HACKS






  • Megaupload Premium Trick For Lifetime




    Megaupload Premium Trick For Lifetime

    Instructions


    After installing right click the icon from task bar do this settings as shown in below pic(put any random data)

    Now click on premium download and here u go..Ur link is now premiums

    No need to signup.



    How to Download
    Step 1: Click On skip Add 
    Step 2:Click On Second Skip Add Then Download Page Will Show 


  •                                                                                                                                                          

    2X Megaupload Premium Cookies





    2X Megaupload Premium Cookies

    Enjoy.......


    Cookies

    RSV8HN0SJOJMKDJPLW2WVIOA1Y-RKWLG

    adfe4f528b9fc88ddab571728b9dd725






                                                                                                                                                                 
  • 50X Filsonic Premium Cookies (Daily Updates)




    23X Filsonic Premium Cookies (Daily Updates)




    See how to use this?


    ufjiii0ljhhhec11cdc4pmo573
    514da42t7kp5vckqp0e423msl3
    pt4csos1ce8p6i70dvkjr1moh0
    m9m77vt6por99ae7iv3jcbgu86
    ui8u32e212i7ka8el793r81m05
    lr2tv9d0urt44kq0mgvqs22g85
    193cdhi6d3o109e7kokbiduiq4
    b1hbeommao9maqmm1ek53gs9j5
    ajm3iias46hdtbdg9j2c14j0g3
    2bi3d2h0oabqktuan5mefu0la0
    0srthss28t4mupfq3tspho7r31
    jqq7s2mclnekb74ood7isec1l6
    deqmqeurg6utoes4t63ut30q57
    pofcspt29al7so4nlo9136p9h7
    er15jhqrr01doi814saaqbarl5
    r1oqvpmh3bbdordfhqjam13ie6
    bspol53khl2thfr5vaghcg8su0
    pntb8h1unrc5qrbqkb6t3tacf6
    f28csvmolq47k6uqd5ssc5qtf4
    g1j2tfe72nqkr2eoc5hp52adl7
    iferhfeve8kh6jp034t9acetn0
    tcopg68k8qcbd746j0jq38t7f7
    aa6pg9bnn8ch7n9cret9pqlr77

                                                                                                                                                                       


  • Premium Account & Cookies 29 May(Daily Update)

  • SHARECASH DOWNLOADER V14

    Posted: Fri, 27 May 2011 00:25:18 PDT



    SHARECASH DOWNLOADER V14

    Enjoy.......


    Download here

    Note:- This can download 50 file per day



          ___________________________________________________________________________-________
  • Hotfile Premium (Daily Update)




     Hotfile Premium (Daily Update)


    Enjoy.......


    4f0a4f59e5982fcd5d04152e4dcb817882c9b155da52839c82d3532852d87392


    See how to use ?
    ___________________________________________________________________________________




  • HF-FS-RS-MU-DF Premium Cookies Checker v5 



    HF-FS-RS-MU-DF Premium Cookies Checker




    How To Use

    1) Take cookies copy.

    2) Press "add" or "past from clipboard" to add cookies.

    3) Choose "hotfile or others".

    4) Press start.

    5) "Start button" will change to "stop" , wait until it change to "start" again and the working cookies will be placed in the textbox.

    6) This program is 100% free of virus,spyware.



    _________________________________________________________________________________

  • Facebook Account Deleter (100% Working)




    Facebook Account Deleter

    Hi, users as many user asked us for exploit for deleting someone's facebook account so this is  one of the best tool we found for that reason. Everyione take it today to delete others account. It is 100% virus free. 

     Requirements:

    1) .Net Framework 4 Client Profile (x86 and x64) / If you dont have it, download it from here.

    2) Microsoft Visual Basic Power Packs 3.0 / If you dont have it, download it from here.

    3) Finally, download this: http://go.microsoft.com/fwlink/?LinkID=145727&clcid=0x804


    Download:

     Click here to download (Direct Link Updated)


    Pass:-  Ioare@_w

    _____________________________________________________________________________--______

  • Hacking for Dummies 



    Hacking For Dummies, 2nd Edition
    Are you worried about external hackers and rogue insiders breaking into your systems? Whether it’s social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. In order to counter these cyber bad guys, you must become a hacker yourself—an ethical hacker.

    Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You’ll discover how to:

    • Work ethically, respect privacy, and save your system from crashing
    • Develop a hacking plan
    • Treat social engineers and preserve their honesty
    • Counter war dialing and scan infrastructures
    • Understand the vulnerabilities of Windows, Linux, and Novell NetWare
    • Prevent breaches in messaging systems, web applications, and databases
    • Report your results and managing security changes
    • Avoid deadly mistakes
    • Get management involved with defending your systems


    DOWNLOAD HERE

    ___________________________________________________________________
     
  • How To Use Filesonic Cookies





    -: How To Use Filesonic Cookies :-

    Hi, all users as many users have asked us to how to use filesonic premium cookies provided by you? So finally i have time to write an article on this. Here is some easy steps witch can  help you to use filesonic premium cookies provided by our site.

    1) Install The Latest Version Of Firefox here.

    2) Download The Cookies Editor For Firefox here.

    3) Open Firefox create a free account at www.filesonic.com and log in to your free account.

    4) Go To Tools > Cookies Editor.


    5) Filter On 'filesonic'.



    6) Select The PHPSESSID Cookie and click the Edit button or if it does not exist than add a PHPSESSID.



    7)     Domain: .filesonic.com (It may be vary according to country, in below case this is .in for India).
            Path: /
            Cookie Content: ********************* (Enter cookie content provided by our site).



    7) Click The Save Button.
     

    8) Click Close.

    9) Refresh The Page And Enjoy.
    _____________________________________________________________________________


  • Hacking Windows Vista (Direct Link)

     


     Hacking Windows Vista (Direct Link)

    Vista is the most radical revamping of Windows since 1995. However, along with all the fantastic improvements, there are a couple of things that likely drive you up the wall. Don’t worry, though—just join forces with author Steve Sinchak and you’ll end up feeling as though Microsoft designed Vista just for you! He shows you how to tweak logon screen settings, build custom Sidebar gadgets, personalize Aero Glass with themes and visual styles, turn your PC into an HDTV media center, fine-tune your firewall, and more...!




    Download here



    _________________________________________________________________________________



  • A Beginners Guide to Ethical Hacking


    A Beginners Guide to Ethical Hacking

    Learn What It Takes to become a Master Hacker 


    A Beginners Guide to Ethical Hacking is a complete path for newbie hackers who want are curious to Learn Ethical Hacking Techniques.The Information given in this book will make you a master hacker. 


    How will the information in the book affect me?

    • You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation
    • You will start to think like hackers
    • Secure your computer from trojans,worms, Adwares etc
    • Amaze your friends with your newly learned tricks
    • You will be able to protect your self from future hack attacks





    Limited Time Only Bonus!

    Learn How To Hack Bonus



    1000 Hacking Tutorials Leaked


    For a limited time only, with the purchase of A Beginners Guide To Ethical hacking you will receive this bonus package! 1000 Hacking Tutorials Leaked contains1000 of the best hacking tutorials of 2010 leaked on the internet!  

    Its Decision Time!



    Now you have heard it all so what are you waiting for.


    This book does not demand any prior knowledge about Hacking. So if you are a newbie to the concept of hacking and want to master it from the basics, then this book is for you.


    The information given in this Book will put you into a hacker’s mindset and teach you all of the hacker’s secret.So what are you waiting for! Grab "A Beginners Guide to Ethical hacking" and start your Hacking journey.

    Note: A Beginners guide to Ethical Hacking is in PDF format to make it easy for you to apply the information in real world.


    _____________________________________________________________________________________________
  • Bluetooth Hacking Full Disclosure


     

    Bluetooth Hacking Full Disclosure

    Bluetooth Hacking Full Disclosure @ 21C3. Blue snarfing Data Theft Calendar Appointments

    Images Phone Book Names, Addresses, Numbers PINs and other codes Images Bluetooth Hacking

    Full Disclosure ...

    _____________________________________________________________________________




    • Megaupload Premium Link Generator 

      Enjoy....... 








    • Fileserve Premium Link Generator 2011 Updated

      Posted: Sun, 01 May 2011 12:10:18 PDT


      Fileserve Premium Link Generator

      Enjoy.......


      Usage is very simple

      I've just found apps to convert fileserve links into premium. Apps requirement only .NET Framework with minimum 2.0

      How To :

      Download Links :

      http://www.duckload.com/download/5274862/Fileserve_file_converter.rar

      http://www.megaupload.com/?d=5LQU8MYQ

      INSIDE ARCHIVE THERE IS DOWNLOAD LINK

      DOWNLOAD ALL OF THE FILE LOCATED INSIDE IT AND ENJOY GENERATING PREMIUM LINK

      ENJOY FRIENDS

      "Your comment will be appreciated"
        
    • Steps to Better Secure Your Wireless Network From Hackers

      Posted: Thu, 21 Apr 2011 08:47:57 PDT

      Steps to Better Secure Your  Wireless Network From Hackers

      The reason we secure a wireless network is to stop people from using the services of our network who don’t have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.

      In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don’t secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:

      1) Strategic antenna placement:

      The first thing you have to do is to position the access point’s antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can’t obstruct its signals. Place it in a central location of the building.

      2) Use WEP:

      WEP stands for Wireless encryption protocol. It’s a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.

      3) Change the SSID, disable the broadcast of SSID:

      SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it’s attainable, hold back the broadcast of the SSID out over the antenna. It wont appear in the listing of offered networks, while being able to provide services as usual.

      4) Disable DHCP:

      By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.

      5) Disable or modify SNMP settings:

      Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

      6) Utilize access lists:


      For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.

      Enjoy.......

    • Tutorial On DNS Poisoning

      Posted: Fri, 15 Apr 2011 22:33:16 PDT


      Tutorial On DNS Poisoning

      This is an introduction to DNS poisoning which also includes an example of quite a nifty application of it using the IP Experiment. It’s purely educational, so I’m not responsible for how you use the information in it.

      To start, you’ll need

      • A computer running Linux (Ubuntu in my case)

      • A basic understanding of how the Domain Name System (DNS) works.

      Note that this is a more advanced topic; don’t try this if you don’t know what you’re doing.

      Why DNS?

      The DNS provides a way for computers to translate the domain names we see to the physical IPs they represent. When you load a webpage, your browser will ask its DNS server for the IP of the host you requested, and the server will respond. Your browser will then request the webpage from the server with the IP address that the DNS server supplied.

      Here’s a pretty diagram to help explain it






      google dns DNS Poisoning Tutorial

      If we can find a way to tell the client the wrong IP address, and give them the IP of a malicious server instead, we can do some damage.

      Malicious DNS Server

      So if we want to send clients to a malicious web server, first we need to tell them its IP, and so we need to set up a malicious DNS server.
      The server I’ve selected is dnsmasq – its lightweight and the only one that works for this purpose (that I’ve found)
      To install dnsmasq on Ubuntu, run sudo apt-get install dnsmasq, or on other distributions of Linux, use the appropriate package manager.

      Once you’ve installed it you can go and edit the configuration file (/etc/dnsmasq.conf)

      sudo gedit /etc/dnsmasq.conf

      The values in there should be sufficient for most purposes. What we want to do is hard-code some IPs for certain servers we want to spoof

      The format for this is address=/HOST/IP

      So for example;

      address=/facebook.com/63.63.63.63

      where 63.63.63.63 is the IP of your malicious web server

      Save the file and restart dnsmasq by running

      sudo /etc/init.d/dnsmasq restart

      You now have a DNS server running which will redirect requests for facebook.com to 63.63.63.63

      Malicious Web Server

      You probably already have a web server installed. If not, install apache. This is pretty basic, so I won’t cover it here.

      There are a couple of things you can do with the web server. It will be getting all the traffic intended for the orignal website, so the most likely cause of action would be to set up some sort of phishing site

      I’ll presume you know how to do that though

      Another alternative is to set up some sort of transparent proxy which logs all activity. I might come back to this in the future.

      I Can Be Ur DNS Server Plz?

      An alternative is to, instead of a spoof webserver, set up a Metasploit browser_autopwn module . You can have lots of fun with that

      But how do you get a victim? Well this is where my project, the IP Experiment could come in handy

      If you don’t know, the IP Experiment basically harvests people’s IPs through websites such as forums and scans them for open ports. A surprising number of these IPs have port 80 open and more often that not, that leads straight to a router configuration mini-site. ‘Admin’ and ‘password’ will get you far in life; its fairly easy to login and change the DNS settings, and BOOM. You have a victim!

      The same techniques can be applied to in many different ways.

      Enjoy.......

    • Better Way To Protect Your Website from Hackers

      Posted: Sat, 09 Apr 2011 21:35:59 PDT


      Better Way To Protect Your Website from Hackers

      Hackers are ethical testers to find faults in systems so they can be corrected before unethical hackers (crackers) exploit them. So, this  is really about how to protect your website from crackers.

      Keep your files up to date

      If your site uses the popular SendMail script, please be sure your version is a current one. Visit Anti-Spam Provisions in Sendmail 8.8 to edit the FormMail script. We have the updated SendMail in use for the Harley Shopping Cart site. FormMail is another popular script used to send form results to an email address or database. We use that file for our website form. These scripts are located in the cgi-bin on the web host server.

      Signing up for updates for scripts (programs) your site uses will let you know if there are any. You should use the latest update to protect yourself. This is often the reason the update is released. If you are unsure of the scripts used on your website, contact your web developer.

      Remove unnecessary files

      Your website changes, old files are ignored. They should be removed. Keep copies offline in case you wish to add them again, but remember to update any scripts. Old files are often indexed by search engines. So even if you do not link to those pages anymore, the search engines lists them for Internet users to find and visit. Automated programs to search for these files can find them to exploit them.

      Implement passwords

      Any sensitive files, databases or scripts should be protected. Please use passwords that are difficult to guess. Use letters AND numbers, but be careful to keep the number of characters within the programmed limits and remember that passwords are case-sensitive.

      Include robots.txt 

      Create a file to tell search engines not to index files that are restricted to certain users. You can also disallow indexing of images, so people who search for images to use illegal do not steal your images.

      Check permissions of uploaded files 

      Left-click each filename in your web host server, then right-click and select CHMOD to make sure files are set to the proper permissions. Check with your web host if you are unsure. Remember to upload images as binary and most other files as ASCII files. Choosing Auto for automatic selection may be incorrect if certain extensions are not specified.

      Protect email addresses
       
      If you ever got a strange email that tested your form or simply sent you an email to yourself, one of those spammer programs found your email address from your website or someone else’s. There are scripts to split up your email address, so spammer software programs cannot read them. Another way is to place your email address in an image or simply have an “Email us” link. I haven’t done this, but I didn’t have any problems until recently. I still want to make my contact information visible to my target audience.

      If you sign guestbooks, go to forums or newsgroups, or share your email address with anyone else, your email address can be posted and shared all over the Internet. I often use several email addresses when making posts, because spammers look there first for email addresses. To spammers, a guestbook is an email address database. So use a Hotmail account for your email, but you can still include your web address in your signature. If the Internet user visits your site, the user can contact you using the link on your site. The spammers probably won’t visit your site, so the spam goes to the posted email address.

      Protect your source code

      Some people use that stupid right-click script to protect their source code. Not only does that not protect your code, you are disabling browser functions such as adding your site to their favorites or printing. Though many people have “borrowed” my source code, I would not want to disable functions that my target audience wants to use. There are scripts to make your source code hidden. This is more effective, but a pain for anyone who wants to edit your site. The preferred method is external files such as external style sheets or javascript files.

      Include copyright information on the page and in the meta tags for every web page. Watermark all images. Keep copies of previous versions of your site with the last modified information intact. Save files on disks, so they can be retrieved. if necessary. Visit the WayBack Machineo find previous versions of websites, if you cannot find your files. Though the information is incomplete, it is better than nothing. Buy the copyrights to important files to protect yourself from competitors or other parties.

      Enjoy .......

    Intro To Google DNS IP & How To Set Up DNS Server?

    Posted: Thu, 07 Apr 2011 08:54:40 PDT


    Intro To Google DNS IP & How To Set Up DNS Server?


    Google Public DNS is a free public DNS resolution service that promises to further speed up the internet.

    What is Google DNS IP

    Google DNS IP are IP addresses provided by Google. DNS Addresses are like Address Book, when you enter the website URL, it resolves the DNS by looking into the address book. The faster they resolve the faster is the loading speed. The primary and secondary IP address are 8.8.8.8 and 8.8.4.4 respectively.

    Set up Google DNS on the computer

    Setting up DNS server is quite easy, the procedures below are for Windows 7. Open Network and Sharing center, click Change Adapter Setting from the left sidebar, right-click the local area network or wireless network and select Properties.

    Now from the Local Area Connection Properties dialog box, select TCP/IPv4 and click Properties. Now select ‘Use the following DNS Server addresses’ and enter the primary and secondary Google DNS IP addresses.


    If you want to configure in the router so that everyone can benefit from it, open the router dashboard, find the option that asks for DNS Server addresses and enter the Google DNS Server addresses(i.e, 8.8.8.8 and 8.8.4.4). It’s that simple.

    Some users are reluctant to add the Google DNS addresses citing privacy concerns. Google can keep track of what every user is doing, thus breaching the privacy of users. But if you want faster speed irrespective of privacy concerns, you can give it a shot.