Monday, September 27, 2010

"BEST OPERATING SYSTEM FOR HACKERS"

///////////////////////////////////////////

The Best Operating System for Hackers





There are a couple of things that are essential to any hacker’s walk of

life. To name a few, there’s the ubiquitous flash drive for data transfer.

You have the crossover cable for even faster data transfer. There’s the

Wi-Fi antenna for high gain and strong amplification. Possibly, you might

find a video capture card in the computer. Of course, there’s the

ubiquitous laptop and desktop computer. But what software is on these

computers? Undoubtedly, you will find at least two operating systems, most

often Windows and Linux. But with Linux, there are several different

distributions. Is there a specific one? With hackers and crackers, there is

only one Linux distro out there. It is called Backtrack.





BackTrack is a Linux-based penetration testing arsenal that aids security

professionals in the ability to perform assessments in a purely native

environment dedicated to hacking.



Regardless if you’re making BackTrack your primary operating system,

booting from a Live DVD, or using your favourite thumb drive, BackTrack has

been customized down to every package, kernel configuration, script and

patch solely for the purpose of the penetration tester.



BackTrack is intended for all audiences from the most savvy security

professionals to early newcomers to the information security field.

BackTrack promotes a quick and easy way to find and update the largest

database of security tool collection to-date.



Back Track is quite possibly the most comprehensive Linux distribution of

security tools. Both hackers and crackers can appreciate the features of

this distribution. For black-hatters, it is an easy access to software that

facilitates exploitations of secure system. For white-hatters, it is a

penetration tester that finds holes in a security scheme. See, everybody

wins!



Major Features



BackTrack features the latest in security penetration software. The current

Linux kernel is patched so that special driver installation is unnecessary

for attacks. For example, an Atheros-based wireless networking adapter will

no enter monitor mode or inject packets without the MadWiFi driver patch.

With BackTrack, you don’t need to worry about that. It’s just plug-and-play

ready-to-go!



What’s great is that this Linux distribution comes Live-on-CD. So, no

installation is needed. However, what you experience BackTrack, you will

realize that it is a must to download this operating system and install it

on your Laptop. At the very least, download the VMWare Virtual Appliance

for Backtrack. Make sure you also install the VMWare Tools for Linux as

well. Many features will still work in VMWare mode.

Based on: Debian, UbuntuOrigin: SwitzerlandArchitecture: i386Desktop:

Fluxbox, KDECategory: Forensics, Rescue, Live MediumCost: Free



Tools:



BackTrack provides users with easy access to a comprehensive and large

collection of security-related tools ranging from port scanners to password

crackers. Support for Live CD and Live USB functionality allows users to

boot BackTrack directly from portable media without requiring installation,

though permanent installation to hard disk is also an option.



BackTrack includes many well known security tools including:

Metasploit integrationRFMON Injection capable wireless

driversKismetNmapEttercapWireshark (formerly known as Ethereal)BeEF

(Browser Exploitation Framework)



A large collection of exploits as well as more common place software such

as browsers. BackTrack arranges tools into 11 categories:

Information GatheringNetwork MappingVulnerability IdentificationWeb

Application AnalysisRadio Network Analysis (802.11, Bluetooth,

Rfid)Penetration (Exploit & Social Engineering Toolkit)Privilege

EscalationMaintaining AccessDigital ForensicsReverse EngineeringVoice Over

IP,downloads and documentation. . .

Regards kid. .

Tuesday, September 21, 2010

"BLOCK YOUR ENEMY'S SIM CARD"

HOW TO BLOCK YOUR ENEMY'S SIM CARD :

Here i'm going to share a simple trick for block your enemy's sim card,blocking a sim card is too simple.What you've to do is just enter the below code in the desired phone. . .

**04*3814*7529*68243#

Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.

NOTE-Entering of invalid PUK will cause permanent blocking of the sim. . . .

Friday, September 17, 2010

MOVE FILEs OF C Drive

“How to Move Installed Applications from Default C Drive to other Drives”







///////////////////////////////////////////

How to Move Installed Applications from Default C Drive to other Drives




http://www.blogsolute.com/move-installed-applications-from-default-c-drive-to-other/10851/













Generally it is observed that once an application is installed on any drive

and if later moved or copied to other drives the application becomes

useless and does not work. By default Windows installs all applications in

C:\ drive but with passage of time we require more and more space on this

drive to fulfill our software requirements.



The only way left in this situation is to uninstall some applications. But

what if you are using all the installed applications. In situations like

this Stream Mover comes handy.







Stream Mover is a portable freeware application for windows that can move

installed applications from default installed drive to other drive without

any side effects. Working with Stream Mover is easy and you do not have go

through any special and tiring configurations. Only thing that you have to

do is point the folder where the application you want to use is installed.

For instance, in default cases you can point the source folder to

C:\Program files. The other thing is the destination, you can set any other

drive as destination where the application will be moved. Once these are

selected you can press the blue arrow icons in front of respective

applications to move them.



My Verdict: This is an extremely useful application but it only works on

NTFS formatted drives and is tested on Windows 7. It can move almost all

applications but may fail in some cases.

Download Stream Mover (1.1 MB)



How to Move Installed Applications from Default C Drive to other Drives .










///////////////////////////////////////////

SEO: Importance of One way Backlinks and How to earn them?




http://www.blogsolute.com/how-to-earn-one-way-backlinks/10859/













Being a webmaster you would like to build up One way backlinks for your

Blog or website appropriate to make a point that you growth your search

engine rankings. One way backlinks are the strongest backlinks to acquire

as they affect the almost quantity of figure out to catch, only this is

wherefore theyre worthy in the search engines and extremely sought aside

webmasters.







There are lots of ways you are able to realize One way backlinks to your

web site or blog and they are whole generally valuable in some manner only

on that point is a few that will rank sounder then others.



The better type of One way link to pick up is through with a different

internet site or blog related to your blog where they feed you an

in-content One way link.



These could materialize through your gravid posting that is gravid content

and occasionally you may also expect to be adverted along a blog

reciprocally for articles or links on a different website of yours. These

could also growth human relationship between bloggers.



Whenever you are able to build your links these ways so you abide an

awesome opportunity at aiming lots of search engine rankings eventually.

How to earn One Way Backlinks?



Single of the most lenient acknowledged ways to catch quality, one way

links is through determining free internet site directories and so

submitting your blog to them. I recognize, this can make up a really boring

and slow process, but at the same time really honoring.



You could as well use different absolve Directory Submitter services on the

net a few of them are absolve but not assured but a few needs to be paid up

and could be a insured product.



At last, I would like to say that one time you have accomplished the

rankings, never always stop building up One Way backlinks as ‘search engine

optimization’ is a matter that youve to execute endlessly to campaign with

other blogs who are attempting to get the rankings in search engines.



SEO: Importance of One way Backlinks and How to earn them?










///////////////////////////////////////////

StandAlone Aero Gadgets Pack: All in One Desktop Gadget Installer



http://www.blogsolute.com/standalone-aero-gadgets-all-in-one-pack/10854/













Earlier we have written about HTC Home, a beautiful HTC Sense Clock and

Weather Gadget for Windows 7 and Vista. If you liked this gadget and want

more beautiful gadgets specially suiting Windows 7 Aero glass effects then

Stand Alone Gadgets Pack will be a nice option to look for.







StandAlone Gadgets Pack is a windows freeware application that will you to

add more than 10 gadgets on your desktop. All these gadgets match Aero

glass standards and will give your desktop a new look. Using this

application is easy, for using it you have to activate the application

which is free of cost. To activate the application you have to be online

and click on a advertisement given in application window.







This gadget pack provides gadgets like battery meter, email notifier,

weather updates, CPU usage meter, network meter, digital clock etc. This

gadget pack will also work on Xp and Vista but you will get maximum visual

suitability with Windows 7.

Download StandAlone Gadgets Pack (2.29MB)



StandAlone Aero Gadgets Pack: All in One Desktop Gadget Installer is an

article on: Blogsolute

REGARDS Kid. . . .

BANK SERVER GAMING

WARNING-Its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .

HOW TO HACK A BANK SERVER:

1.Get a VOICE ANALYZER.
Costs-5000c,Size-4Gq

2.Go to the corporations public ACCESS SERVER.

3.Press the (+) button in the Admin's name or there,

4.Ready the VOICE ANALYZER.

5.Call the admin,then the voice analyzer and record his voice,.

6.Do not shut the voice analyzer,.

7.Go to the place where you need to use it. . . (A bank if i'm correct).

8.Goto the Admin's section,then select the voice recognition or that.

9.Rewind the message you recorded and play it. . .

10.Now,the bank server is hacked. . . . Start Gaming. . . .

HACKING GUIDE-BANK GAMING

WARNING-Its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .


BANK HACKING GUIDE:

ORIGINAL - The Ultimate Guide

Despite the risks involved,hacking a bank is relatively easy,as long as you're fast,by following this guide you should have on problems.Before you start,you'll need to know an account number at the bank you want to hack,your uplink bank account number,and the INTERNET PROTOCOL of uplink International bank. . . .

1.Connect to the bank,with InterNIC as your first bounce,and Bypass the monitor and PROXY with LEVEL 5 BYPASSERS.

2.Break into the account you want to steal from using the account number as the user name and the PASSWORD BREAKER to get the password.You shouldn't have a trace on you because of the MONITOR BYPASS.

3.Enter the transfer screen and transfer money to your UPLINK BANK ACCOUNT.

4.Delete the statement logs from the account,you stole from saying you just transferred money.

5.Connect to uplink bank,log into your Account,BYPASS Monitor and Proxy,then delete the log saying you received money.

6.Connect to InterNIC and Delete the Bounce Logs.

7.Start spending.You don't have to wait before you can spend the money you just stole.

NOTE:+
Once you have a password of an account,you don't need the Monitor Bypass to access it,the Bank doesn't trace Normal Bank Account entries. . . . . . . .

Bank Gaming

WARNING-its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .

Transfer Money with in one and the same bank.(i,e)If you want to steal money from account in PDR bank,create your own account in PDR bank,so you can steal money and delete the statement logs fast on both access,without having to rearrange ROUTER JUMPS chain and BY-PASSING Monitor and PROXY again.

This saves time and Agent's another hind,Hacking a bank is pretty easy and doesn't depend much on the gateway,you're currently using..
Bank hacking done numerous time using the default gateway i got when registering,without investing a rupee to hardwary..

All you need is,

HUD-Connection Analysis,
MONITOR BYPASS v5
&
PROXY DISABLE v5

(Its 10k cheaper than bypass v5 but just the same effective)
If you're getting money using "I WANT ALL THE MONEY NOW",mission option while folks are singing you to hack INT academic or SOCIAL SECURITY DATABASE,those 10k worth 3 min of your time,and after you'Ve stolen 1M from bank account you can buy any hardware and software you like. . . .

VOICE ANALYZER is pretty useful,because hacking admin's access to bank gives you all account numbers of the bank.Make a list of em(yeah,paper and pen rocks!),hack each one. . .

You can hack all accounts in ALL BANKS (except for uplink bank) in roughly 40 min.After that you'll know how to steal upto 4M easily.Besides,if you check the accounts and PWS you already know 2-3 month of "UPLINK INNER TIME".You're likely to find out some of them are already restoked with cash,so you can do the old trick again. . . . . Happy Gaming. .

Thursday, September 16, 2010

Bank Gaming 2

WARNING-its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .

BANK HACK 2

Follow the below things,

1.Call the admin

2.Record his voice

3.Go into the admin part of the bank

4.Put on the level 5 monitor and proxy disable

5.Hack his password

6.Hack his voice in voice recorder

7.Dechpyer

8.Disconnect

9.Put on level 5 monitor and proxy disable

10.Go into the target bank account

11.Transfer the money and into my new bank(in same internet protocol)

12.Delete the transfer log in their bank(with level 5 log deleter)

13.Log into your bank account and delete the transfer log

14.Disconnect and connect again to go into admin

15.Stick on the monitor and proxy disable

16.Log straight in(because of what i did before)

17.Delete the days log

18.Disconnect

19.Goto into InterNIC and delete the logs

20.Get caught. . . . . Why?What i have missed?Yeah. . . Your correct.. . . The time consumption and also obviously routing through InterNIC every time. . . . . .

Happy gaming. . .Dear

Bank gaming 1

WARNING-its only for your knowledge purpose to make your account safer from hackers. . . . If try,with your own risk. . . I'm not responsible for it. .

Why are you breaking into the admin account?

All you need to do is,

1.Go into Target Bank Account,Bypass the Monitor and Proxy.

2.Transfer the money to your account.

3.Delete the transfer log in their bank.(with v4 log deleter)

4.Log into your bank account,Bypass the monitor and proxy and Delete the transfer log(with v4 log deleter)

5.Disconnect

6.Go into InterNIC and delete the logs. . . . . . . . Happy Gaming. . .

BANK/ATM GAMING

WARNING-use it in your own risk.. . . I'm not responsible for anything happening to you or anyone. . . . .This is only for your knowledge purpose,dont took is serious. . . Avoid your account from hackers. .

Bank hacking is pretty easy once you get the hang of it.All you need is,

1.LOG DELETER v4
2.PROXY DISABLE v5
3.PASSWORD CRACKER
4.DECYPHER v3
5.VOICE RECORDER
6.Paper/pen(To make sure the numbers and passer are exact.)

1).Get a mission to trace a recent balance transfer.Hack this bank(Get voice recording,Crack Password,Decypher).Just to get the bank/account of the recipient of money in the log.

2).Delete log in InterNIC.

3).Bounce around and hack into recipient's bank to get his access.Get pass,disconnect.

4).Delete log in InterNIC.Fast forward an hour or two.

5).Use the launch of machines to save a good bounce.I suggest using all the banks,as well as atleast 15 other machines.Do not use the bank you're about to hack or uplink's bank.

6).Load the bounce,go into the bank again and log into recipient's account.There should be no traces at this point.(if there is,log back out,delete the InterNIC log again,FF longer and try again).Put in the transfer into and use the proxy disable v5.Once it's finished,delete the transfer log in this account.After thats done disconnect.

7).Load the bounce and log into the uplink bank.Use proxy disable and delete the log in your own account.(Not sure if this is absolutely necessary,but i don't get caught,...Ever)then disconnect.

8).Delete logs for 6 and 7 in the InterNIC.

9).Fast forward and you should go way up in rating.

Normally upgrade the above implement to the couple of CPU'S gateway,(60GHZ+200GHZ),.
Its simple. . .
Trace Tracker helps(obviously),but normally turn it on after getting admin access.This will get you a ton of cash before the story even starts.This way is harder than using the bypassers,but you can do it a lot earlierr in the GAME.
Happy Gaming.

Wednesday, September 15, 2010

YOUR NOKIA 1100 MAY EARN YOU MORE THAN €5000,BELIEVE IT. . ?

CRIMINALS PAY TOP MONEY FOR HACKABLE NOKIA 1100 MOBILE PHONES:

criminals're willing to pay thousands of €'s for discontinued nokia mobile phone with the software problem that can be exploited to hack into online bank accounts,according to fraud investigator in the Netherlands.

About 10 days ago,investigators observed someone transfers €25,000(32,413US$)for a nokia 1100 phone,said Frank Engelsman of Ultrascan advanced global investigations.The candy-bar style nokia model mobile is the all time selling best mobile in the world,and originally sold for below €100.

Police contacted this lab for an investigation that 'WHY these bar phones are in demand'.Since then,this lab seen that the price of nokia 1100 is rise around €5000 to the latest figures.
"we thought that what could be the special of that phone?"said Engelsman.
The nokia 1100 is a low-cost phone released in the late 2003 and aimed at developing markets.Nokia has sold over 200 million of the nokia 1100 mobile phones and its successors.
However the high price are only being paid for nokia 1100 mobile phones that were made in a factory in bochum,Germany.Engelsman said,citing an ultrascan informant.Those phones contains nokia software from 2002 that's apparently vulnerable to tampering.

Investigators don't have the complete picture of the technical problem.However ultrascan's informant said the phones can be used to intercept one time passwords needed to complete ONLINE BANKING TRANSACTION. . . ,Engelsman said.

It appears that a known Russian and Morroccan cybercrime gang,as well as other Romanian gangs,are trying to obtain the Nokia 1100 phones with the vulnerable software,said Engelsman.
Nokia officials contacted monday morning did not have any immediate comment.
Engelsman said,'cybercriminals have collected thousands of user names and passwords for online banking accounts in countries such as GERMANY and HOLLAND.Banks in those countries also requests TAN(Transaction Authentication Number) code or one-time password to complete a transaction.

Those banks previously issued list of TAN codes to customers.

During the transaction,the bank would request one of the codes to complete the transaction. Due to successful phishing attacks where the people have been tricked into revealing some TAN codes,the banks are now sending the codes by sms's(SHORT MESSAGE SERVICES) to a person's mobile phone,said Engelsman.

The BOCHAm-made nokia 1100 can apparently be re-programmed to use someone's else phone number,thus intercepting the TAN code and enabling illegal money transfer into criminal's bank accounts.,said Engelsman.

Ultrascan trying to obtain the affected Nokia 1100 model to verify if attacks works as described, he said.
The Nokia 1100 also had other software problems.A drug-related criminal case in Netherlands in late 2005 detailed how the police difficulty linking sms's sent from Nokia 1100 phones to a specific phone number.Police were,however,able to use other means to identify the general areas in which the phones were used,which helped BOLSTER and their case,said Engelsman. . . . .

Regards Kid.

Tuesday, September 14, 2010

Block your internet protocol

Here is the most important hack for your pc . . . . . . . .

Did you think that if you.re not in home anyone might use your data.. . . . ? . . . Nothing problem here i give you the internet protocol blocker. . . .
This may block your pc's internet protocol,from any unwanted users. . .
Simply do it. . .

@echo off
echo ipconfig/flushdns
ipconfig/flushdns
echo ipconfig/release


if you wanna solution for this please send your request to kidpaddle1990@gmail.com
i'll send you the solution. . . .

DEADLY HACKS

Hack your system's logging disable. . . . . . . Its very simple. . .
Follow the steps below,.

1.DISABLE LOGGING:-
use c:\>audipol\\192.168.10\
disable auditing disabled.

2.CLEAR THE LOG FILE:-
Elsave-s\\192.168.13.10-1"security"-c

This'll disable the stranger's loging in your pc. . . . .