How To Spy Your Girlfriend Mobile Phone With A Free Software Remotly
Posted by Nikhil Chawra 9/04/2012
Today i am Writing a very interesting post for You friends..What is The cost to hire a spy who can able to spy your girlfriend 24X7 days..???? its around hundreds of dollars Or may Be Thousands of dollars but you are on infotechno, so everything here mentioned are free..would you be happy if i will show you a trick by which you can track your girlfriend,spouse or anyone's mobile phone 24 X 7 which is absolutely free..The only thing you have to do is send a sms like SENDCALLLOG To get the call history of your girlfriend's phone.
SO lets Start The trick...
1 First of all go to android market from your Girlfriend,spouse,friends or anyone's phone which you want to spy.
2 Search for a android application named "Touch My life.."
3 Download and install that application on that phone.
4 Trick is Over :)
Now you can able to spy that phone anytime by just sending sms to that phone. Now give back that phone to your girlfriend and whenever you want to spy your girlfriend just send sms from your phone to your Girlfriend phone Which are mentioned in Touch My Life manage book.
i am mentioning some handy rules below...
1) Write "CALLMEBACK" without Quotes and Send it to your girlfriend's mobile number for a Automatic call back from your girlfriend's phone to your phone.
2)Write "VIBRATENSEC 30" without Quotes and send it to your girlfriend's mobile number to Vibrate your Girlfriend's Phone for 30 seconds..You can also change Values from 30 to anything for the desired Vibrate time.
3)Write "DEFRINGTONE" without Quotes and Send it to your girlfriend's mobile number..this will play the default ringtone on your girlfriend's phone.
4)Write "SENDPHOTO youremail@gmail.com" without Quotes and Send it to your girlfriend's mobile number.it will take the photo of current location of your girlfriend and send it to the email address specified in the SMS as a attachment.it will also send a confirmation message to your number.
5)Write "SENDCALLLOG youremail@gmail.com" without Quotes and Send it to your girlfriend's mobile number ..it will send all the call details like incoming calls,outgoing calls,missed calls to the email address specified in the SMS.
6)Write "SENDCONTACTLIST youremail@gmail.com" without Quotes and Send it to your girlfriend's mobile number ..it will send all the Contact list to the email address specified in the SMS.
So Guys Above all are only some Handy features of touch my life...You can also view more by going to touch my life application and then its manage rules.. :)
Enjoy..:)
Trick to make Unlimited free Calls From Internet to mobile Phone
Posted by Nikhil Chawra 9/04/2012
Now a day’s VoIP (Voice Over Internet protocol) is going to change our internet
experience by providing free calling facility all over the world by just using
internet..We all love to make free calls from internet..:)
There are lots of websites and web-clients offering internet to internet calling facility..Gtalk is One of them...
But what if I tell you the trick by which you can make calls from free internet to mobile phones..?
Isn’t it Sound Cool..?
Hmm..To Make Free Calls From your pc To Mobile Phones All You need is a MIC or Headphone and Yahoo Messenger...
STEP 1: Install Yahoo Messenger..if You don’t have Yahoo Messenger On Your Pc Then Follow This Download Link And Download The Latest Version.
STEP 2: Sign In to Your Yahoo Messenger By Using Your Yahoo Id And Password.
STEP 3: Configure Your MIC or Headphone In Yahoo Messenger..
STEP 4: Inside Your Yahoo Messenger dial +18003733411 ..As You Can See In Image Below..
Now A Small window Will Pop-up…

STEP 5: After That An operator greets you with a recorded welcome message along with an advertisement and asks you to select one of the Free411 service. Just hear the services options until they say the last one as “Free Call”. When you hear this, don’t press any number on your keyboard and instead SAY “Free call” loudly on your microphone connected to your PC.
After this voice message is detected by their System, they will run a short advertisement of their sponsor Don’t Press Any Number At That Time..
WAIT UNTIL YOU HEAR A BEEP SOUND after the following message “Please dial the phone number with country code first (i.e “1 for north America Or 91 For India”)
Now Your Call Will Be Connected And You Can Call 7 Continuous minutes For Free..
After Disconnected…Repeat The Same Procedure Again..You Can Able To make Multiple and Unlimited Calls By Using This Trick...you Can Also make International Calls By Using This Trick..
For More Tricks Like This..Stay Tuned With Us.. :))
Enjoy.!!!
Hack Passwords Using iStealer
Posted by Nikhil Chawra 9/03/2012
There are different way's to steal passwords.
I want to be able to steal passwords from cookie files with 1 click,
well what do you know it exists! It's a cookie stealer called iStealer ( 6.0 is newest version ).
It steals every cookie password from the slave's browser, and shows it to the attacker.
So if you do it correctly you will have hotmail, netlog, facebook, WoW, rapidshare and other passwords from lots of people in no time.
I'll set one up, and will go thru all the details.
Prepare yourself
1st Download iStealer 6.0 ( link is at the bottom of the thread )
2th Disable your virusscanner, this is because your antivirus sees the iStealer program as a keylogger ( it's acctualy a CookieStealer but whatever )
3th Register domain and hosting
iStealer requires a webserver, this is because when someone click's your own made "Virus" it has to send the passwords and usernames somewhere.
I suggest http://www.000webhost.com/ for free webhosting, so register a domain there.
The registration can take a while, but when u have your domain registered, go to the cPanel.
Once your on the cPanel, click on MySQL ( this is under the tab "Software / Services" )
Now create a new database and user. Something like this
MySQL database name: a7356028_stealer
MySQL user name: a7356028_theadmin
Password for MySQL user: 123456
Then click create database.
Configure to steal
Now extract the downloaded zip file ( below the thread ).
You should have iStealer 6.0.exe, and a map called PHP Logger.
Open index.php in the map PHP Logger with notepad or any text-editor.
you see a bunch of codes, but dont worry, we only need the first part of the php file. Search for the CONFIGURATION section, this will be in it
$dbHost = "localhost"; // MySQL host
$dbUser = "suicide_admin"; // MySQL username
$dbPass = "GOX"; // MySQL password
$dbDatabase = "suicide_is"; // MySQL database name
$username = "admin"; // Login Username
$password = "GOV"; // Login Password
$logspage = 100; // Number of logs per page
Configure this with you own MySQL database information. Then it should look like this
$dbHost = "localhost"; // MySQL host
$dbUser = "a7356028_theadmin"; // MySQL username
$dbPass = "123456"; // MySQL password
$dbDatabase = "a7356028_stealer"; // MySQL database name
$username = "admin"; // Login Username
$password = "whatuwant"; // Login Password
$logspage = 100; // Number of logs per page
Note that the $username and $password variable will be used to log in your website, so choose it carefully.
Now save the file.
Loading it up
Go back to the cPanel of your site, and click on File Manager ( under the tab "Files )
Log in with your 000webhost password and continue.
Click on public_html map, and once ur in it, click Upload.
Select the index.php you saved before, and the style.css
Upload it.
Then just browse to your domain name in your browser, and login with the $username and $password you choose in the index.php ( in my case admin and whatuwant ). Now you have the page where the passwords and usernames are stored.
Making the Stealer File!
Now everything is set up, we have to make our CookieStealer file.
Just open iStealer 6.0.exe, enter your domain on the top ( edit things you want, like changing the icon etc ).
Click build!
Testing, crypting, spreading?
Testing?
To see if it works, just click it yourself! If you enter your website, and see your passwords and usernames, it works!
Crypting?
Well, it worked on yourself, because your antivirus is not up, but most of the people have antivirus scanner on all the time, so you might think of crypting it ( making it undetectable ), i'll talk about this later ( and show u some tools ), in the main time, use Google!
I want to be able to steal passwords from cookie files with 1 click,
well what do you know it exists! It's a cookie stealer called iStealer ( 6.0 is newest version ).
It steals every cookie password from the slave's browser, and shows it to the attacker.
So if you do it correctly you will have hotmail, netlog, facebook, WoW, rapidshare and other passwords from lots of people in no time.
I'll set one up, and will go thru all the details.
Prepare yourself
1st Download iStealer 6.0 ( link is at the bottom of the thread )
2th Disable your virusscanner, this is because your antivirus sees the iStealer program as a keylogger ( it's acctualy a CookieStealer but whatever )
3th Register domain and hosting
iStealer requires a webserver, this is because when someone click's your own made "Virus" it has to send the passwords and usernames somewhere.
I suggest http://www.000webhost.com/ for free webhosting, so register a domain there.
The registration can take a while, but when u have your domain registered, go to the cPanel.
Once your on the cPanel, click on MySQL ( this is under the tab "Software / Services" )
Now create a new database and user. Something like this
MySQL database name: a7356028_stealer
MySQL user name: a7356028_theadmin
Password for MySQL user: 123456
Then click create database.
Configure to steal
Now extract the downloaded zip file ( below the thread ).
You should have iStealer 6.0.exe, and a map called PHP Logger.
Open index.php in the map PHP Logger with notepad or any text-editor.
you see a bunch of codes, but dont worry, we only need the first part of the php file. Search for the CONFIGURATION section, this will be in it
$dbHost = "localhost"; // MySQL host
$dbUser = "suicide_admin"; // MySQL username
$dbPass = "GOX"; // MySQL password
$dbDatabase = "suicide_is"; // MySQL database name
$username = "admin"; // Login Username
$password = "GOV"; // Login Password
$logspage = 100; // Number of logs per page
Configure this with you own MySQL database information. Then it should look like this
$dbHost = "localhost"; // MySQL host
$dbUser = "a7356028_theadmin"; // MySQL username
$dbPass = "123456"; // MySQL password
$dbDatabase = "a7356028_stealer"; // MySQL database name
$username = "admin"; // Login Username
$password = "whatuwant"; // Login Password
$logspage = 100; // Number of logs per page
Note that the $username and $password variable will be used to log in your website, so choose it carefully.
Now save the file.
Loading it up
Go back to the cPanel of your site, and click on File Manager ( under the tab "Files )
Log in with your 000webhost password and continue.
Click on public_html map, and once ur in it, click Upload.
Select the index.php you saved before, and the style.css
Upload it.
Then just browse to your domain name in your browser, and login with the $username and $password you choose in the index.php ( in my case admin and whatuwant ). Now you have the page where the passwords and usernames are stored.
Making the Stealer File!
Now everything is set up, we have to make our CookieStealer file.
Just open iStealer 6.0.exe, enter your domain on the top ( edit things you want, like changing the icon etc ).
Click build!
Testing, crypting, spreading?
Testing?
To see if it works, just click it yourself! If you enter your website, and see your passwords and usernames, it works!
Crypting?
Well, it worked on yourself, because your antivirus is not up, but most of the people have antivirus scanner on all the time, so you might think of crypting it ( making it undetectable ), i'll talk about this later ( and show u some tools ), in the main time, use Google!
Metasploit: A Penetration Tester's Guide free download
Posted by Nikhil Chawra 9/03/2012
"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks.

Download
Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide willteach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--

Download
Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide willteach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--
Batch File Programming book for beginners written by Premkumar .S
Posted by Nikhil Chawra 9/03/2012
Batch File Programming book for beginners
This book "Batch File Programming" is written after experimenting and testing all the snippets covered in this book. Batch File Programming is a pretty old one, but i have found lot of books that have not covered the dark side of the batch which still remains untold the ultimate goal of this book is to make the readers understand how it works what are the limitations of the batch what else is possible with a batch construction useful programs with various views creating a batch virus by misusing the commands creating a batch file to an executable and lot more.
Index
- Batch File programming
- Internal and external commands
- Run line commands
- Batch operator
- Basic commands
- Environment variable
- Lopping statement
- Conditional statement
- Commands associated with files and folder
- Network troubleshooting comands
- Code snippets
- Virus programming
- Converting batch to executable
SAMSUNG MOBILE T200 CODES
Posted by Nikhil Chawra 9/03/2012
Samsung codes
*#06# IMEI code
*#9998*4357# Help Menu
*#9998*5282# Java menu (GRPS/CSD settings for JAVA server)
*#9999#0# Monitor
Mode
*#9999# or *#9998*9999# Software Version
*#8888# or *#9998*8888# Hardware Version
*#9998*746# or *#9998*0746# or *#0746# Sim Infos
*#9998*523# or *#9998*0523# or *#0523# Display Contrast
*#9998*842# or *#9998*0842# or *#0842# Vibration On
*#9998*289# or *#9998*0289# or *#0289# Buzzer On
*#9998*288# or *#9998*0288# or *#0288# Battery & Field Infos
*#9998*377# or *#9998*0377# Error log
*#9998*778# or *#9998*0778# or *#0778# Sim Service table
*#9998*782# show date and alarm clock
*#8999*638# show network information
*#9998*5646# change operator logo at startup
*#9998*76# production number
*#9998*968# view melody for alarm
*#9998*585# Non-Volatile Memory (NVM)
*#3243948# Digital Audio Interference Off
*#32436837# Digital Audio Interference On
*#9998*4357# Help Menu
*#9998*5282# Java menu (GRPS/CSD settings for JAVA server)
*#9999#0# Monitor
Mode
*#9999# or *#9998*9999# Software Version
*#8888# or *#9998*8888# Hardware Version
*#9998*746# or *#9998*0746# or *#0746# Sim Infos
*#9998*523# or *#9998*0523# or *#0523# Display Contrast
*#9998*842# or *#9998*0842# or *#0842# Vibration On
*#9998*289# or *#9998*0289# or *#0289# Buzzer On
*#9998*288# or *#9998*0288# or *#0288# Battery & Field Infos
*#9998*377# or *#9998*0377# Error log
*#9998*778# or *#9998*0778# or *#0778# Sim Service table
*#9998*782# show date and alarm clock
*#8999*638# show network information
*#9998*5646# change operator logo at startup
*#9998*76# production number
*#9998*968# view melody for alarm
*#9998*585# Non-Volatile Memory (NVM)
*#3243948# Digital Audio Interference Off
*#32436837# Digital Audio Interference On
Samsung T100 secret codes
*#06# IMEI code
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters
*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also change IMEI to 447967-89-400044-0, you must use CHGIMEI to restore it)
*2767*2878# -> Custom EEEPROM Reset
*#8999*228# -> Battery status (capacity, voltage, temperature)
*#8999*246# -> Program status
*#8999*289# -> Change Alarm Buzzer Frequency
*#8999*324# -> Debug screens
*#8999*364# -> Watchdog
*#8999*377# -> EEPROM Error Stack
*#8999*427# -> Trace Watchdog
*#8999*523# -> Change LCD contrast
*#8999*544# -> Jig detect
*#8999*636# -> Memory status
*#8999*746# -> SIM File Size
*#8999*778# -> SIM Service Table
*#8999*785# -> RTK (Run Time Kernel) errors
*#8999*786# -> Run, Last UP, Last DOWN
*#8999*837# -> Software Version
*#8999*842# -> Test Vibrator
*#8999*862# -> Vocoder Reg
*#8999*872# -> Diag
*#8999*947# -> Reset On Fatal Error
*#8999*999# -> Last/Chk
*#8999*9266# -> Yann debug screen (=Debug Screens?)
*#8999*9999# -> Software version
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters
*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also change IMEI to 447967-89-400044-0, you must use CHGIMEI to restore it)
*2767*2878# -> Custom EEEPROM Reset
*#8999*228# -> Battery status (capacity, voltage, temperature)
*#8999*246# -> Program status
*#8999*289# -> Change Alarm Buzzer Frequency
*#8999*324# -> Debug screens
![]() |
| Infotechno |
*#8999*377# -> EEPROM Error Stack
*#8999*427# -> Trace Watchdog
*#8999*523# -> Change LCD contrast
*#8999*544# -> Jig detect
*#8999*636# -> Memory status
*#8999*746# -> SIM File Size
*#8999*778# -> SIM Service Table
*#8999*785# -> RTK (Run Time Kernel) errors
*#8999*786# -> Run, Last UP, Last DOWN
*#8999*837# -> Software Version
*#8999*842# -> Test Vibrator
*#8999*862# -> Vocoder Reg
*#8999*872# -> Diag
*#8999*947# -> Reset On Fatal Error
*#8999*999# -> Last/Chk
*#8999*9266# -> Yann debug screen (=Debug Screens?)
*#8999*9999# -> Software version
Samsung T200 codes
#9324# Netmon (press the hangup key to exit)
#9998*JAVA# Edit GPRS/ CSD settings (S100 Only)
*#9998*Help# Help screen/ List of codes
*#9998*LOGO# Change operator Logo
*#9998*RTC# RTC Display
*#9998*Bat# Battery Status
*#9998*Buz# Turns Buzzer ON
*#9998*Vib# Turns Vibrator ON
*#9998*LCD# LCD Contrast
*#9998*9999# Softwre Version
*#9998*8888# Hardware Version
*#9998*377# NVM Error Log (?????)
*#9998*NET# SIM Network ID
![]() |
| Infotechno |
*#9998*SIM# SIM Info
*#9998*PN# Production No.
*#9998*968# Reminder Tune
*#9998*NVM# Displays Non-Volitile Memory Status
*#9999*C# ???????????????????
*#06# Displays phones I**I No.
***/// ***/// NOTE /// *** RED COLOR , they appear serious !!! Use at own risk !!!
*#9998*2576# Forces SIM Error
*#9998*DEAD# Forces Phone Crash
*2767*MEDIA# Resets the medis on the phone (deletes all downloaded pics/tones)
*2767*FULL# Resets the EEPRON *DANGEROUS*
*2767*CUST# Resets the Custom EEPRON
*2767*JAVA# Resets JAV downloads (deletes all downloaded midlits)
*2767*STACKRESET# Resets Stack
*2767*225RESET# ????????????????? * Dangerous *
*2767*WAP# Resets WAP Setting & Deletes Favorites
For all Samsung mobiles ! some codes are not applicable for all samsung mobile
ENJOY..............................................
How to Bypass Google 2 Step Verification
Posted by Nikhil Chawra 9/03/2012
Step 1. First
of all go to www.k7.net and sign up there. This is a site where you
can receive fax or voice calls without having a phone no. When you
create an account on this site, it will provide you an unique phone no.
of US.
Related Post - BYPASS ANY SMS VERIFICATION
Step 2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.
Step 3. Now click on 'I accept, create an account'.
Step 4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from http://www.k7.net/
Step 5. Now you will get a mail having verification code as voice mail on that account from which you have registered on . Open it, download the attachment file and listen the code http://www.k7.net/
Step 6. Now enter the code of your voice mail in verification code. and click OK.Your account is ready now :)
Related Post - BYPASS ANY SMS VERIFICATION
Step 2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.
Step 3. Now click on 'I accept, create an account'.
Step 4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from http://www.k7.net/
Step 5. Now you will get a mail having verification code as voice mail on that account from which you have registered on . Open it, download the attachment file and listen the code http://www.k7.net/
Step 6. Now enter the code of your voice mail in verification code. and click OK.Your account is ready now :)
HOW TO BLOCK YOUR ENEMY'S SIM CARD
Posted by Nikhil Chawra 9/03/2012
What is Sim card ?A subscriber identity module or subscriber identification module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) and the relatedkey used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers).
- BY wikipedia
HOW TO BLOCK YOUR ENEMY'S SIM CARD
Here a simple trick for block your enemy sim card,Blocking a sim card is too simple.What you have to do is just enter the below code in the desired phone
**04*3814*7529*68243#
Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.
Note:Entering of invalid PUK will cause permanent blocking of your SIM
YOUR OWN PORTABLE HACKING DEVICE
Posted by Kunal Karda 9/03/2012
MAKE IPOD/IPHONE A HACKING DEVICE

For all the complaints against apple for making it hard to get an
application registered and sold in the Apple store, there are some very
cool applications that can be used to set up your Iphone or other apple
Iphone OS based system into an excellent scanning and pseudo hacker
tool. These are the products you want to get if you are a security
engineer.
Ipad that will help you figure out what systems have what ports open on
a remote computer. Cost is 1.99 and it works quite well, but at times a
bit slow depending on the network you are working with. This is the
coolest tool out there right now to use an IPod/Ipad/Iphone for
security work.

address and number of services running on each computer that it
encounters. Works excellent on an Iphone/IPod meaning it will work
great on an Ipad as well.

on all the Iphone/Ipod systems that I tested this on and allowed remote
access. Saving off the data from the security scanner you can use this
tool for checking Windows based systems that might be improperly
secured.

most expensive application of the lot. Works very well and if the VNC
server is not set up right can help you figure out how to connect to
systems that are improperly configured or are not using a good password
system.

around you and which ones are secure and which ones are not. Very
similar to any other wireless network analyzer on the market, this one
works on your IPod/Iphone and should work great on an Ipad.

With these tools you can turn your Iphone/IPod and soon to be Ipad
into a relatively robust and portable security/hacker system that will
let you know a lot about the networks you are connecting too. These are
some very cool applications and for around 40 dollars in total these
can be yours and working very quickly on your IPod/Iphone.
For all the complaints against apple for making it hard to get an
application registered and sold in the Apple store, there are some very
cool applications that can be used to set up your Iphone or other apple
Iphone OS based system into an excellent scanning and pseudo hacker
tool. These are the products you want to get if you are a security
engineer.
Security Scanner by Tommy Kammerer
A full featured port scanner for your Iphone, IPod or soon to beIpad that will help you figure out what systems have what ports open on
a remote computer. Cost is 1.99 and it works quite well, but at times a
bit slow depending on the network you are working with. This is the
coolest tool out there right now to use an IPod/Ipad/Iphone for
security work.
iNet Pro Network Scanner
This one is more detailed in terms of providing the name, IPaddress and number of services running on each computer that it
encounters. Works excellent on an Iphone/IPod meaning it will work
great on an Ipad as well.
iTap RDP Client for Windows by HLW
This application completely rocks and is very easy to use. It workson all the Iphone/Ipod systems that I tested this on and allowed remote
access. Saving off the data from the security scanner you can use this
tool for checking Windows based systems that might be improperly
secured.
iTap VNC Client
Same as the iTap RDP Client – just works on VNC systems and is themost expensive application of the lot. Works very well and if the VNC
server is not set up right can help you figure out how to connect to
systems that are improperly configured or are not using a good password
system.
WiFi Analyzer
A very simple WiFi analyzer to let you know what networks arearound you and which ones are secure and which ones are not. Very
similar to any other wireless network analyzer on the market, this one
works on your IPod/Iphone and should work great on an Ipad.
With these tools you can turn your Iphone/IPod and soon to be Ipad
into a relatively robust and portable security/hacker system that will
let you know a lot about the networks you are connecting too. These are
some very cool applications and for around 40 dollars in total these
can be yours and working very quickly on your IPod/Iphone.
7 Sites to Send SMS for Free without Registration
Posted by Nikhil Chawra 9/01/2012
Most of us chat with our Friends using our Cell Phone and Many of us
used to send SMS online to our Friends and Family . For that we need to
Register in Some Site and always need to login into your account in
order to send a SMS. There are many sites to send Free SMS.Related Post - How to get Email Alert on your Mobile for Free
But what if there will be a site where you can send SMS to anyone without Registering or without telling your Number to the Receiver. I mean you do not need to Register yourself in Order to send an SMS . In other words the receiver will not be able to know your Number. Yes this is now Possible.
Previously I have posted about Send free SMS without Registration in 160 Character , but now I have a List of few Sites from whcih you can send SMS for Free without Registration in India .
Here we Go -
SMSTI.com
No Registration or Login required. Send Unlimited 160 Characters Sms. You Check Message Delivery Report in Real Time. They Don’t Include Any Ads Along With Your Sms. Very High Speed Message Delivery System.
BollywoodMotion
Send Upto 500Charecters SMS. All GSM and CDMA network Supported. No ads and Very High speed delivery.
SeaSMS
Here you can send SMS and MMS throughout the World for free without Registration.
SMSMAFIA
Free SMS India: Send free sms to all GSM CDMA mobiles from your computer without registration.SMS PORTAL
Send Free SMS without registration
FooSMS
Write mobile number and message you want to send and click on send.
9TO9 SMS
So here were the List of the Top 7 SMS sites from where you can send SMS for Free without Registration.
Thanks
Trace Mobile numbers or IP-Address - How to?
Posted by Nikhil Chawra 8/29/2012
Recently I came accross a website in which we can
easily trace a Mobile number. For example , when we enter the 10 digit
mobile number, then we get the Mobile Service provider, Location, City along with area. Thats really awesome.- This tool will be really helpful specially for business persons to verify the location etc...
- Just Enter your Ten Digit Mobile no. in the box shown below..and Click on Submit button

- After that the Information given by this website is Shown as below::

- Its really Awesome Website..Just Click Here to open this mind blowing website..
- Trace Vehical Number
- Trace Pin Code
- Trace IP Address
- WHOIS Trace
- Trace Fixed Line Number & More..
Hack Gmail using Advance Phishing Technique[UPDATED]
Posted by Nikhil Chawra 8/28/2012
Hi everyone, our blog got so many comments regarding email hacking , and thus I’m writing this tutorial using the best – Fool Proof attack known as Phishing attack to hack Gmail Accounts, but it’s advance phishing attack so I’m going to give some steps to make your own Phishing attack possible, In this tutorial we’r going to make phishing page of gmail.
It’s only for Educational purpose don’t misuse it because I will Not Hold any responsibility .
Step 1# First of all you’ll need Gmail verifying page as I earlier told you it is Advance Phishing attack to hack gmail, yahoo and lots more …!!
To make this page you need three file :i) Gmail Verifying Page ( out phishing page )
ii) mailer.php (this file work for redirect your phishing page )
iii) hackedid.txt ( leave this blank , it will store the passwords )
You can download this package from Here :
Step 2# After downloading the page, Open this package with WinRAR or any extractor tools that you are using , you need to edit this page .
So, Open Reauthenticate.htm or gmail.htmlThen find the email address “NCHAWRA6@GMAIL.COM“
And just replace it with the email address that you want to HACK …!!! As showed in image below
Step 3# Now you need website hosting to upload this file just go to
Don’t Panic !!! I am not going to ask you pay money for this, there are many websites available that provides free web hosting, we’ll be utilizing those free hosting here.
Out of all the best free hostings are:
www.ripway.com
www.t35.com
www.110mb.com
www.yourfreehosting.com
which support .PHP and ftp and than upload all files . Just open your Phishing page by right clicking on Reauthenticate.htm and copy this link …!!!
Step 4# Now in this steps you need some little bit of social engineering , just like chat with the Victim and give him your phishing page link as you copied earlier and tell him that, ” This link have many tutorial on Hacking”. When the Victim will Click on the link , Victim will see your phishing page. He will think that gmail is asking him to get verified because he saw that his email is already there and he just need to enter password to verify , and if he will put the password he will redirect to ( or according to your address as you edit in mailer.php ) and thus the Victim can’t even realize that he/she has been hacked.
See the Image:`
Now just go to hackedid.txt where you upload it …and BinGOO ….!!!! see below
If you have any problem regarding this tutorial or any other article, feel free to comment below !!!
TRACE VEHICLE AND GET ITS INFORMATION
Posted by Nikhil Chawra 8/28/2012
Hello Friends, today i am sharing an awesome trick with you all. Today I will tell you
How to trace a vehicle and get its information ?
This is very easy trick, it can be easily done only one thing u need is vehicle number of victim whom u want to trace.
first of all open the below link -----
Enter the registration number of the vehicle which u want to trace and click on submit
for more information click n show detail option and get the remaining info....................
ENJOY THE TRICK............................................

How to trace a vehicle and get its information ?
This is very easy trick, it can be easily done only one thing u need is vehicle number of victim whom u want to trace.
first of all open the below link -----
Enter the registration number of the vehicle which u want to trace and click on submit
for more information click n show detail option and get the remaining info....................
ENJOY THE TRICK............................................
Recover My Files 4.9.4 Full Version Portable PC Software
Posted by Nikhil Chawra 8/27/2012
If you are worry about the lost files now you can recover deleted files emptied from the recycle bin or deleted due to any type of virus attack or infection or due to formating your hard disk. You can use Recover My Files data recovery Software that can easily recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or Software failure.
Download (link removed)
Few options are as under:
Download (link removed)
Few options are as under:
- Search Windows temporary folders
- Locate and recover files that have never been saved
- No technical skills required
- Recover My Files is fast and easy
- Hard drives
- USB drives
- External storage units
- Digital camera storage media
Windows 7 Tweaks free download
Posted by Nikhil Chawra 8/26/2012
Windows 7 Tweaks free download
Written by bestselling author and the creator of tweaks.com Steve Sinchak, this unique guide provides you with the ultimate collection of hidden gems that will enable you to get the most out of Windows 7. Packed with more than 400 pages of insider tips, the book delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 so you can get every ounce of performance from your operating system.
?
+
X
Recommended for you
Loading..
















.jpg)



