Tuesday, November 26, 2013

How to develop and increase a concentration with 12 Concentration Exercises lastly release.

How to develop and increase a concentration with 12 Concentration Exercises

Exercise 11: When You Read
No one can think without first concentrating his thoughts on the subject in hand. Every man and woman should train himself to think clearly. An excellent exercise is to read some short story and then write just an abridged statement. Read an article in a newspaper, and see in how few words you can express it. Reading an article to get only the essentials requires the closest concentration. If you are unable to write out what you read, you will know you are weak in concentration. Instead of writing it out you can express it orally if you wish. Go to your room and deliver it as if you were talking to some one. You will find exercises like this of the greatest value in developing concentration and learning to think.
After you have practiced a number of these simple exercises read a book for twenty minutes and then write down what you have read. The chances are that at first you will not remember very many details, but with a little practice you will be able to write a very good account of what you have read. The closer the concentration the more accurate the account will be.
It is a good idea when time is limited to read only a short sentence and then try to write it down word for word. When you are able to do this, read two or more sentences and treat similarly. The practice will produce very good results if you keep it up until the habit is fixed. If you will just utilize your spare time in practicing exercises like those suggested you can gain wonderful powers of concentration. You will find that in order to remember every word in a sentence you must keep out every thought but that which you wish to remember, and this power of inhibition alone will more than compensate for the trouble of the exercise. Of course, success in all of the above depends largely upon cultivating, through the closest concentration, the power to image or picture what you read; upon the power, as one writer expresses it, of letting the mountains of which we hear loom before us and the rivers of which we read roll at our feet.
Exercise 12: Watch Concentration
Sit in a chair and place a clock with a second hand on the table. Follow the second hand with your eyes as it goes around. Keep this up for five minutes, thinking of nothing else but the second hand, This is a very good exercise when you only have a few minutes to spare, if you are able to keep every other thought in the stream of consciousness subordinate to it. As there is little that is particularly interesting about the second hand, it is hard to do this, but in the extra effort of will power required to make it successful lies its value.
Always try to keep as still as possible during these exercises.

How to develop and increase a concentration with 12 Concentration Exercises third release.

How to develop and increase a concentration with 12 Concentration Exercises

Exercise 7: Concentrating on Sleep
What is known as the water method is, although very simple, very effective in inducing sleep. Put a full glass of clear water on a table in your sleeping room. Sit in a chair beside the table and gaze into the glass of water and think how calm it is. Then picture yourself getting into just as calm a state. In a short time you will find the nerves becoming quiet and you will be able to go to sleep. Sometimes it is good to picture yourself becoming drowsy to induce sleep, and, again, the most persistent insomnia has been overcome by one thinking of himself as some inanimate object–for instance, a hollow log in the depths of the cool, quiet forest.
Those who are troubled with insomnia will find these sleep exercises that quiet the nerves very effective. Just keep the idea in your mind that there is no difficulty in going to sleep; banish all fear of insomnia. Practice these exercises and you will sleep.
Exercise 8:Practice Talking Before a Glass
Make two marks on your mirror on a level with your eyes, and think of them as two human eyes looking into yours. Your eyes will probably blink a little at first. Do not move your head, but stand erect. Concentrate all your thoughts on keeping your head perfectly still. Do not let another thought come into your mind. Then, still keeping the head, eyes and body still, think that you look like a reliable man or woman should; like a person that anyone would have confidence in…
While standing before the mirror practice deep breathing. See that there is plenty of fresh air in the room, and that you are literally feasting on it. You will find that, as it permeates every cell, your timidity will disappear. It has been replaced by a sense of peace and power.
The one that stands up like a man and has control over the muscles of his face and eyes always commands attention. In his conversation, he can better impress those with whom he comes in contact. He acquires a feeling of calmness and strength that causes opposition to melt away before it.
Three minutes a day is long enough for the practice of this exercise.
Exercise 9: The Eastern Way of Concentrating
Sit in a chair with a high back in an upright position. Press one finger against the right nostril. Now take a long, deep breath, drawing the breath in gently as you count to ten; then expel the breath through the right nostril as you count to ten. Repeat this exercise with the opposite nostril. This exercise should be done at least twenty times at each sitting.
Exercise 10: Controlling Desires
Desire, which is one of the hardest forces to control, will furnish you with excellent exercises in concentration. It seems natural to want to tell others what you know; but, by learning to control these desires, you can wonderfully strengthen your powers of concentration. Remember, you have all you can do to attend to your own business. Do not waste your time in thinking of others or in gossiping about them.
If, from your own observation, you learn something about another person that is detrimental, keep it to yourself. Your opinion may afterwards turn out to be wrong anyway, but whether right or wrong, you have strengthened your will by controlling your desire to communicate your views.
If you hear good news resist the desire to tell it to the first person you meet and you will be benefited thereby. It will require the concentration of all your powers of resistance to prohibit the desire to tell. After you feel that you have complete control over your desires you can then tell your news. But you must be able to suppress the desire to communicate the news until you are fully ready to tell it. Persons that do not possess this power of control over desires are apt to tell things that they should not, thereby often involving both themselves and others in needless trouble.
If you are in the habit of getting excited when you hear unpleasant news, just control yourself and receive it without any exclamation of surprise. Say to yourself, “Nothing is going to cause me to lose my self-control. You will find from experience that this self-control will be worth much to you in business. You will be looked upon as a cool-headed business man, and this in time becomes a valuable business asset. Of course, circumstances alter cases. At times it is necessary to become enthused. But be ever on the lookout for opportunities for the practice of self-control. “He that ruleth his spirit is greater than he that ruleth a city.”

How to develop and increase a concentration with 12 Concentration Exercises second release.

How to develop and increase a concentration with 12 Concentration Exercises second release.

Exercise 4: Concentrate on Opening and Closing Fists
Move your chair up to a table, placing your hands upon it, clenching the fists, keeping the back of the hand on the table, the thumb doubled over the fingers. Now fix your gaze upon the fist for a while, then gradually extend the thumb, keeping your whole attention fixed upon the act, just as if it was a matter of great importance. Then gradually extend your first finger, then your second and so on until you open the rest. Then reverse the process, closing first the last one opened and then the rest, and finally you will have the fist again in the original position with the thumb closed over the finger. Do this exercise with the left hand. Keep up this exercise first with one hand and then the other until you have done it five times with each hand. In a few days you can increase it to ten times.
_____
The chances are that the above exercises will at first make you “tired,” but it is important for you to practice these monotonous exercises so you can train your attention. It also gives you control over your muscular movement. The attention, of course, must be kept closely on each movement of the hand; if it is not, you of course lose the value of the exercise.
You may think these exercises very simple and of no value, but I promise you in a short time you will notice that you have a much better control over your muscular movements, carriage and demeanor, and you will find that you have greatly improved your power of attention, and can center your thoughts on what you do, which of course will be very valuable.
No matter what you may be doing, imagine that it is your chief object in life. Imagine you are not interested in anything else in the world but what you are doing. Do not let your attention get away from the work you are at. Your attention will no doubt be rebellious, but control it and do not let it control you. When once you conquer the rebellious attention you have achieved a greater victory than you can realize at the time.Many times afterwards you will be thankful you have learned to concentrate your closest attention upon the object at hand.
Let no day go by without practicing concentrating on some familiar object that is uninteresting. Never choose an interesting object, as it requires less attention. The less interesting it is the better exercise will it be. After a little practice you will find you can center your attention on uninteresting subjects at will.The person that can concentrate can gain full control over his body and mind and be the master of his inclinations; not their slave.When you can control yourself you can control others. You can develop a Will that will make you a giant compared with the man that lacks Will Power. Try out your Will Power in different ways until you have it under such control that just as soon as you decide to do a thing you go ahead and do it. Never be satisfied with the “I did fairly well” spirit, but put forward your best efforts. Be satisfied with nothing else.When you have gained this you are the man you were intended to be.
_____
Exercise 5: Concentration Increases the Sense of Smell
When you take a walk, or drive in the country, or pass a flower garden, concentrate on the odor of flowers and plants. See how many different kinds you can detect. Then choose one particular kind and try to sense only this. You will find that this strongly intensifies the sense of smell. This differentiation requires, however, a peculiarly attentive attitude. When sense of smell is being developed, you should not only shut out from the mind every thought but that of odor, but you should also shut out cognizance of every odor save that upon which your mind, for the time, is concentrated. You can find plenty of opportunity for exercises for developing the sense of smell. When you are out in the air, be on the alert for the different odors. You will find the air laden with all kinds, but let your concentration upon the one selected be such that a scent of its fragrance in after years will vividly recall the circumstances of this exercise.
_____
The object of these exercises is to develop concentrated attention, and you will find that you can, through their practice, control your mind and direct your thoughts just the same as you can your arm.
_____
Exercise 6: Concentration on the Within
Lie down and thoroughly relax your muscles. Concentrate on the beating of your heart. Do not pay any attention to anything else. Think how this great organ is pumping the blood to every part of the body; try to actually picture the blood leaving the great reservoir and going in one stream right down to the toes. Picture another going down the arms to the tips of the fingers. After a little practice you can actually feel the blood passing through your system.

How to develop and increase a concentration with 12 Concentration Exercises.

How to develop and increase a concentration with 12 Concentration Exercises

Does your mind flit from one thing to another? Do you have trouble focusing on something for more than a few minutes? Do you consequently have a bunch of half-finished projects lying around the house, and a dozen half-baked ideas still knocking around in your cranium, and thus a pile of regrets about where you’re at with those things and in your life? If so, what should you do?
Now if you went to the gym and tried to lift weights only to find your arms and legs were weak and flabby, you’d start a program of weekly exercises to strengthen your muscles. Well, your mind is a kind of muscle too! And just like the muscles in your body, your brain needs weekly exercise to tone up the strength of its focus and concentration. What’s a good workout for your noodle? Well, I discovered some interesting concentration exercises in a great old book from 1918: The Power of Concentrationby Theron Q. Dumont, and have shared some excerpts from the book below, along with some great illustrations from Mr. Ted Slampyak. While some of the exercises are a little goofy and you may look like a crazy person staring at an outstretched glass of water, you’ll have the last laugh as your concentration power increases to Professor X levels. Use this guide to beef up your brain, or as inspiration to invent your own concentration exercises. Now put your finger on the side of your nose and let’s get started.
Concentration Exercises from 1918
The rays of the sun, when focused upon an object by means of a sun glass, produce a heat many times greater than the scattered rays of the same source of light and heat. This is true of attention. Scatter it and you get but ordinary results. But center it upon one thing and you secure much better results. When you focus your attention upon an object, your every action, voluntary and involuntary, is in the direction of attaining that object. If you will focus your energies upon a thing to the exclusion of everything else, you generate the force that can bring you what you want.
When you focus your thought, you increase its strength. The exercises that follow are tedious and monotonous, but useful. If you will persist in them you will find they are very valuable, as they increase your powers of concentration.
It will be necessary to first train the body to obey the commands of the mind.I want you to gain control of your muscular movements. The following exercise is especially good in assisting you to acquire perfect control of the muscles.
Exercise 1: Sitting Still in a Chair
Sit in a comfortable chair and see how still you can keep. This is not as easy as it seems. You will have to center your attention on sitting still. Watch and see that you are not making any involuntary muscular movements. By a little practice you will find you are able to sit still without a movement of the muscles for fifteen minutes. At first I advise sitting in a relaxed position for five minutes. After you are able to keep perfectly still, increase the time to ten minutes and then to fifteen. This is as long as it is necessary. But never strain yourself to keep still. You must be relaxed completely. You will find this habit of relaxing is very good.
Exercise 2:Fix Gaze on Fingers
Sit in a chair with your head up and your chin out, shoulders back. Raise your right arm until it is on the level with your shoulder, pointing to your right. Look around, with head only, and fix your gaze on your fingers, and keep the arm perfectly still for one minute. Do the same exercise with your left arm. When you are able to keep the arm perfectly steady, increase the time until you are able to do this five minutes with each arm. Turn the palm of the hand downward when it is outstretched, as this is the easiest position. If you will keep your eyes fixed on the tips of the fingers you will be able to tell if you are keeping your arm perfectly still.
Exercise 3: Fix Eyes on Outstretched Glass
Fill a small glass full of water, and grasp it by the fingers; put the arm directly in front of you. Now fix the eyes upon the glass and try to keep the arm so steady that no movement will be noticeable. Do this first for one moment and then increase it to five. Do the exercise with first one arm and then the other.
_____
The purpose of the above exercises is to gain control over the involuntary muscular movement, making your actions entirely voluntary.The following exercise [is designed] to bring your voluntary muscles under the control of the will, so that your mental forces may control your muscular movements.
_____

How To Become Invisible lastly release.

How To Become Invisible.

Great. Mastered both stages - why am I still visible?
Patience! If it was that easy, don't you think everyone would be doing it by now? There is still a long way to go, but by now you are getting your head into the space it needs to be for total invisibility to become effective. All really impressive skills take time to learn and turning invisible is no exception.
Bring on stage 3, then!
A word of warning to those who think they can jump straight in at this stage without fully mastering the previous two - you could do yourself serious mental damage if you are not prepared. I have never taken anyone on to this stage who I wasn't sure was ready for it. Please, if you have any doubts whatsoever, seek the advice of a medical doctor or a psychiatrist. There is a risk involved here and I do not want to be responsible for any decline in your health. If you have successfully completed both of the above stages, you will be mentally prepared for what is to come and you should be fine. But please, if you have any doubts whatsoever DO NOT CONTINUE. You have been warned.
Stage 3
Now, for the first time, we'll get a second person involved in the exercise. This person should be someone you trust, someone who will read through these instructions with you and understand what it is you are trying to achieve. If this person is not sympathetic to your aims, they will only hinder your progress. Ideally they should be your partner, but if you are single you can ask a close friend or a relative to take part. We'll refer to this second person as your "invisibuddy".
Ask your invisibuddy to bring a pen and paper to the exercise. Have them sit near you, quietly, to observe you as you perform the mental tasks I am about to list. At the start of the task, and at the end, they should write down how "visible" they think you are, expressed as a percentage. 100% would mean you were totally visible, and 0% would be a very early (and, unfortunately, unlikely) success - total invisibility. Throughout the exercise, if they notice any change, however small, in your visibility, they should make a note of the time and whether they thought you got more visible, or less visible, than before. This will provide a useful "map" for you to refer to later, to see how effective your mental exercises are becoming.
Apart from these notes, your invisibuddy should have no other input into the exercise - please ask them to keep as quiet as possible throughout the hour. Even the noise a pen makes can be distracting. An experienced invisibuddy will try to match their breathing rate to yours, which can actually aid in your relaxation.
Now, onto the exercise from your point of view:
*.For the first ten minutes you should repeat a couple of full body sweeps as described in stage 2. Keep the word "invisible" repeating in your mind, and visualize as totally as possible each part of your body becoming transparent.
*.For the remainder of the hour, you will have a new exercise to

How To Become Invisible.second release

How To Become Invisible.

This is some kind of joke, right?
If you don't want to believe this is possible, you'll never succeed. A positive mental attitude is one of the keys to making this work. Read through what I have to say, and move on to the next site on your list. For those of you who are willing to put in the time, you'll discover just how much fun being invisible can be!
Come on! How do we do it???
Ok, ok, I won't keep you waiting any longer. It's time to let you in on the secrets of true invisibility. It starts simple, with a mental exercise that you can practise whenever you have a quiet moment. Here's what you have to do:
*.Sit somewhere you can feel relaxed
*.Close your eyes
*.Imagine what it might feel like to be invisible
*.Picture yourself living out your invisible fantasies
*.After about five minutes of this, concentrate on one part of your body - a fingertip is a good choice - andwillit to become invisible. See it in your mind's eye as it slowly becomes transparent, revealing what is behind it.
*.Once it is invisible in your mind, hold that thought for as long as possible. You may find your mind begins to wander. If it does, don't worry, relax. Wait a while, and try again.
*.To begin with you may only be able to hold that thought for a few seconds, or perhaps a minute at most. Keep practising. You'll need to be able to hold that thought uppermost in your mind for at least FIVE minutes before continuing on to stage 2. Distractions are, unfortunately, inevitable, but with enough practise, you'll find you are able to ignore them.
*.Keep repeating this exercise for at least three weeks. If you still haven't reached five minutes, stick with it - it will happen. Some people have taken two or more months to achieve this, but everyone who has stuck with it has made it to five minutes.
*.The best way to time yourself is to glance at a clock before you begin to concentrate. When your mind begins to wander - however slight it may be - open your eyes again and check the clock. You may be surprised how long you kept that thought going.
Ok, I've mastered stage 1. What next?
Now that you have the ability to hold a thought about having a part of your body transparent, it's time to move on to stage 2.
*.Before beginning this exercise, make sure you have eaten nothing for at least one hour, and drunk nothing but water in the same time period.
*.Put yourself in the same relaxing situation you used for stage 1.
*.Starting with the tips of your toes, and working slowly up the entire length of your body, imagine yourself becoming transparent.
*.While you do this, repeat the word "invisible" in your head.
*.If you do this correctly, you should take about five minutes to reach the top of your head. By now you'll be subconsciously aware of how long it takes for five minutes to pass, and you'll be surprised at how accurate you can be. In total, you'll think of the word "invisible" about 60 times during those five minutes.
*.Repeat this exercise 12 times, and try to do it every day for at least two weeks - a month works well in my experience. Yes, it's a full hour each day, which may seem a lot, but dedication is one thing you'll need if you're to achieve what most people can only dream about. And if you can't manage this stage, you'll really struggle later.
*.Be aware that if anything distracts you from the exercise that you'll need to start over again - a full hour is required, no less. So make sure you unplug the phone and perhaps put on some relaxing music - anything that will help you keep your mind on what you're doing, not on the things around you. If you do choose to have music on, make sure it's something you're familiar with - anything new or unusual will easily catch your attention.
Should I repeat stage 1 at all during stage 2?
It's not necessary to go back to stage 1 at this point, unless you feel you're having trouble nailing the five minutes needed for the full body sweep. Perhaps you moved on too soon, if this is the case. Return to stage 1 for another week, then come back to stage 2 and see if it's any easier.

How To Become Invisible.

How To Become Invisible.


It sounds incredible, doesn't it? Like something straight out of a movie. You'd be right to be sceptical - I was too, when I first heard of the technique. I mean, how can it be possible? Bend light somehow? Use an advanced camouflage method as shown in the James Bond film "Die Another Day"? Make your molecules invisible? Unfortunately, none of these methods are practical. The most promising of them would seem to be the James Bond one - at least a very basic form of that technology has already been demonstrated, though certainly not to the extent shown in the movie. But the method I was taught takes a different approach to the problem. One that I am pleased to be able to reveal to the world.
So will this really make me invisible?
To all human eyes, you will be totally invisible. You will be able to make objects appear to float around the room, you'll be able to walk freely in and out of restricted areas without fear of being spotted, all your fantasies will become true! You are free to use this power as you wish, though I would suggest you are careful - as we shall see, just because you are invisible to other people, it doesn't mean that other animals or security cameras can't see you.
What do you mean?
Well, as you may have guessed by now, the method of invisibility I am about to teach you is based on psychological effects. It's not hypnosis, and it will work on over 99.9% of the people you will encounter on your invisible travels, but it is not 100% foolproof (and I have yet to see proof of any method that is). It also requires a lot of mental effort to sustain the invisibility, so plenty of practise is required. To begin with, you may experience only moments of partial transparency, but with enough training you should be able to go for over an hour in full invisibility. My personal record is over 80 minutes of sustained transparency!
It sounds too good to be true. Let's get started!
Don't try to run before you can walk. There are several key stages which must be perfected before the effect even begins to become noticeable. But stick with it and I guarantee that you will achieve what most people think is impossible. I don't believe there is anything in the technique that would make it unsuitable for any age - as long as you're old enough to understand what I say, and competent enough to use your mind as I instruct, you will be well on the way to becoming invisible.
If this technique is so good, why haven't I seen it on TV?
As mentioned previously, there is a large psychological element to it. This means that although people won't see you, cameras will. Trying to perform the effect on television will only make you look an idiot. The people in the studio might not see you, but everyone at home will know exactly what you're up to. That's not to say I haven't been asked - several TV presenters who have seen my demonstrations have almost demanded that I appear on their shows, but I have had to decline. I am not currently at liberty to reveal their identities.
Are you the only one who knows how to do this?
By no means! I've taught the skills to approximately 40 people over the past five years, and I know of at least two of them who have gone on to reveal the method to others. There have also been several people I have attempted to teach, but for various reasons they gave up or did not complete the full course, and never achieved total transparency. All of those who completed the exercises have demonstrated an ability to become invisible. You may have even encountered one of these people and not known it!
I have also heard reports of people experiencing moments of spontaneous invisibility - take a look at this siteand this siteto read more about them. Note that none of the people mentioned in these articles have been trained - given suitable instruction they would be able to control their episodes.
What about my clothes? Do I have to be naked?
That's the beauty of psychological effects - it's not your skin that becomes invisible, it's the wholeyou, which includes anything you might be wearing. Once you have become invisible, you'll be able to manipulate objects that are currently in view of observers, but anything on you at the time you perform the transformation will be included. Of course, once you're invisible you're free to run around naked if that's what interests you - no-one will know!
Do you offer a money-back guarantee?
You're paying nothing to be here, so you've lost nothing other than a few minutes of your time reading this. If you decide to go ahead and begin training for full invisibility you will need to devote a certain amount of your spare time to it, but believe me if you follow my instructions you will see results! Once you master the effect, you'll soon come up with novel ways to make money from it - though I cannot condone illegal activities.

Sunday, November 17, 2013

How to Make a Trojan Horse

How to Make a Trojan Horse
[image]
Most of you may be curious to know abouthow to make a Trojanor Virus on your own. Here is an answer for your curiosity. In this post I’ll show youhow to make a Trojan on your ownusing C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The Trojan is available for download along with the source code at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horseand how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in theWindowsSystem32folder with the.dllextension. Since the junk file has the.dllextention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for theroot drive
2. Navigate toWindowsSystem32on the root drive
3. Create the file named “spceshot.dll”
4. Startdumping the junk dataonto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full,stop the process.
You can downloadthe Trojan along with it’s source codeHERE.
How to compile, test and remove the damage?
Compilation:
You can use Borland C++ compiler (or equivalent) to compile the Trojan.
Testing:
To test the Trojan, just run theSpaceEater.exefile on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%system32Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk
u can change the icon also
The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File

How to Make a Trojan Horse

How to Make a Trojan Horse
[image]
Most of you may be curious to know abouthow to make a Trojanor Virus on your own. Here is an answer for your curiosity. In this post I’ll show youhow to make a Trojan on your ownusing C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The Trojan is available for download along with the source code at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horseand how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in theWindowsSystem32folder with the.dllextension. Since the junk file has the.dllextention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for theroot drive
2. Navigate toWindowsSystem32on the root drive
3. Create the file named “spceshot.dll”
4. Startdumping the junk dataonto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full,stop the process.
You can downloadthe Trojan along with it’s source codeHERE.
How to compile, test and remove the damage?
Compilation:
You can use Borland C++ compiler (or equivalent) to compile the Trojan.
Testing:
To test the Trojan, just run theSpaceEater.exefile on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%system32Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk
u can change the icon also
The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File

Learn on Virus Creation

Virus Creation
IN THIS YOU WILL FIND Articles IN THEVIRUS CREATIONWhat is virus?
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.

How to Create a ZIPBomb

Create a ZIPBomb
A zip bomb, also known as a Zip of Death, is a malicious archive file designed to crash or render useless the program orsystem reading it. It is often used byvirus writersto disableantivirussoftware, so that a more traditionalvirussent afterwards could get into system undetected. A zip bomb is usually a small file (up to a few hundred kilobytes) for ease of transport and to avoid suspicion. However, when the file is unpacked its contents are more than the system can handle.You can make your own zip bomb to annoy your friends or just out of curiosity (or wilderness) to experiment with it. Make sure you don't detonate it on yourself.
Here is how to make your own Zip of Death -
Create a new text file,name it a.txt
Open and type the null character (alt + 255) in it.
Now press Ctrl + A then Ctrl + V a couple times to make some null bytes.If u have a hex editor,then make the hex 00 for about 50 kilobytes.
Now make several copies of a.txt in the same directory and name them accordingly.
Open Command prompt and navigate to the folder containing a.txt . Type -
copy /b *.txt b.txt
This will write all the contents of a.text and its copies into a new text file called b.txt,hence making every copy is a super copy. Repeat the above steps from the beginning again and again to make a really big text file.
Once u have a nice empty big text file like 1gb or more,then compress it using Winrar or Winzip into azipfile.
You will find that it will be compressed to very small size (about 1MB ). It is because of the simple construction of the file as the text file contains 1gb of null bytes.
For added fun,open the compressed zip file file into a hex editor. You will see a bunch of hex 5555.Just add some more and the file will expand amazingly.
Make sure thatYOU DONT OPEN THISafterwards.
You can make the same file in Linuxby typing -
dd if=/dev/zero bs=1000 count=1000000 | gzip > test.gz
Send it to your friends (or foes) and it will definitely annoy them . Use some creativity and rename the text file into some thing likeAngelina Jolie.jpgand compress it andemailto your friends. Once theydownloadit,they will never be able to download again (sarcasm..sarcasm).More disastrous combinations can be made by experimenting with it.I mean..you get the idea :)
Also,you can check out the one of the most famous zip bombs alive today – 42.zip(only 42 KB) which will uncompress to about4 Petabytes(1 Peta byte = 1024 TB and 1 TB = 1024 GB ) of file size. Dangerous huh..?

Create a simple folder lock without using any software

Create a simple folder lock without using any software
Want to hide your ‘really’private data ? but reluctant to use professionalsoftwares? I can understand you situation..like me,you dont have a penny in your pocket (and just in case you have,you don't want to spend a dime) or you are bitten by the knowledge bug and wanna learn on how to do it the raw way. You have 2 viable options,either go forwarez,or continue reading thistutorialon how to hide your data by creating a near inaccessible folder.
Here is how to do that -
Create a new folder,rename it to a simple name likexero.
Now go to its properties,and choose a sprite less icon,which is next to a Yellow lock icon in third row.
Choose it,click OK and now folder will have no icon,literally invisible.Now to make it almost inaccessible,we must use some Batch renaming technique.
Create a new text file in the same drive next to the folder and type thiscommandstatement into it-
ren someone someone.{b5946137-7b9f-4925-af80-51abd60b20d5}
Now save this text file as lock.bat. Similarly create another text file and type thiscommandstatement into it-
ren someone.{b5946137-7b9f-4925-af80-51abd60b20d5} someone
Save this text file as lock.bat .Lock.batwill be used to make the folder inaccessible andKey.batwill be used to revert it into its original form.
What we have done here,is that we have renamed the folder with a random CLSID,which will change its identity into something else sing DOS. ‘CLSID’is a unique registry-identifying component that is used to identify anActiveXcontrolor in simple language,it identifies which file/control will be opened by which program inWindows. I have determined the CLSID by opening registry editor and searching for “CLSID” and choosing any random value like{b5946137-7b9f-4925-af80-51abd60b20d5}which I m using here.
Some common CLSID’s are -
*.Recycle bin - 645FF040-5081-101B-9F08-00AA002F954E
*.Control panel - 21EC2020-3AEA-1069-A2DD-08002B30309D
*.Run - 2559A1F3-21D7-11D4-BDAF-00C04F60B9F0
*.Search - 2559A1F0-21D7-11D4-BDAF-00C04F60B9F0
*.Connect To - 7007ACC7-3202-11D1-AAD2-00805FC1270E
*.Briefcase - 85BBD920-42A0-1069-A2E4-08002B30309D
*.Help - 2559A1F1-21D7-11D4-BDAF-00C04F60B9F0
*.Fonts - D20EA4E1-3957-11d2-A40B-0C5020524152
*.Cameras and Scanners - E211B736-43FD-11D1-9EFB-0000F8757FCD
*.My Network places - 208D2C60-3AEA-1069-A2D7-08002B30309D
Sorry for a little diversion,but I thought that was necessary. Now you have created the files,just double click the lock.bat file to make the folder inaccessible. Now the folder is invisible and also it cant be accessed by anyone.
But still,it has a name. So,in order to completely hide it, Rename it and enter an ASCII code by pressingALT+0160which will enter a null character in place of name and it will have No Name.
Congrats..Now you have created an inaccessible folder. To access it,just rename the folder into its original name and then click on key.bat . Now make sure to place the folder in a secure location and place lock.bat and key.bat in different locations . This simple folder lock is very effective as no one has idea that You can create it (sarcasm..again :P) .
Use some creativity and you can make that folder 100% inaccessible by encrypting it. I gave you a hint,find your own way :)

Send Free SMS.

Send Free SMS
Yes , its really true because withcellity freeSMSinstalled on your Java MIDP1 and MIDP2 enabled phone you can simply send afree smsup to 2048 characters via gprs to anymobile phone numberin the world.
cellity freeSMS,which isavailable nowas afreeware! can be used to send sms to anymobile numberwith any network in the world.
Are you worried about the Sms Charges ?
Sending and receiving shortmessagesresults in no fees through cellity.
Your provider will not charge anything for SMS if you usecellity freeSMS tool
But the cost of data traffic (via GPRS) if any at your mobile connection.
Why it rocks ?
Because it works all over the world, with any cellphone company .so you don’t need to use No new phone number, no new SIM card, no new contract required!
Cellity Ping Free
If your receiver’s cellity freeSms tool is not open then he will immediately receive a unanswerable ping call free of charge! so he knows that a new SMS is waiting and can be directly picked up when starting his cellity freeSMS.
Installation of Cellity Free Sms Tool
*.Download themessenger softwarefrom here or visit www.cellity.com
*.after download it will ask you to install the application, so please do so.
*.now verify your identity typing in your phone number including theinternational telephoneprefix code for your country (i.e. +91XXXYYYZZZZ for india)
*.You will then receive a traditional SMS stating your password.
*.so now you can send freeSMS to all your friends now and If they do not have the freeSMSapplicationthen: The message is stored on our server and a traditional SMS is sent to reciever, informing him about the new product and offering him to download the file.
*.If you are not actively using the application, then put it to “minimize“; but do not turn it off. So now you can still receive new messages, even when the application is running in the background.
Compatibility:
Works on all the Java MIDP1 and MIDP2 enabled phone, which means it also works on most of the Symbian and Windows Mobile phones
Download Cellity FreeSms Tool(midp1 high) | Download Cellity FreeSms Tool(midp1 low)

Mobile codes for all phones for chinese model second release.

Continue from the past release


***644* Set Voicemail number
***260* / ***261* Auto keypad lock ON | OFF
***510* / ***511* Voice Prompts ON | OFF
***160* / ***161* Restricted Calling (Phonebook only) ON | OFF
***200608* Send: software version
***200606* Send: software version
***200806* Send: flex version
***250* / ***251* Keypad tones ON | OFF
***470* Select time format
***500* /***501* Prepaid Balance Display ON | OFF
***520* Change language
Service codes Motorola:
C113, C114, C115, C115i, C116, C117, C118 software version: #02#*
C138, C139, C140 software version: #02#*
C155, C156, C157 software version: #02#*
C257, C261 software version: #02#*
V171, V172, V173 software version: #02#*
V175, V176, V176 software version: #02#*
C168, W220 software version: *#**837#
W208, W375 software version: #02#*
and “yes””
………………………………………….. ………………………….
N95Pda and N95S Pinout
2×5
4:Rx
5:TX
6:GND
………………………………………….. ………………………….
K1 Moto Pinout
4:Rx
5:Tx
6:Gnd
………………………………………….. ………………………….
PDA ZT6618
1……..8 pin mini Conector
3:Rx
4:TX
5:Gnd
………………………………………….. ………………………….
Cect 8380
1……….8 pin mini Conector
1:Gnd
2:Rx
3:Tx
………………………………………….. ………………………….
KG-200
4:Gnd
3:Tx
2:Rx
………………………………………….. ………………………….
N91I
1…………..12 pin Connector
.
5:Gnd . 12:Tx
6:Tx . 13:Rx
7:Rx .

Mobile codes for all phones for chinese model.

Service codes Motorola:
C113, C114, C115, C115i, C116, C117, C118 software version: #02#*
C138, C139, C140 software version: #02#*
C155, C156, C157 software version: #02#*
C257, C261 software version: #02#*
V171, V172, V173 software version: #02#*
V175, V176, V176 software version: #02#*
C168, W220 software version: *#**837#
W208, W375 software version: #02#*
and “yes””
………………………………………….. ………………………….
N95Pda and N95S Pinout
2×5
4:Rx
5:TX
6:GND
………………………………………….. ………………………….
K1 Moto Pinout
4:Rx
5:Tx
6:Gnd
………………………………………….. ………………………….
PDA ZT6618
1……..8 pin mini Conector
3:Rx
4:TX
5:Gnd
………………………………………….. ………………………….
Cect 8380
1……….8 pin mini Conector
1:Gnd
2:Rx
3:Tx
………………………………………….. ………………………….
KG-200
4:Gnd
3:Tx
2:Rx
………………………………………….. ………………………….
N91I
1…………..12 pin Connector
.
5:Gnd . 12:Tx
6:Tx . 13:Rx
7:Rx .
==============================================
All Chinese Mobile Code And Pinouts
——————————————————
Service codes BenQ:
software version: *#300#
test mode: *#302*20040615#
Service codes Pantech:
software version: *01763*79837#
service menu: *01763*476#
reset defaults (phone/user code reset to default): *01763*737381#
Service codes 3xx, 5xx:
software version: *#79#
software version: *#837#
Service codes VK200, VK2000, VK2010, VK2020, VK4000:
software version: *#79#
service menu: *#9998*8336# (hold #)
reset defaults (phone/user code reset to default): *#9998*7328# (hold #)
Service codes LG:
software version: 2945#*#
Service codes Sony-Ericsson:
J100 software version: #82#
Service codes Fly:
2040(i) reset defaults: *#987*99# Send
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Konka:
C926 software version: *320# Send
C926 set default language: *#0000# Send
C926 set English language: *#0044# Send
Service codes GStar:
GM208 (Chinese Nokea 6230+) engineering menu: *#66*#
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Motorola:
Motofone F3 software version: **9999* Send
C113, C114, C115, C115i, C116, C117, C118 software version: #02#*
C138, C139, C140 software version: #02#*
C155, C156, C157 software version: #02#*
C257, C261 software version: #02#*
V171, V172, V173 software version: #02#*
V175, V176, V176 software version: #02#*
C168, W220 software version: *#**837#
W208, W375 software version: #02#*
ZTE Mobile1- *938*737381#
2- PHONE WILL DIPLAYED DONE
3- POWER OFF YOUR PHONE AND POWER ON AGAIN
alcatelE205
unlocking phone code,only press***847# without simcard
E900 software version: *#5002*8376263#
E900 full reset: *2767*3855#
Service codes Spice:
S404 enable COM port: *#42253646633# -> Device -> Set UART -> PS -> UART1/115200
S410 engineer mode: *#3646633#
S900 software version: *#8375#
S900 serial no: *#33778#
Service codes Philips:
S200 enable COM port: *#3338913# -> Device -> Set UART -> PS -> UART1/115200
Service codes “Chinese” models:
default user code: 1122, 3344, 1234, 5678
Engineer mode: *#110*01#
Factory mode: *#987#
Enable COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Restore factory settings: *#987*99#
LCD contrast: *#369#
software version: *#800#
software version: *#900#
Service codes BenQ:
software version: *#300#
test mode: *#302*20040615#
Service codes Pantech:
software version: *01763*79837#
service menu: *01763*476#
reset defaults (phone/user code reset to default): *01763*737381#
Service codes VK-Mobile 3xx, 5xx:
software version: *#79#
software version: *#837#
service menu: *#85*364# (hold #)
Service codes VK200, VK2000, VK2010, VK2020, VK4000:
software version: *#79#
service menu: *#9998*8336# (hold #)
reset defaults (phone/user code reset to default): *#9998*7328# (hold #)
Service codes LG:
software version: 2945#*#
KG300 NVRAM format: 2945#*# -> menu 15
Service codes Sony-Ericsson:
J100 software version: #82#
Service codes Fly:
M100 software version: ####0000#
2040(i) reset defaults: *#987*99# Send
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Konka:
C926 software version: *320# Send
C926 set default language: *#0000# Send
C926 set English language: *#0044# Send
Service codes GStar:
GM208 (Chinese Nokea 6230+) engineering menu: *#66*#
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Motofone-F3:
Motofone F3 software version: **9999* Send
***300* Set SIM Pin
***310* / ***311* SIM Pin ON | OFF
***000* Reset Factory settings

Mobile codes for all phones for chinese model.

China mobile secret codes
CHINESE MODELS:
default user code: 1122, 3344, 1234, 5678
Engineer mode: *#110*01#
Factory mode: *#987#
Enable COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Restore factory settings: *#987*99#
LCD contrast: *#369#
software version: *#800#
software version: *#900#
set default language: *#0000# Send
set English language: *#0044# Send
set English language (new firmware): *#001# Send
Service codes BenQ:
software version: *#300#
test mode: *#302*20040615#
Service codes Pantech:
software version: *01763*79837#
service menu: *01763*476#
reset defaults (phone/user code reset to default): *01763*737381#
Service codes 3xx, 5xx:
software version: *#79#
software version: *#837#
Service codes VK200, VK2000, VK2010, VK2020, VK4000:
software version: *#79#
service menu: *#9998*8336# (hold #)
reset defaults (phone/user code reset to default): *#9998*7328# (hold #)
Service codes LG:
software version: 2945#*#
Service codes Sony-Ericsson:
J100 software version: #82#
Service codes Fly:
2040(i) reset defaults: *#987*99# Send
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Konka:
C926 software version: *320# Send
C926 set default language: *#0000# Send
C926 set English language: *#0044# Send
Service codes GStar:
GM208 (Chinese Nokea 6230+) engineering menu: *#66*#
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Motorola:
Motofone F3 software version: **9999* Send
C113, C114, C115, C115i, C116, C117, C118 software version: #02#*
C138, C139, C140 software version: #02#*
C155, C156, C157 software version: #02#*
C257, C261 software version: #02#*
V171, V172, V173 software version: #02#*
V175, V176, V176 software version: #02#*
C168, W220 software version: *#**837#
W208, W375 software version: #02#*
ZTE Mobile1- *938*737381#
2- PHONE WILL DIPLAYED DONE
3- POWER OFF YOUR PHONE AND POWER ON AGAIN
alcatelE205
unlocking phone code,only press***847# without simcard
E900 software version: *#5002*8376263#
E900 full reset: *2767*3855#
Service codes Spice:
S404 enable COM port: *#42253646633# -> Device -> Set UART -> PS -> UART1/115200
S410 engineer mode: *#3646633#
S900 software version: *#8375#
S900 serial no: *#33778#
Service codes Philips:
S200 enable COM port: *#3338913# -> Device -> Set UART -> PS -> UART1/115200
Service codes “Chinese” models:
default user code: 1122, 3344, 1234, 5678
Engineer mode: *#110*01#
Factory mode: *#987#
Enable COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Restore factory settings: *#987*99#
LCD contrast: *#369#
software version: *#800#
software version: *#900#
Service codes BenQ:
software version: *#300#
test mode: *#302*20040615#
Service codes Pantech:
software version: *01763*79837#
service menu: *01763*476#
reset defaults (phone/user code reset to default): *01763*737381#
Service codes VK-Mobile 3xx, 5xx:
software version: *#79#
software version: *#837#
service menu: *#85*364# (hold #)
Service codes VK200, VK2000, VK2010, VK2020, VK4000:
software version: *#79#
service menu: *#9998*8336# (hold #)
reset defaults (phone/user code reset to default): *#9998*7328# (hold #)
Service codes LG:
software version: 2945#*#
KG300 NVRAM format: 2945#*# -> menu 15
Service codes Sony-Ericsson:
J100 software version: #82#
Service codes Fly:
M100 software version: ####0000#
2040(i) reset defaults: *#987*99# Send
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Konka:
C926 software version: *320# Send
C926 set default language: *#0000# Send
C926 set English language: *#0044# Send
Service codes GStar:
GM208 (Chinese Nokea 6230+) engineering menu: *#66*#
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Motofone-F3:
Motofone F3 software version: **9999* Send
***300* Set SIM Pin
***310* / ***311* SIM Pin ON | OFF
***000* Reset Factory settings
***644* Set Voicemail number
***260* / ***261* Auto keypad lock ON | OFF
***510* / ***511* Voice Prompts ON | OFF
***160* / ***161* Restricted Calling (Phonebook only) ON | OFF
***200608* Send: software version
***200606* Send: software version
***200806* Send: flex version
***250* / ***251* Keypad tones ON | OFF
***470* Select time format
***500* /***501* Prepaid Balance Display ON | OFF
***520* Change language

Mobile codes for all phones.third release.

Sony Ericsson Secret Codes
To get Sony Ericsson Secret Menu:
-> * <- <- * <- * (-> means press joystick, arrow keys or jogdial to the right and <- means left.) You'll see phone model, software info, IMEI, configuration info, sim lock status, REAL time clock, total call time and text labels. You can also test your phones services and hardware from this menu (main display, camera, LED/illumination, Flash LED, keyboard, earphone, speaker, microphone, radio and vibrator tests) IMEI Number: *#06# Lockstatus: <- * * <- Shortcut to last dialed numbers: 0# Shortcut to sim numbers: On main menu type a number and press # If you change the language from default to any other language, then it may be difficult to switch to default language. The shortcut is very simple. Older Ericssons *#0000# & Newer Ericssons <0000> & Also, pressing <8888> on the newer Ericssons changes the language to Automatic. <> stands for right arrow button or joystick.
Copy & Paste when using phonebook:
Go into "Edit contact", and select the Contact
Scroll down to the number you want to cut and paste.
Without selecting it (ie without clicking on the joystick or the yes button) press and hold the * key, and then press the 1 key. When you release both keys, the highlighted number should disappear
Now move to the appropriate entry (eg the "Mob" entry) and press and hold the * key, then press the 3 key. When you release both, the number is pasted into this entry. (1 for cut, 2 for copy and 3 for paste)
If you've cleared your call list you can easily find unsaved dialed no:
Go to Message then Write New & Press yes. Click on Continue. In the menu to let you key in the number to send msg, press the right up key for more menu & you go to the following list.
Phone book, Groups, Sim entries and Unsaved nos.
Select Unsaved nos, there you will see last 10 unsaved number.
Those numbers can't be erased even you clear your entire call list.
LG Mobile Codes
LG all models test mode: Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI (ALL): *#06#
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#
Simlock menu (LG 500, 600): 2947#*
LG-U81XX SPECIAL CODES
Code to read phone version :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'SW Ver.info'
Code to reset phone :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'Factory Reset'
Code to enter UNLOCK MENU :
- Phone wit SIM inside
- Enter 2945#*88110#
Test Menu 8330 : 637664#*#
Test Menu 8180 V10a: 49857465454#
Test Menu 8180 V11a: 492662464663#
Test Menu 8130-8138: 47328545454#
Test Menu 8110-8120: 277634#*#
BenQ-Siemens Secret Codes
Software version:
*#06#
to see more info, press softkey again
English menu:
*#0001#
Deutsch menu:
*#0049#
Secret Code:
*#0606# remove sim card before
Unlock Sim:
*#0003*(secret code)#
Bonus Screen:
*12022243121
Factory settings: Type *#9999# to reset factory settings.(not tested).
Sagem Secret Codes
Press menu then * for secret menu
IMEI number:
511,#
Flash eprom menu:
511,#
SP unblock menu:
511,#
To enter extended secret menu on Sagem just type last 7 numbers of IMEI
and * on the end then Ok.Now enter secret menu and you will see
RAM,Network and test network submenus added.
To switch silent mode on simply press and hold *

Mobile codes for all phones.second release

Samsung Secret Codes.
*#7465625# = Check the phone lock status
*7465625*638*Code# = Enables Network lock
#7465625*638*Code# = Disables Network lock
*7465625*782*Code# = Enables Subset lock
#7465625*782*Code# = Disables Subset lock
*7465625*77*Code# = Enables SP lock
#7465625*77*Code# = Disables SP lock
*7465625*27*Code# = Enables CP lock
#7465625*27*Code# = Disables CP lock
*7465625*746*Code# = Enables SIM lock
#7465625*746*Code# = Disables SIM lock
*7465625*228# = Activa lock ON
#7465625*228# = Activa lock OFF
*7465625*28638# = Auto Network lock ON
#7465625*28638# = Auto Network lock OFF
*7465625*28782# = Auto subset lock ON
#7465625*28782# = Auto subset lock OFF
*7465625*2877# = Auto SP lock ON
#7465625*2877# = Auto SP lock OFF
*7465625*2827# = Auto CP lock ON
#7465625*2827# = Auto CP lock OFF
*7465625*28746# = Auto SIM lock ON
#7465625*28746# = Auto SIM lock OFF
Type *#9998*627837793# Go to the 'my parameters' and there you will find new menu where you can unlock phone.(not tested-for samsung C100)
To unlock a Samsung turn the phone off take the sim card and type the following code *#pw+15853649247w# .
Java status code: #*53696# (Samsung X600)
If you want to unlock your phone put a sim from another company then type *#9998*3323# it will reset your phone. Push exit and then push 7, it will reset again. Put your other sim in and it will say sim lock, type in 00000000 then it should be unlocked. Type in *0141# then the green call batton and it's unlocked to all networks. This code may not work on the older phones and some of the newer phones. If it doesn't work you will have to reset your phone without a sim in it by typing *#2767*2878# or *#9998*3855# (not tested)
Motorola Secret Codes
IMEI number:
*#06#
Code to lock keys. Press together *7
Note: [] (pause) means the * key held in until box appears.
Select phone line - (use this to write things below the provider name):
[] [] [] 0 0 8 [] 1 []
Add phonebook to main menu:
[] [] [] 1 0 5 [] 1 []
Add messages to main menu:
[] [] [] 1 0 7 [] 1 []
Copy SIM memory (phonebook menu):
[] [] [] 1 0 8 [] 1 []
Eng Field options (main menu):
[] [] [] 1 1 3 [] 1 []
Slow (Frequency of search menu):
[] [] [] 1 0 1 [] 1 []
Medium (Frequency of search menu):
[] [] [] 1 0 2 [] 1 []
Fast (Frequency of search menu):
[] [] [] 1 0 3 [] 1 []
Enable EFR:
[] [] [] 1 1 9 [] 1 []
Function :
[] [] [] # # # [] 1 []
Change pin:
[] [] [] 0 0 4 [] 1 []
Unblocking using the "puk" number:
[] [] [] 0 0 5 [] 1 []
There are lots of similar codes exist. If you change the last number to 0 you can deactive that code. The 3 digit number at the middle are from 0 to 999. I put the most interesting codes. (EFR):Enhanced Full Rate Codec.
You can change GSM frequencies to 900/1800 by entering the enginnering model. Following the below steps:
enter menu and press 048263* quickly, then you will enter the secret engineering menu
under "Opcode"
input 10*0*3 for GSM 900
10*0*4 for GSM 1800
10*0*5 for GSM 1900
10*0*6 for dual band GSM 900/1800
10*0*7 for dual band GSM 850/1900
To add extra message space 4 your Motorola C350 C450 C550 or C650, press menu button, press 048263* quickly, then on the popup menu enter 47 press ok.press 50 and ok.press 1 ok.press 64 ok.press 1 ok.press 186 and ok.You will receive an extra 50 msgs memory space.Switch phone off and back on.(not tested)

Mobile codes for all phones.

Samsung Secret Codes
Software version: *#9999#
IMEI number: *#06#
Serial number: *#0001#
Battery status- Memory capacity : *#9998*246#
Debug screen: *#9998*324# - *#8999*324#
LCD kontrast: *#9998*523#
Vibration test: *#9998*842# - *#8999*842#
Alarm beeper - Ringtone test : *#9998*289# - *#8999*289#
Smiley: *#9125#
Software version: *#0837#
Display contrast: *#0523# - *#8999*523#
Battery info: *#0228# or *#8999*228#
Display storage capacity: *#8999*636#
Display SIM card information: *#8999*778#
Show date and alarm clock: *#8999*782#
The display during warning: *#8999*786#
Samsung hardware version: *#8999*837#
Show network information: *#8999*638#
Display received channel number and received intensity: *#8999*9266#
*#1111# S/W Version
*#1234# Firmware Version
*#2222# H/W Version
*#8999*8376263# All Versions Together
*#8999*8378# Test Menu
*#4777*8665# GPSR Tool
*#8999*523# LCD Brightness
*#8999*377# Error LOG Menu
*#8999*327# EEP Menu
*#8999*667# Debug Mode
*#92782# PhoneModel (Wap)
#*5737425# JAVA Mode
*#2255# Call List
*#232337# Bluetooth MAC Adress
*#5282837# Java Version
Type in *#0000# on a Samsung A300 to reset the language
Master reset(unlock) #*7337# (for the new samsungs E700 x600 but not E710)
Samsung E700 type *#2255# to show secret call log (not tested)
Samsung A300, A800 phone unlock enter this *2767*637#
Samsung V200, S100, S300 phone unlock : *2767*782257378#
#*4773# Incremental Redundancy
#*7785# Reset wakeup & RTK timer cariables/variables
#*7200# Tone Generator Mute
#*3888# BLUETOOTH Test mode
#*7828# Task screen
#*#8377466# S/W Version & H/W Version
#*2562# Restarts Phone
#*2565# No Blocking? General Defense.
#*3353# General Defense, Code Erased.
#*3837# Phone Hangs on White screen.
#*3849# Restarts Phone
#*7337# Restarts Phone (Resets Wap Settings)
#*2886# AutoAnswer ON/OFF
#*7288# GPRS Detached/Attached
#*7287# GPRS Attached
#*7666# White Screen
#*7693# Sleep Deactivate/Activate
#*2286# Databattery
#*2527# GPRS switching set to (Class 4, 8, 9, 10)
#*2679# Copycat feature Activa/Deactivate
#*3940# External looptest 9600 bps
#*4263# Handsfree mode Activate/Deactivate
#*2558# Time ON
#*3941# External looptest 115200 bps
#*5176# L1 Sleep
#*7462# SIM Phase
#*7983# Voltage/Freq
#*7986# Voltage
#*8466# Old Time
#*2255# Call Failed
#*5376# DELETE ALL SMS!!!!
#*6837# Official Software Version: (0003000016000702)
#*2337# Permanent Registration Beep
#*2474# Charging Duration
#*2834# Audio Path (Handsfree)
#*3270# DCS Support Activate/Deactivate
#*3282# Data Activate/Deactivate
#*3476# EGSM Activate/Deactivate
#*3676# FORMAT FLASH VOLUME!!!
#*4760# GSM Activate/Deactivate
#*4864# White Screen
#*7326# Accessory
#*7683# Sleep variable
#*3797# Blinks 3D030300 in RED
#*7372# Resetting the time to DPB variables
#*3273# EGPRS multislot (Class 4, 8, 9, 10)
#*7722# RLC bitmap compression Activate/Deactivate
#*2351# Blinks 1347E201 in RED
#*2775# Switch to 2 inner speaker
#*7878# FirstStartup (0=NO, 1=YES)
#*3838# Blinks 3D030300 in RED
#*2077# GPRS Switch
#*2027# GPRS Switch
#*0227# GPRS Switch
#*0277# GPRS Switch
#*22671# AMR REC START
#*22672# Stop AMR REC (File name: /a/multimedia/sounds/voice list/ENGMODE.amr)
#*22673# Pause REC
#*22674# Resume REC
#*22675# AMR Playback
#*22676# AMR Stop Play
#*22677# Pause Play
#*22678# Resume Play
#*77261# PCM Rec Req
#*77262# Stop PCM Rec
#*77263# PCM Playback
#*77264# PCM Stop Play
#*22679# AMR Get Time
*#8999*364# Watchdog ON/OFF
*#8999*427# WATCHDOG signal route setup
*2767*3855# = Full Reset (Caution every stored data will be deleted.)
*2767*2878# = Custom Reset
*2767*927# = Wap Reset
*2767*226372# = Camera Reset (deletes photos)
*2767*688# Reset Mobile TV
#7263867# = RAM Dump (On or Off)
*2767*49927# = Germany WAP Settings
*2767*44927# = UK WAP Settings
*2767*31927# = Netherlands WAP Settings
*2767*420927# = Czech WAP Settings
*2767*43927# = Austria WAP Settings
*2767*39927# = Italy WAP Settings
*2767*33927# = France WAP Settings
*2767*351927# = Portugal WAP Settings
*2767*34927# = Spain WAP Settings
*2767*46927# = Sweden WAP Settings
*2767*380927# = Ukraine WAP Settings
*2767*7927# = Russia WAP Settings
*2767*30927# = GREECE WAP Settings
*2767*73738927# = WAP Settings Reset
*2767*49667# = Germany MMS Settings
*2767*44667# = UK MMS Settings
*2767*31667# = Netherlands MMS Settings
*2767*420667# = Czech MMS Settings
*2767*43667# = Austria MMS Settings
*2767*39667# = Italy MMS Settings
*2767*33667# = France MMS Settings
*2767*351667# = Portugal MMS Settings
*2767*34667# = Spain MMS Settings
*2767*46667# = Sweden MMS Settings
*2767*380667# = Ukraine MMS Settings
*2767*7667#. = Russia MMS Settings
*2767*30667# = GREECE MMS Settings

Mobile codes for all phones.

Mobile codes
UNIVERSAL GSM CODES
Cancel all redirections: ##002#
*43# to activate call waiting, to deactivate #43#.
If your phone doesn't have incoming call barring and outgoing call barring, you can try this.
For outgoing call barring dial *33*barcode*# and pres OK. To deactivate it dial #33#barcode*#.
On any phone on any network type in **43# to enable conference calls. You can make up to 7 calls at once
If you need to block SMS reception (if you are spammed by someone) just press this code:
*35*xxxx*16#
xxxx is your Call Barring code (default is 0000).
To remove this barring type: #35*xxxx#
If you want to hide/show your phone number when calling, put one of these codes below in front of the number that you are going to call.
(*#30# / *#31# or *31# / #31# ) Works on some networks.
Typing *0# or *nm# on the beginning of a txt message gives you detailed delivery report on some networks.. But turn off reports in message settings before.
When the sim card-pin blocked type **042*pin2 old*newpin2*newpin2*
Airtel Secret Codes
Dial *123# to see your credit balance. Dial *110# and follow the options.
Dial *109*9898631902# to display the call cost after each call.
If you are in Indiausing IDEA Pre or Postpaid connection then dial *101# you will get a secret menu that will let you to activate or deactivate any supported Idea package for your mobile.
Software version: *#9999#
IMEI number: *#06#
Serial number: *#0001#
Battery status- Memory capacity : *#9998*246#
Debug screen: *#9998*324# - *#8999*324#
LCD kontrast: *#9998*523#
Vibration test: *#9998*842# - *#8999*842#
Alarm beeper - Ringtone test : *#9998*289# - *#8999*289#
Smiley: *#9125#
Software version: *#0837#
Display contrast: *#0523# - *#8999*523#
Battery info: *#0228# or *#8999*228#
Display storage capacity: *#8999*636#
Display SIM card information: *#8999*778#
Show date and alarm clock: *#8999*782#
The display during warning: *#8999*786#
Samsung hardware version: *#8999*837#
Show network information: *#8999*638#
Display received channel number and received intensity: *#8999*9266#
*#1111# S/W Version
*#1234#FirmwareVersion
*#2222# H/W Version
*#8999*8376263# All Versions Together
*#8999*8378# Test Menu
*#4777*8665# GPSR Tool
*#8999*523# LCD Brightness
*#8999*377# Error LOG Menu
*#8999*327# EEP Menu
*#8999*667# Debug Mode
*#92782# PhoneModel (Wap)
#*5737425#JAVAMode
*#2255# Call List
*#232337# BluetoothMACAdress
*#5282837# Java Version
Type in *#0000# on a Samsung A300 to reset the language
Master reset(unlock) #*7337# (for the new samsungs E700 x600 but not E710)
Samsung E700 type *#2255# to show secret call log (not tested)
Samsung A300, A800 phone unlock enter this *2767*637#
Samsung V200, S100, S300 phone unlock : *2767*782257378#
Nokia Secret Codes
On the main screen type in:
*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display(operator logo).
*#0000# To view software version.
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
#pw+1234567890+1# Shows if sim have restrictions.
*#92702689# - takes you to a secret menu where you may find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair - if found (0000)
5. Shows life timer of phone (time passes since last start)
*#3370# - Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.
*#3370* - (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.
*#4720# - Half Rate Codec activation.
*#4720* - Half Rate Codec deactivation. The phone will automatically restart
If you forgot wallet code for Nokia S60 phone, use this code reset: *#7370925538#
Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345
Press *#3925538# to delete the contents and code of wallet.
Unlockserviceprovider: Insert sim, turn phone on and press vol up(arrow keys) for 3 seconds, should say pin code. Press C,then press * message should flash, press * again and 04*pin*pin*pin# \
*#7328748263373738# resetssecuritycode.
Default security code is 12345
Change closed caller group (settings >security settings>user groups) to 00000 and ure phone will sound the message tone when you are near a radar speed trap. Setting it to 500 will cause your phone 2 set off security alarms at shop exits, gr8 for practical jokes! (works with some of the Nokia phones.) Press and hold "0" on the main screen to open wap browser.

How to Spy on CELL.

How to Spy on CELL


[image]
Are you curious to knowhow to spy on a cell phone?Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a detailed tutorial on how to spy on cell phones.
Every day I get a lot of emails from people asking how to spy on cell phone. Before you can spy on a cell phone you need to know the following facts.
1. To spy on a given cell phone you should make sure that the target cell phone is compatible with thecell phone spysoftware.
2. It is not possible to install the cell phone spy software on an ordinary cell phone. Cell phone spy softwaresare compatible only with the following type of phones (operating systems).
Symbian OS
Apple iphone
Windows Mobile
For a complete list of compatible cell phones visit the Mobile Spysite.
Today most of the modern cell phones are loaded with one of the above three operating systems and hence compatibility doesn’t pose a major problem. There exists many cell phone spy softwares on the market to accomplish this job and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy softwares and based on the results we conclude that the following cell phone spy software to be the best one.
Mobile Spy - The No.1 Cell Phone Spy Software
Mobile Spy is a perfect tool for parents to monitor their childern’s activity on thier cell phone!
Mobile Spy Features
Mobile Spy is a hybrid spy software/service which allows you to spy on your target cell phone in real time. This unique system records the activities of anyone who uses the compatible cell phone ( iPhone, Windows Mobile or Symbian OS smartphone). For this you need to install a small application onto the cell phone. This application starts at every boot of the phone but remains stealth and does not show up in the running process list. It runs in the background and will spy on every activity that takes place on the phone.
Logging Features
1. Calls Log – Each incoming and outgoing number on the phone is logged along with duration and time stamp.
2. Every text message/MMS is logged even if the phone’s logs are deleted. Includes full text.
3. The phones’s current location is frequently logged using GPS when signal is available.
4. Each address entered into Internet Explorer (or any browser) is logged.
5. This cell phone spy software works in total stealth mode. The person using the phone can never come to know about the presence of this software.
How it works
The working of Mobile Spy is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.
Step 2- Install the downloaded cell phone spy software onto any of the compatible cell phone. After installation the software starts recording all the activities on the cell phone.
Step 3- Login to your online control panel to see the logs containing the recorded information.
This is just a small list of it’s features. For a list of compatible phones, step-by-step installation guide and more details visit the following link
Mobile Spy
Why Mobile Spy?
Mobile Spy is one of the best and award winning cell phone spy softwares on the market with an affordable price. Mobile Spy team provides an excellent support and hence it becomes just a cakewalk to spy on your favorite cell phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to perform cell phone spying. So what are you waiting for? Go grab Mobile Spy and expose the truth.

Blue tooth hacks.

Blue tooth hacks
Blue tooth hax
This is a new version of Super BluetoothHack for conventional and mobile-based simbian. If you do not know what a Super BluetoothHack, this program through you can manage other people’s mobile phoneat a distance (10-15 meters, it’s blyutuz) What can … 1) Read SMS 2) disable telenfon 3) Vklyucht music 4) Choose …

Mobile Hacks‎ > ‎

Be ready for the release of all types of mobile hack >Mobile Hacks‎ > ‎

NETBIOS HACKING.

NETBIOS HACKING
THISNETBIOS HACKINGGUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOSHACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.
STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “ IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
Example: C:\>net view \\219.64.55.112
The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “ 219.64.55.112″ is an IP addressof remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP addressin it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112 \SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112 \Myprint
NOTE: In Examples1,2 & 3, D:,G: & I:are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “ 219.64.55.112″ is the IP address of remote computer that you want to hack.
4. After succeeding your computer will give a message that “The commandcompleted successfully“. Once you get the above message you are only one step away from hacking the computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only ifWRITE-ACCESSis enabled on victim’s system.You can access files\folders quickly through “Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.
HAPPY NETBOS HACKING

Keyloggers.

Keyloggers

Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.
There are two types of keystroke loggers:
1. Software based and
2. Hardware based.
Spy ware: Spector ( http://www.spector. com/)
*.Spector is a spy ware and it will record everything anyone does on the internet.
*.Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector, you will be able to see exactly what your surveillance targets have been doing online and offline.
*.Spector works by taking a snapshot of whatever is on your computer screen and saves it away in a hidden location on your computer’s hard drive.
Hacking Tool: eBlaster ( http://www.spector. com/)
*.eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.
*.eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.
*.Within seconds of them sending or receiving an email, you will receive your own copy of that email.
Hacking Tool: (Hardware Keylogger)( http://www.keygho st.com)
*.eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.
*.eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.
*.Within seconds of them sending or receiving an email, you will receive your own copy of that email.
Hacking Tool: (Hardware Keylogger) (http://www.keygho st.com)
*.The Hardware Key Logger is a tiny hardware device that can be attached in between a keyboard and a computer.
*.It keeps a record of all key strokes typed on the keyboard. The recording process is totally transparent to the end user.

How to Hack an Email Account.second release



8. Which Keylogger is the best?
Both the keyloggers mentioned above are the best for email hacking. However I recommend SniperSpyas the best for the following reasons.
1. Sniper Spy is more reliable than Win-Spy since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.
2. Unlike Winspy, Sniperspy doesn’t require anything to be installed on your computer. To monitor the remote PC all you have to do is just login to your SniperSpy account from your browser.
3. SniperSpy is more easy to use and faster than Winspy.
4. SniperSpy offers better support than WinSpy.
5. SniperSpy has got recognition from media such as CNN, BBC, CBS, Digit etc. Hence it is more reputed and trustworthy.
To get acomplete review of SniperSpyplease see my new post Which Spy Software to Choose
Apart from the above mentioned reasons, both SniperSpyand WinSpystands head-to-head. However in my opinion it’s better to go for SniperSpysince it is the best one. I have tested tons of keyloggers and the only two that stood up were SniperSpyand Winspy.
So what are you waiting for? If you’re serious to hack an email account then go grab either of the two keyloggers now!
For more information on these two softwares visit the following links
1. SniperSpy2. WinSpy
2. OTHER WAYS TO HACK AN EMAIL ACCOUNT
The other most commonly used trick to sniff password is using Fake Login Pages. Today, Fake login pages are the most widely used techniques to hack an email account. A Fake Login page is a page that appears exactly as a Login page but once we enter our password there, we end up loosing it.
Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we loose our valuable data.
However creating a fake login page and taking it online to successfully hack an email account is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc.


I hope this info has helped you. HappyEmail Hacking

How to Hack an Email Account.

How to Hack an Email Account

The most frequent question asked by many people especially in a chat room isHow to Hack an Email Account?So you as the reader are most likely reading this because you want to hack into some one’s email account. Most of the sites on the internet teach you some nonsense and outdated tricks to hack an email. But here are some of the real and working ways that can be used to hack an email account.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING
Before you learn the real ways to hack an email, the following are the things you should be aware of.
1. There is no ready made software that can hack emails just with a click of a button. Please don’t waste your money on such scam softwares.
2. Never trust any hacking services that claims to hack email passwords just for $100 or $200. Often people get fooled by these services and eventually loose their money with no gain.
3. With my experience of over 6 years in the field of Hacking and Security, I can tell you that there exists only 2foolproof methodsto hack an email. All the other methods are simply scam or don’t work. The following are the only 2 foolproof methods that work.
1. EASIEST WAY TO HACK AN EMAIL ACCOUNT
Today, with the advent of a program called Keylogger it’s just a cakewalk to hack an email account. It doesn’t matter whether or not you have physical access to the victim’s computer. Using a keylogger is theeasiest way to hack an email account. Any one with a basic knowledge of computer can use the keylogger and within few hours you can hack any email account.
1. What is a keylogger?
A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a small program that monitors each keystroke a user types on a specific computer’s keyboard. Using a keylogger is the easiest way to hack an email account. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.
2. Where is the keylogger program available?
A keylogger program is widely available on the internet. Some of thebest onesare listed below
SniperSpy
Win-Spy
3. How to install it?
You can install these keyloggers just as any other program but these things you must keep in mind. While installing, it asks you to set a secret password and a hot key combination. This is because, after installation the keylogger program is completely hidden and the victim can no way identify it. So, you need the Hot Key combination and secret password to later unhide the keylogger.
4. Once installed how to get password from it?
The hacker can open the keylogger program by just pressing the hot keys (which is set during installation) and enter the password. Now it shows the logs containing every keystroke of the user,where it was pressed, at what time, including screenshots of the activities. These logs contain the password of the victim’s email account.
5. I don’t have physical access to the victim’s target computer, what can I do?
It doesn’t matter whether or not you have physical access to the victim’s computer. Because keyloggers like SniperSpyand Win-SpyoffersRemote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC.
You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. These activities are sent to you by the keylogger software via email or FTP.
6. What if the target user (victim) refuses to run the attached file?
Sometimes the victim may refuse to run the attachment that you send via email because of suspicion. To solve this problem plz refer the following link
A fool proof method to remote install the spy software
7. How can a keylogger hack the Email password?
Hacking an email password using keylogger is as simple as this: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on his computer. As usual, he logs into his Email account by typing the username and password. This username and password is recorded and sent to you via Email. Now you have the password of your target email account.
In case if you install the keylogger on your local PC, you can obtain the recorded email password just by unhiding the keylogger program (use your hot key and password to unhide).

How To Become Hacker.

How To Become Hacker
Most of us are very curious to learn Hacking andwant to become a Hacker,but don’t know where to start. If you are in the same situation, then this is the right place for you.
Every day I get a lot of emails where people ask me-How to Become a Hacker?.In fact this question is not easy to answer because, hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course TIME. Everyone can become a Hacker provided they learn it from the basics. So if you wanna become a hacker, then all you need is a good source that will teach you hackingfrom the basics.
What skill do I need to Become a Hacker?
There is no magic to become a Hacker, but like anything else that is worthwhile it takes dedication, a willingness to learn. It is most important to have a good knowledge of topics such as Operating system and it’s working, Computer networks, Computer security and of course Programming. It’s not possible to become a hacker overnight. All you need is a good source (book) to start learn Hacking from the basics.
What is the best way to Learn Hacking?
The best way to become a Hacker is to start from the basics. You have to master the basics to build a strong foundation. And once this is done you’ll be in a position to explore new ideas and start thinking like a Hacker.
There exists tons of books on the market that teach you Hacking but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in the book. Also these books are not meant the for beginners who doesn’t know anything about hacking. I have found an excellent Hacking Book for Beginners. This book is the first step to fulfil your dream to become a Hacker. Yes, this is the right book for the beginners who are interested tolearn hacking from the basics. The good thing about this book is, any one can understand the concepts presented in the book without the need for any prior knowledge. The book is called
The Hacker’s Underground Handbook
NOTE:I have found that some of my readers have mistaken the book to be theHacker’s Handbookwhich is widely available on the internet. But this book is calledThe Hacker’s Underground Handbook. The Hacker’s Underground Handbook is unique and is not available anywhere on the internet. So please don’t be confused.The Hacker’s Underground HandookandHacker’s Handbookare different.
This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything is presented in a simple and effective manner. It’s a greak book for the beginner who want to become a Hacker. This book will install aHacker’s Mindseton you.
The following skills are uncovered in this book
1. You will learn all the hackers underground tricks and learn to apply them in real world situations.
2. You will be put into a hackers mindset and learn to think like a Hacker.
3. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
4. You will acquire knowledge nonexistent to 99.9% of the people in the world!
5. This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.
This book is of great value for all those who have a dream tobecome a Hacker.

Sunday, November 10, 2013

Simple ways to solve problems.

Simple ways to solve problems.

Five Ways For Using Light Remedies To Solve Problems When You're In Bad Condition(s).
1. You get into a big argument with your spouse. You consider your options: ignore him or her for a few weeks; go argue with more force than ever; hire a marriage counselor to referee the fight.
You then think, "What is the lightest remedy I can use?" and come up with a light solution. You apologize. All is well.
2. You do not have enough time. You are extremely busy and fall behind. You can't seem to get things done. You consider screaming and throwing things or just giving up.
But then you consider light solutions and have a bright idea. "I'll keep a time log to see where I spend my time." You discover three people are wasting dozens of your hours each week. You gently remove them from your life and you suddenly have enough time to do what you want to do.
3. Your boss is angry with you, but you don't know why. Your work has not gotten worse, you show up on time and you have not caused any problems. You think of getting angry at your boss or getting your coworkers to hate him.
Instead, you think of a simple remedy. You ask your boss, "Are you angry with me?" He says, "No, sorry I snapped at you. My darn car won't start." You feel relieved.
4. You are drowning in debt. You made too many financial commitments and are now unable to pay everything you agreed to pay. You think of robbing a bank, going into hiding or ruining your credit reputation with bankruptcy.
You ask yourself, "What is the lightest remedy I can use to solve my money problems?" You realize, "I just need to focus on making more money, all day long." Or "I just need to sell some stuff." Or "Starting now, I will spend less than I make for the rest of my life."
5. You are frustrated and confused by a government regulation concerning your business. You consider hiring an expensive attorney, bribing a politician or going underground to avoid the rule.
But then you remember a simple remedy and get out your dictionary. You carefully read the government regulation and look up each word you do not understand. You suddenly understand the regulation and realize you are already complying with it.
Recommendation.
Whenever you feel frustrated by a condition that is getting worse and worse, do not look for desperate, heavy or complicated solutions. Instead, ask yourself questions like these:
1. "What light remedy can I use for this bad condition?"
2. "What is the simplest, most obvious solution?"
3. "How could I solve this with the least amount of time, work or money?"
4. "What solution, if it worked, would make me laugh?"
5. "What is the lightest way to handle this problem?"
You might be pleasantly surprised to find your worst conditions can be solved with the lightest solutions.Try using those ways to solve your problems and see the change.
WORD OF THE DAY:''Are you happy? If YES keep going and if NO change something.''