Sunday, January 30, 2011

How To Hack Facebook...by devzz cyber arenaa....!!!

1) How To Hack Facebook � Phishing
Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Login Pages. So , we�ll create login page taht resemble the original facebook login page. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away.

Step 1
Download fake facebook login page from this link . Upload all downloaded files to web hosting that supports php language, . I recommend 000webhost.com , it�s free and has all what you need.



Step 2
Login to your web hosting and upload files to root folder (root folder in 000webhost is /public_html), if you want to upload it to other folder then you�ll need to change facebook.htm code , action=�/login.php� , replace with action=�/yourFolder/login.php�. Below are instructions how to upload files to 000webhost.com , for other web hosting services is similar. Launch Cpanel , go to File Manager and upload.














Step 3
Select FacebookPasswords.htm and Pass.php and click on Chmod. Set the permissions to 777.




That is it. Send url of the fake facebook login page to the person you want to hack


2) How To Hack Facebook � Sniper Spy (Remote Install Supported)
SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC�s! This means that you can view logs of the remote PC�s from anywhere in the world as long as you have internet access! Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel! This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!


SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes

4. Records any Password (Email, Login, Instant Messenger etc.)

5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall
What if i dont have physical acess to victims computer?

No physical access to your remote PC is needed to install the spy software. Once installed you can view the screen LIVE and browse the file system from anywhere anytime. You can also view chats, websites, keystrokes in any language and more, with screenshots.
This software remotely installs to your computer through email. Unlike the other remote spy titles on the market, SniperSpy is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.
The program then records user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.
Why would I need SniperSpy?
Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. If you can�t get to your computer and are worried about the Internet safety or habits of those using it, then you NEED SniperSpy.
This high-tech spy software will allow you to see exactly what your teenager is doing in MySpace and elsewhere in real time. It will also allow you to monitor any employee who uses the company computer(s).


DOWNLAOD SNIPER SPY

3) How To Hack Facebook � View Private Pictures
This hack will enable you to view private pictures in facebook by adding a link above photos to see them in their albums, even if you�re not their friend. We�ll be using Greasemonkey script for firefox.

This hack will add a link above such photos with a link saying �See this Photo in its Album�. Clicking this link will reload the photo, but you�ll be viewing it inside the album that you couldn�t view without this hack.
When you�re viewing a photo that is in an album like this, the script (Greasemonkey script) will now add a link above the photo that says �Back to Album�. This will remove the photo from the page and load a thumbnail gallery of all photos in the album.
When viewing all photos of a user, on the page that shows photos of them and their albums etc., a link is added at the top to view all photos of them on one page.
This script however cannot get around Facebook�s security, so you will not be able to view photos that you can�t otherwise view.
Before I teach you how to apply this hack, I�ll be assuming that you are using Firefox Browser and have Greasemonkey script addon installed on it.
Click here to download Greasemonkey Script addon for firefox.
After you are done installing Greasemonkey Script, restart your firefox.
Now download the following script by clicking on the link below:

DOWNLOAD SCRIPT

When you click the link above, you�ll be welcomed to the screen similar this:

Click on Install, restart firefox if needed. Now the script you applied will be working forever.
If you have any problem with this hack you can comment us or go to the discussion board of this script.




DO POST UR FEED BACK GUYSSS.....OR ANR QUERIESSS.......:-))))))


















Let's begin to create your first web page. To make this truly the easiest guide, we will ignore some technical terms and details that you don't need to know right now.

This tutorial will guide you in creating a simple web page containing text, image, links to other web pages, and email link. What you need for this tutorial is only a simple text editor program like Notepad or other programs that you use for writing text on your machine. If you're using Windows 95/98, just click 'Start' -> 'Programs' -> 'Accessories' -> 'Notepad'

Create your first web page

First, type the first line of our web page
<HTML>
then type this
</HTML>
You can type them in capital case or lower case. It doesn't matter. I typed them in capital to make it easy to read. Nothing has happened yet; we have just told the browsers (Netscape, Internet Explorer, and etc.) that this is a HTML document. The first <HTML> is to tell the browser that "Here's the begining of HTML section." </HTML> tells the browsers that "Here's the end of HTML section." Inside these two tags is where you will put the contents of your web page in.
Notice that we have <HTML> and </HTML>. This is how we open and close HTML tags. The closing tag is always in </.....> format. In most case, you will have to close every tag that you open.
Next, add a HEAD section to your web page.
<HTML>
<HEAD>
<TITLE>My first page</TITLE>
</HEAD>
</HTML>

<TITLE> tells the browsers that the title of our web page is "My first page." This sentence will appear at the top of browser window. Where? Look at the top of this window (the one that you're reading) and you will see "The easiest HTML guide for beginners"
OK. Now, let's put in the first word that the browser will display.
<HTML>
<HEAD>
<TITLE>My first page</TITLE>
</HEAD>
<BODY>
<H1>HELLO</H1>
</BODY>
</HTML>

We put <BODY> to tell the browser that this is the starting point of the body of our document. <H1> refers to header 1, which is the biggest size (see below.) You can try from <H1> to <H6>. Different numbers will yield different sizes.
Here is an example: 

h1

h3

h5
Let's get back to our document. It now looks like this in a browser.

HELLO

Let's save this web page and view it in your browser. Save the page using 'save as' and name it whatever you like. Let's name it "mypage.htm" Please remember the location of your file. You may create a new directory for it or just simply save it in drive C. Open your web browser (Netscape or Internet Explorer) and try to open the file that you just save. Click on 'File' -> 'Open' and type in c:\mypage.htm or the path to your file.
Do you access your Facebook or Twitter account while you are on a public network like your college�s or office�s unsecured wifi.Then this is the time that you should think about your account security.If you think that facebook or Twitter are secured websites then it�s the time to face the reality they are not secured.Whenever you login into your facebook or twiiter account check the address bar of your browser you will see something like http://www.facebook.com/home.php? Similar is the case with twitter.They use http protocol instead of secured https protocol.But if you login into your gmail account you will notice that it uses https protocol.

So, the trick I am telling you works only on websites like facebook,twiiter,flickr but not on secured websites like Gmail.So here is Trick to Hack Facebook and Twitter Password on Wifi and also the method of protection from this hack.This trick doesnot require any programming knowlege and everyone can use this trick easily.
1.Download firesheep Firefox extension.This is a freeware extension for firefox browser.




2.  Once installed it will open a sidebar window into your firefox browser.

3.Now it will show all the people who are connected to unsecured wifi network.Once they login into your facebook or twitter account you will get a notification and with a single click you can login into their account.
This whole thing work on the technique of cookie hijacking.Once your session cookie is hacked then anybody can login into your account.These cookies can be easily caputered on unsecured wifi network.
The best way to protect yourself from such a hacking trick is to avoid using your facebook or twitter accounts on unsecured wifi networks as it is a security lapse from the websites not on your side.



Note:-This article is to inform you about how your password can be hacked and how to prevent it.This article is purely for educational purposes. 

DO post ur feedback..guysss...thru commentss..!! 


  1. 1. Google gravity:- We all have read the Newton�s law of gravity.Does it also apply to google?To test it follow the instructions
  • Go to google.com
  • Type Google Gravity
  • Click on I�m feeling Lucky
Now you will see the effect of gravity on google.The google icon will fall down automatically.You can even pickup and throw google icon anyware.

  1. 2. Google Pacman Game:-I have already published a post on the google pacman.To read how to play the pacman game on google click the link below
Play Google Pacman Game
  1. 3. Change Background Image:-You can also change the background image of google image.To change the background image follow the instructions
  • Go to google.com
  • Click on the Change Background Image
  • Login with gmail username and upload Image
This will not work if you open the encrypted google.To open unencrypted version  click Here
  1. 4. Epic Google:- In epic google you will see the font size of google increasing automatically as if it will come out of your computer screen.To use google Follow the instructions
  • Go to google.com
  • Type Epic Google
  • Click on I�m feeling Lucky
  1. 5. Google Advanced Search Hacks:-Google provides some special search operators.By using these operators you can easily search anything you want.To learn about these oprators and how to use them click the link below.
Google advanced search hack
  1. 6. Google Hacker:-want to see how the google homepage will look if it gets hacked .Follow the instructions below
  • Go to google.com
  • Type Google Hacker
  • Click on I�m feeling Lucky
  1. 7. Annoying Google:- In this trick the capitalisation of your searches will change automatically.Some words will change into small letter and some into capital letters in your search result.Want to try it follow the instructions
  • Go to google.com
  • Type Annoying Google
  • Click on I�m feeling Lucky


If you also know some more cool google tricks then do share with us and our readers by commenting your google tricks
Hide Drive


Steps to Hide Drive
1. Go to Start � > Run �> Cmd open command prompt.
2. Type diskpart in the command prompt, now diskpart session opens.
3. Type list volume and press enter.
Diskpart List Volume
4. You can see list of volume and Letters for the Volume.
5. Now select a volume for example type select volume 3 you can get a message volume 3 is selected.
6. Type remove letter F (Note : you should type current volume letter only)
Diskpart Remove Letter
7. Now F drive is hided, just need to restart the machine.
Hide F Drive
8. To Recover the Volume letter F follow the above procedure up to step 5.
9. Now type assign letter F and restart your machine.
Recover F  Drive
10. Your hidden drive is rolled back.

do post ur feed back guyss ...
ricks

How-to: Remotely shut down your computer

Think of this scenario; You are lying in bed and just finished watching a movie that you were streaming from a computer downstairs. You want to sleep, but you need to head downstairs to turn the computer off. Save some time, and do it from the computer upstairs.
There are a number of ways that you can restart or shutdown remote computers. You could use a remote desktop connection, but there are quicker ways and we will look at them today.
This article will show you various methods you can use to shutdown or restart computers on your network. We will look at:
  • Command Line/Shortcuts
  • Windows Tools
  • 3rd Party Applications
As well as looking after the environment and your pocket by saving electricity, it is surprisingly easy to achieve. This article is very much aimed at a home user. Most server operating systems have much more powerful tools available.
I have learnt a thing or two researching for this article.



What you need:
All of the methods below require you to have an administrator account on the computer you want to shut down. This was a relief for me as I could see all sorts of ways this could be abused without such security.
All the methods below will require you to have either the IP address or machine name of the computer or computers you want to shutdown remotely.
All of the methods below were created using Windows XP. Vista offers the same commands and a few extras, while Windows 2000 has similar commands. If you use 2000, change the �-� to a �/�.


Method 1: Command line
Microsoft has included a tool that comes with Windows that will be the focus of most of this article. I always like to use inbuilt utilities when they are available. In this case the command is �shutdown�.
If you open up a command prompt (Start > Run > Cmd) and type �shutdown�, you will see that there are a bundle of arguments you can use with the shutdown command. The -m argument followed by the machine name, and a -r(restart trigger) will shutdown your computer. The best way for me to explain it is through examples.
In the command prompt, try the following:
shutdown -m \\computername -s
Lets break it down:
  1. The shutdown command gets the ball rolling
  2. -m \\computername should be the name of the computer you want to shutdown.
  3. -s tells the remote computer to Shutdown.
There are a number of other arguments you can use.
  1. -r tells the remote computer to Restart
  2. -l tells the remote computer to logoff
So that is all you need to know to do it from the command line. I find it a bit tricky to remember all the switches, so the methods below are more ideal for me.



Method 2: Shortcuts
This method uses the same �shutdown� command as above. The only difference is that we put the command into a shortcut so that we can launch it quickly.
Right click on your desktop
Select �New�
Select �Shortcut�
In the path put in:
shutdown -m \\computername -s
Call it whatever you want and change the icon if you would like.
Now you have a shortcut that when it is launched will shutdown the remote computer. How easy is that!

Method 3: Windows Tools
ShutdownThe �shutdown� command we have been looking at above has a graphical front end with a few nice features in it. If you have multiple computers you want to shut down, this may be a good option for you.
To get into it, open a command prompt and type �shutdown -i�
The graphical front-end will open up.
In here, you will see the same options available to you as the manual methods above, but this time you can list or browse multiple computers on your network and do bulk shutdowns or restarts.
It is fairly self explanatory, so I won�t go into it much more. It isn�t all that powerful. Check out another utility below.
This method requires you to put in a reason as to why you are restarting/shutting down. It�s a real pain.







Method 4: External utilities
Rcl
RCL� Remote Computer Log On is a program I came across while scouring through SourceForge. It doesn�t look like much, but it is much more powerful and user friendly than the options above.
RCL was originally designed by a school teacher to control the computers in a computer lab. RCL offers no annoying fonts or popups. It makes up for them in features.
You can login/out, shutdown or restart multiple computers. There is even a feature to enable or disable Internet access.
The computer list uses text files making it easy to list groups of computers; i.e. one file for each lab.
It may be more than you want, but I am definitely going to be using this gem. If only I had it 3 years ago. Download it from SourceForge.
Another program of note is XP remote Timer. It runs much the same as the shutdown command but it offers a timer feature. It might be a good way to control how much time the kids use their computer.
Which method is right for me?
When this article was suggested to me, shortcuts seemed like the most practical way to control 1 or 2 remote computers. As the amount of computers increased, the graphical utilities won out.
Note:
Windows has inbuilt power management features which you might choose to use to shutdown a machine automatically when it is not in use for a certain period of time. This would achieve the same thing, but it removes the control you can have.