Saturday, October 23, 2010

How to Make Invisible Password Protected Folder

Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.
How to create a Password Protected Folder
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.
How to make it Invisible
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
  • Do not show hidden files and folders
  • Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.
"ruhil here for my dear follower's"
I hope you like this post. Pass your comments!! Cheers...............

How To Hide Files In A Calculator?

Having read the title of this post you may be wondering if it’s really possible. Yeah! It is possible. As the word suggests, it’s a calculator with a safe which is capable of storing and keeping your files and folders safe. The safe calculator looks just like the default calculator in Windows and in fact it can even perform calculations just like any other calculator. When you start Safe Calculator it will look just like the below pic.




The default code/ pin for the safe is ‘123’. So, to unlock you need to type ‘123’ in the calculator and press on ‘MS’, now the calculator will enter into safe mode. Here you can change the default pin if you want by clicking on ‘New pin’.
Now click on ‘+’ and then ‘=’ to confirm and enter into the safe to browse and choose the files you want to hide. Click on ‘Store’ once you’re done.


Monday, October 18, 2010

email account hacking

Netbios Hacking


THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.

STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
Example: C:\>net view \\219.64.55.112
The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint

NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.
4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.You can access files\folders quickly through “Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.
HAPPY NETBOS HACKING!!

Posted in Hacking | Leave a Comment »
How to Hack an Email Account
November 1, 2009

The most frequent question asked by many people especially in a chat room is How to Hack an Email Account? So you as the reader are most likely reading this because you want to hack into some one’s email account. Most of the sites on the internet teach you some nonsense and outdated tricks to hack email. But here are some of the real and working ways that can be used to hack an email account.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING
Before you learn the real ways to hack email, the following are the things you should be aware of.
1. There is no ready made software that can hack emails just with a click of a button. Please don’t waste your money on such scam softwares.
2. Never trust any email hacking services that claims to hack emails just for $100 or $200. Often people get fooled by these services and eventually loose their money with no gain.
3. With my experience of over 6 years in the field of Hacking and Security, I can tell you that there exists only 2 foolproof methods to hack an email. All the other methods are simply scam or don’t work. The following are the only 2 foolproof methods that work.
1. EASIEST WAY TO HACK AN EMAIL ACCOUNT

Today, with the advent of a program called Keylogger it’s just a cakewalk to hack any email account. Using a keylogger is the easiest way to hack an email account. Any one with a basic knowledge of computer can use the keylogger and within few hours you can hack any email account.
1. What is a keylogger?
A keylogger is a small program that monitors each keystroke a user types on a specific computer’s keyboard. Using a keylogger is the easiest way to hack an email account. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.
2. Where is the keylogger program available?
A keylogger program is widely available on the internet. Some of the best ones are listed below
SniperSpy
Win-Spy
3. How to install it?

You can install these keyloggers just as any other program. Installation is just a child’s play!
4. Once installed how to get password from it?

Once installed the keylogger starts recording every activity on the target computer. These logs are sent to you by the keylogger software via email or FTP. These logs contain the password of the victim’s email account.
5. I don’t have physical access to the victim’s target computer, what can I do?
It doesn’t matter whether or not you have physical access to the victim’s computer. Because keyloggers like SniperSpy and Win-Spy offers Remote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC.
6. What is the best way to deploy the keylogger onto remote PC?
Instead of sending the keylogger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to www.hotlinkfiles.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.
NOTE: WHILE USING A KEYLOGGER TO HACK AN EMAIL ACCOUNT IT IS HIGHLY RECOMMENDED THAT YOU HIDE YOUR REAL IP ADDRESS. SO WE RECOMMEND THE FOLLOWING IP HIDING SOFTWARE
Hide the IP
Hide the IP provides an option to frequently change your country location so that you never reveal your real IP. However to avail this facility you need to purchase the software since this feature is not available in the trial version.
7. Which Keylogger is the best?
I recommend SniperSpy as the best for the following reasons.
1. SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista. But Winspy has known compatible issues with Vista. So if your PC or the remote PC runs Vista then Winspy is not recommended.
2. SniperSpy is more reliable than Win-Spy since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.
3. SniperSpy is more easy to use and faster than Winspy.
4. SniperSpy offers better support than WinSpy.
To get a complete review of SniperSpy please see my new post Which Spy Software to Choose
Apart from the above mentioned reasons, both SniperSpy and WinSpy stands head-to-head. However in my opinion it’s better to go for SniperSpy since it is the best one.
If you’re serious to hack an email account then go grab either of the two keyloggers now!
For more information on these two softwares visit the following links
 1. SniperSpy      2. WinSpy
2. OTHER WAYS TO HACK AN EMAIL ACCOUNT

The other most commonly used trick to hack an email is by using Fake Login Pages. Today, Fake login pages are the most widely used techniques to hack an email account. A Fake Login page is a page that appears exactly as a Login page but once we enter our password there, we end up loosing it.
Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we loose our valuable data.
However creating a fake login page and taking it online to successfully hack an email account is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc.
I hope this info has helped you. Happy Email Hacking!




Saturday, October 2, 2010

C++ in Windows 7 with DOSbox | Emulation

Download Borland Turbo C++
Install the software DOSBox ver 0.72 ( 1.2 MB ) (Freeware) from the link below
(Direct Link)
Code:http://prdownloads.sourceforge.net/dosbox/DOSBox0.72-win32-installer.exe?download
Before going to the details u have to create a folder (any name will do). Here we
name it as Turbo
Copy the TC into the Turbo folder
Run the DOSBox 0.72 from the icon located on the desktop or from the location of
the installation folder
Then u are presented with two screens which look like the command prompt in
Windows
Now u are presented with two screens. One with a Z prompt. U can ignore the other
screen.
There type the following commands at the command prompt Person:
Mount [Type in any alphabet that u wish except z] [Type the source of the turbo C]
press enter
Now , Type in the following commands after the Z prompt:
Z: mount d c:\Turbo\ [The folder TC is present inside the folder Turbo]
* Now u should get a message which says: Drive D is mounted as a local directory
c:\Turbo\ ***
Now type d: to shift to d: prompt .
D: cd TC [The contents inside the folder Turbo gets mounted as a virtual drive
(Here D drive)
D: cd Bin
D: TC or Tc.exe [This presents u the Turbo C++3.0 screen]
On the Turbo C++ goto Options>Directories>Change the source of TC to the source
directory Drinks ( i.e. virtual D: refers to original c:\Turbo\ . So make the path
change to something like D:\TC\include and D:\TC\lib respectively )
===========================================================
In order to get the full screen use the key combination of Alt and Enter
When u exit from the DosBox [precisely when u unmount the virtual drive where
Turbo C++ 3.0 has been mounted] all the files u have saved or made changes in
Turbo C++ 3.0 will be copied into the source directory(The directory which
contains TC folder)
It is a good idea to backup your files in the source directory prior to running
DOSBox 0.72
google_protectAndRun(“ads_core.google_render_ad”, google_handleError, google_render_ad);
For additional help go through the readme file located in the installation folder
or look on the website of the DOSBox forum.
The above procedure has been successfully implemented on Windows Vista Ultimate 64
bit & is operated in Windows 7 also perfectly ! Confused
IMP : Don’t use shortcut keys to perform operations in TC because they might be a
shortuct key for DOSBOX also . Eg : Ctrl+F9 will exit DOSBOX rather running the
code
Still have problems in working-out ???Comment Here