Hope Some of my Audiences are users of after effects yap hope xo so today im going to share with you about fourty after effects training site that hope fully there going to help you understands after effects
Tuesday, April 8, 2014
HOW TO UNSUBSCRIBE FROM A GMAIL GROUP
Posted on 7:33 AMby this with No comments
A most disturbing condition in my gmail account is those daily emails in my inbox that i'm less concerned . this are emails from my gmail groups i hate this but today i'l show you how to get ride of these emails
You can remove yourself from a group using any of these steps:
- Option 1: Reply to an email from the group with REMOVE ME as the subject of your message.
- Option 2: Send an email to groupname+unsubscribe@googlegroups.com. For example, if you want to leave the group myfriends@googlegroups.com, you can remove yourself by sending a blank email to myfriends+unsubscribe@googlegroups.com.
- Option 3: Edit your settings.
- Open Google Groups.
- Click My Groups > name of the group you want to edit.
- In the upper-right corner, click My Settings > Leave this group.
Unable to unsubscribe
If you continue to get unwanted emails, make sure you removed the email address that receives the group's emails. Email forwarding, or having multiple Google accounts might be causing your issue.
- Email forwarding: You're reading an email at john_doe@gmail.com, but the email is actually being forwarded to this address from your john_doe_two@gmail.com account. You can check message headers to see if your emails are being forwarded from another address.
- Multiple Google accounts: You receive unwanted email at john_doe@example.com, but you can't use that email address to log in to Groups. If you don't have an account for the address that receives the emails, create an account so you can log in and leave the group.
Change your email settings
You can adjust your settings so that you stay a member, but stop receiving group email.- Open Google Groups.
- Click My Groups > name of the group you want to unsubscribe from.
- In the upper-right corner, click My Settings > Membership and email settings.
- From the drop-down, select "Don't send email updates."
Saturday, April 5, 2014
How to Re-Enable Task Manager,System Restore,cmd,run,Registry? Fixed
Posted on 8:52 AMby this with 2 comments
Hi friends, today i faced a problem. A virus attacked my XP. I was unable to use Task Manager, System Restore,cmd,run,Registry.
This malware disabled important windows features(task manager, system restore,.......)
Whenever i try to open the Task Manager, it pop this error message as " Task Manager is Disabled by Administrator. Contact admin" .
When i try to use System restore "it said restore is turn off. it is disabled by administrator".
So i started search in Internet , finally i found the solution. If you have this problem,
Don't get panic. I will help you to fix this problem because i faced this problem.(Experience man..!!!)
How to Fix this?
Here is one software that will fix this problem with a single click.
Download TangoSoft Software from here:
Now my system working finely.
Note: After problem is fixed, try to install good antivirus like Kaspersky.
This malware disabled important windows features(task manager, system restore,.......)
Whenever i try to open the Task Manager, it pop this error message as " Task Manager is Disabled by Administrator. Contact admin" .
When i try to use System restore "it said restore is turn off. it is disabled by administrator".
So i started search in Internet , finally i found the solution. If you have this problem,
Don't get panic. I will help you to fix this problem because i faced this problem.(Experience man..!!!)
How to Fix this?
Here is one software that will fix this problem with a single click.
Download TangoSoft Software from here:
http://www.tangosoft.co.uk/downloads.htmlThe program has the ability to restore functionality to these Windows features:
- Windows Registry
- Command Line Tool
- Windows Task Manager
- System Restore Config
- Folder Options
- Run command
- My Computer
- Task Scheduler
- Right Click Context menu
- Ms-Config (Xp only)
- Control Panel
- Search
- You can download portable version but it is 22Mb. So download the instller(only 1mb).
- Install the Tangosoft
- Run the Application
- Click the "Re-Enable" button.
- It will ask you to restart.
Now my system working finely.
Note: After problem is fixed, try to install good antivirus like Kaspersky.
Share This Article on Twitter/Facebook/Blog/Forum or Anywhere:
How to hack windows Password free and easy
Posted on 8:38 AMby this with No comments
This is one of my best tutorials coz il be talking about what i experienced as a problem before and thats how to eeasily hack any windows password
Requirements:
- BackTrack Linux 4 or 5. Download it from http://backtrack-linux.org
- One pen drive(above 4gb)
- Xp Free Fast RainBow table [tables_xp_free_fast.zip]. Download it from here:http://ophcrack.sourceforge.net/tables.php
Step 1: Booting From Back Track
Insert the pen drive in target computer[when turned off]. We are going to boot the operating system from pen drive, so insert when the system is turned off.
Now Turn on the system.
Press F10 [boot menu, differs for system] before booting and select boot from Pen drive.
Now it will boot the Backtrack.
Select "Graphical User Interface "
Now wait for a while ( it will execute some commands}
Now you can see the "root:"
type "startx" and hit enter. It will bring you to the GUI view of Backtrack.
Step 2:Copy the SAM and System files
Click the Start button(dragon symbol)
Select System Menu
Select Storage Media(if you see nothing, close the window open it again).
You can see the list of Hard disk and Your pen drive.
Open the windows installed Hard disk and Navigate to this path:
WINDOWS/system32/config/
There you can see two files named as "SAM" and "System".
Copy the both SAM and system files .
[ Just proceed to next step without closing the window]
Create a new folder in the desktop and paste the files inside.
Step 4: Run OphCrack Tool in Backtrack
Open the ophcrack GUI(start->Backtrack->Privilege Escalation->Password Attack->offline Attacks-ophCrack GUI).
Step 5: Loading the folder that contains sam and system files
Click the Load and select "Encrypted SAM" in ophcrack tool.
Now it will ask you to select directory that contains SAM folder. Select the directory where you saved the SAM file.
Now it will load and display the list of user accounts in the windows.
Step 6: Target the Admin Account
Here i am going to hack the one of the administrator account of my computer. So remove all other accounts except the target admin account.
Step 7: The Rainbow Table
Extract the "tables_xp_free_fast.zip" file in the desktop.
Click the Table button in ophcrack tool. Now it will ask you to selec the table. Select the "XP free fast" and click the install button. Now browse to the Rain bow table directory "tables_xp_free_fast"
Now click ok.
Step 8: Cracking Begins
Click the Crack button.
Wait for a while [ophcrack is the fastest cracking tool. so it won't take too much time]
Step 9: Password is cracked
Yes..!! we got the password.
Friday, March 21, 2014
Funny trick(google)
Posted on 1:32 PMby this with No comments
Hey have you guys ever found out whta peoples do with search engines some guys made a search tag that dispslays onys a pictures of peoples with heads on freezer
Go and google on google images this number = " 241543903 "
You will find a lot of Peoples in frezer pictures hahahah thanks for visiting check for other cool stuff
Friday, February 21, 2014
KEYLOGGERS - THE COMPLETE TUTORIAL
Posted on 12:13 AMby this with 4 comments
Hello out mhhhh no sorry today i am straightly going to start with the tutorial cause i am going to give you the complete tutorials on how to use and understand key logger
NOTICE:All this tutorial is on ly for demonstration and security purpose if you use it against its going to be for your own risk please
KEY LOGGERS
There are many ways you can hack a computer - RATs, Keyloggers, bots and Password Stealers.
In this tutorial I will teach you how to set up your own Keylogger and also protect yourself against them.
What is a Keylogger?
A keylogger is a program that records a persons keystrokes (everything
they type) and send the logs back to the the hacker by either email of
FTP.
Good keyloggers also detail what program the keystrokes were typed into.
Settings
For this tutorial I will be using images from Unknown Logger V 1.3.3 as I
believe that it is very thorough logger but there are many free
keyloggers
which I will link in another section.
Email
With email I recommend you create a two new email addresses (one for
sending and one for receiving) and not to use your personal email.Gmail is usually what people use as it can hold lots of logs and is secure if you have the settings right.
Email Address: you put your email address into that, obviously.
Password: you put in the password of your keylogger email. I recommend your new email address has a different email than your personal email address
because if you have it as your recovery email they can see the address and login with the same pass.
SMTP Server: is where you get your email. So for Gmail it would be smtp.gmail.com and for Hotmail it would be smtp.live.com . You can search for these if you are not sure.
Logs Sent To: you put where the logs will be sent to. You could set this as the same email address you used in the first field but this would be less secure and you would be much safer having them sent to a different email with a different pass.
Port: this is the SMTP port. For Gmail this port is 587. You should look up what port your email provider uses.
FTP
For FTP you need an FTP server. There are many sites that offer FTP like http://www.drivehq.com or just go here: http://www.lmgtfy.com/?q=free+website+hosting+ftpUsername: Your FTP Username (you will be given this)
Password: You will be given this or asked to make one depending on host
URL: This is the FTP address where it will save logs. You will be given the address by your host.
I would advise you to test these. Lots of keyloggers offer you a button to test.
Icon
Icons add to your servers credibility.Location: you put the address of the icon you want to use here. If you are going to be crypting or binding there's no need.
File Pumper
File Pumpers increase the size of the server file. This is used to make it more believable.Add: here you put how many KB/MB/GB you want to increase your file by.
In: Here you select what format the number you had in the Add box was in (KB, MB or GB). KB stand for Kilobytes and would be used for very small amounts. MB stands for Megabyte and would be best if you are say, binding it with a song. Songs are usually 4-6MB. GB stands for Gigabytes and would be used for huge files like Adobe C26 Suite would be 200GB or more.
Send Logs Time Interval
This is important. This is how often you want the logger to send
keylogs. Don't set it too small because you would just get lots of very
short logs, and don't set it too high to say 2 hours as your victim
mightn't use the PC for that long and it would never get sent. Best
setting would be 30-60 mins.Server: just the name that it will put in the file it outputs.
The checkbox is self-explanatory.
Antis
These disable or make your server undetectable to antiviruses and
sandboxes and other forms of security. It varies from program to program
what way the antis work. I would advise enabling these as they allow
your keylogger to be on the computer for longer.
Spreaders
These are methods of infecting more computers using your victims
computer. They operate by infecting files sent on P2P programs
(Limewire, Shareaza, Emule, Bearshare etc.), infecting USB drives (USB),
sending files over LAN (LAN), infecting specific filetypes (Rar, Zip)
sending files of chat and messaging applications (Outlook, Omegle, MSN,
Yahoo, Skype, ICQ) and other methods.Spreaders are always handy for getting more victims with little effort as it uses your victims computer power rather than your time and energy.
Stealers
Stealers take logins and keys for various programs. They make the
process of taking usernames and passwords a lot quicker as you won't
need to search through endless logs.
Fake Message
Possibly the silliest feature (yet for some reason every RAT and
Keylogger has one) and one I would advise you not to use it. Basically
what it does is bring up a fake error message on your victims PC. If you
do use this it will be quite obvious to the user that their PC is
infected and they will remove your keylogger.
Webcam Logger
This will take pictures/video with the webcam on the victims PC if they
have one. Set the interval the same as the logs interval before if you
want to use it.
Screen Logger
This will take screenshots of the victims screen every period of time.
Set it the same as logs too if you want to use it. If it is set too low
you will have too much data.
Clipboard Logger
This saves text that the victim copies to the clipboard. So basically every thing copy is saved.
Download and Execute
It is very important that you have this on every keylogger or RAT that
you use. It allows you to install another keylogger or RAT on your
victims PC. This mean that you can change to a different RAT or
keylogger later or give some victims to a friend or what not.Add link(s) to places where you can put a file to download and execute if you ever need it eg: http://www.dropbox.com/5235121/public/newserver.exe OR you can make a shortened link at bit.ly and direct it to your server when you need it.
Webpage Loader/Ad Visitor
This opens webpages and ads. Its obvious and would alert your victim
that they are infected. You would use affiliate links and other methods
to get money from this feature.
Run at Startup
It will start the keylogger on start up. Tick it no matter what.
Melt
This deletes the server file once it has infected the PC.
Mutex
Click + several times. This helps make it more undetectable.
Text to Speech
This will play a message using Windows text-to-speech feature when
server is installed. Similar to Fake Message it alerts the victim that
they are infected and has no benefit so I advise you not to use it
Assembly Changer
This changes the Assembly Information on your file. If you go to the
properties of any file on your computer and go to Properties>Assembly
you will see information about the file. That's what the Assembly
Changer changes.
Cookie Deleters
These are brilliant! If your victim has saved their passwords for
different sites they wont need type them in and your keylogger wont get
them so what this does is delete their cookies so that they have to
login again.
Website Blocker
This blocks websites. The options given in this picture block Virus scanning websites but you can add other sites too.
Disablers
These disable different windows features on the victims computer so
that it is harder for them to remove your virus. If your victim is
savvy they will notice this straight away and remove the keylogger very
quickly. I wouldn't use these except maybe Disable system restore,
disable registry tools and disable registry as these are not used as
often and wouldn't be noticed.
What Next?
Worming
Worms make your victim spread your virus to his contacts and whatever
the plug their USB stick into etc. Our example above had worm options
(spreaders) but not every keylogger, RAT etc have worm/spreading
options.
Crypting
Crypting is important if you want to get lots of victims and keep them
for a long time. It makes your server undetectable to Anti-viruses.FUD stands for Fully-undetectable and UD stands for Un-Detectable. FUD crypters are the best especially private ones.
Binding
Binding is when you bind your server with another file or program. It
is very useful for spreading. You would bind your server with
chessgame.exe (for example) and say "Hey check this cool game out!" and
when they open it the game will open but so will the RAT. The victim
would be none the wiser on whether they were infected or not whereas
they would be suspicious if nothing opened.
Spreading
These are methods of getting victims for your keylogger. You should get a few and use them as effectively as possible.
How do I Protect Myself Against Keyloggers?
Having an Anti Virus would be a start! Obviously be careful with what you download too.
There is a tool that I think works very well against keyloggers.
Its is called KeyScrambler. Whenever you type something it randomizes it so that if a keylogger has infected your PC they would just get logs of jumbled numbers, letters and symbols.
You can get KeyScrambler here: http://www.mediafire.com/?vu2542u0yuwes5y
The Official Site: http://www.qfxsoftware.com/download.htm
And the user and key: Code:
alanmonick186@gmail.com MLWWLTFJ7
If that dosen't work you can just use the free version or try to find another key
If you don't want to use keyscrambler there is also Zemana Anti-Keylogger
How To Reverse Engineer a Keylogger
This is my favorite part. If you know your PC is infected or a file is infected you can get the email login or FTP login from the server. People also go "whaling" and download obvious viruses from youtube to steal lots of keylogs and slaves from skids.
There are two ways to do this and I will explain both below.
Wireshark
1. Download and install WireShark if you do not already have it: http://www.wireshark.org/download.html . While it is installing make sure Winpcap gets installed with it.2. If you have an infected file and are not yet infected then open it in SandBoxie or VirtualBox or VMWare and follow these steps within the virtual machines. If you are already infected you can skip to the next step.
3. Once it is installed open it up and click "Capture" on the top menu and select the interface - if you are following in a virtual machine select that otherwise select windows or your network card.
4. Leave it on like that for about half an hour. This is to make sure the keylogger actually does connect back while you are capturing packets. (refer back to "Time Intervals")
5. When it is done you need to filter through the results for the FTP or email login. Type "FTP" in the filter box and search. If a login comes up for that then they have used an FTP server to take your keylogs. If not try "SMTP" to search for email login.
If this dosen't work then either -
- the keylogger hasn't connected back
- You did something wrong
- You are not infected
6. Now that you have their login details you can take all their keylogs and delete their keylogs of you. Then just change the password so they no longer have access
BinText
1. Download BinText here: http://www.mcafee.com/us/downloads/free-...ntext.aspx2. Open BinText and drag the infected file into the BinText window.
3. Now search through it for "hotmail" "gmail" "yahoo" "ftp" etc.
4. Self-explanatory amirite?
Tuesday, January 7, 2014
HOW TO USE WINDOWS 8 IN WINDOWS 7 PC
Posted on 5:00 PMby this with No comments
Ooooooh ooooh ooh here i go again i am xo sorry i had to be silent but dont worry here i come again with an interesting trick that every body wishes to know xo it has been time since windows 8 has been released by microsoft but according to my review the great diference btn windows 8 and 7 is theme although there are other small diferences but some computers dont meet requirements of installing windows 8 instead they run on windows 7 xo wat do we do and we like windows 8 view.
xo here is a little short and easy trick to do that
Step 1
Download WINDOWS 8 UX PACK 5.0
Click here
Step 2
Run or double click to install it
Lastly just reboot and enjoy
coment if your having problems
xo here is a little short and easy trick to do that
Step 1
Download WINDOWS 8 UX PACK 5.0
Click here
Step 2
Run or double click to install it
Lastly just reboot and enjoy
coment if your having problems
Subscribe to:
Comments (Atom)






.jpg)
