Thursday, 30 May 2013

Play Music through CMD


FIRST  DOWNLOAD THIS & INSTALL => DOWNLOAD NOW 

                             

AFTER DOWNLOAD & INSTALL THE DOS BOX

 

THEN DOWNLOAD THIS mpxplay=>  DOWNLOAD NOW

10 FREE KEYLOGGERS

10 FREE KEYLOGGERS TO MONITOR YOUR LOCAL PC OR LAPTOP!

HERE IS AN EXCLUSIVE LIST OF TOP 10 FREE LOCAL KEYLOGGERS. HOWEVER IF YOU ARE PLANNING TO MONITOR ONLY YOUR PC OR ANY PC WHICH YOU HAVE CONTROL OF, THEN YOU CAN BLINDLY GO FOR “HARDWARE KEYLOGGERS” AS THEY ARE THE SAFEST KEYLOGGERS AND OPERATE IN A COMPLETE STEALTH. IF YOU STILL WANNA PREFER FREE KEYLOGGERS THEN BELOW IS THE LIST OF FREE KEYLOGGERS THAT WILL REALLY HELP YOU MONITOR YOUR PC.

1) REFOG FREE EDITION

Refog Free Keylogger beats competition in two respects: it’s simple to use and it’s free. REFOG Free Keylogger can look after your children without them even noticing. Even technically minded children won’t detect the key logger when it runs in a stealth mode. The program removes all the shortcuts and can be accessed only through a hot key combination. Running unobtrusively from the moment the system boots, REFOG Free Keylogger keeps track of all typed or pasted text.

->Download It From here

2) Black box express

Simple to use monitoring of one local computer; Monitor Screen recordings, Programs, Keystrokes typed, Websites, Web Searches, Emails/Webmails/ Instant Messenger Chat sent and received. Alerts and Warnings instantly or as a summary on your e-mail or cell phone. everything for 100% Free. No strings attached.

->Download It From here

3) PERSONAL KEYLOGGER

The Personal Keylogger application was designed to be a small tool that will allow you to secretly record all keystrokes and other input. All specific instructions are explained in the application. To exit it and receive your logs, you will need to enter in your keycode. If you have forgotten your keycode, you will need to restart the computer. Keycode is like password. To stop Personal keylogger, you can enter your keycode anywhere on the screen. Once you type-in your keycode, the keylogger will stop monitoring and the log.txt file will be created in your selected destination folder.

->Download It From Here
4) PY KEYLOGGER

PyKeylogger is an easy-to-use and simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a short python script that you can easily examine. It is primarily designed for personal backup purposes, rather than stealth keylogging. Thus, it does not make explicit attempts to hide its presence from the operating system or the user. That said, the only way it is visible is that the process name shows up in the task list, so it is not immediately apparent that there is a keylogger on the system.
#Tip: Press and hold ‘left-CTRL + Right-CTRL + F12′ keys simultaneously to bring up the Control Panel (default password is blank).

->Download It From Here
                                                                              5) HERETIC MACRO

Heretic is a powerful tool that is able to record user events, such as mouse clicks and keys, into a C/Java-like script, and play that script either once or repeatedly. It has many commands for dynamic pixel-based botting, window based botting, and static botting/macro-ing (i.e. key presses, mouse clicks, mouse moves, and pauses).

->Download It From HERE


6) Ultimate Keylogger

Ultimate Keylogger Free is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrokes, applications, passwords, clipboard, email, and visited websites’ URLs. You can view the reports as HTML files. Ultimate Keylogger Free will help you to find out, what exactly took place in the system.

->Download It From HERE


7) Actual keylogger

It runs hidden in the background and automatically records all keystrokes (including Alt, Ctrl and other functional buttons). The interface can be password protected and the log files are encrypted. You can view the reports as HTML or plain text. In the hidden mode it is invisible in all operating systems.

->Download It From HERE


8) Revealer Keylogger Free Edition

Revealer Keylogger is surely the easiest and faster way to record keyboard inputs. There is almost nothing to configure, in fact everything is configured internally with the best settings. Free keylogger monitoring tool that logs every keystroke even passwords behind asterisks and conversations in common instant messengers. Its interface is password protected, the software does not appear in Add/Remove programs or in the taskbar.

->Download It From HERE


9) Romaco Keylogger

Romaco Keylogger is a small and easy to use tool that can log all key-presses that are made while it is running, and display them to you in its window. It automatically exports the logged text to a text file every 5 minutes, or manually. It can be hidden at the click of a button, and recalled by vigorously pressing one of the least used keys on the keyboard, the break key.

->Download It From HERE


10) KidLogger

KidLogger collects user activity journal on the Computer and creates detailed Analysis of the user activity available online. Creates the list of most used web sites. Record the text was typed on the keyboard in any application


->Download It From HERE
                                                                                  




Use Facebook Without Internet Connection

I know Title Of  Post Sounds somewhat funny but friends You can use facebook with no internet connection And Even On Phones Which don't Have Internet Support.
And the best thing is that its Completly free.Facebook India has partnered with Fonetwish to bring Facebook on every mobile phone without requiring any apps or even the Internet.Now you can able to use facebook on cell phones like 1100.which don't have any browser or internet facility.
 The only You have to do is to  dial *325# 

from your mobile phone and follow the instructions.

First of all it asks for Facebook username and password,You have to enter these information via a number based command Prompt.
After You get in.You will see a menu like 
  1. news feed
  2. update status
  3. post on wall.
  4. friend request.
  5. messages.
  6. notifications. 

       *Account settings.

You have to enter desired Number in a number based command prompt for accessing your account.


NOTE:
  • This Service is only available in India. 

  • This Service Currently available On selected operators like Airtel, Aircel, Idea, Vodafone andTata Docomo users.

  • Access to facebook account and Status updates is completely free.If you also want to use features like Notifications, updating friends wall you have to subscribe to Fonetwish premium plan which is very cheap.

Top 10 Ways to Hack Facebook Accounts


Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers have , I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2013, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the top 10 methods how hackers can hack facebook accounts.

10 Ways How Hackers Can Hack Facebook Accounts


So here are the top 10 methods which have been the most popular in Everytime :


1. Facebook Phishing


Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.



2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will recordevery thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.




3. Stealers



Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.


4. Session Hijacking


Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's.



5. Sidejacking With Firesheep


Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.



6. Mobile Phone Hacking


Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.




7. DNS Spoofing 

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.



8. USB Hacking


If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser.




9. Man In the Middle Attacks

If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,



10. Botnets


Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.


Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 40 years of imprisonment, if got caught in doing so.