "copy From phone card to SIM"<br />
<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">9</span>
<div class="stepMeat">
<div itemprop="step">
Follow the prompts till all the numbers from the phone card are copied to the destination SIM<br />
</div>
</div>
</li>
</ul>
<div data-module="google-ad-336x280" data-type="adTracking" id="DMINSTR" name="&adunit_id=ca-ehow_336x280&ad_unit_type=CNT&ad_unit_network=GAP&revenue_basis=CPC&ad_position=-&revenue_tag=elec_cell_phones_accessories" type="adimpression">
</div>
<figure class="Module tipsWarnings" data-module="tips-warnings">
<h2 class="Heading2 ">
<span class="decoration">Tips & Warnings</span></h2>
<ul>
<li class="tip">This method works with any and all SIM cards, however I have only found that Nokia's have this two-way SIM copy feature</li>
<li class="tip">Test this by simply backing up your SIM card before attempting to copy one to another.</li>
<li class="warning">Make sure your phone is fully charged before trying this. If the phone goes dead while copying you may loose data.</li>
</ul>
</figure> </div>
</div>
</li>
</ul>
</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-31359202592672722512012-09-30T00:13:00.001-07:002012-09-30T00:13:40.047-07:00How to Pay for Prepaid SIM Cards<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-y4nAyXPNVAE/UGfwz37wYOI/AAAAAAAAAJA/kFOuYN2tE5c/s1600/fdg.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="209" src="http://3.bp.blogspot.com/-y4nAyXPNVAE/UGfwz37wYOI/AAAAAAAAAJA/kFOuYN2tE5c/s320/fdg.jpg" width="320" /></a></div>
The Subscriber Identification Module card, also called a SIM card, holds
the cell phone subscriber's phone number, personal security key and
other data necessary for the phone to function. If you are using a phone
not linked with any specific provider--an "unlocked" phone--SIM cards
may be switched from phone to phone, letting the new phone receive all
calls to the subscriber's number. International SIM cards are available
for travelers, since country-specific SIM cards usually work only in
their country of origin. SIM cards can be conveniently purchased in
stores or online.<br />
<br />
<br />
<a name='more'></a> <br /><br />
<h2 class="Heading2">
Instructions</h2>
<section>
<ol class="steps" id="intelliTxt">
<li class="section">
<h2 class="header Heading3">
Most Convenient Option</h2>
<ul>
<li class="step ">
<span class="stepNumber">1</span>
<div class="stepMeat">
<div itemprop="step">
Go to a discount department store and look at the phones
with prepaid, pre-installed SIM cards. Purchasing a brand name phone
directly from a well-known store is the most convenient way to obtain a
SIM card, although you will not be able to insert SIM cards from other
networks into a "locked" phone.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">2</span>
<div class="stepMeat">
<div itemprop="step">
Explain to the store clerk where and when you will be using
your phone, and ask the clerk to help you compare the available network
phones that contain prepaid SIM cards.<br />
</div>
</div>
</li>
<li class="googleAd">
<div data-type="adTracking" id="DMINSTR" name="&adunit_id=ca-ehow_300x250&ad_unit_type=CNT&ad_unit_network=GAP&revenue_basis=CPC&ad_position=-&revenue_tag=elec_cell_phones_accessories" type="adimpression">
</div>
</li>
<li class="step ">
<span class="stepNumber">3</span>
<div class="stepMeat">
<div itemprop="step">
Ask the store clerk to activate the phone if you purchase it
in the store. Upon activation, you can purchase additional SIM card
minutes through an online account.<br />
</div>
</div>
</li>
</ul>
<h2 class="header Heading3">
Purchase a Prepaid SIM Card Online</h2>
<ul>
<li class="step ">
<span class="stepNumber">4</span>
<div class="stepMeat">
<div itemprop="step">
Look at your upcoming travel schedule. If you want to use
your SIM card in another country, you will need to purchase either an
international SIM card or a country-specific SIM card.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">5</span>
<div class="stepMeat">
<div itemprop="step">
Check online auction houses such as eBay and Amazon if you
have an unlocked phone. You may be able to purchase unused SIM cards for
a discount.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">6</span>
<div class="stepMeat">
<div itemprop="step">
Go to your carrier's website if you have a locked phone and
choose from the available SIM cards. If you are replacing your SIM card
because your phone has been lost or stolen, alert your carrier about the
situation. While you can only lose the amount of money you spent on the
card, criminals may use your stolen phone and SIM card.<br />
</div>
</div>
</li>
</ul>
</li>
</ol>
</section>
<div data-module="google-ad-336x280" data-type="adTracking" id="DMINSTR" name="&adunit_id=ca-ehow_336x280&ad_unit_type=CNT&ad_unit_network=GAP&revenue_basis=CPC&ad_position=-&revenue_tag=elec_cell_phones_accessories" type="adimpression">
</div>
<figure class="Module tipsWarnings" data-module="tips-warnings">
<h2 class="Heading2 ">
<span class="decoration">Tips & Warnings</span></h2>
<ul>
<li class="tip">Do not buy a new
SIM card when your prepaid minutes run out. Go online or call your
network's representative to purchase additional minutes for your present
card.</li>
<li class="warning">If you're
traveling to another country, make sure that you purchase an appropriate
SIM card before your trip. SIM cards are a convenient communication
tool for criminals and terrorists, so many counties make buying them
extremely difficult for foreigners.</li>
</ul>
</figure></div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-20202045202269379112012-09-30T00:10:00.002-07:002012-09-30T00:10:41.937-07:00How to Reprogram a SIM Card<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-WzPic7iH0CY/UGfwOupvenI/AAAAAAAAAI4/Gu94Vajoezg/s1600/gf.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="214" src="http://3.bp.blogspot.com/-WzPic7iH0CY/UGfwOupvenI/AAAAAAAAAI4/Gu94Vajoezg/s320/gf.jpg" width="320" /></a></div>
Modern day cell and mobile phones use a tiny memory unit called a
subscriber identity module card, or SIM card. It keeps track of your
phone numbers, rate plan information, contacts and messages. It is
simple to swap out your current SIM card, but you must learn how to
reprogram it with your current account information. To achieve this, you
must contact your cell phone service provider and have them initiate an
over-the-air, or OTA, update that is wirelessly transmitted to your
phone.<br />
<br />
<a name='more'></a><br />
<h2 class="Heading2">
Instructions</h2>
<section>
<ol class="steps" id="intelliTxt">
<li class="section">
<ul>
<li class="step ">
<span class="stepNumber">1</span>
<div class="stepMeat">
<div itemprop="step">
Navigate to the Internet site for your cell phone provider.
Click the "Contact Us" link in their website and write down their toll
free customer service number.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">2</span>
<div class="stepMeat">
<div itemprop="step">
Turn off the power to your phone. Flip it over and push down
on the battery cover. Slide it towards you to separate it from the
phone. Place the battery cover aside, slide your fingernail under the
battery and lift it upwards. Pull it out and set it aside.<br />
</div>
</div>
</li>
<li class="googleAd">
<div data-type="adTracking" id="DMINSTR" name="&adunit_id=ca-ehow_300x250&ad_unit_type=CNT&ad_unit_network=GAP&revenue_basis=CPC&ad_position=-&revenue_tag=elec_cell_phones_accessories" type="adimpression">
</div>
</li>
<li class="step ">
<span class="stepNumber">3</span>
<div class="stepMeat">
<div itemprop="step">
Pull the metal SIM card cover off of the card and find the
identity number on the backside. They are usually long numbers ranging
from 16 to 20 digits. Write this number down, reassemble your phone and
turn the power back on.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">4</span>
<div class="stepMeat">
<div itemprop="step">
Use a different phone to call the toll free number for your
cell phone provider that you noted down earlier. Tell customer service
you need to have your SIM card re-programmed and give him the 16 to 20
digit card number.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">5</span>
<div class="stepMeat">
<div itemprop="step">
Ask the representative if you need to enter in a specific
code on the phone to receive your OTA update. It will arrive to your
phone in the form of a text message, so use your cell phone arrow keys
to highlight the option "Accept Update." Hit your "Enter" or "Menu" key
to program the update on to your SIM card.<br />
</div>
</div>
</li>
</ul>
</li>
</ol>
</section></div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com43tag:blogger.com,1999:blog-6512083992498604011.post-58513993066353522742012-09-30T00:08:00.001-07:002012-09-30T00:08:31.375-07:00How to Track Cell Phone Calls With a SIM Card Number<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-H56AWOF_28k/UGfvzY8G4mI/AAAAAAAAAIw/RE-dZZ2sTUQ/s1600/hbb.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="240" src="http://1.bp.blogspot.com/-H56AWOF_28k/UGfvzY8G4mI/AAAAAAAAAIw/RE-dZZ2sTUQ/s320/hbb.jpg" width="320" /></a></div>
Tracking cell phone calls with a SIM card requires the use of a SIM card
reader. A SIM card stores all the information associated with a user's
account. A card reader is required to access all the information on the
SIM card, including contacts and call history. There are two types of
card readers, readers and spoofers. The spoofers can clone the SIM card,
which basically means the machine acts like a clone of the SIM card.<br />
<br />
<br />
<a name='more'></a> <br /><br />
<h2 class="Heading2">
Instructions</h2>
<section>
<ol class="steps" id="intelliTxt">
<li class="section">
<ul>
<li class="step ">
<span class="stepNumber">1</span>
<div class="stepMeat">
<div itemprop="step">
Remove the SIM card from the phone. This can usually be done by taking out the battery first and then the SIM.<br />
<br />
<header>
<h4 class="header Heading5">
<span>Things You'll Need</span></h4>
</header>
<ul class="UnorderedTitleList">
<li class="FLC"><span class="title">SIM card reader</span></li>
</ul>
<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">2</span>
<div class="stepMeat">
<div itemprop="step">
Purchase a SIM card reader. A reader will only extract
information up to the point of removal from the phone and nothing more,
while a spoofer will continue to update the clone profile of the SIM
card after the SIM is inserted back into the phone. Essentially the
spoofer will record every call placed and received (not the conversation
but the numbers) and text message (full message.) Spoofers are in a
gray area of the law and the use of them is prohibited in certain
states. Both of these devices are not available for purchase at local
electronics stores and must be purchased online from specialty shops.
Ebay, Amazon.com, spy shops and cell phone equipment wholesalers may
carry these units. Expect to pay between $20 (for a basic reader) and up
to $1,000 (for an advanced spoofer.)<br />
</div>
</div>
</li>
<li class="googleAd">
<div data-type="adTracking" id="DMINSTR" name="&adunit_id=ca-ehow_300x250&ad_unit_type=CNT&ad_unit_network=GAP&revenue_basis=CPC&ad_position=-&revenue_tag=elec_cell_phones_accessories" type="adimpression">
</div>
</li>
<li class="step ">
<span class="stepNumber">3</span>
<div class="stepMeat">
<div itemprop="step">
Insert the SIM card into the SIM card reader. Download all
the information from the card reader to the computer using native
software that came with the SIM card reader. The software is fairly
self-explanatory; in most cases and these devices come with an
instruction manual. SIM card readers almost always connect to the
computer via USB. View the downloaded call history using the SIM card
reader's software.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">4</span>
<div class="stepMeat">
<div itemprop="step">
Spoof the SIM card using a SIM card spoofer. The same
installation process will apply as using a normal reader. The extra step
of spoofing the card will require additional work in the program. This
is usually done via an on screen install wizard. The spoofer's log file
will be updated with new information every time the SIM card is used.<br />
</div>
</div>
</li>
</ul>
</li>
</ol>
</section></div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com2tag:blogger.com,1999:blog-6512083992498604011.post-2411891649184973632012-09-30T00:04:00.003-07:002012-09-30T00:04:50.298-07:00How to Detect SIM Card Cloning<div dir="ltr" style="text-align: left;" trbidi="on">
SIM card cloning, a type of fraud, occurs when someone intercepts your
SIM card information as you make a call with your cell phone, then
copies that information to a different cell phone. The person then makes
calls and texts that you are billed for. These cloned phones are
difficult for the police to find, so it's important that you pay close
attention to your mobile phone bill to ensure there are no unauthorized
calls or text messages.<br />
<br />
<a name='more'></a><br />
<br />
<h2 class="Heading2">
Instructions</h2>
<ul>
<li class="step ">
<span class="stepNumber">1</span>
<div class="stepMeat">
<div itemprop="step">
Open your monthly cell phone bill or access it online.
<span> </span><br />
<br />
<span>Things You'll Need</span><br />
<header>
</header>
<ul class="UnorderedTitleList">
<li class="FLC"><span class="title">Mobile phone bill</span></li>
<li class="FLC"><span class="title">Cell phone PIN</span></li>
</ul>
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">2</span>
<div class="stepMeat">
<div itemprop="step">
Check the list of phone numbers the bill shows you called or
received calls from. Make a note of any unfamiliar numbers. If there
are only a couple of unfamiliar numbers, it's possible they are
legitimate -- you may have called a restaurant to make reservations or
received a call from your mechanic saying your car was repaired. Call
these numbers to confirm they are legitimate.<br />
<ul>
<li class="step ">
<span class="stepNumber">3</span>
<div class="stepMeat">
<div itemprop="step">
Check the numbers under you text message section of your
bill. Make sure they are all familiar numbers. Call any unfamiliar
numbers to ensure they are legitimate.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">4</span>
<div class="stepMeat">
<div itemprop="step">
Make a note of the dates and times of suspicious activity
you notice during your normal cellphone use. This activity includes
being unable to check voice mail, consistent calls saying they've
reached the wrong number or problems placing outgoing calls.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">5</span>
<div class="stepMeat">
<div itemprop="step">
Call your service provider to ask about any suspicious calls
or texts listed on your bill or to report other suspicious activity.
The fraud department investigates SIM card cloning, but you must change
your phone number and existing SIM card to minimize the expenses to your
account.<br />
</div>
</div>
</li>
<li class="step ">
<span class="stepNumber">6</span>
<div class="stepMeat">
<div itemprop="step">
Add a PIN code that must be entered before you can make
calls on your cellphone. According to the Better Business Bureau, a PIN
code can reduce the chance of your SIM card being cloned by 80 percent.<br />
</div>
</div>
</li>
</ul>
<br />
</div>
</div>
</li>
</ul>
</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com1tag:blogger.com,1999:blog-6512083992498604011.post-22602219100599910562012-09-29T23:59:00.001-07:002012-09-29T23:59:06.978-07:00How Does a SIM Card Work?<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 class="header Heading3">
Introduction</h2>
<ul>
<li class="step ">
<div class="stepMeat">
<div itemprop="step">
<a href="http://4.bp.blogspot.com/-bIsqQL1br-c/UGftkcxTayI/AAAAAAAAAIo/Jc0a5HRDwIc/s1600/k.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://4.bp.blogspot.com/-bIsqQL1br-c/UGftkcxTayI/AAAAAAAAAIo/Jc0a5HRDwIc/s1600/k.jpg" /></a>SIM cards are the most important part of a cell phone that
runs on a GSM network. They enable the phone to receive signal from a
mobile phone company. Many people who have phones that accept SIM cards
find it extremely easy to simply swap out their SIM card for a new SIM
card when in a different country.<br />
</div>
</div>
</li>
</ul>
<h2 class="header Heading3">
What is a SIM Card?</h2>
<ul>
<li class="step ">
<div class="stepMeat">
<div itemprop="step">
SIM cards are formally called Subscriber Identity Module
cards. While the first SIM card appeared in 1991, they have been seeing
an increase in use due to their ease and their simple design. When
compared with a phone that uses CDMA technology, phones that have SIM
cards in them offer lower prices and lower rates, especially outside of
the United States. When you are traveling to a foreign country, all
that you need to do in order to use your GSM, SIM-card enabled phone is
to purchase a new SIM card that works for the country that you are in
and add credit to it.<br />
<br />
<h2 class="header Heading3">
Using a SIM Card</h2>
<ul>
<li class="step ">
<div class="stepMeat">
<div itemprop="step">
When you open up the back of a phone that is equipped with a
SIM card, you will see the card tucked into the phone. Usually, the
card is tucked behind the battery. SIM cards are also great because
they can be used with any handset that accepts them. For example, if
your cellular phone breaks and you are unable to make calls from it, but
still have an active SIM card, you are in luck. Just take your SIM
card out of the old phone and plug it into a new phone and you will have
full service. SIM cards are encoded with information about the carrier
that you are using, as well as information like your address book.
Having information like this on a SIM card will allow you to make a fast
and simple switch over to another phone on the same carrier, or to
switch carriers completely.<br />
</div>
</div>
</li>
</ul>
<h2 class="header Heading3">
Other SIM Card Uses</h2>
<ul>
<li class="step ">
<div class="stepMeat">
<div itemprop="step">
Some phones with SIM cards may accept memory cards on their
own, however, on most phones, the SIM card is your memory card. All the
information that you need is on the phone itself, so you don't have to
download all your numbers when you want to switch phones, and you don't
even need to worry if a certain phone will work with your SIM card.
Some phones may need to be unlocked for service with a specific carrier
and you may receive a different SIM card, but otherwise you should have
no problems using the phone.<br />
</div>
</div>
</li>
</ul>
<h2 class="header Heading3">
Summary</h2>
<ul>
<li class="step ">
<div class="stepMeat">
<div itemprop="step">
SIM cards are a great solution for anyone who likes to
change phones or carriers or who travels internationally. They are a
quick and easy solution to prevent borders, carriers or locked-down
phones from slowing you down. SIM cards keep all of the information
that is needed right on your phone. There is no need to constantly back
up or write down all the numbers on your phone, and you will never have
to worry about outrageous bills when calling overseas when you purchase
a local SIM card for your phone.<br />
</div>
</div>
</li>
</ul>
<br />
</div>
</div>
</li>
</ul>
</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0tag:blogger.com,1999:blog-6512083992498604011.post-64622597730412646892012-09-29T23:52:00.001-07:002012-09-29T23:52:42.676-07:0015 Things You Need to Know About the iPhone 5<div dir="ltr" style="text-align: left;" trbidi="on">
<h1>
15 Things You Need to Know About the iPhone 5</h1>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-eFNJnp3XQ5E/UGfr-oZfxuI/AAAAAAAAAIg/N6fP5z_bTF8/s1600/iphone-toptop.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="http://4.bp.blogspot.com/-eFNJnp3XQ5E/UGfr-oZfxuI/AAAAAAAAAIg/N6fP5z_bTF8/s320/iphone-toptop.jpeg" width="320" /></a></div>
<h1>
After much anticipation, it is finally here. Yes, that’s right—today the iPhone 5 was unveiled. While we were absolutely thrilled to get our hands on the iPhone 4S its updates were not nearly substantial enough for our tastes. And apparently, they weren’t substantial enough for anyone’s tastes. Wall Street is expecting about 6 million units of the iPhone 5 to be sold during presale alone, proof that consumers are willing to spend on worthwhile upgrades that never happened when the iPhone 4S hit the market.<br /><br />While we haven’t technically gotten our hands on the iPhone 5 yet, it’s safe to say that Apple has another revolutionary device on its hands. If you’re on the fence about whether or not to take the plunge and purchase it, we’ve compiled a handy list of data about its new features. Here, 15 things you need to know about the iPhone 5.<br /><br />1. The phone will be offered at the same price as the 4S—$199 for 16 GB, $299 for 32 GB and $399 for 64 GB. There are two colors—black and white. The white version has a raw aluminum back. The black one has the black anodized backing. Preorder starts Friday, September 14, and the devices will ship on September 21.<br /><br />2. With a taller screen and the same width, it will now show five rows of icons—as well as four shortcuts on the bottom. For example, the calendar will now show the entire five day work week, perfect for seeing your full appointments. You can also use the phone more comfortably with one hand.<br /><br />3. It is made entirely of glass and aluminum, making it the thinnest and lightest iPhone yet, not to mention the world’s thinnest smart phone.<br /><br />4. The processor is 22% smaller and more energy-efficient than the 4S.<br /><br />5. Pages will launch 2.1 times faster than before, while keynote attachments will load 1.7 times faster.<br /><br />6. The battery life will exceed the 4S, with 8 hours of 3G or LTE talk time or browsing and 10 hours of WiFi browsing.<br /><br />7. The camera will offer a dynamic low light mode, which evaluates nearby pixels—and it has a 40% faster image capture.<br /><br />8. Panorama is officially a feature. You will be able to “sweep the scene” vertically.<br /><br />9. You’ll be able to take photos while taking videos for the first time.<br /><br />10. There are now three microphones to ease your recording anxiety, located on the front, bottom and back.<br /><br />11. Although the iPhone has used the iPod’s connector from the start, there will be a new one called “Lightning,” with an all-digital design that is 80% smaller than the previous model.<br /><br />12. Apple is ditching Google Maps and introducing a new Maps application which they have been working on for years. There’s a built in search engine so all of your restaurant and shopping destinations will be available at the click of a button.<br /><br />13. For email, you can now mark people as “VIP,” which will place their mail in a separate inbox.<br /><br />14. Siri is sharper than before, and you’ll be able to make more specific inquiries, like finding out the score of a football game. Siri’s taste level has also improved, and she is now more qualified to offer advice about movies.<br /><br />15. The iPhone 5 will run on LTE, which is much faster than the majority of WiFi and cable providers.<br /><br />Will you be pre-ordering the iPhone 5? And what do you think of the new features? Share your thoughts in the comments!</h1>
</div>
http://www.hackingdesire.blogspot.in/http://www.blogger.com/profile/05792063344323906999noreply@blogger.com0