Wednesday, 26 November 2014

Facebook Latest Bug Suggest Friends To Themselves Using Facebook Social ToolKit






Make Fool Your Friends By Using Facebook Social Toolkit!

We are all in a Generation where facebook uses are too much it has become a part of our day to day life

Most of Peoples Known That You Can Only Suggest Your Friends To Other Friends, But You Can Not Suggest Themselves

So let us say what we got for you all. What will be it like to get a friend request from yourself on facebook?! ?! It sounds interesting right. yeah!

And the most entertaining part is that your friends will start to think that someone may have created their fake account or someone may have succeeded to hack their account. Your friends will go crazy when they will see that you suggested them to their own account. We are pretty much sure that this trick will make your friends think that their facebook profile is now hacked or the facebook is going crazy.

You Need To Download Facebook Social Toolkit Which was Made By Mr.Dinesh Bhosale

Enjoy it =D and share with your friends!


  • This is just a prank and won’t end up getting you a ban from facebook. Don’t Worry. POINTS TO BE NOTED:-


#1 :- This will does not creat any harm neither to your nor to your friends

#2 :- You can suggest your friends to themseleves without getting any banned

#3 :- Free and Spam Free :

#4 :- Best One Their is some Paid Tools in Facebook Social Toolkit But You can use this paid tool for sometimes by entering this TEST KEY! :-  testkeyforall


  • Steps to suggest your friends to themselves


#1 :- Install Facebook social toolkit chrome extension from chrome web store.

#2 :- Start Facebook Social Toolkit chrome extension.

#3 :- Click on suggest friends to themself button (as shown in the screenshot)

#Enjoy!





  • For more info watch the video carefully.



Monday, 24 November 2014

How To Get Approved By Google Adsense Via YouTube Trick ?


Everybody Know that Google Adsense is the Best Place for Making Money. It is a Program by Google that Enable Publishers to Generate Cash Through his Websites or Blogs. Adsense can generate cash according to per-page-expression and per-page-click.

Geeting Approved by Google Adsense is Very Difficult Game, So Keep in Mind that It is a Money Making Machine and Work on Adsense and You will Get Approved by GA by Follow These Simple Steps

On The Other side its ia Also Known name in the market of Advertising Network that is the main Source of Money to Adsense. It is a Dream of Every Blogger to have an Adsense Account So, Today am Gonna Show that How to Get Approved by Google Adsense Network. Sounds Good, There is no Complex work that you can Do It. Just Follow These Below Steps to Get Approved by Google Adsense.

  • Steps to Get Approved by Google Adsense Program


Create Google Account if you have Already, So SKIP.

Go to This YouTube Monetization Page.

Now in Monetization TAB you can See the Option of "Enable My Account". Just Click on It.

Now After Doing This a Pop-Up Dialog Box is Open that is "Term & Conditions". Accept it.

Now a page will Open Where You can Click on "Monetize" Button.

You can Enable your "Monetization Option" for your Youtube videos

Lets Do It, Now Time to Approve Google Adsense.

UPLOAD, 5-10 Unique Video that you create by him Self.

Wait ! ! Get Some Views on Your Youtube Videos.

Now Again go To "YouTube Monetization Page" and Find the Option "How Will i Paid" Expand it and Click on "Associate a Adsense Account Link".

Screen will Open Where you Submit the URL of Your Channel Where you want to Show Adsense Ads.

Click on "Continue" ans Submit Application.

Wait for a 1-2 Hour, Check Your Inbox and you got Mail From Adsense Program.

"Approved"

If You Faced any Type of Problem Related to This Article Please Leave Comment Below or You can not Approved by Adsense Program and You can't Able to Approve Our team Help You to Approve by Adsense.

We're happy to help! =)

How To Add Background Music To Your Blogger Blog/Website ?


Here is The Most Easy and Simple Method To Add Background Music In Your Blog/Websites

Background Music Has a Cool Effect On The Visitors of Your Blog or Websites, It May Help You In Catching The Attentions Of Your Visitors

Its Amazing that when user Surfing on Website/Blog and Listen Music that automatically starts when webpage is loaded. Embed any Background Sound and Music behind the Blogger Blog and Websites is too easiest work. One Day i surfing on internet and i see a player's blog and when i load that page automatically Music starts and i amazed and check my computer's background and i looking for where the music is played and i noticed that sound is coming from Blog's Webpage. Then I Decided To Adding Music in My Own Website and I Like To Share This Post So People Can Also Add Background Music To Their Blogs/Websites!

Let's Start!

Go To Blogger Dashboard > Layout.

Click On "Add Gadget" > HTML/Javascript.



Now Copy the Below script and paste in HTML/Java script Section.

--------------------------------------------------------------------------------------------------------------------------
<audio autoplay loop><source src="http://your-mp3-file-location.mp3"></source></audio>
-------------------------------------------------------------------------------------------------------------------------



NOTE : replace Your Song's URL With http://your-mp3-file-location.mp3 and Save the Gadget and View Your Blog and Listen Music While Surfing on Your Blog.

=D It's Done Now Check Your Blog And Enjoy Music =) 

Don't Forgot To Share , Stay Tuned with Us!

Sunday, 23 November 2014

7 Facts/Truths About Rajnikant You Don't Know


#1 :-  Rajinikanth was born as Shivaji Rao Gaikwad in an impoverished family in Bangalore. He did all those odd jobs previously due to the same reason. He had worked as a coolie and had also joined Bangalore transport service as a conductor!

2) The actor has worked in Tamil, Telugu, Kannada, Malayalam, Hindi and even Bengali films except in his mother tongue. Though, not many may know that Rajini was a MAHARASHTRIAN!

3) Rajnikant is an actor that is never scared for an experiment! Thus he is famous for having portrayed some of the most diverse roles in a career spanning four decades. Be it Rajinikanth’s white and red-streaked hairdos, blonde moustache or six-pack abs in his upcoming film Kochadaiyaan, this is one actor who is never afraid to experiment.

4) As always he has been a great fighter in his movies, he has actually never hurt himself! Shocking right? The directors/producers are actually scared of portraying Rajni dead in movies as people might get angry and burn down the theatres.

5) After his 2007 release, Sivaji, Rajinikanth became the highest paid actor in Asia after Jackie Chan for taking home a salary of 26 crores!

6) If you are a Rajinikanth fan, then you would be knowing that he had done some dance steps with controversial south Indian actress, Silk Smitha. The actor was reported to be having an affair with the Malayalam actress several times, as he was a family man always!

7) The best and the most shocking fact is that Rajnikant has not only worked in films with regional languages but also in an english film! In 1988 He worked in a film called Bloodstone, Produced by Ashok Amritraj, it was directed by American filmmaker, Dwight H. Little.

Yanna Rascle Mind it!!!

Subscribe us and Stay Tuned with Us ! =)

Best 5 Online Security Scanners


Online security is one of the trending topic of these days and it is very much important for all internet users. As Internet is full of online threats and fraud, then also users are very keen to use it. Internet is good as well bad also, because every good things have some of its demerits also. Same as Internet is the vast source for information, knowledge and other things too. But there are some spammer who makes users to there victim.

There are tonnes of users who is also doing bad thing over internet as every seconds they are spreading there malicious application by various means like making phishing webpage, attach in some software, bundled with some video flash player, or via attractive online advertising.

For these there are some security firms out there who are contentiously working on these issue and try to make it as low as possible. These firms provides some handful application/service to the users as like Security products , Online Security Services and Online Security Scanner and also helps users by various means.

So below here are some of the free and good online security scanner that will help you to check the threats on PC's or laptops.
[Note- Some of them ask to download its supportive addons (browser extension), or application before proceed to the online scan.]


1. ESET Online scanner- ESET is one of the best and free online scanner. ESET scan your computers for know malware, virus and other types of threats. It is optimized for Internet Explorer and it download ActiveX control in Internet Explorer. If you use other browser (Google chrome, Firefox) for scan, it will ask to download small application that help to run Online scan.

2. TrendMicro Online Scanner- Now TrendMicro is another best online virus scanner which have high threats detection ratio. The online scanner is named as Housecall and this provides a quick and easy check for threats regardless of the protection status of your existing security solution. It is easy to use, reliable and cleans your computer from Malware and virus.

3. BitDefender Online Scanner - Here comes the another impressive online security scanner tool. BitDefender is easy to use, with powerful detection and updates, and reliable. Its Online scanner is one of the fastest scanner (as I have seen) and it also scan your system for all the major threats. BitDefender run without installing any supportive apps or tools. Bitdefender scan and automatically clean the system memory, all files and drives' boot sectors also.


4. F-Secure Online Scanner- F-secure is also a good online scanner available for free. F-secure needs Java run-time environment for online scan of your system. F-secure is much effective scanner because first it downloads the latest virus database before preform scan.

5. Bullguard Online Scanner- Bull Guard is same as BitDefender scanner. It will ask to download supportive addons and then you can scan your system for the threats.

There are  many other many others Online Virus Scanner available Quick Heal Online Scanner, McAfee Security Scan, Panda Active scan, but here I have only listed good online scanner. All the above discussed online scanner have good detection ratio and is less time and resource consumption.

Friday, 21 November 2014

Some Facts That Will Makes You Shocked


Did You Know?

SomeFacts That Will Makes You Shocked!!

Must READ! :-


  • #1 :- A human brain has a capacity to store 5 times as much information as Wikipedia

  • #2 :-   You can survive without eating for weeks, but you will only live 11 days without sleeping.
  
  • #3 :- According to Albert Einstein, if honey bees were to disappear from earth, humans would be dead within 4 years.


  • #4 :- A person’s height is determined by their father, and their weight is determined by their mother.


  • #5 :- There are at least 6 people in the world who look exactly like you. There’s a 9% chance that you’ll meet one of them in your lifetime.

  • #6 :- Your shoes are the first thing people subconsciously notice about you. Wear nice shoes.


  • #7 :- There are so many kind of apples, that if you ate a new one everyday, it would take over 20 years to try them all.

  • #8 :- People who laugh a lot are healthier than those who don’t.

  • #9 :- Our brain uses same amount power as 10-watt light bulb!!

  •  #10 :-Our body gives enough heat in 30 mins to boil 1.5 litres of water!!



Thursday, 20 November 2014

FBI Offers 1 Million $ Reward for Romanian Cybercriminals


United States investigation Agency Federal Bureau of Investigation (FBI) is looking for the two Romania cyber hackers who is allegedly involve in a massive cyber crimes and cyber frauds. FBI have also announced a monetary awards of $1 million for the information of these two Romania cyber criminals.

The two Romanian nationals, named as Nicolae Popescu and Dumitru Daniel Bosogioiu have made it to the FBI’s Most Wanted Cyber Fugitive List after participating in a long-term cyber-fraud conspiracy that inflicted losses of over $3 million on US businesses.

High level of Online Scamming
According to the FBI, Popescu ran a multimillion dollar cyber-fraud scheme on US-based car-trading websites Cars.com and AutoTrader.com. eBay.com and other similar sites were also used by the fraudsters, who posted advertisements for cars, motorcycles, boats, and other high-value items that had a price range from $10,000 / €8,000 to $45,000 / €36,000.


These criminals have designed there phishing offer so well that it completely looks genuine. Fake invoices that were seemingly issued by legitimate online payment services were sent to the buyers, along with instructions for depositing the money in a US bank account, which belonged to the conspirators.
The US bank accounts receiving the money would be set up by the crooks using fake documents. In this fraud both criminals allegedly made around $3 million in ill gotten moolah.


  • On the statement FBI wrote- 
Popescu coordinated the roles of the various participants in the scheme – he hired and fired passport makers based on the quality of the fake passports they produced, supervised co-conspirators who were responsible for placing the fraudulent ads and corresponding with the victims, and ensured that the illicit proceeds transferred to the U.S. bank accounts were quickly collected and transferred to himself and others acting on his behalf in Europe.

Dumitru Daniel Bosogioiu is also on the list, with a bounty of up to $750,000 / €600,000 for details leading to his arrest. Both of them have been charged along with 11 others. They managed to escape an international takedown in December 2012.


Wednesday, 19 November 2014

WhatsApp Messenger Adds End-to-End Encryption by Default



World popular messaging app Whatsapp which have the more than 600 million users have got a new features. Facebook owned service Whatsapp working together with the Twitter acquired company Open Whisper System have implemented end-to-end encryption on all its text message.

Implementing end-to-end encryption by default on whole popular messaging service have made better security line for its users online privacy. However, the encryption feature is included in the WhatsApp client for Android and only works for one-to-one messages, not group messages.

The encryption features is available in latest release of the Whatsapp app. So if you want to hide all your conversation and increase the security level, it is recommended to download and use latest version.

WhatsApp runs on an incredible number of mobile platforms, so full deployment will be an incremental process as we add TextSecure protocol support into each WhatsApp client platform. We have a ways to go until all mobile platforms are fully supported, but we are moving quickly towards a world where all WhatsApp users will get end-to-end encryption by default,” Open Whisper Systems said in a blog post. 


There are other messaging service too which have the end-to-end encryption which are Telegram, Cryptochat, Silent Text etc.. but these are not as popular as Whatsapp.

Encrypting all the conversation is one of the major security implement over messaging service till yet. The app maker describe this move as the "largest deployment of end-to-end encryption ever." 

5 Accidental Inventions That Earned Millions!!

#1 Ice Cream Cones


Ice cream had been served over plates for years! It was until 1904, that this ice cream cone was invented in the World Fair. An ice cream stall was selling so much that they were gonna be out of plates. Next to them, was a waffle store that was hardly selling anything. The owners the thought to merge their stalls. First, for a waffle in a form of a cone, then plopping in some of the ice cream. The awesome threat was then made.

#2 X-Rays



Yeah, I know they can’t be created! They had been discovered.  In 1895, German physicist Wilhelm Roentgen was performing an experiment with cathode rays, he noticed a fluorescent cardboard shining. A thick screen had been placed between his cathode emitter and the radiated cardboard, the particles of light were passing through the solid objects. He quickly found that an image can be printed on a film too! Thus, this led to the accidental discovery of the X-Rays.


#3 Super Glue


Dr. Harry Coover of Eastman-Kodak Laboratories found that a substance he created — cyanoacrylate. This substance was very messy and was rejected for being over sticky and instantly drying. But later, it was taken over as Super Glue for a commercial purpose.

 #4 The Microwave



Percy Spencer, an engineer at Raytheon after his WWI stint in the Navy, was known as an electronics genius. In 1945 Spencer was playing with a microwave emitting magnetron when he felt strange sensation and sizzles in his pants. He saw that the chocolate bar in his pocket was melting. he found the the microwaves were to blame!  This lead him to make a Microwave and earned millions from it.

#5 A Slinky


In 1943, Navy engineer Richard James was trying to keep some delicate and sensitive instruments balanced on the ship by making a different kind of spring! He then knocked one of his prototyped spring on the floor. Unlike other springs, this one, rather then crashing with the floor, tumbled and righted itself! This turned out to be a great way for him to earn money thus, it became a great toy for most of the childhoods.

Tuesday, 18 November 2014

Watch YouTube Videos in Slow Internet Connection


Many of the time we all get fed up with the speed of internet connection, specially when watching videos on YouTube. This is all because of slow internet.

YouTube is the worlds most popular video sharing site. It have millions of users. Watching videos on YouTube is usually like by all.

I also like to watch videos on YouTube and had same problem earlier. Thanks now I got the good speed connection. But what for other, there are many of us who have same problem. Mostly with the common people who have slow internet connection but wants to watch the videos on YouTube.

I have the solution of this. You can watch videos more smoothly. This will increase the buffering speed of the video. This can be done by using "YouTube feather beta". This helps to load YouTube video faster in a slow internet connection because it removes the entire information panel.

This will remove many thing from your video browser window. It removed like, share, comments, also short the sidebar video list once you activate the YouTube feather beta.

To activate it log-in to your account (you can use Google account also), and click on this YouTube feather beta link. Just click on the "Join "Feather" Beta".

That's it  you have done. Now watch your videos much faster then the earlier.
You will see the message at the right bottom of the window like this when you activate the Feather beta.



Keep Visiting Us!

Hackerspedia !!Your Door To The World Of Hacking!!

Bypass The Uploaders To Upload Shell / Virus!

Today i want to share some techniques which i use to bypass the uploaders to upload shell i hope you will find this article informative.

Hackers always try to find a way inside to exploit and upload their shell to the server or website and for this many times they have to face the restricted uploaders like some uploaders allow only image files like .jpg or .gif etc.

Uploaders actually work in a same way rather they are in php , asp , aspx or any other file format but the technique from which the up loaders detect the shell is same and below are the methods by which uploaders detect the shell.


How They Detect the Shell / virus 


  • By Name 
  • By Source Code


These are two most common way by which uploaders detect your php or asp shell and below we will learn how can we bypass those image or restricted file uploaders.

As i have mentioned the two types of uploaders the one is By name and the second is by Source code now below are the ways by which they detect the uploaders.

1. By Name

  • Disallows the file if it consists .php name 
  • Allow,s the file if it consists .jpg

2. By Source Code
  1. Allows the file if it consists ‰PNG  ( It is Included in every PNG Image file in Starting )
  2. Disallow,s the file if it consists of <?php ( included in every php file in starting ) 

First We will cover the topic No 1

Many Uploaders only detect the php file by its name like if our shell is named shell.php it will read its name and will disallow it but how could we by pass it ? 

  • We can bypass the uploader by creating a combination of upper case and lower case in php file like .PhP or pHP or pHp 

  • we can also bypass it by simply adding .png name in its name before .php because we know that many uploaders read the name of a file and if it contains .png or .jpg in its name they will alow that file to upload example shell.png.php or shell.png.pHp
Advance Method to bypass ( Topic 1) 

One of the most popular advance method used by attackers or hackers is by editing the HTTP Request and sending a customized request to the server and this method works for many peoples.

We will use a Firefox add-on for this purpose so download it by clicking here ( Live HTTP Headers ) 
First Rename the shell file into .jpg like mine is cmd.asp i will rename it into cmd.jpg 
Now we have this uploader and chose your cmd.jpg or the file which you want to upload 



Now after chosing your file , in FireFox click on Tools > Live Http Headers >
And after this Live Http Headers will start up and make sure that capture box is checked and after click on upload to upload your file and Live Http Headers will start capturing the Http packets.


Now Scroll Upside and try to find the name of your file like mine is cmd.asp and after finding that click on it and click on replay and after clicking on it a new window will pop up like below 



Now After clicking on replay you will get the name of your file like cmd.asp and rename it into cmd.jpg.asp and now click on replay and it will resend the http customized request to the server by saying that it is an image file even if named .asp server will allow it because of the http customized request.

And in this way we can also bypass the uploader so our topic one got cleared now lets proceed to the topic to which is Detecting by reading the source code.


  • By Reading the Source Code

we know that some uploaders detect the file by its source like we have a php shell and its named as shell.php and if we open its source we will ind <?php at the starting of the file source and this is what exactly the uploader dose it reads that <?php in the starting and disallows the file

So by adding some source code of picture in the starting of the php file this will allow us to bypass the uploader like below as shown in the picture so click on it to zoom.

Here we have opened one png image file in a notepad and copied the source code from starting of it and pasted it into the php shell file so when we will upload the uploader will scan the %PNG symbol and will allow the file to get upload but keep in mind that there are many uploaders which reads the complete source code and if there,s a <?php any where in the file this will deny the php file So also try to encrypt the php file.


Sunday, 16 November 2014

Making your Own Google Dorks For Hacking-Undestanding Dorks!


  • I Will Tell You Those Google Dorks Which Are Commonly Used By Hackers in Daily Life


Remember one thing that when ever you want to twin two dorks like if you want to join another dork with dork then you will use & symbol...


#1 :- intitle:file upload
This google dork is used to the entered text in website title like if we search " intitle:file upload" then google will search all those websites whose title is file upload as u can see in pic below



#2 :- “intext:File Upload by Encodable“

This google dork used to find Site Vul. File Upload By Encodable if We Search " “intext:File Upload by Encodable“ " then Google Will Search All Those Sites Whose Can Vul. To Upload File By Encodable! In Pic Below

 as We Mentioned in our Last Post That How To Upload File By Encodable :- Upload By Encodable Vul.


 #3:- inurl admin login.asp

This google dork is used to find text every where weather in title or description or in url etc as if we enter inall:admin login this will search every where admin login text in website as in pic below





  1. Now can you twin dorks ?

yes you can twin the dorks by adding & symbol like

inurl:.co.in & inurl:/admin/index.php & intext:user pass

Now what are the advantages of those dorks and why hackers use them ?  many of hackers use them for finding admin panels as for finding admin panel dork is inurl:/admin/index.php & intext:/welcome admin user name pass . now this dork will find admin panels and many hackers use those dorks for finding upload paths to upload their shells like inurl:.co.in & inurl:upload.php & intext:browse . now this dork will find upload paths in indian sites.. i recommend you to learn that because in future tutorials we gona need this..

Tuesday, 11 November 2014

Signup For AdSense in New blog, blogger Big bug!

Google (Blogger) Big Bug or Whatever......!

Leave =D it Now you can Apply for your New Blog From Blogger No 6 Months Experianced Required Just Go To Blogger.com and Create New Blog n Post Something on Blog!

I just noticed this Bug!

Check My new Blog :-


Only 21 Views =D n Posts are Imported from other Blog =)

Now Create a New Blog

Then Go to the  Blog See Image 0 views Today!


Click on Earning!

You will see like this below Image!





Click On Sing Up!




Fill the form and Everything is done

But i suggested you post atleast 50 posts =D

don't worry mail me here =D gthakor16@hotmail.com

and i will send you Exported blog =D you just need to importe it into your new blog and one more thing you need to give atleast 100-200traffic to your blog otherwise your request for AdSense will not be approved!

Thank you! =D





Monday, 10 November 2014

How To Increase BSNL Broadband Speed



BSNL Internet Speed Hacked!

BSNL Internet is most famous Internet Broadband connection service in India. Its not only due to its ready availability but mainly because of it's somewhat cost-effectiveness. But, even though, many BSNL Broadband and BSNL Cellone Dataone users are frustrated with BSNL Internet speed as they never get speed that BSNL has promised to them and BSNL broadband connection breaks after every minutes because of line errors.  So today i am going to share with you the latest hacks that you can use to increase BSNL broadband connection speed and avoid regular disconnection and line losses

How To Speed Up BSNL Internet Speed [ Hacked ]

1- Change BSNL DNS Servers :-

The main reason for slow BSNL Broadband connection speed is slow BSNL DNS servers. So, we can increase BSNL Broadband connection speed by changing default BSNL DNS servers to fast BSNL DNS servers, which can help us to increase BSNL broadband connection speed. Using public DNS servers improves speed, as BSNL has lot of users and all using the same DNS servers. So during peak time the DNS reacts very slow and takes a lot of time to translate the host address to numerical value, called IP address that your network used to connect to website.
Use these DNS servers for best speed




2. Use Adblock Plus:

The best way to increase BSNL Broadband connection speed is to block flash and other unwanted ad material on webpage, so that page loads faster, thus make BSNL Broadband apparently fast. AdBlockPlus is a firefox addon used to block flash content of page, thus helping you to increase BSNL Broadband connection speed. This has a lot of effect as it blocks unwanted advertisements and popups thus making your internet browsing experience even better.


3. Using TCPOptimizer:

This is another software used to optimize your TCP/IP connection settings. TCP/IP determines the maximum transfer Unit(MTU) for your device. The maximum data that your connection can send or receive per packet. Best MTU setting for BSNL broadband is 1492 ( by default its 1500 that causes an extra load on your broadband connection that why disconnections occur as you are forcing your device for doing something that it is not capable off, so optimise your TCP/IP settings). You can use TCP Optimizer your BSNL network settings. Install TCPOptimizer.


4. Reducing cache space:


Reduced Cache space can be used to increase BSNL Broadband speed. You can do this as:
For Internet Explorer : Tools - Internet Options - Browsing History - Settings - Disk space to use and reduce disk space value to "50".
For Firefox: Tools - Options - Advanced - Network and look for cache space. Change value to 50.



Wednesday, 5 November 2014

Top 5 Famous Blackhat Hackers and What Happened to Them!

In this article, I’ll be talking specifically about famous hackers that don hats of black. Here are five of the most widely known black hatters and what happened to them for their recklessness.

Jonathan James 

Jonathan James was known as “comrade” on the Internet. What is his ticket to fame? He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.

Yes, James hacked into NASA’s network and downloaded enough source code to learn how the International Space Station worked. The total value of the downloaded assets equaled $1.7 million. To add insult to injury, NASA had to shut down their network for three whole weeks while they investigated the breach, which cost them $41,000.


The story of James has a tragic ending, however. In 2007, a number of high profile companies fell victim to a massive wave of malicious network attacks. Even though James denied any involvement, he was suspected and investigated. In 2008, James committed suicide, believing he would be convicted of crimes that he did not commit.

Kevin Mitnick

Kevin Mitnick’s journey as a computer hacker has been so interesting and compelling that the U.S. Department of Justice called him the “most wanted computer criminal in U.S. history.” His story is so wild that it was the basis for two featured films.

What did he do? After serving a year in prison for hacking into the Digital Equipment Corporation’s network, he was let out for 3 years of supervised release. Near the end of that period, however, he fled and went on a 2.5-year hacking spree that involved breaching the national defense warning system and stealing corporate secrets.

Mitnick was eventually caught and convicted, ending with a 5-year prison sentence. After serving those years fully, he became a consultant and public speaker for computer security. He now runs Mitnick Security Consulting, LLC.

Albert Gonzalez

Albert Gonzalez paved his way to Internet fame when he collected over 170 million credit card and ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of the United States.

Gonzalez started off as the leader of a hacker group known as ShadowCrew. This group would go on to steal 1.5 million credit card numbers and sell them online for profit. ShadowCrew also fabricated fraudulent passports, health insurance cards, and birth certificates for identity theft crimes totaling $4.3 million stolen.

The big bucks wouldn’t come until later, when Gonzalez hacked into the databases of TJX Companies and Heartland Payment Systems for their stored credit card numbers. In 2010, Gonzalez was sentenced to prison for 20 years (2 sentences of 20 years to be served out simultaneously).

Kevin Poulsen

Kevin Poulsen, also known as “Dark Dante,” gained his fifteen minutes of fame by utilizing his intricate knowledge of telephone systems. At one point, he hacked a radio station’s phone lines and fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was called the “Hannibal Lecter of computer crime.”

He then earned his way onto the FBI’s wanted list when he hacked into federal systems and stole wiretap information. Funny enough, he was later captured in a supermarket and sentenced to 51 months in prison, as well paying $56,000 in restitution.

Like Kevin Mitnick, Poulsen changed his ways after being released from prison. He began working as a journalist and is now a senior editor for Wired News. At one point, he even helped law enforcement to identify 744 sex offenders on MySpace.

Gary McKinnon

Gary McKinnon was known by his Internet handle, “Solo.” Using that name, he coordinated what would become the largest military computer hack of all time. The allegations are that he, over a 13-month period from February 2001 to March 2002, illegally gained access to 97 computers belonging to the U.S. Armed Forces and NASA.

McKinnon claimed that he was only searching for information related to free energy suppression and UFO activity cover-ups. But according to U.S. authorities, he deleted a number of critical files, rendering over 300 computers inoperable and resulting in over $700,000 in damages.

Being of Scottish descent and operating out of the United Kingdom, McKinnon was able to dodge the American government for a time. As of today, he continues to fight against extradition to the United States.




Tuesday, 4 November 2014

Web Hacking For Beginners

How to bypass Admin Login Page of website using SQLi: [[ SQL Injection ]]


Hello Readers! We're Back Again With Web Hacking For Beginners!

NEW UPDATE!


Many People asked us for hacking but it is impossible to be LEET with in Minutes or Hours :) . We should start from Basic. In this circumtacne i am writing This article.With the help of ScreenShots i will try to make you understand. So, lets Start :)

Step By Step! =D

First Copy / Download File From Here :- Download SQLi txt File

Friends after downloading This SQLi txt File your next step is to find site's admin panel. For this u can use havij or any other online admin panel finder. I am giving you some google dorks u can also use these:

I am sharing some of common google DORKS for beginning afterwords u can use yours own...
Here are the DORKS

  • Dorks

inurl:adminlogin.aspx
inurl:admin/index.php
inurl:administrator.php
inurl:administrator.asp
inurl:login.asp
inurl:login.aspx
inurl:login.php
inurl:admin/index.php
inurl:adminlogin.aspx 

Now, I copy the dork and paste in google...See below in Pic




Now i got many sites by google search.. Pick anyone of them as i am picking from here:


We are going to our aim perfectly...Now from SQLi txt File copy and paste one of them in username and password box. (same string add at a time)


 Now Just Press enter key and u done it......See pic below


yey!.....admin panel bypassed...Now u can hack the site easily.....

If any porblem or u like this articleyou can feedback in comments :)

Subscribe us For More =)

Education Purpose Only