First of all, you need an SMTPServer. These are extremely common and, in fact, I'll provide one for you(mail.hotmail.com).
SMTP: Simple Mail Transfer Protocol
This service runs on port 25 (in most cases) and is used to send outgoing email.
Now, open up the command prompt and telnet to mail.hotmail.com on port 25 (note: to see what you type, type telnet and enter then type in set local_echo)
Ok, A really Quick tutorial on for windows XP on How To Create A Invisible Account In Windows Xp. What we have do in this hack is really simple just create a DWORD valuein the windows registry and hack the windows user accounts .
Ok so are you sure you want to learn this hack then read ahead,
Steps :-
1. Open Start menu then click on RUN. 2. Type in the Run Window Regedit
3. Windows Registry editor will open then navigate from the left panel :
4. Create a new DWORD, setting its name to the name of the account you wish to hide.
5. Then set its value to 0 to hide it.
6. Enjoy its Hidden !!
NOTE :This account isn't completely hidden because it is visible to administrators inLocal User and Groups and also the profile is visible in the Documents and Settings.
Now How To Login In it after you have hidden the account :
1. At Welcome screen, and you want to login to this account. 2. Press Ctrl+Alt+Delete twice and it will display the log-on promt. 3. Type the username, and the password and hit enter.
If you have basic HTML and JavaScript knowledge, you may be able to access password protected websites. This article will give you an easy method to hack simple, less-secured websites of your choice simply through HTML. Use it responsibly.
Note: This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack.
Steps:-
1
Open the site you want to hack.Provide wrong username and wrong password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --) An error will occur saying wrong username and wrong password. Now be prepared because your experiment starts from here.
2
Right click anywhere on that error page =>> go to view source.
3
View the source code. There you can see the HTML coding with JavaScript.• There you find something like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")
4
Delete the JavaScript from the above that validates your information in the server. Do this very carefully.—Your success in hacking the site depends upon how efficiently you delete the java script code that validates your account information.
5
Take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=password>" with "<_type=text>".See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write ).
6
Go to file => save as and save it anywhere in your hard disk with ext.html (e.g.: c:\chan.html).
7
Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.
8
Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.
We do this thing from an amazing software named Predator. This software turns your Pendrive into a password. Without your Pendrive, you can’t access your PC. If you unplug Pendrive from your PC your PC will be locked. This is one of the most advanced security for any computer user.
1. Download Predator USB software from its Official Website for 9 days trial.
2. Install and Launch this software in your window PC.
3. When you launch this software first this software asks you to set the password.
Set Password in Predator Software
4. Set your password and click on Ok button. (Make sure your Pendrive is connected to your PC.)
Set your password and click on Ok button.
5. Now this software is ready for locking your computer from Pendrive.
6. Open Predator Settings
Open Predator Settings
Predator Settings
Here you set time interval according to your needs.The default time interval is 30 seconds. If you remove Pendrive from your computer you computer will be locked in 30 seconds.
When you remove Pendrive from your computer your computer asks you enter your password with the warning.
Predator Warning for System Lock
If you do not enter the correct password, you computer screen goes black with access denied message.
Access Denied in Predator
Start Automatically Predator Software When you Start your PC
If somehow this software not automatically started when you start your computer then add this software in your startup folder.
1 Press Win+R, type shell:startupand press enter.
Open Startup Folder in PC
2. Now add Predator Shortcut icon in Startup Folder. You can copy it from the desktop.
Add Shortcut in Startup Folder
PREDATOR protects its own in-memory process. Nobody can stop it with Ctrl-Alt-Del. PREDATOR can sound an audible alarm if somebody enters an invalid password.
You can also see logs for all messages, warnings, fail login attempts and all other information.
This first tip is absolutely the most important Android security feature of them all. If your phone were to ever become lost or stolen, a secure lock screen would be the only barrier between a potential thief and all the passwords and sensitive data stored on your phone.
To set up a secure lock screen, head to your phone or tablet's main Settings menu, then go to Security and tap the "Screen lock" option. From here, choose either Pattern, PIN, Password, or on capable devices, the Fingerprint option.
From here, you'll be prompted to enter your new security code twice, but as soon as that's done, your phone will be much more secure than it was before. The next time you go to unlock your device, you'll be greeted by the secure lock screen—just enter your passcode to log in.
[1] Setting up a PIN unlock code, [2] Secure lock screen blocks access without PIN
Tip 2: Turn on Smart Lock Features
Google is aware that users tend to avoid setting up the secure lock screen because it complicates things a tiny bit, but knowing how important it is, they've added a new feature to Android 5.0 that will let you bypass the secure lock screen altogether in some cases.
The feature is called "Smart Lock," and the premise is simple—when your phone is in a secure environment, you shouldn't have to be bothered by the secure lock screen.
To set this feature up, head to the Security menu again, but this time choose the "Smart Lock" option (note that the secure lock screen must be enabled first). From here, you should see several options, and here's what they each do:
Trusted devices: Bypass secure lock screen when connected to a known Bluetooth or NFC device.
Trusted places: Bypass secure lock screen when device is in a preset location (home, work, etc.).
Trusted face: Bypass secure lock screen when the front-facing camera on your device detects your face.
Trusted voice: Bypass secure lock screen for "OK Google" voice search when user's voice is recognized.
On-body detection: Bypass secure lock screen after passcode has been entered, where device has not been set down since.
With the Smart Lock options set up, your device will be more secure since you have a secure lock screen enabled, but you won't have to bother entering your passcode when you're in a trusted environment.
Tip 3: Enable 2-Step Verification
Considering that Google and Android are almost synonymous these days, if someone were to ever gain access to your Google account, your device's security would be compromised. To combat this, you can add an extra layer of security to your Google account called 2-Step Verification that will require a second code to be entered after your password. The trick here is that this code will only be sent to your cell phone, meaning no one can get into your Google account without having physical access to your device.
To set up 2-Step Verification on your Google account, head to this link, then follow the simple prompts. As a head's up, this is probably better to do from a desktop or laptop.
Tip 4: Set Up Android Device Manager
All modern Android phones and tablets have an awesome utility calledAndroid Device Manager baked right in. This allows you to remotely lock, wipe, and locate your device should it ever fall into the wrong hands.
This feature should be enabled by default, but to be on the safe side, head to the Security menu again, then select the "Device administrators" option. From here, be sure to tick the box next to the Android Device Manager entry, then press "Activate" on the subsequent popup.
Android is now capable of scanning your device for malware automatically, and it does a wonderful job. This option is enabled by default in Android 5.0 and above, but for the folks on KitKat or lower, it's a great security service that should be manually enabled if it isn't already.
To begin, head to the Security menu in settings, then scroll down to the Device Administration section. From here, make sure that the "Verify app" option is ticked, and you'll be all set.
Tip 6: Only Install Apps from Trusted Sources
Although Android is capable of scanning your apps to detect malware, you should never rely too heavily on an automated solution such as this. Instead, use the prophylactic approach of researching an app and its publisher before you install it.
At the very least, you should only install apps from trusted sources. Publishers like the Google Play Store and the Amazon Appstore can be trusted, but be weary when downloading APKs from random websites.
[1] Google Play Store, [2] Amazon Appstore
Tip 7: Uninstall Permission-Hungry Apps
Android uses what is known as a permission system to dole out access to certain parts of your phone when apps request it. Unfortunately, untilAndroid M is officially released, these permissions are handled in an all-or-nothing approach, and your only chance to deny an app access to the permissions it requests is by not installing it in the first place.
Some apps request way too many permissions, and this is a security risk in the sense that if an app has access to certain parts of your phone, so does its developer. To see which apps on your phone are getting out of control with their permission requests, I'd suggest installing an app calledPermission Friendly Apps. It scans your installed apps and rates them by how many permissions they've requested, where the higher the score, the bigger the security risk.
Once you've identified the permission-hungry apps on your phone or tablet, your safest bet would be to uninstall them and look for a more permission-friendly alternative on the Play Store.
Tip 8: Use an Antivirus App
While Android scans for malware automatically and silently, an antivirus app can give you more peace of mind by actually showing you the results of its scans. There are many great antivirus options available, but I've recentlyrated the best antivirus apps on Android if you'd like to narrow down the field.
[1] Avast, [2] Kaspersky, [3] AVG
Tip 9: Encrypt Your Data
I know the word "encryption" might evoke feelings of technophobia in some, but it's an incredibly simple concept. Think of it like all of the data on your device being jumbled up to the point where it's meaningless to an outsider, but once a password has been entered, it all sorts itself out and falls back into place automatically.
With an Android device, encrypting your data is incredibly easy. Just head to the Security menu again, then choose the "Encrypt phone" option. From here, make sure your phone or tablet is fully charged and connected to a charger, then press the "Encrypt Phone" button.
Depending on how much data you have stored on your device, the process can take as long as an hour or more, so keep your phone plugged in and stay patient. When it's done, the data on your phone will be completely useless to an outsider, but all you have to do to decrypt it and render it useful again is enter the pattern, PIN, or password on your secure lock screen.
Tip 10: Don't Connect to Unknown Wi-Fi Networks
One of the biggest potential security risks to your phone or tablet is the network it's connected to. Traffic through this connection is generally trusted by default, so if you're not familiar with a Wi-Fi network, the best thing to do would be not connecting in the first place.
Public access points generally have some form of security that prevent the various devices connected to them from communicating with one another. But if you're not sure about a certain network's security measures, it would be best not to connect.
Tip 11: Use a Third-Party Web Browser
Speaking of web traffic, the internet browser on your device has the potential to be your biggest security hole. If you're using the stock browser that came preinstalled on your phone or tablet, the problem with these is that they don't generally receive updates until your entire phone gets a firmware update.
Instead, consider downloading a third-party browser from the Play Store, which should receive prompt updates to block new security exploits that are discovered. One of the most secure and functional browsers available is Google's own Chrome, which is always updated with the latest security patches.
Tip 12: Keep Your Device Up to Date
Continuing on the topic of prompt updates being good for security, your phone or tablet will occasionally receive an over-the-air firmware update from the device manufacturer. Some users are reluctant to update their firmware for fear of change, but this is an important security measure as exploits and loopholes in the Android system are often patched in a firmware update.
To see if your device has an update waiting on you right now, head to the "About phone" or "About tablet" menu in Settings. From here, tap "System updates" and install any available updates. Generally, though, you will receive a notification when a firmware update is ready.
Tip 13: If You're Rooted, Install a Trusted Root Management App
Finally, if you are a rooted user, this means that apps can acquire full access to your entire system. If a root-enabled app were to have malicious intents, this might be the biggest security risk of all.
The easiest way to prevent apps from gaining full access to your system in this case would be to install a root management app like SuperSU. This app monitors the root requests from other apps on your phone, then prompts you to either allow or deny root access—meaning no app can gain full access to your system without your consent.