In this post, I will show
you how domain names
are hacked. Hacking of a
domain name from it's
original user is known
as Domain name
hijacking. Let me explain
what is this.
Suppose i bought a
domain name. Now i
need a web host for
hosting my website.
Now how it works??
When we bought a
domain name, we also
get a control panel for
full control on this
domain name. From this
control panel we point
our domain to the web
server where our files
are actually host.
For ex- I have a domain
name abc.com and i
bought hosting at a
server webhost.com.
then for working of our
website we need to
setup our domain to
point to our web
hosting server
webhost.com.
Now how domain
hijacked??
For hijacking a domain
name, you need to get
access the domain
name control panel and
point out it to your
website server from
it's original server. In
above example,
suppose a person Y
wants to hack the
domain name abc.com.
He will try to get access
to the control panel of
the domain name
abc.com. After doing
this he will change it to
point ywebhosting.com
where Y has hosted his
website. Now we can
see thaty the original
website was on
webhost.com but now
it changes to
ywebhosting.com. All
visitors of abc.com will
see a different website
now.
How to get access to
the domain control
panel??
To hijack a domain
name it is necessary to
get access to the
domain name control
panel. For this we need
2 infornmations.
1. Domain name registrar
2. Administrative email
associated with this
domain
This is very easy to get
these information
about a domain name.
Use WHOIS service for
this. go to http://
whois.domaintools.com/
enter the target URL
and lookup. You will get
the whois record of the
domain name. NOw see
the record and find the
administrative email
address and registrant
service provider for this
domain name. Now you
have both informations
about this domain
name.
The administrative
email address of this
domain name is the key
to hijack this domain
name. Now hack this
email account. For
hacking email account
go and read email
account hacking of this
website section.
after gaining access to
this email id, search in
mail for emails from the
registrar emails. Surely
there will be an email
with user name and
password. If not then
go to the registrar
website and click on
forgot password link
and reset the password
of your choice. Now you
can login to the control
panel of the domain
name. Change the
settings of this domain
name.
Domain name is now
hijacked ......
How to protect your
domain name??
For protecting your
domain name, protect
your administrative
email address. Protect
your email account from
being hacked.
Another best way is
private domain name
registration. In this type
of registration, your
private information
such as administrative
address will be hidden
to public in whois
records. So the private
registration provides an
extra security and
protects your privacy.
Private domain
registration costs a bit
extra amount but is
really worth for it’s
advantages. Every
domain
registrar provides an
option to go for private
registration, so when
you purchase a new
domain make sure that
you select the private
registration option
please comment below
if this post is useful for
you..
:)
Sunday 24 July 2011
How to hacktwitter account
Many of readers sent
me emails for writing a
post on twitter account
hacking. Before writing
more on topic i want to
say one thing that
there is no any
software tool which
can give you passwords
of any twitter account
by entering the user
name. If you are here
for any this type of
software then please
leave this website.
Twitter is one of the
top 10 most visited
website having a lots of
security features. No
tool can intrude or hack
its database to give you
passwords. If you want
to hack a twitter
account, you have to
use your hacking skills
with a good use of
social engineering. I
think social engeering is
the best way to trick a
person to give his
passwords to you. If
you had read my older
post on facebook
hacking, no trick is new
for you.
1: phishing: phishing is
the best way to hak
any account. If you
think only saving a
webpage and creating a
fake login page with
this is phishing, then
you are wrong. Phishing
is just create a
webpage which can
trick users to give their
passwords. It does not
mean that it is a login
page or any other page
which offers a service
to that website. I used
a page for finding
invisible in orkut for
orkut phishing. So think
what you can do in this.
I am not uploading any
phishing page. If you do
not know what is
phishing, read my old
post.
2: Keylogger:
keylogger is another
way to hack into
twitter account by
getting the keystrokes
from a user's system.
download remote
keyloggers from
keylogger section.
3: Firesheep: If your
victim uses unsecure
wireless network then
you can hack him easily
by using mozilla firefox
and a simple firefox
plugin. Firesheep. read
this post to know
about firesheep and
dowload it from that
post. Firesheep
use this tool to hack.
You can also try to hack
primary email id hacking
attached with the
twitter account. But
hacking a Gmail or yahoo
account also need
above method. Try
above given methods
and trick users to
explore their
passwords.
me emails for writing a
post on twitter account
hacking. Before writing
more on topic i want to
say one thing that
there is no any
software tool which
can give you passwords
of any twitter account
by entering the user
name. If you are here
for any this type of
software then please
leave this website.
Twitter is one of the
top 10 most visited
website having a lots of
security features. No
tool can intrude or hack
its database to give you
passwords. If you want
to hack a twitter
account, you have to
use your hacking skills
with a good use of
social engineering. I
think social engeering is
the best way to trick a
person to give his
passwords to you. If
you had read my older
post on facebook
hacking, no trick is new
for you.
1: phishing: phishing is
the best way to hak
any account. If you
think only saving a
webpage and creating a
fake login page with
this is phishing, then
you are wrong. Phishing
is just create a
webpage which can
trick users to give their
passwords. It does not
mean that it is a login
page or any other page
which offers a service
to that website. I used
a page for finding
invisible in orkut for
orkut phishing. So think
what you can do in this.
I am not uploading any
phishing page. If you do
not know what is
phishing, read my old
post.
2: Keylogger:
keylogger is another
way to hack into
twitter account by
getting the keystrokes
from a user's system.
download remote
keyloggers from
keylogger section.
3: Firesheep: If your
victim uses unsecure
wireless network then
you can hack him easily
by using mozilla firefox
and a simple firefox
plugin. Firesheep. read
this post to know
about firesheep and
dowload it from that
post. Firesheep
use this tool to hack.
You can also try to hack
primary email id hacking
attached with the
twitter account. But
hacking a Gmail or yahoo
account also need
above method. Try
above given methods
and trick users to
explore their
passwords.
Web SecurityDojo v.1.2Released(pccorner.tk)
Various web application
security testing tools
and vulnerable web
applications were added
to a clean install of
Ubuntu v10.04.2, which
is patched with the
appropriate updates
and VM additions for
easy use.
The Web Security Dojo
is for learning and
practicing web app
security testing
techniques. It is ideal
for self-teaching and
skill assessment, as
well as training classes
and conferences since it
does not need a
network connection.
The Dojo contains
everything needed to
get started – tools,
targets, and
documentation.
Download Web
Security Dojo from
Here
http://sourceforge.net/
projects/
websecuritydojo/files/ .
To install Dojo you first
install and run
VirtualBox 3.2 or later,
then “Import Appliance”
using the Dojo’s OVF
file.
Read instruction
http://
www.mavensecurity.com/
documents/
VirtualBoxInstall4Dojo.pdf
security testing tools
and vulnerable web
applications were added
to a clean install of
Ubuntu v10.04.2, which
is patched with the
appropriate updates
and VM additions for
easy use.
The Web Security Dojo
is for learning and
practicing web app
security testing
techniques. It is ideal
for self-teaching and
skill assessment, as
well as training classes
and conferences since it
does not need a
network connection.
The Dojo contains
everything needed to
get started – tools,
targets, and
documentation.
Download Web
Security Dojo from
Here
http://sourceforge.net/
projects/
websecuritydojo/files/ .
To install Dojo you first
install and run
VirtualBox 3.2 or later,
then “Import Appliance”
using the Dojo’s OVF
file.
Read instruction
http://
www.mavensecurity.com/
documents/
VirtualBoxInstall4Dojo.pdf
Follow Most Simple
Guide to Install your
Favorite Blogger
Template.
1. Click in Download button
and save file in PC [hard
drive].
2. File that you have
downloaded is .ZIP file so
need to be extracted.
Extract / Unzip it.
3. Log in Blogger dashboard
4. Click Design link in
dashboard panel.
5. Now click in Edit HTML
link in tab bar.
6. Click Browse button and
look for folder that is
created after extracted file
that you have downloaded.
7. Folder has a XML file
and TXT file or Internet
shortcut, you select only
XML file.
8. Click Upload button.
9. Confirm and Save
Guide to Install your
Favorite Blogger
Template.
1. Click in Download button
and save file in PC [hard
drive].
2. File that you have
downloaded is .ZIP file so
need to be extracted.
Extract / Unzip it.
3. Log in Blogger dashboard
4. Click Design link in
dashboard panel.
5. Now click in Edit HTML
link in tab bar.
6. Click Browse button and
look for folder that is
created after extracted file
that you have downloaded.
7. Folder has a XML file
and TXT file or Internet
shortcut, you select only
XML file.
8. Click Upload button.
9. Confirm and Save
More Comments onyour blog posts(pccorner.tk)
You’re here because
you’re a blogger and
blog because they want
people to view and
appreciate whatever it
is they’re writing about.
The easiest way to
gage how popular and
useful your writing is
comes in the form of
comments. The more
people comment about
how much they enjoyed
your writing or if you
can give them more
information, the better
you’re doing. Comments
also provide a sense of
community to your blog.
Below are some of the
methods you can use to
give visitors a reason to
take a minute off and
comment on your blog
post.
1. Provide longer more
insightful posts, but
keep it open ended. Not
open-ended as in
unanswered, but
provide them with the
information they want
and something extra
that will have them
asking for more.
2. Use the WordPress
CommentLuv Plugin. You
are bound to be visited
by other bloggers and
site owners. With
CommentLuv they can
enter their feed with
their comment, which
will then show their
latest blog post. You
can also use a similar
plugin which allow
visitors to add their
Twitter accounts.
3. Send them a
notification e-mail every
time someone replies to
a topic they’ve
commented on.
4. Use comment
management systems
to add that social
feeling to your
comments. I suggest
trying out
IntenseDebate or
Dysqus.
5. Show the top
commenters in your
sidebar. People will have
to register for your blog
and it will provide them
with recognition
you’re a blogger and
blog because they want
people to view and
appreciate whatever it
is they’re writing about.
The easiest way to
gage how popular and
useful your writing is
comes in the form of
comments. The more
people comment about
how much they enjoyed
your writing or if you
can give them more
information, the better
you’re doing. Comments
also provide a sense of
community to your blog.
Below are some of the
methods you can use to
give visitors a reason to
take a minute off and
comment on your blog
post.
1. Provide longer more
insightful posts, but
keep it open ended. Not
open-ended as in
unanswered, but
provide them with the
information they want
and something extra
that will have them
asking for more.
2. Use the WordPress
CommentLuv Plugin. You
are bound to be visited
by other bloggers and
site owners. With
CommentLuv they can
enter their feed with
their comment, which
will then show their
latest blog post. You
can also use a similar
plugin which allow
visitors to add their
Twitter accounts.
3. Send them a
notification e-mail every
time someone replies to
a topic they’ve
commented on.
4. Use comment
management systems
to add that social
feeling to your
comments. I suggest
trying out
IntenseDebate or
Dysqus.
5. Show the top
commenters in your
sidebar. People will have
to register for your blog
and it will provide them
with recognition
Manage YourFacebook As YouWish! :) JstBetter FacebookWill Rock it!
Hello my Xacky reader's
today I'm going to post
a selected and required
post demanded by
many of my reader's
that they want to
change their facebook
according to their wish,
So, Here is a solution for
you all! :)
I think your Facebook
Account looks like this :-
And you want to see
like this (according to
your favourite theme
and layout) :-
So Just Download
Better Facebook
Extension For your
Browser Just Right
Here!!!
After Downloading :-
1.Install This Extension
2.Check it in your
Extensions Tab of your
Browser.
3.Activate It.
4.Follow the Option
Wizard of Better
Facebook.
5.Save it and Njoy! ;)
Don't Forget To +1
Above this site if you
like this Post! :)
Bookmark & Share
You might also like:
Find How Many Single or
Male-Female Facebook
Friends You ...
Outsource Facebook
Apps Development to
Preferred Developer ...
Get The Cool Facebook
Profile Picture Effect –
PicScatter
Bypassing Facebook
Security to Hack
Facebook Account ...
Export Email Addresses
of your Facebook
friends
today I'm going to post
a selected and required
post demanded by
many of my reader's
that they want to
change their facebook
according to their wish,
So, Here is a solution for
you all! :)
I think your Facebook
Account looks like this :-
And you want to see
like this (according to
your favourite theme
and layout) :-
So Just Download
Better Facebook
Extension For your
Browser Just Right
Here!!!
After Downloading :-
1.Install This Extension
2.Check it in your
Extensions Tab of your
Browser.
3.Activate It.
4.Follow the Option
Wizard of Better
Facebook.
5.Save it and Njoy! ;)
Don't Forget To +1
Above this site if you
like this Post! :)
Bookmark & Share
You might also like:
Find How Many Single or
Male-Female Facebook
Friends You ...
Outsource Facebook
Apps Development to
Preferred Developer ...
Get The Cool Facebook
Profile Picture Effect –
PicScatter
Bypassing Facebook
Security to Hack
Facebook Account ...
Export Email Addresses
of your Facebook
friends
How to PlayMovies in CarDVD PlayerCorrectly?(pccorner.tk)
blockbusters in car is
regarded as a pleasant
thing. Many motorists
download movies,
while, they have
difficulties in playing the
movies in the car DVD
player, such as the
format compatibility
issue or no suitable DVD
burning software. For
these issues, I will
make the guide to
specify them.
regarded as a pleasant
thing. Many motorists
download movies,
while, they have
difficulties in playing the
movies in the car DVD
player, such as the
format compatibility
issue or no suitable DVD
burning software. For
these issues, I will
make the guide to
specify them.
Monday 18 July 2011
MICROSOFT WINDOWS 7 ULTIMATE EIRR X86-X64 V11.02(pccorner.tk)
Windows 7 Ultimate x86-x64 from CtrlSoft with the possibility of semi-automatic installation in 4 languages, does not require a serial number and activation.
Features:
• Assembly based on the WINDOWS 7 ULTIMATE SP1 RTM
To create an assembly used in the original images of Microsoft Windows 7 Ultimate SP1 RTM.
• Suitable for 4 languages: English, Italian, Romanian, RUSSIAN.
In the original distributions were integrated language packs Italian, Romanian and Russian. After installing you have the opportunity to change the language interface standard means (intl.cpl), for example - from Russian to English and back, not depending on the language selected at installation.
• Optional 32-bit or 64-bit WINDOWS
The uniqueness of this building is that you have the ability to install Windows from a different pre-installation media - to 32-bit and 64-bit architecture. This method increases the likelihood of a successful installation on computers of various configurations, including a computer with a disk array RAID.
• Installation in a semiautomatic mode
All you have to do - is to select the partition to install, format it and click Next. Upon completion of all phases, you are invited to enter a user name, password (optional), select the method of updating, set the date and time, choose a location on your computer.
Note. For a complete installation, you must run (boot) your computer using an installation disk Windows.
• Ability to upgrade from previous versions of WINDOWS.
All of the above set of semi-automatic refers to this type of setup except the user name and password.
This assembly provides the possibility to update not only the 32-bit versions of Windows, but with 64-bit, that one of its kind - unique!
Note. When you upgrade, save files, settings, programs and user accounts used in the current version of Windows.
• DO NOT NEED SERIAL NUMBER AND ACTIVATION
During installation, you will not need to enter a serial number. Activating Windows automatically. Used in the assembly of the activator includes a unique activation technology, while not affecting the system files or boot Windows.
If you have a laptop or a branded PC Dell, Acer, Alienware, etc. will (almost) legal activation! I want to note that while the default oem-established theme of the manufacturer. If you have not branded PCs, but the motherboard includes a SLIC 2.1, established topic close to your hardware manufacturer, such as Intel.
DOWNLOAD
• Being tested for authenticity
In Service Pack 1, Microsoft has included checking the authenticity of the update KB971033, but you do not worry about anything! You can safely download Microsoft products or upgrade Windows.
• Clean - no resources Patched
The assembly is not crammed with various third-party resources clearance. From the original distribution differs only in that the added 20 original local packages (for more information - http://bit.ly/h5hgLI) and also automatically set oem-topic (about oem-read the topic above).
Note. In the Russian version of the problems with the Start menu, there are no more (official patch), I have changed the inscription "Max" to the "Ultimate" and corrected a couple of inscriptions in the pop-up menu.
• ADDITIONAL FUNDS FOR RECONSTRUCTION AND COMPUTER *:
- Acronis Disk Director 11 Home
- Acronis True Image Home 2011
- Everest
- GImageX
- Total Commander
* Available when you select 32-bit architecture.
Development Phase: Release
Year / Issue Date: 2011
Bit depth: 32bit +64 bit
Language: English, Italian, Romanian, Russian
Features:
• Assembly based on the WINDOWS 7 ULTIMATE SP1 RTM
To create an assembly used in the original images of Microsoft Windows 7 Ultimate SP1 RTM.
• Suitable for 4 languages: English, Italian, Romanian, RUSSIAN.
In the original distributions were integrated language packs Italian, Romanian and Russian. After installing you have the opportunity to change the language interface standard means (intl.cpl), for example - from Russian to English and back, not depending on the language selected at installation.
• Optional 32-bit or 64-bit WINDOWS
The uniqueness of this building is that you have the ability to install Windows from a different pre-installation media - to 32-bit and 64-bit architecture. This method increases the likelihood of a successful installation on computers of various configurations, including a computer with a disk array RAID.
• Installation in a semiautomatic mode
All you have to do - is to select the partition to install, format it and click Next. Upon completion of all phases, you are invited to enter a user name, password (optional), select the method of updating, set the date and time, choose a location on your computer.
Note. For a complete installation, you must run (boot) your computer using an installation disk Windows.
• Ability to upgrade from previous versions of WINDOWS.
All of the above set of semi-automatic refers to this type of setup except the user name and password.
This assembly provides the possibility to update not only the 32-bit versions of Windows, but with 64-bit, that one of its kind - unique!
Note. When you upgrade, save files, settings, programs and user accounts used in the current version of Windows.
• DO NOT NEED SERIAL NUMBER AND ACTIVATION
During installation, you will not need to enter a serial number. Activating Windows automatically. Used in the assembly of the activator includes a unique activation technology, while not affecting the system files or boot Windows.
If you have a laptop or a branded PC Dell, Acer, Alienware, etc. will (almost) legal activation! I want to note that while the default oem-established theme of the manufacturer. If you have not branded PCs, but the motherboard includes a SLIC 2.1, established topic close to your hardware manufacturer, such as Intel.
DOWNLOAD
• Being tested for authenticity
In Service Pack 1, Microsoft has included checking the authenticity of the update KB971033, but you do not worry about anything! You can safely download Microsoft products or upgrade Windows.
• Clean - no resources Patched
The assembly is not crammed with various third-party resources clearance. From the original distribution differs only in that the added 20 original local packages (for more information - http://bit.ly/h5hgLI) and also automatically set oem-topic (about oem-read the topic above).
Note. In the Russian version of the problems with the Start menu, there are no more (official patch), I have changed the inscription "Max" to the "Ultimate" and corrected a couple of inscriptions in the pop-up menu.
• ADDITIONAL FUNDS FOR RECONSTRUCTION AND COMPUTER *:
- Acronis Disk Director 11 Home
- Acronis True Image Home 2011
- Everest
- GImageX
- Total Commander
* Available when you select 32-bit architecture.
Development Phase: Release
Year / Issue Date: 2011
Bit depth: 32bit +64 bit
Language: English, Italian, Romanian, Russian
WIN RAR(pccorner.tk)
WinRAR is a shareware file archiver and data compression utility developed by Eugene Roshal, and first released in autumn of 1993.[3] It is one of the few applications that is able to create RAR archives natively, because the encoding method is held to be proprietary.
Contents[hide] |
[edit]Developer
The current developer is Eugene Roshal, while his brother Alexander Roshal is engaged in running the business behind the software.[4]
[edit]Features
WinRAR supports the following features:
- Complete support for RAR (WinRAR native conversion format) and ZIP archives, and unpacking of ARJ, LZH, TAR, GZ, ACE, UUE, BZ2,JAR, ISO, EXE, 7z, and Z archives.[5]
- Multithreaded compression
- The ability to create self-extracting and multi-volume (split) archives.
- Data redundancy is provided via recovery records and recovery volumes, allowing reconstruction of damaged archives.
- Support for advanced NTFS file system options and Unicode in file names.
- Optional archive encryption using AES (Advanced Encryption Standard) with a 128-bit key.
[edit]
Thursday 14 July 2011
SPEED BIT VIDEO ACCELERATOR(pccorner.tk)
Download Accelerator Plus (also referred to as DAP) is a download manager for Microsoft Windows and Mac OS X. It uses multipart download to increase speeds, creating multiple connections of different file segments to speed up downloads. Download Accelerator Plus works by splitting files into smaller pieces and automatically seeking faster mirrors. It also can get a file simultaneously from several sites.[2]
DOWNLOAD
INTERNET DOWNLOAD MANAGER(pccorner.tk)
IDM allows users to automatically download any file types, divides downloads into multiple streams for faster downloading, batch downloading, Import and Export of download jobs, auto/manual update of download address, supports multiple queues and lists recent downloads for easy access to files. It can search for mirrors in order to increase download speeds and also supports downloading videos from many streaming video sites. The IDM algorithm includes dynamic segmentation throughout the downloading process. IDM supports HTTP, FTP, HTTPS andMMS protocols, Microsoft ISA and FTP proxy servers and authentication protocols like Basic, Negotiate, NTLM, and Kerberos allowing for storage and auto-authentication of user names and passwords.
- The software ships in two versions. One is a free, 30-day trial (some versions are a 15-day trial). The application stops functioning at the end of the trial period unless a license is purchased. The other version is commercial for continual use. IDM works with Internet Explorer, Opera,Netscape Navigator, Apple Safari, Flock, Google Chrome, Mozilla, and Mozilla Firefox. [1]
DOWNLOAD
Thursday 7 July 2011
GOOGLE TALK
Google Talk is a freeware voice over Internet protocol (VoIP) client application[1] offered by Google Inc. The first beta version of the program was released on August 24, 2005. It is available for the Android operating system, as well as Microsoft Windows (XP, Server 2003, Vista and Windows 7) instant messaging.
Instant messaging between the Google Talk servers and its clients uses an open protocol, XMPP, allowing users of other XMPP/Jabber clients to communicate with Google Talk users. VoIP in Google Talk uses an older version of what would later become the Jingle protocol. The technology used within the Google server network, however, is not publicly known.
Google Talk mobile clients are also available for the Palm Pre, BlackBerry, Android-based devices and is preloaded on the Nokia N900 smartphone.
GOOGLE EARTH 6
Google Earth is a virtual globe, map and geographical information program that was originally called EarthViewer 3D, and was created by Keyhole, Inc, a company acquired by Google in 2004. It maps the Earth by the superimposition of images obtained from satellite imagery, aerial photography and GIS 3Dglobe. It was available under three different licenses, 2 currently: Google Earth, a free version with limited function; Google Earth Plus (discontinued),[1][2]which included additional features; and Google Earth Pro ($399 per year), which is intended for commercial use.[3]
The product, re-released as Google Earth in 2005, is currently available for use on personal computers running Windows 2000 and above, Mac OS X 10.3.9 and above, Linux kernel: 2.6 or later (released on June 12, 2006), and FreeBSD. Google Earth is also available as a browser plugin which was released on May 28, 2008.[4] It was also made available for mobile viewers on the iPhone OS on October 28, 2008, as a free download from the App Store, and is available to Android users as a free app on the Android Market. In addition to releasing an updated Keyhole based client, Google also added the imagery from the Earth database to their web-based mapping software, Google Maps. The release of Google Earth in June 2005 to the public caused a more than tenfold increase in media coverage on virtual globes between 2004 and 2005,[5] driving public interest in geospatial technologies and applications
YAHOO MESSENGER 11
Yahoo! Messenger (sometimes abbreviated YIM) is an advertisement-supported instant messaging client and associated protocol provided by Yahoo!. Yahoo! Messenger is provided free of charge and can be downloaded and used with a generic "Yahoo! ID" which also allows access to other Yahoo! services, such as Yahoo! Mail, where users can be automatically notified when they receive new email. Yahoo! also offers PC-PC, PC-Phone and Phone-to-PC service, file transfers, webcam hosting, text messaging service, and chat rooms in various categories.
Yahoo! Messenger was originally launched under the name Yahoo! Pager on March 9, 1998.[1]
In addition to instant messaging features similar to those offered by ICQ, it also offers (on Microsoft Windows) features such as: IMVironments (customizing the look of Instant Message windows, some of which include authorized themes of famous cartoons such as Garfield or Dilbert), address-book integration and Custom Status Messages.[2] It was also the first major IM client to feature BUZZing and music-status. Another recently added feature is customized avatars. Yahoo Messenger also allows users to access Yahoo Chat Rooms so download it
DOWNLOAD
Subscribe to:
Posts (Atom)