Saturday, March 16, 2013

The 10 Ways to Hack Facebook Accounts You Should Know


There is something we should know when we use this social network as our daily social intercourse. Many people are curious about what inside our facebook and there might be someone who hate you and try to hack your facebook.


Facebook is one of the most popular social media in the world with active member in 2011 around 800 million users. So many users so it becomes the main target for hackers. There are lots of ways to hack or take over someone account. Here are 10 most broadly used ways for hacker to hack into your Facebook login, by knowing these ways which usually used by hackers, hopefully you will become more alerted so your Facebook account will stay safe.

1) Facebook Phishing

Phishing is the most popular way to get someone facebook login data. There are some kind of Phishing attack, the most simple one is the hacker make fake facebook login account with an interface close with the real one. From that face page, victim will insert “E-mail Address” and “Password” which saved in .txt file. These data then taken by the hacker to get into victims facebook account and change the password with the new one.

2) Keylogging

Keylogging use a small program installed on the victims computer. This program will record all things that the victims type on their computer, also the login facebook data. The log will be send back to the attacker FTP network or from hackers e-mail.

3) Stealers

Almost 80% people use password saved in the browser to make it easier to login into facebook. This will make it easier but it can be dangerous. Stealer is software designed to take password saved in the victim’s browser.

4) Session Hijacking

Session Hijacking will be really effective if you access facebook with standard connection (http://…). This way is by stealing victim’s cookie browser which used for user authentication on a sites. Session hijacking is commonly used on local area network.

5) Sidejacking with Firesheep

Sidejacking is an alternate name for http session hijacking which specified on Wi-Fi user. To do Sidejacking attack, hackers commonly use software Firesheep, But Firesheep will only work if the attacker and the victim is inside the same Wi-Fi network.

6) Mobile Phone Hacking

Millions of people do facebook login from their mobile phone. If hacker can access the victim’s mobile phone, most likely the hacker can also access the victims account. it can also be done using software to monitor mobile phone like “Mobile Spy” and “Spy Phone Gold”

7) DNS Spoofing

If the attacker and victims is on the same computer network, attacker can use DNS spoofing or redirecting from the original facebook page to the fake one which made by the hacker.

8) USB Hacking

This is usually used when the attacker have physical access to the victims computer. Hacker will insert USB device which already programmed automatically to take the password which saved in the browser.

9) Man In the Middle Attacks

This could happened when the hacker and the victim is within the same switch based network. Hacker will place itself between the victims and the server or act like gateway so it can capture all passing data. This way is also called ARP Poisoning.

10) Botnet

Botnet is actually not commonly used to hack into facebook login, because of the high cost. This is used for more advance attack. Basically this is a cooperation between some computer. The infection process is just like keylogging. The popular botnet are “SpyEye” and “Zeus”

How to Make Windows XP Genuine Without Crack

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"ProductId"="55274-640-7450093-23464"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\
37,34,35,30,30,39,33,2d,32,33,34,36,34,00,2e,00,00,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,62,fc,61,4c,e0,26,33,16,05,d3,54,e7,a0,de,00,00,\
00,00,00,00,49,36,c2,49,20,47,0c,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,33,33,35,30,30,00,00,00,00,00,00,00,65,10,\
00,00,74,99,dd,b0,f7,07,00,00,98,10,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,c4,ae,d6,1c
"LicenseInfo"=hex:e7,77,18,19,f8,08,fc,7d,e8,f0,df,12,6e,46,cb,3f,ad,b2,dd,b9,\
15,18,16,c0,bc,c3,6a,7d,4a,80,8b,31,13,37,5a,78,a2,06,c8,6b,b9,d9,dd,cc,6a,\
9c,c5,9b,77,aa,07,8d,56,6a,7c,e4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd

  1. copy all the information from above.
  2. open notepad [start--programs--accessories
  3. paste above info.
  4. press Ctrl + S
  5. on left side of Save Dialogue box, click on "DESKTOP"
  6. On bottom of Save Dialogue box, find something written "text Documents (txt)", click on it and click All Files.
  7. Type the file Name as WIN.REG
  8. Close notepad and open desktop
  9. Double click on file, Win, thats now on your desktop. [it will have a green broken cuboid icon]
  10. Click Yes and then Click OK.
  11. Say thanks.

IT WILL WORK

NO CHANCE OF VIRUS OR ANYTHING

Also works on SP 3 and that PE editions, who didnt fail validation a year back, but now do [ i use it ]

If you don't want to make your win.reg, You can simply download following link and double click it! Click Yes and then Click OK.

Download Link

Important Tips for Restoring an Unbootable Hard Drive


Have you ever tried to restart a machine only to find it won’t boot? For whatever reason, you get a warning message informing you that disaster might well have struck… and you’re staring in the face of what could be a very bad day. Well, don’t panic yet. There are a few tricks you can try that may get that machine booted
. All is not lost until you know, with 100 percent certainty, that the drive will not boot — and even then, you can possibly recover your data. Here are some tips that can help you to get that drive booted and your machine recovered.

1: Boot from a restore disk

With many operating systems, restore disks can be created and used to deal with such disasters. The problem with this usually arises because the user hasn’t made a restore disk. I always tell users that one of the first things they should do when they get a new computer or install a fresh operating system is create a restore disk and then put it somewhere safe. That disk can really save your hide — especially in cases such as an unbootable drive. Now, every operating system approaches the restore disk differently. For example, some Linux distributions, such as Ubuntu 11.04, let you use the Live disk as a restore disk. So even if you didn’t create a restore disk, you can just download the same release that’s installed on the machine and use that as your restore.

2: Use the install disk

If you didn’t create a recovery disk in Windows, but you have the full installation disk, you’ll be okay. Those disks include recovery tools that can be accessed by pressing R at the Welcome To Setup screen. The tools let you fix boot problems, restore the hard drive from image, diagnose memory, and perform system restore. Note: The system restore typically can work only if the system restore partition is intact.

3: Get to know BartPE

There are tools… and then there is BartPE. BartPE is a huge challenge to build. But once you have it, you have a serious tool for fixing serious problems. Bart E creates a complete, preinstalled Win32 environment on your hard drive that allows you to use many of the tools available for repair. You to run check disk on your drive, which could easily solve your problem.

4: Rebuild the MBR

In many instances, the problem is a corrupt master boot record (MBR). If that’s the case, the MBR needs to be rebuilt. This process will vary, depending upon the operating system you use. With Windows 7, the necessary tool is Bootrec.exe, which can be found in the Windows Recovery Environment. If the operating system uses Grub 2 and the boot loader was lost after a Windows installation (with the intent to dual-boot), there is a tool called Grub4dos, which can certainly be a lifesaver. If no Windows environment is on the machine, grab that Live CD and you’ll have all the tools you need to rebuild your Grub boot loader. The specific tool you want is grub-install, and to rebuild the grub menu, update-grub.

5: Remove the drive

If all else fails, pull out the drive from the machine, attach it to a machine known to run, and see if the drive can be seen at all. It is possible that the reason the drive will not boot is due to physical damage. If the drive can be seen but not accessed, most likely the partition table has gone corrupt. But if the drive can’t even be seen, especially using a Linux machine to view it, the drive might well be physically damaged. If the drive can be seen and accessed, the problem is probably the MBR. I would highly recommend that at this point, you copy your data over to another drive — just in case.

What has saved you?

There are plenty of ways to recover that unbootable drive, but the techniques above have always brought me the most luck. What about you? If you’ve found a more reliable or efficient way to recover a drive that refuses to boot, share it with your fellow .

Download usb write protection format 100% Working


Have you ever attached a USB to a computer and later found out that the drive is infected by a virus? I have definitely faced this situation many times. If you attach your USB drive to the infected computer the virus is transferred to the drive in no time infecting all the important documents in USB drive too,
depending on the nature of the virus you may loose important data from the USB drive and never recover them back. But there is a solution to protect your USB drive from virus infection when it is connected to already infected computer.

If you make your USB drive into non writable mode then any kind of data can’t be written to it which means that if a virus infected computer is going to transmit any virus to drive, it won’t be able to because USB drive is write protected.
Write Protect Switch

Certain USB flash drives comes with write protector switch in them, using which you can write protect the USB flash / pen drive or make them read only drives. If the write protect feature is missing in the USB flash / pen drive then you can use USB Write Protector utility.

Download Link

How to share internet connection (through wifi) on laptop or PC Without Software

This Tutorial step by step to make our computer or laptop become Hotspot without any software on our area to share internet via wifi. This Tutorial is tested on windows seven.
1. Turn On your wireless on your laptop or Your computer.

2. Open control panel-> network and internet-> network and sharing center-> set up a new connection.




3. Choose set up a wireless bla bla bla.



4. Write your network name and password (pass min 8 digit).



5. Click turn on internet connection sharing.



6. Close if You done.



7. Result:


8. Enjoy..

Sharing Internet Connection using WiFi (Windows XP)

Here is the situation, you have two (or more) laptops (or PC) with WiFi capabilities. You don't have any router, switch, hub, or whatsoever. Just a single Internet port enough for one of your computer. Don't be worry, because you still can share the Internet connection by using ad-hoc network.

First, you need to pick one of those computers as a "server". Connect it to the Internet using the usual way. Next, open Control Panel>Network and Internet Connections>Network Connections. Open the Wireless Connection Properties. Change tab to Wireless Networks then click Add... button. Under the Association tab, input your Network Name as you like. Clear the The key is provided for me automatically check box and select the This is a computer-to-computer (ad hoc) network check box. Fill in the Network Key along with the confirmation with a 13-digit password and then press OK. Press OK once again to close the dialog box. Now you have finished with the first computer.

For the other computer, check for available wireless network. Usually a notification balloon will pop up and you can just simply click on it or just go to the Network Connections, right click on the Wireless Network Connection and click on View Available Wireless Networks. Select your network, and click connect button on the lower right corner. Input the Network Key and press connect once again.

If the first computer is using a PPPoE connection to gain access to the Internet don't forget to allow other computers to use it. You can do it by accessing the Network Connections, then open the properties of the connection. Open Advanced tab, check the Allow other network users to connect through this computer's Internet connection and set the Home networking connection to Wireless Network Connection.

In my experience, this network is not very stable. Not really sure what is the cause, but still good enough for a temporary solution.

Friday, March 15, 2013

Topaz Remask 3

Fast, Easy & Good - The Masking Tool You Want

Anyone editing photos must be able to select the exact objects or sections, which is essential to improving your photos. This ability to select objects and cutout backgrounds provides greater flexibility to your post processing workflow - making essential editing tasks like background replacement, selective adjustments, repositioning and multi-layer compositions effortless.

With ReMask's powerful and controllable tools you can quickly and easily select any part of your image. Like a pair of digital scissors, ReMask allows you to define the edges of an object and intuitively
cut it out - which as a photographer, saves you both time and money.
  • Simple approach to masking that's quick and easy.
  • Powerful tools for complex masking and refining.
  • Extract intricate image details like hair & fur.
  • Cutout accuracy with flexible preview options.
  • Replace backgrounds or isolate areas with a few clicks.
  • Maintain transparency in hard-to-mask objects.
 
Download Link