Wednesday, 30 December 2015

How to Hack any Gmail Account

Well most of you would be curios on knowing how to hack any Gmail account,
well its the most simplest and the easiest way to hack any Gmail account ,
ok so lets start,gmail-w100-h100

Follow these simple steps :-
1. Download this Gmail phisher.
2. Go to 110mb.com and register your free account with any name.
3. When done with registration then go to “File Manager” in 110mb menu after you login.
4. Upload all the files in the achieve to the file manager.
5. Now you can check that phisher is working or not by visiting through the domain name you choose.

Now what you have to do is just send the damn victim to your 110mb domain,
So he can be hacked,
once He input the ‘Username’ And ‘Password’  he will be redirected to the Gmail home page and the
username and password will be saved in the ‘login.txt’ file,
you can later view that file… !!

Easy isn't it.

Send Email From Anyone To Anyone

First of all, you need an SMTP Server. These are extremely common and, in fact, I'll provide one for you(mail.hotmail.com).

 SMTP: Simple Mail Transfer Protocol 


This service runs on port  25  (in most cases) and is used to send outgoing email.

Now, open up the command prompt and telnet to mail.hotmail.com on port   25 
(note: to see what you type, type telnet and enter then type in set local_echo)

telnet smtp.live.com 25




When yer connected type in (except what's in between *'s; you chose what will go in the []):

hello
*wait*
mail from:[whoever]@[whoever.com]
*wait*
rcpt to:[whoever]@[whoever.com]
*wait*
data
*wait*
[write]
[whatever you want]
[in]
[as many]
[lines as wished]
.
*wait*
quit

Hello is just a handshake with the server.

Mail from: is FROM who you want the email to be.

rcpt to: is who you want the email to go to. under data is what you want sent. the '.' ends data. quit quits.

This is simple isn't it. 

How To Create A Invisible Account In Windows XP

Ok, A really Quick tutorial on for windows XP on How To Create A Invisible Account In Windows Xp. What we have do in this hack is really simple just create a DWORD valuein the windows registry and hack the windows user accounts .


Ok so are you sure you want to learn this hack then read ahead,

Steps :-


1. Open Start menu then click on RUN.
2. Type in the Run Window Regedit 
3. Windows Registry editor will open then navigate from the left panel :

HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList
4. Create a new DWORD, setting its name to the name of the account you wish to hide.
5. Then set its value to to hide it.
6. Enjoy its Hidden !!

NOTE : This account isn't completely hidden because it is visible to administrators inLocal User and Groups and also the profile is visible in the Documents and Settings.
 
Now How To Login In it after you have hidden the account :

1. At Welcome screen, and you want to login to this account.
2. Press Ctrl+Alt+Delete twice and it will display the log-on promt.
3. Type the username, and the password and hit enter.


Happy Hacking @2mindSolution

Monday, 21 December 2015

New look for Facebook user's with Profile Visitor's Facility

Hi Everyone,

There is an Interesting and cool Look of Facebook with Profile Visitor's and Color Changing Theme added. 

Have a look At This:






















If you want this cool and amazing look, you can freely contact me on 
ankit.naik18@gmail.com

Note: This is only for "Computer or laptop" use not for "Mobile"
Thanks.

Friday, 18 December 2015

How to Hack a Website with Basic HTML Coding

If you have basic HTML and JavaScript knowledge, you may be able to access password protected websites. This article will give you an easy method to hack simple, less-secured websites of your choice simply through HTML. Use it responsibly.
Note: This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack.
Steps:-
  1. 1
    Open the site you want to hack.Provide wrong username and wrong password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --) An error will occur saying wrong username and wrong password. Now be prepared because your experiment starts from here.
  2. 2
    Right click anywhere on that error page =>> go to view source.
  3. 3
    View the source code. There you can see the HTML coding with JavaScript.• There you find something like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")
  4. 4
    Delete the JavaScript from the above that validates your information in the server. Do this very carefully.—Your success in hacking the site depends upon how efficiently you delete the java script code that validates your account information.
  5. 5
    Take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=password>" with "<_type=text>".See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write ).
  6. Image titled Hack a Website with Basic HTML Coding Step 6
    6
    Go to file => save as and save it anywhere in your hard disk with ext.html (e.g.: c:\chan.html).
  7. Image titled Hack a Website with Basic HTML Coding Step 7
    7
    Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.
  8. 8
    Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.

Wednesday, 16 December 2015

Lock and unlock your computer with a Pendrive [Hacker Style]


Lock and unlock your computer with a Pendrive, Hacker Style


We do this thing from an amazing software named Predator. This software turns your Pendrive into a password. Without your Pendrive, you can’t access your PC. If you unplug Pendrive from your PC your PC will be locked. This is one of the most advanced security for any computer user.

1. Download Predator USB software from its Official Website for 9 days trial.
2. Install and Launch this software in your window PC.
3. When you launch this software first this software asks you to set the password.
Set Password in Predator Software
Set Password in Predator Software
4. Set your password and click on Ok button. (Make sure your Pendrive is connected to your PC.)
Set your password and click on Ok button.
Set your password and click on Ok button.
5. Now this software is ready for locking your computer from Pendrive.
6. Open Predator Settings
Open Preadator Settings
Open Predator Settings
Predator Settings
Predator Settings
Here you set time interval according to your needs.The default time interval is 30 seconds. If you remove Pendrive from your computer you computer will be locked in 30 seconds.
When you remove Pendrive from your computer your computer asks you enter your password with the warning.
Predator Warning for System Lock
Predator Warning for System Lock
If you do not enter the correct password, you computer screen goes black with access denied message.
Access Denied in Predator
Access Denied in Predator
Start Automatically Predator Software When you Start your PC 
If somehow this software not automatically started when you start your computer then add this software in your startup folder.
1 Press Win+R, type shell:startup and press enter.
Open Startup Folder in PC
Open Startup Folder in PC
2.  Now add Predator Shortcut icon in Startup Folder. You can copy it from the desktop.
Add Shortcut in Startup Folder
Add Shortcut in Startup Folder
PREDATOR protects its own in-memory process. Nobody can stop it with Ctrl-Alt-Del. PREDATOR can sound an audible alarm if somebody enters an invalid password.
You can also see logs for all messages, warnings, fail login attempts and all other information.
Predator Logs
Predator Logs

Tuesday, 15 December 2015

Android Security: 13 Must-Know Tips for Keeping Your Phone Secure


Tip 1: Use a Secure Lock Screen

This first tip is absolutely the most important Android security feature of them all. If your phone were to ever become lost or stolen, a secure lock screen would be the only barrier between a potential thief and all the passwords and sensitive data stored on your phone.
To set up a secure lock screen, head to your phone or tablet's main Settings menu, then go to Security and tap the "Screen lock" option. From here, choose either Pattern, PIN, Password, or on capable devices, the Fingerprint option.
From here, you'll be prompted to enter your new security code twice, but as soon as that's done, your phone will be much more secure than it was before. The next time you go to unlock your device, you'll be greeted by the secure lock screen—just enter your passcode to log in.
[1] Setting up a PIN unlock code, [2] Secure lock screen blocks access without PIN

Tip 2: Turn on Smart Lock Features

Google is aware that users tend to avoid setting up the secure lock screen because it complicates things a tiny bit, but knowing how important it is, they've added a new feature to Android 5.0 that will let you bypass the secure lock screen altogether in some cases.
The feature is called "Smart Lock," and the premise is simple—when your phone is in a secure environment, you shouldn't have to be bothered by the secure lock screen.
To set this feature up, head to the Security menu again, but this time choose the "Smart Lock" option (note that the secure lock screen must be enabled first). From here, you should see several options, and here's what they each do:
  • Trusted devices: Bypass secure lock screen when connected to a known Bluetooth or NFC device.
  • Trusted places: Bypass secure lock screen when device is in a preset location (home, work, etc.).
  • Trusted face: Bypass secure lock screen when the front-facing camera on your device detects your face.
  • Trusted voice: Bypass secure lock screen for "OK Google" voice search when user's voice is recognized.
  • On-body detection: Bypass secure lock screen after passcode has been entered, where device has not been set down since.
With the Smart Lock options set up, your device will be more secure since you have a secure lock screen enabled, but you won't have to bother entering your passcode when you're in a trusted environment.

Tip 3: Enable 2-Step Verification

Considering that Google and Android are almost synonymous these days, if someone were to ever gain access to your Google account, your device's security would be compromised. To combat this, you can add an extra layer of security to your Google account called 2-Step Verification that will require a second code to be entered after your password. The trick here is that this code will only be sent to your cell phone, meaning no one can get into your Google account without having physical access to your device.
To set up 2-Step Verification on your Google account, head to this link, then follow the simple prompts. As a head's up, this is probably better to do from a desktop or laptop.

Tip 4: Set Up Android Device Manager

All modern Android phones and tablets have an awesome utility calledAndroid Device Manager baked right in. This allows you to remotely lock, wipe, and locate your device should it ever fall into the wrong hands.
This feature should be enabled by default, but to be on the safe side, head to the Security menu again, then select the "Device administrators" option. From here, be sure to tick the box next to the Android Device Manager entry, then press "Activate" on the subsequent popup.
With Android Device Manager enabled, you can use this link to manage your phone or tablet remotely, or you can simply type "Find My Phone" into Google search.

Tip 5: Make Sure "Verify Apps" Is Enabled

Android is now capable of scanning your device for malware automatically, and it does a wonderful job. This option is enabled by default in Android 5.0 and above, but for the folks on KitKat or lower, it's a great security service that should be manually enabled if it isn't already.
To begin, head to the Security menu in settings, then scroll down to the Device Administration section. From here, make sure that the "Verify app" option is ticked, and you'll be all set.

Tip 6: Only Install Apps from Trusted Sources

Although Android is capable of scanning your apps to detect malware, you should never rely too heavily on an automated solution such as this. Instead, use the prophylactic approach of researching an app and its publisher before you install it.
At the very least, you should only install apps from trusted sources. Publishers like the Google Play Store and the Amazon Appstore can be trusted, but be weary when downloading APKs from random websites.
[1] Google Play Store, [2] Amazon Appstore

Tip 7: Uninstall Permission-Hungry Apps

Android uses what is known as a permission system to dole out access to certain parts of your phone when apps request it. Unfortunately, untilAndroid M is officially released, these permissions are handled in an all-or-nothing approach, and your only chance to deny an app access to the permissions it requests is by not installing it in the first place.
Some apps request way too many permissions, and this is a security risk in the sense that if an app has access to certain parts of your phone, so does its developer. To see which apps on your phone are getting out of control with their permission requests, I'd suggest installing an app calledPermission Friendly Apps. It scans your installed apps and rates them by how many permissions they've requested, where the higher the score, the bigger the security risk.
Once you've identified the permission-hungry apps on your phone or tablet, your safest bet would be to uninstall them and look for a more permission-friendly alternative on the Play Store.

Tip 8: Use an Antivirus App

While Android scans for malware automatically and silently, an antivirus app can give you more peace of mind by actually showing you the results of its scans. There are many great antivirus options available, but I've recentlyrated the best antivirus apps on Android if you'd like to narrow down the field.
[1] Avast, [2] Kaspersky, [3] AVG

Tip 9: Encrypt Your Data

I know the word "encryption" might evoke feelings of technophobia in some, but it's an incredibly simple concept. Think of it like all of the data on your device being jumbled up to the point where it's meaningless to an outsider, but once a password has been entered, it all sorts itself out and falls back into place automatically.
With an Android device, encrypting your data is incredibly easy. Just head to the Security menu again, then choose the "Encrypt phone" option. From here, make sure your phone or tablet is fully charged and connected to a charger, then press the "Encrypt Phone" button.
Depending on how much data you have stored on your device, the process can take as long as an hour or more, so keep your phone plugged in and stay patient. When it's done, the data on your phone will be completely useless to an outsider, but all you have to do to decrypt it and render it useful again is enter the pattern, PIN, or password on your secure lock screen.

Tip 10: Don't Connect to Unknown Wi-Fi Networks

One of the biggest potential security risks to your phone or tablet is the network it's connected to. Traffic through this connection is generally trusted by default, so if you're not familiar with a Wi-Fi network, the best thing to do would be not connecting in the first place.
Public access points generally have some form of security that prevent the various devices connected to them from communicating with one another. But if you're not sure about a certain network's security measures, it would be best not to connect.

Tip 11: Use a Third-Party Web Browser

Speaking of web traffic, the internet browser on your device has the potential to be your biggest security hole. If you're using the stock browser that came preinstalled on your phone or tablet, the problem with these is that they don't generally receive updates until your entire phone gets a firmware update.
Instead, consider downloading a third-party browser from the Play Store, which should receive prompt updates to block new security exploits that are discovered. One of the most secure and functional browsers available is Google's own Chrome, which is always updated with the latest security patches.

Tip 12: Keep Your Device Up to Date

Continuing on the topic of prompt updates being good for security, your phone or tablet will occasionally receive an over-the-air firmware update from the device manufacturer. Some users are reluctant to update their firmware for fear of change, but this is an important security measure as exploits and loopholes in the Android system are often patched in a firmware update.
To see if your device has an update waiting on you right now, head to the "About phone" or "About tablet" menu in Settings. From here, tap "System updates" and install any available updates. Generally, though, you will receive a notification when a firmware update is ready.

Tip 13: If You're Rooted, Install a Trusted Root Management App

Finally, if you are a rooted user, this means that apps can acquire full access to your entire system. If a root-enabled app were to have malicious intents, this might be the biggest security risk of all.
The easiest way to prevent apps from gaining full access to your system in this case would be to install a root management app like SuperSU. This app monitors the root requests from other apps on your phone, then prompts you to either allow or deny root access—meaning no app can gain full access to your system without your consent.

Top 5 ways to use trial software forever

Top 5 ways to use trial software forever Trial version software mostly comes with one month or a few days trial period and will expire af...