how to crack a software by yourself


click the following link:


http://www.raymond.cc/blog/archives/2007/12/03/how-to-crack-programs-yourself-with-offset-comparison-tool/

NEEDED FILES FOR HACKING


Needed Files for Hacking
ActiveX 6.02
-Microsoft ActiveX Control
Pack...- winsck.ocx
bwcc32
-bwcc32.dll
cswskctl
-cswskctl.vbx
cswsock
-cswsock.vbx

cygwin
-cygwin.dll
dssock32
-dssock32.ocx
icmp
-icmp.dll
ipdaem32
-ipdaem32.ocx
ipport
-ipport.vbx

msvbm50
-msvbm50.dll
oc25
-oc25.dll
vb40016
-vb40016.dll
vb40032
-vb40032.dll
vbrun300
-vbrun300.dll

ws2setup
-Winsock 2.2 Upgrade

STYLISH THEMES FOR WINDOWS 7


The latest and the stylish themes for the windows7 is the BIG JAPAN theme pack.This theme pack make your windows7 os very attractive.

Download from the following link:
http://www.esnips.com/doc/43c58546-2bb6-4b1d-bdd4-91fc6effbc0e/BingJapan1

[How To] Block programs in Windows 7 using Registry Editor


Follow the simple steps given below to block execution of any particular program on your Windows 7.
  1. Click Start, and then click Run.
  2. In the text box, type regedit, and press Enter.
  3. Locate and then click the following registry key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer
  4. In the right side panel right click on some empty area and point to New, and then click on DWORD Value.
  5. Type disallowrun, and then press ENTER.
  6. Double-click the DisallowRun value that you created in the previous step.
  7. Type 1 in the Value data box, and then click OK.
  8. Create a newHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer\DisallowRun subkey.
  9. Right-click the following registry key, point to New, and then click Key:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer.
  10. Type disallowrun, and then press ENTER.
  11. For each program that you want to prevent users from running, create a new string value in the DisallowRun subkey . Use consecutive numbers to name the string values (starting with 1), and use the executable file name for the program as the data for the string value.For example, if you want to restrict users from running Microsoft Internet Explorer:
    1. Go to the following key in Registry Editor:
      HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer\DisallowRun. Then right click in the right side panel and create a new string value. Type 1, and then press ENTER.
    2. Double-click the 1 value that you created in the previous step.
    3. Type iexplore.exe in the Value data box, and then click OK.
  12. Quit Registry Editor, and then restart the computer.

China Mobile Secret Codes


–Default user code : 1122, 3344, 1234, 5678
–Engineer mode : *#110*01#
–Factory mode : *#987#
–Enable COM port : *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
–Restore factory settings : *#987*99#
–LCD contrast : *#369#
–Software version : *#800#
–Software version : *#900#
–Set default language : *#0000# Send
–Set English language : *#0044# Send
–Set English language (new firmware) : *#001# Send
–Default user code : 1122, 3344, 1234, 5678

Hack Wifi using Backtrack


Hacking Wifi using Backtrack - rdhacker.blogspot.com
Wifi or Wireless Fidelity is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections (as if you didnt know..),Wifi has become an integral part of our lives today. Wifi is secured using a WPA protocol which intends to secure Wireless LANs like Wired LAN’s by encrypting data over radio waves,however, it has been found that WEP is not as secure as once believed.Now almost anyone can hack into a Wifi network by generating the valid WEP key using Bactrack. Read on to learn how ..
Disclaimer: This tutorial is given for educational purposes only and that for any misuse of this information, the blogger cannot be held liable.
SETTING UP THE CARD AND THE CONSOLE
Boot up Backtrack on your virtual machine/laptop and open up the command console and type the commands as they are given -
  • ifconfig
This is the Linux equivalent of ipconfig, you will see the network adaptors in your system. See which one is for Wi-Fi. A few examples are wlan0, wifi0, etc.
  • airmon-ng
This command will initialize the Wi-Fi network monitoring & will tell you how many networks are in range
  • airmon-ng stop [Wi-Fi Card name(without the quotes)]
This command will stop the cards broadcast and reception immediately
  • macchanger –mac [Desired MAC address] [Wi-Fi card name]
this command will change the current MAC address to any MAC address you desire, so that you don’t get caught later
  • airmon-ng start [Wi-Fi Card name]
You will see another extra adaptor that is set on monitor mode, use that adaptor for all further purposes in the following commands where – ‘[Wi-Fi card name]’ appears
DUMPING PACKETS
Once you have set up all the parameters,you need to sniff and dump data packets in order to get the key.You can do so by using following commands. On the command console type these commands -
  • airodump-ng [Wi-Fi card name]
Copy and paste the BSSID in the following command and execute it
  • airodump-ng –c [Channel Number] –w [Desired Filename for later decryption] --bssid [BSSID] [Wi-Fi Card name]
As you execute the command, you will see a certain number of beacons and data packets that will be stored in the filename you have given. The file will be stored in the root of the system drive (Click on Computer and you will see the file).The file will be present in two formats: *.cap, *.txt.
SPEEDING UP THINGS
However packet dumping is quite a slow process,we need to speed up things to save our time.Open a new console after the first data packet has been stored and type the command in the new console and execute it
airreplay-ng -1 0 –a [BSSID] –h [FAKED MAC ADDRESS] -e [Wi-Fi name (you wish to hack)] [Wi-Fi card name]
As you type this command you will see that the data packets required for breaking the key will increase dramatically thereby saving you a lot of time.
REVEALING WEP KEY
Open another console once you have around 20,000 data packets and type the following command to reveal the WEP key.
aircrack-ng –n 64 –b [BSSID] [Filename without the extension]  Revealing the WEP Key - rdhacker.blogspot.com
As you type this command, you will see that a key will appear in front of you in the given below format:
XX:XX:XX:XX
It is not necessary that the key should have exactly the same digits as shown above so please don’t freak out if you see a 10 digit or 14 digit key. Also if the decryption fails, you can change the bit level of the decryption in the command:
aircrack-ng –n [BIT LEVEL] –b [BSSID] [Filename without extension]
Remember, the bit level should be a number of 2n where n:1,2,3,4…
e.g.
aircrack-ng –n 32 –b [BSSID] [Filename without the extension]
OR
aircrack-ng –n 128 –b [BSSID] [Filename without the extension] etc. etc.
Now just login using the WEP key you got.

Scan files online using 40+ antivirus software at Virustotal


Ever wanted to scan a suspicious looking file using multiple antivirus software ? This happened to me recently, as I stated in my last post that I upgraded my  sadsdUbuntu linux to Lucid Lynxand installed Oracle Virtual Box over it. I later installed Windows XP as a virtual operating system and thought it might be better if I would install an antivirus program on it. However, as I moved my antivirus program and some other files from my USB drive, I had a gut feeling that things are just not right. So..a bit of googling landed me at Virustotal.com which allows to scan a file using multiple antivirus software, and it does what it says perfectly :)
Virustotal main website - theprohack.com
The site is extremely easy to use, I uploaded a file over it and it took less than a minute to generate results.
I uploaded a file over it and it took less than a minute to generate results - theprohack.com
The file was found positively ID’ed by it and one antivirus triggered a positive result from a scan of 41 antivirus.
one antivirus triggered a positive result from a scan of 41 antivirus. - theprohack.com
Pros
  1. Extremely fast scanning
  2. Scanning using 40+ antivirus
  3. complete detail about the file is provided
Cons
  1. Cant scan my whole PC :(
  2. Can only scan one file at a time
  3. 20 MB file limit (that means I cant scan heavy executables like that of Adobe Photoshop and Burnout Paradise)

How to Use Windows 7 Without Activating


Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activations. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.

1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter
slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
5. In right-side pane, change value of SkipRearm to 1.
6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using “slmgr -rearm” command before registry edit
+
240 days using “slmgr -rearm” command after registry edit
 =      360 Days

command prompt hacking



The following are the IP utilities available in Windows that help in finding out the information about IP Hosts and domains. These are the basic IP Hacking Commands that everyone must know!
Please note that the the term Host used in this article can also be assumed as a Website for simple understanding purpose.
1. PING
PING is a simple application (command) used to determine whether a host is online and available. PING command sends one or more ICMP Echo messages to a specified host requesting a reply. The receiver (Target Host) responds to this ICMP Echo message and returns it back to the sender. This confirms that the Host is online and available. Otherwise the host is said to be unavailable.
syntax:
c:\>ping gohacking.com
2. TELNET
Telnet command is used to connect to a desired host on a specified port number. For example
syntax:
c:\>telnet yahoo.com 25
c:\>telnet yahoo.com
NOTE: The default port number is 23. When the port number is not specified the default number is assumed.
Telnet Hacking is explained in detail in the following post.
How To Send Fake Email
3. NSLOOKUP
Many times we think about finding out the IP address of a given site. Say for example google.com, yahoo.com, microsoft.com etc. But how to do this? For this there are some websites that can be used to find out the IP address of a given site. But in Windows we have an inbuilt tool to do this job for us. It is nslookup. Yes this tool can be used for resolving a given domain name into it’s IP address (determine the IP of a given site name). Not only this it can also be used for reverse IP lookup. That is if the IP address is given it determines the corresponding domain name for that IP address.
syntax:
c:\>nslookup google.com
4. NETSTAT
The netstat command can be used to display the current TCP/IP network connections. For example the following netstat command displays all connections and their corresponding listening port numbers.
Eg: C:\>netstat -a
This command can be used to determine the IP address/Host names of all the applications connected to your computer. If a hacker is connected to your system even the hacker’s IP is displayed. So the netstat command can be used to get an idea of all the active connections to a given system.



A Closer Look at a Vulnerability in Gmail


Gmail is one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word BETA. Sometimes we may wonder, why Gmail is still in the testing stage even after years of it’s emergence. Here is one small reason for that. 
Gmail follows a strict rule that doesn’t allow it’s users to have their first or the last namecontain the term Gmail or Google. That is, while signing up for a new Gmail account the users cannot choose a first or last name that contains the term Gmail or Google. You can see this from the below snapshot.
This rule is implemented by Gmail for obvious reasons, because if the users are allowed to keep their first or the last name that contains the term Gmail or Google, then it is possible to easily impersonate the identity of Gmail (or Gmail Team) and engage themselves in phising or social engineering attacks on the innocent users. This can be done by simply choosing the first and last name with the following combinations.
First Name        Last Name
Gmail                       Team
Google                     Team
Gmail                       Password Assistance 
From the above snapshot we can see that, Gmail has made a good move in stopping the users from abusing it’s services. However this move isn’t just enough to prevent the malicious users from impersonating the Gmail’s identity. Because Gmail has a small vulnerability that can be exploited so that the users can still have their name contain the terms Gmail or Google. You may wonder how to do this. But it’s very simple.
1. Login to your Gmail account and click on Settings.
2. Select Accounts tab
3. Click on edit info
4. In the Name field, select the second radio button and enter the name of your choice. Click on Save Changes and you’re done!
Allowing the users to have their names contain the terms Gmail or Google is a serious vulnerability even though it doesn’t seem to be a major one. This is because a hacker or a malicious attacker can easily exploit this flaw and send phishing emails to other Gmail users asking for sensitive information such as their passwords. Most of the users don’t even hesitate to send their passwords since they believe that they are sending it to Gmail Team (or someone authorized). But in reality they are sending it to an attacker who uses these information to seek personal benefits.
So the bottomline is, if you get any emails that appears to have come from the Gmail Team or similar, don’t trust them! Anyone can send such emails to fool you and take away your personal details. Hope that Gmail will fix this vulnerability as soon as possible to avoid any disasters.

How to Load and use multiple OSs from your USB drive


Ever felt like carrying your Ubuntu, Fedora, Tiny-core and all other OS’s iso in your pen drive? Yes, you can now carry all your favorite Operating systems with you wherever  you go and boot from them using the same USB drive.MultiBoot USB is a freeware which can help you to use the multiple OS iso files on the same pen drive.
To use the MultiBoot on your pen drive it must meet some requirements first. You’ll require a FAT32 formatted pen drive and a computer which can boot from a USB device. Prefer using an 8-16 GB pen drive so that you can have more different operating systems on it.
To start off first download the MultiBootISO’s from here . Run the executable and follow the instructions. Browse to the ISO file you want to load on your USB drive and build the bootable USB using it. You might have to format your pen drive during the process so do take a backup of all your data which is there on the pen drive.
To add more ISO files repeat the same procedure. Restart your PC and set the highest priority for the USB drive to boot from it and done. Do give it a shot!!! :)

Download MultiBoot ISO’s (781 KB) (Freeware)http://www.pendrivelinux.com

Add funny effects to your photos using PicJoke


PicJoke is one of those amusing web services which allows you to add funny effects to your pics. It’s really a very user friendly and an easy to use service.
After entering the site all you have to do is just select any effect you would like to use.After that upload your photo which you want to use. And click on “Create your picture”. In the end you will see the option to download your picture or you can share it on Facebook.
Here is an example of what you can do with your images.The image in the frame on wall and on the girls laptop was the original image which I uploaded.
Everyday you will see some new effects to apply to your photos. PicJoke is a completely freeservice and easy to use. It does not even require any registration .Now even you can make your boring pics look funny and share it with your friends. Have fun.http://www.picjoke.net

LEARN TO HACK