Friday 29 July 2011

Hackerstips: Adobe Photoshop CS5 and Extended Version Serials, Keygens + Crack Also

Hackerstips: Adobe Photoshop CS5 and Extended Version Serials, Keygens + Crack Also

Thursday 28 July 2011

How To Trace IP Address Of E-mail Sender

How To Trace IP Address Of E-mail Sender

Sunday 24 July 2011

hack

http://www.hack-your-world.blogspot.com

hack

http://www.hack-your-world.blogspot.com

Wednesday 13 July 2011

Saturday 9 July 2011

Sunday 5 June 2011

Hackerstips: Adobe Photoshop CS5 and Extended Version Serials, Keygens + Crack Also

Hackerstips: Adobe Photoshop CS5 and Extended Version Serials, Keygens + Crack Also

Saturday 4 June 2011

How To Trace IP Address Of E-mail Sender










How To Trace IP Address Of E-mail Sender
Find ip address of the sender of a mail in Gmail, Yahoo and Hotmail.
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.
Finding IP address in Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is
65.119.112.245.
That is be the IP address of the sender!
5. Track the IP address of the sender
Finding IP address in Yahoo! Mail
1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail
5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!
6. Track the IP address of the sender
Finding IP address in Hotmail
1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail
5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender’s IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
9. Track the IP address of the sender

Thursday 2 June 2011

Adobe Flash Player 10.2.159.1





Adobe Flash Player is the high performance, lightweight, highly expressive client runtime that delivers powerful and consistent user experiences across major operating systems, browsers, mobile phones and devices.
Specific versions are available for Internet Explorer and other browsers.

SIZE -2.70MB

Tuesday 31 May 2011

How To Recover Deleted Files By Abhishek




If you have lost important files from your hard drive and if you are sure that they have been deleted, don’t panic! Uneraser is simple software that can help. In this tutorial, we will see how Uneraser works. On this link you can download Uneraser Or Buy It
For example, I delete movie file on Local Disk (E:) , how to recover movie file?
It is simple
1. Run Uneraser , then select wizard , as shown below
2. When the wizard appears select “Do a lost files scan”, then click Next , as shown below
3. Select partition , where is deleted data, then click Next
4. Uneraser find my deleted movie
5. Now, just save your recover file, as shown below

Password Recovery Software




This is a short and effective way to change your Windows Login password without knowing the previous password. This trick works only in case you are already logged into Windows and you have all the administrative privileges. So here we go:
1.Open Command prompt
START>RUN
password Recovery
Type in; cmd
2. In command prompt just type in “net user” as shown below:
3.After doing the above, the command will give you all the account’s names>
password recovery
4. So the next thing you do is just type in: net user YourUser NewPass
password recovery
…now just log off from Windows and try to log back in with your new password


After read upper information..then continue to do below ones

Here’s a way to bypass the well familiar Windows logon screen.
This will work only under the condition that the default Windows administrator account has not been disabled.
So the only thing you need to do is to type Administrator in the usernameand to leave the password field blank.
Click OK and you will enter the Administrator account. From here you can hack the passwords of other users and gain control

MICROSOFT OFFICE 2010 PROFESSIONAL PLUS





Office Professional plus 2010 is the ultimate full version of Office 2010 suite which contains all the individual office 2010 applications like Word 2010, Powerpoint 2010, Excel 2010, OneNote 2010, Access 2010, InfoPath 2010, Outlook 2010 with Business Contact Manager, Publisher 2010, SharePoint Workspace 2010 and Communicator 2007 R2.

Microsoft allows developers and professionals to use the Office professional 2010 suite with 60 days free license. The serial key could be obtained after registering any of these sites [TechNet or MSDN]. After registering these sites, Microsoft will provides 2 months free license key for activating MS Office Professional plus 2010 at no cost.

Visit our MS Office 2010 archive for more download links and reviews.

Complete Package of Microsoft Office pro plus 2010 Includes









Office Professional Plus 2010 Direct Download Links 

DIRECT DOWNLOAD LINKS FOR OFFICE 2010

650.27MB

 Microsoft Office 2010 32-bit English





718.48MB
 
Microsoft Office 2010 64-bit English





DOWNLOAD PRODUCTKEY--[link]

1.01MB
Download activater  it is virus free but antivirus will show win32/hacktool because it hack office 2010 to activate it.



  
2.50 MB

  Download the following file and run. In the “Main” tab, click “EZ-Activator” button. It will automatically search Office programs (including Visio) and be activated. You don’t need to do anything, just look at the screen.<100% VIRUS FREE >



VLC media player 1.1.9



VERSION 1.1.9
 DESCIPTION

VLC media player is a highly portable multimedia player for various audio and video formats as well as DVDs, VCDs, and various streaming protocols without external codec or program.
It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
VLC can play:
  • MPEG-1, MPEG-2 and MPEG-4 / DivX files from a hard disk, a CD-ROM drive, and so on
  • DVDs, VCDs, and Audio CDs
  • From satellite cards (DVB-S)
  • Several types of network streams: UDP/RTP Unicast, UDP/RTP Multicast, HTTP, RTSP, MMS, etc.
  • From acquisition or encoding cards (on GNU/Linux and Windows only)

Saturday 28 May 2011

Adobe Photoshop CS5 and Extended Version Serials, Keygens + Crack Also






adobe_photoshop_cs5-313x400
As you all know that Adobe Photoshop is a popular Image editing software used by the photographers and designers to make their images looking good and pretty nice.but due to its high price lots of people cant afford to buy it, that leaves them to the second option is to search for Adobe Photoshop CS5 Extended Serial Number or any other poor software.Hence to solve this problem, I'll be showing you how to get it for free. These instructions are 100% safe and completely idiot-proof. No fancy key generators or other bullshit required. Note: This hack will only work on Windows (XP and above) both 32 and 64bit compatible mainly.
Adobe Photoshop CS5 Extended version Trick-
First you have to download and install the Adobe Photoshop CS5 Extended trial from the Adobe website.
Process 1.
1.Then once the trial is installed, make sure Photoshop is closed and navigate to this directory:-
C:\WINDOWS\system32\drivers\etc\
2.Download adobe tools file here .
3.Extract all the files after downloading it.Inside the archive there's a file titled "hosts". Now copy the file hosts and  drag it to the above directory (drivers\etc). It should ask if you want to overwrite or replace the file. Click "Yes" or "ok".
4.If you have trouble overwriting, take ownership of your original "hosts" file then try replacing it again. Google this: "how to take ownership of a file".
5.Almost done. Open Photoshop. There will be a window asking for a serial number. Use one of these:
1330-1036-2793-5476-2605-5729
1330-1193-9982-0310-7670-2199
1330-1470-0441-6829-3063-2553
1325-1558-5864-4422-1094-1126
Process 2.
If the above mentioned trick will not work(otherwise it is 101% working),then just copy the adobe Photoshop CS5 Extended.exe crack from the adobe tools file given in step 2 and paste it on the main file of Adobe Photoshop where you run the Photoshop for doing something. Click yes or ok if they asked for to overwrite the file.
Process 3.
Or just generate the fresh keys from the adobe Photoshop CS5 Extended key generator software given below-
Adobe Photoshop CS5 trick-
First of all you have to download and install the Adobe Photoshop CS5 trial from the link below-
Process 1.
Try the following given keys and enjoy !
1325-1558-5864-4422-1094-1126
1325-1758-5864-4422-1094-1126
1325-1958-5864-4422-1094-1178
1330-1036-2793-5476-2605-5729
1330-1193-9982-0310-7670-2199
1330-1470-0441-6829-3063-2553
1330-1281-8916-6015-7348-5124
1330-1404-7538-8933-1430-9428
1330-1252-4888-1152-3288-2616
1330-1247-2759-1294-4526-4754
1330-1713-2301-4428-6400-6280
1330-1030-8573-7382-5779-4241
1330-1601-6716-8530-6716-4565
1330-1811-7064-7875-6205-7468
1330-1700-6887-5489-1226-3294
1330-1423-0212-0680-3874-0293
1330-1088-8402-1437-0249-8795
1330-1143-5962-2631-2772-5625
1330-1117-0144-5622-5205-0027
1325-0621-9125-0765-3648-0614
1325-0365-5929-6118-8817-8422
1325-0150-1163-7532-1626-3430
1325-0178-1927-9019-0123-2254
1325-0702-3693-1544-9166-3515
1325-0549-2240-0071-3409-1342
Process 2.
Or you can just generate the keys from the adobe Photoshop CS5 key generator software given below-
Please Leave comments also.

Top 10 Best Facebook Hacks 2010-2011




facebook1With the success of my new book on ‘Learn Facebook Hacking’ in the market, today I am going to tell some more facebook hacks to all my readers. Now a days facebook takeovers the Orkut,hi5,twitter and more due to its amazing technology of chatting and apps,People are now shifted from various social networking sites to facebook and get benefited . Due to this,FB hacking is becoming common and hackers are more concentrating on their skills.Sometimes if you want to see or do something with your friends for joy and fun but you are going to not to do because he/she will lock that feature with privacy.Therefore now I am going to introduce you all my latest collection of top 10 best facebook hacks.This will make more fun and easyness to you while online.

List of Top 10 Facebook hacks-


1.How to View the Album of Any User Even if it is Private
You can use this script to view a photo in the original album, even if you’re not friends with the person.
Get it Here
2. How to Remove Annoying Facebook Advertisement
Get rid of some of the Facebook advertising and sponsored by sections with this tool.
Get it Here

3. How to see Real Profiles from Public Pages
This script redirects to real profiles from the Facebook people pages (public profiles). There is a risk of an infinite redirect loop if not logged in, so be logged in.
Get it Here

4. How to Undo Facebook Changes
If you hate some or all of the new Facebook changes, undo them with these scripts and use what you liked previously.
Get it Here

5. How to View All the Photos from a Person
You can search for pictures of a Facebook member who has tight privacy settings and view all his/ her pictures without his/ her consent.
Get it Here

6. How to Find More Friends at Facebook
Suppose some of your friends have newly joined Facebook and you didn’t even knew. Use this script and it will help you go through your friends’ friends list and find them out.
Get it Here

7. How to Share Files from Facebook
With this box widget, you can share files from your computer through Facebook. Isn’t it great?
Get it Here

8. How to Get a Job from FacebookLooking for a job?
This application gives Facebook users unique access to job information, networking opportunities and other career resources.
Get it Here

9. How to Tighten up the Privacy and still Maintain Communication Convenience
The Private Wall combines the best of both worlds of Facebook: online convenience and communication with more serious privacy settings.
Get it Here 
10 How to Cheat Facebook Texas Hold em Poker
This is one of my Favorite hacks and that is why I have saved it for the last one. Using this software you can see the cards of any player and the advanced version of this software allows you to even add credits to your account for free.
Get it Here  
                                        Enjoy Hacking
   

How to Hack Facebook Accounts-All Ways




hack facebook loginNow a days Facebook Hacking is being a tradition for people to fun out. You all know that I also launched my eBook on “Learn Facebook Hacking” previously for that particular purpose only but due to some issues I stop preventing it now.  I was amazed to see that my previous posts on Facebook gets a huge amount of visitors recently. So I decided to write an post on “how to hack Facebook” containing the list of all possible ways or methods to hack Facebook accounts very easily. so Today I am going to explain these 8 methods given below each by each.

1. Phishing attacks
2. Keylogging
3. Cookie stealing techniques
4. Social Engineering
5. Primary Email Address Hack
6. Some readymade Tools and Software's
7. Harmful Viruses
8. Useful Scripts

1. Facebook phishing attacks -
Well Phishing means the art of dragging someone into a well or something else. These type of attacks are very famous and commonly used by the hackers among all the attacks mentioned above, so I am explaining it very firstly. In this procedure, we have to make Fake Login Pages, also known as spoofed pages. These fake login pages resemble the qualities of original login pages of sites like Facebook, Yahoo , Gmail, MySpace etc. The victim is fooled to believe the fake page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her Facebook login details are stolen away and now we can see their passwords in a text file stored in any hosting site where you sign up. To learn more how to perform this attack, please visit Here .
2.Keylogging-
Keylogging is one of the easiest method to hack someone accounts with the help of keyloggers like sniper-spy, winspy etc. All you have to do is to install a keylogger into his/her computer(victims computer) without its permission. Basically an keylogger is that tool which records all the physical activities perform by an user at that particular pc including passwords,usernames,sites etc. Now when the person is going to open his/her account in any website, it will be captured by the keylogger and gets stored. Thus when you are free,go to yours victims house and at his/her pc see the passwords silently. You can also install it remotely if you are not in touch with your victim. Installing the keyloggers in cybercafés is also an good method to work out with. to learn more, please visit Here.

3. Cookie stealing techniques-
Well you all know Cookies, they are used to store all the necessary Information about one’s account , using this information you can easily hack anybody’s account by going into it. To take your victims cookie without its permission you have to take help from some software's like cookielogger,wireshark and add-on’s also like greasemonkey. According to me, it is very hard to perform and have less chances of success.
4. Social Engineering-
This sounds very good, but I guess majority of people didn’t aware of it. For newbies, social engineering is method of retrieving password or the answer of security question simply by quering him(your victim). You have to be very careful while using this method as victim must not be aware of your intention. Just ask him cautiously using your logic and way.

5. Primary Email Address hack-
Primary Email Address Hack means that you will hack or gain access to your victims yahoo,Gmail,Rediff etc ids and now you will gonna reset her/his password by saying Facebook that you forgotten the password thus by providing the email address of victims Facebook account which you will already hacked. Now you can see the password coming in the inbox and reset it by logging into yours victims Facebook account and he/she will be easily hacked. So, always remember to protect your Facebook primary email address and try to keep unknown or useless mail id as your primary email address.
6. Some readymade Tools and Software's-
Some hackers or persons says that they will made a tool or hacking software by which you can easily hack someone's Facebook accounts without knowing basics of hacking. Then they will ask you to buy that software for some dollars say $10, but the fact is that they are making you fool by providing this software which either works half-ly or expires after sometime of fixing in the bugs.  Examples of Some of the software's  used in Facebook hacking are Facebook Freezer, Facebook Hacking Tool, Facebook accounts Deleter etc.           
7. Harmful Viruses-
If the hacker gets fail in Hacking someone's Facebook account by the methods mentioned above, then he/she getting started to produce harmful viruses like OMG,WOW,DAMN,CLICK HERE and some other pranks etc. When you will click on it, you will be redirected to any of the hidden pages containing some inappropriate data and your acc. gets hacked. so I suggest you while on clicking such type of viruses you should must scan it with the help of good online scanners and never install any uncertified add-ons in your computer.
8. Useful Scripts-
In simple words, Scripts means some design or codec to perform some specified task.There are many scripts available online for Facebook Account Hacking like how to see any persons private photos,How to remove FB Advertisements,How to break someone's privacy, how to undo Facebook Changes etc. By using or installing these scripts, you can easily perform hack. To know more, please visit Here.                                      
That’s it !
Don’t Forgot about to comment Or to Subscribe our RSS

Download ‘The Hackers Underground Handbook’ For free of Cost




learn_to_hack

Now a days,learning Hacking or becoming a perfect hacker is something quite difficult to do due to many reasons like lack of knowledge,interest,money problem etc. Thus everyone wants to become a hacker but actually they are not because either they need a good trainer or an Book. Since books are very costly to purchase in todays world. Therefore I Bring you an E-book of Mr.David which costs around  $20 at http://learn-how-to-hack.net/ and with my skills I hacked it one and giving my readers for free of cost for completing their dreams.







How To Hack : Learn Hacking From Professional Book Free .
The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phishing, web hacking, network hacking and Linux (intro, installation, etc.). .
The Hacker's Underground Handbook which contains information unknown to 99.9% of the world will teach you the hacker's ways.
A great starting book which will guide you in the right direction, helping you understand the basic concepts of computer security and matters that you should take in consideration.
Other Benefits of this E-book-
1.You will be started to thing like Hackers
2.Full Covered topics on Ethical hacking and Cyber security
3.Extra knowledge in the field of hacking what 0.1% people have

And also subscribe to our Email via this box given below for getting more E-books at free of cost.

Sunday 1 May 2011

Hackers PDF's (HACK PACK)

Here you will,get the freshly released hackers pdf set 2011 + My own made hacking tips in short download all the hacking tips which i have posted in my blog........ 
you can get it for free just do these things
Like my site on Facebook
Submit some tricks
Complete customer satisfaction survey
Download our toolbar
Follow us on twitter
Subscribe to rss feed
Contact me and give me your name,Gmail adress and your site name
   NOTE-YOU MUST HAVE AN WEBSITE OTHERWISE YOU'LL GET ONLY HALF PART OF PDF IF SOME ONE HAVE ANY DOUBT PLEASE COMMENT ENJOY HACKING
REGARDS
HACKERSTIPS


How to Identify and Avoid Phishing Scams


I have written many post on hack via phishing But now i'am going to tell you how to prevent or identify phishing scams
Phishing ScamPhishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victims and hence, phishing can be very effective.
With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.
Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips that can be used to identify various phishing techniques and stay away from it.
 

Identifying a Phishing Scam

 
1. Beware of emails that demand for an urgent response from your side. Some of the examples are:
  • You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanant suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed webpage (similar to your bank website) and enter your login details over there.
  • In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.
2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.
3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed webpage with official logos and information that looks exactly same as that of the original webpages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there. Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:
  • papyal.com
  • paypal.org
  • verify-paypal.com
  • xyz.com/paypal/verify-account/
 

Tips to Avoid Being a Victim of Phishing

 
1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.
2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.
3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as usernames and passwords, account numbers or credic card details. You will see a lock icon Picture of the Lock icon in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN as shown below.
HTTPS Address Bar


In most cases, unlike a legitimate website, a phishing website or a spoofed webpage will not use a secure connection and does not show up the lock icon. So, absence of such security features can be a clear indication of phishing attack. Always double-check the security features of the webpage before entering any of your personal information.
4. Always use a good antivirus software, firewall and email filters to filter the unwanted traffic. Also ensure that your browser is up-to-date with the necessary patches being applied.
5. Report a “phishing attack” or “spoofed emails” to the following groups so as to stop such attacks from spreading all over the Internet:
You can directly send an email to spam@uce.gov orreportphishing@antiphishing.org reporting an attack. You can also notify the Internet Crime Complaint Center of the FBI by filing a complaint on their website: www.ic3.gov.
 

Copyright 2008 All Rights Reserved | Hackers-tips Designed by Bloggers Template | CSS done by Link Building