Skip to main content

Posts

Showing posts from February, 2012

Send Free sms WorldWide, Lets game da world

Send free text messages using this site.  Send free SMS from the computer. You can send free unlimited text messages from this website to almost anywhere in the world / India. You don'tneed to send text messages from your phone anymore; do it online! If you're at school or work, this site will allow you to send free sms. It is an absolutely free sms text messaging service, Instant delievery makes it more attractive. . . . . .The site is simpler and easy to handle, all u have to give reciep number without country code or any other and have to chose operator . . . . . .thats it. . . . . . Send Sms WordWide just go to above link and u r done. . . . !

How to Detect Anonymous IP Addresses

As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP. 1. Credit Card Frauds For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeri

What is Phishing ?

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures. Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing. Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . He

Hacking FAQs

I get a lot of emails about hacking. It’s hard for me to answer each and every question which is asked more frequently. So here I have compiled some of the Most Frequently Asked Questions (FAQs) about Hacking. Hope it helps. Don’t forget to pass your comments. What is Hacking?  Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. Hacking is the art of exploiting the flaws/loopholes in a software/module. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. Who is a Hacker? A Hacker or White Hat Hacker, also known as Ethical Hacker, is a Computer Security expert, who specialise in penetration testing, and other testing methodologies, to ensure that a company’s information systems are secure. Such people are employed by companies where these profes

Silent Mail Bomber 100% Working

Hi Friends, here is a mail bomber I have used it long time ago and today I found it on my backup DVD and checked if it's working or not, and voilaaaa it's still working. So wish to share with all of you and hope you will enjoy. It's very easy to use and so I don't feel to put the tutorial here. DOWNLOAD

Removing virus manually in windows XP

Start->Run->type cmd in each drive type attrib /s /d it will display the list of all files in that drive along with folders.concentrate on files having SHR attribute.normally virus files have two characteristics 1.SHR attribute 2.Queer name like amvo.exe,r6r.exe,autorun.inf etc. Note:some system files also have this attribute like MSDOS.SYS,IO.SYS etc so before deleting goggling about that file will help. to delete these files type c:\>del /f /s /a >> to view the content of files with .inf,.vbs,.c etc i.e files which r not batch files or executables.goto explorer n then goto the required drive or folder n type the file name with extension it will open up in notepad. >>there is another method also.goto the required location n type attrib -s -h -r file name then use gui to see that hiiden file.if it is not n exe or .bat or then open it with notepad.Here you will get some information like a file name or a registry key which the virus affects or a start up