Causes Email, Facebook, Twitter, Etc Taxable Hack

Various reasons facebook hacked, for various reasons email hacked, hacked twitter. So what actually happened?
Come, let us explore more deeply, what really happened:
We start from ourselves:
  • Sometimes we terliti less and less careful in dealing with something, accompanied by a high andrenalin that is in us, causing us tedor and forget for what we do.
  • Less vigilant and observant of seeing things, so that makes everything go blind, deaf and tasteless.
  • Lack of ownership and less to preserve what we have, so we make it easy and think little of everything.
From the above, some things that cause email, facebook, twitter, etc. hacked is:
  1. Less observant attention to the URL address (URL), eg: http://www.facekook.com, http://facebook.website.com, while the actual URL is http://www.facebook.com. Well if you click on the site, then you have entered a trap batman, because it might be just the contents of the website may contain scam / phishing / fakelogin / virus / malware, etc & Your account disappeared!
  2. Tempted by the seductive tricks, so get stuck in a fatal error, eg: "Foto Bugil Artis ABCDE, please click the following link: http://www.andaterjebak.com", "Video Mesum Actor CDEFGH, New Loh, please click: http : / / www.artisvideoporno.com "," big prize awaits, free Blackberry: http://www.webpalsugratisan.com ", and many other tricks & tricks. It certainly knows what will happen when they click on the site, then maybe will see a link scam / phishing / fake login / virus / malware / spam & Terhack your Account if you do inputing user & email password on that site!
  3. Never thought that there was "Backdoor, Trojans, Spyware, Keyloggers" in computer in use today,that I forget to do checking of applications & services that are currently running. For example: Windows -> Press "CTRL + ALT + DEL", then comes the Task Manager, checklah applications and services running, if there is an application / service that suspicious please on the "End Process / End Task".Linux: Just type "ps-aux", and then kill -9 the suspicious applications. Delete the autorun via regedit in windows or remove the crontab in Linux.
  4. Most do not know that the password email, facebook, twitter, etc. must be DIFFERENT. If a password is all that we have the same account, it will be easier for the hacker to tap into our account the other. However, the most important thing is to keep your PASSWORD EMAIL WITH GOOD, because email is the root of the other accounts. For example: email Password "h4ck3r $ 3jAt1" facebook password "f @ c3b () () kk03", password twitter "b3rk #! C @ u", the important thing is to be different & easy to remember.
  5. Email is considered something of a second, because it is very easy to create an email, to email password forgot because almost never open emails that are made. Email password forgotten, let alone "Secret Question" her, when in the case of Facebook, Twitter hit hack, it will be very difficult to merecovernya back.
  6. Lazy to update your account profile / account settings on the email, facecook, twitter, etc.. So that information on the "Alternate Email, Secret Question, Address, No. Tel "sometimes in the contents of arbitrary even sometimes not in content. This account has been hacked will never return to its owner.
  7. No time to make periodic changes to the password, the password is always the same from the beginning of creation until today. This is what can cause the password can still be used suppose password is entered in the log even if the hacker logs already 1-2 years ago.
  8. Filling random passwords, easy to guess and weak passwords, such as "abcdef", "12345", "21,101,986", "201,282", "ayulovejelek". Usually most people fill out a password with "Date of Birth, Firstname & Rear, Special Day, Boyfriends Name, No. HP, Family ". Password must be made ​​at least there is a "Character Alphabet, Numbers, Symbol & Length Minimum 10 Character" it aims to strengthen passwords, passwords must be something different that is easy in mind by our own to make when there is activity on the account bruteforce.
  9. The most frequent is "Lost & Forgotten Logout Clear Browsing History" as we do browsing activity on the internet so most of the hackers use cookies before to take over the account and, of course, the account will be lost in the night. Most of this happens in the cafe or the public Internet.
  10. One of the most vulnerable and being lazy for a password, so that is used is the "Remember Password", although it should be a personal laptop, personal pc, we'd better leave this habit, because it is quite easy to take account if there is a "remember password". There are also tools that can recover passwords saved in the browser.
Some of the things that makes accounts affected by the hack, I will give BinusHacker Clue to the faithful readers:
  1. Man is Vulnerability (A Weakness / Vulnerability) that AT PATCH CAN NOT EVER! If the hacker has a headache and did not succeed to hack into the system. So the goal is HUMAN itself, because Humans have kelemaan that can never be in PATCH, except upon a permit Almighty 
  2. Every time and every time every bug in a system, developers will act to perform PATCH. Therefore WILL NEVER EASY TO HACK ACCOUNT SYSTEM IN THE BIG 5 (GOOGLE, YAHOO, MICROSOFT, Facebook, Twitter). So should be careful if there are services offering to do the hacking "Yahoo, Facebook, Gmail, Twitter" etc., let alone asking for payment and via online. To be sure your money will disappear just like that.
For BINUSHACKER faithful readers, stay alert, careful, cautious in dealing with anything & DO NOT easily fooled by people who are not responsible. Because let's face it, many who enter in the inbox of my email asking for help to recover passwords, hack passwords, facebook hacked, hacked yahoo, hotmail hacked, hacked gmail, and some are deceived by making a payment but the goods are not delivered. (For The Feeling:Sorry If All I Had No Reply), because many other important things to do.
Save Keep, Keep Watch, Keep Learn & Dont Forget We Have unpatched Vulnerability 

Hacking Local Area Network

Hack Local Area Network – LAN Hack – LAN Hacking.
This technique will be taking advantage of Port 139.
Most of the time,Port 139 will be opened.
First of all,I will do a port scanning at the target computer which is 192.168.40.128.
This computer is inside my LAN network.
I will scan it using Nmap.
[Image: 1_13.jpg]
I get the result and it shows Port 139 is opened up for me.
Now you will need both of these tools:
** USER2SID & SID2USER
** NetBios Auditing Tool
You can get both of them on the Internet.
After you get both of them,put them in the C:\ directory.
[Image: 2_1.jpg]
You now need to create a null session to the target computer.
[Image: 3_3.jpg]
Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER.
We will first using USER2SID to get the ID.
[Image: 4_10.jpg]
We will test against the Guest account because Guest account is a built in account.
After we get the ID,we need to do some modification on the ID.
We take the ID we get from the guest account and modified it become
“5 21 861567501 1383384898 839522115 500″.
Please leave out the S-1-,leave out all the – too.
[Image: 5_8.jpg]
Now you will see that you get the username of the Administrator account.
In this case,the Administrator account is Administrator.
Create a text file called user.txt and the content will be the username of the Admin account.
[Image: 6.jpg]
Prepare yourself a good wordlist.
[Image: 7.jpg]
Now put both of them in the same directory with the NetBios Auditing Tool.
[Image: 8.jpg]
Now we are going to crack the Admin account for the password in order to access to the target computer.
Browse to the NetBios Auditing Tool directory.
[Image: 9_1.jpg]
Press on enter and the tool will run through the passlist.
[Image: 10.jpg]
In this case,I have get the password.
In order to proof that I can get access to the target computer using this password.
[Image: 11.jpg]
After you press enter,it will prompt you for the username and password.
[Image: 12_6.jpg]
Therefore,just input them inside the prompt and continue.
[Image: 13.jpg]
Target C drive will be on your screen.
[Image: 14.jpg]
In order to prevent from this attack,close down port that you do not want to use such as Port 135,Port 136,Port 137,Port 138 and Port 139.
The download link of the tools will be:
Download Tools.rar

Keeping Your Inbox Free Of Spam



Although e-mail can be incredibly convenient, it also can potentially allow a flood of junk e-mail, or “spam” to come flooding into your inbox uninvited. Because this type of e-mail can harbor computer viruses and spyware, it is important to take steps to combat it so that your annoyance level will be kept at bay and your computer will keep running safely. Even if you only send e-mails to people that you know, this doesn’t necessarily mean that you will be be immune from the effects of spam. The reason for this is that experienced spammers use tools such as automated e-mail generators to help guess combinations of e-mails. Therefore, they don’t necessarily have to know your e-mail address in order to send spam to your inbox.
Furthermore, always take care when filling out any e-mail registration forms, whether you are intending to gain access to a message board, or try your luck by entering a contest. Although most such registration efforts are ultimately harmless, there are still other entities that will willingly sell their e-mail lists to marketers in return for a handsome profit. If you are on such an e-mail list, you may soon find that your inbox becomes littered with spam.
Finally, many current e-mail programs such as Gmail and Yahoo have spam filters that sort out the junk from the important messages, without you having to even click your mouse. That said, these programs aren’t perfect. If you are expecting an e-mail from someone, yet you’ve failed to receive it, always check your spam filter to make sure that it hasn’t been sent there. Most programs allow you to add certain addresses to your “white list,” effectively telling your e-mail program that the address is not spam and should never be placed in your spam folder.

Hack TRIAL Software To Run It Forever.


Hi Guy Im Posting Again.Now Iwant to show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?
Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.
When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.
So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista.
NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate.
3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.
For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate. I hope this helps! Please express your experience and opinions through comments.

Menggunakan Google Untuk Hacking

Google melayani hampir 80 persen dari seluruh permintaan pencarian di Internet, membuktikan dirinya sebagai mesin pencari paling populer.. Namun Google memungkinkan untuk mencapai bukan hanya sumber informasi yang tersedia untuk publik, tetapi juga memberikan akses ke sebagian dari informasi rahasia yang seharusnya tidak pernah diungkapkan. In this post I will Dalam posting ini saya akan menunjukkan bagaimana cara menggunakan Google untuk memanfaatkan kelemahan keamanan dalam website. Berikut adalah beberapa hack yang dapat diselesaikan menggunakan Google. 

1. Hacking Kamera Keamanan
Terdapat banyak kamera keamanan yang digunakan untuk memantau tempat-tempat seperti tempat parkir, kampus, lalu lintas jalan dll yang dapat di-hack menggunakan Google agar Anda dapat melihat gambar yang diambil oleh kamera mereka secara real time. Yang harus Anda lakukan adalah menggunakan permintaan pencarian di Google. Ketik di kotak pencarian Google persis seperti berikut dan tekan enter
          inurl:”viewerframe?mode=motion”
Klik pada salah satu hasil pencarian (Top 5 direkomendasikan) dan Anda akan mendapatkan akses ke kamera hidup yang penuh kontrol. Anda akan melihat sesuatu seperti berikut ini:
Seperti yang anda lihat di atas layar, Anda sekarang memiliki akses ke kamera Live yang bekerja secara real-time.Anda juga dapat memindahkan kamera di seluruh empat arah, melakukan tindakan seperti memperbesar dan memperkecil. Kamera ini memiliki refresh rate yang rendah. Tetapi ada pencarian lain di mana Anda dapat memperoleh akses ke kamera lain yang memiliki refresh rate lebih cepat. Jadi untuk mengaksesnya cukup gunakan permintaan pencarian berikut:
          intitle:”Live View / – AXIS”
Klik pada salah satu hasil pencarian untuk akses kamera yang berbeda. Dengan demikian Anda memiliki Kamera Keamanan yang di-hack menggunakan Google.
2. Hacking Data Pribadi dan Dokumen Rahasia
Menggunakan Google adalah mungkin untuk mendapatkan akses ke repositori email berisi CV dari ratusan orang yang diciptakan ketika melamar pekerjaan mereka. Dokumen-dokumen yang berisi Alamat, Telepon, DOB, Pendidikan, Pengalaman kerja dll dapat ditemukan hanya dalam hitungan detik.
          intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
Anda dapat memperoleh akses ke daftar. Xls (excel dokumen) yang berisi rincian kontak termasuk alamat email kelompok besar orang. Untuk melakukannya ketik perintah berikut di kotak pencarian dan tekan enter.
          filetype:xls inurl:”email.xls” filetype: xls inurl: "email.xls"
Juga mungkin untuk mendapatkan akses ke dokumen berpotensi berisi informasi tentang rekening bank, ringkasan keuangan dan nomor kartu kredit menggunakan permintaan pencarian berikut:
          intitle:index.of finances.xls intitle: index.of finances.xls
3. Hacking Google untuk mendapatkan akses ke Free Stuffs
Pernah bertanya-tanya bagaimana hack Google untuk musik atau ebooks gratis. Nah di sini saya akan memberikan cara untuk melakukan itu. Untuk men-download musik gratis cukup masukkan query berikut pada kotak pencarian google dan tekan enter.
          “?intitle:index.of?mp3 eminem “
Sekarang Anda akan mendapatkan akses ke seluruh indeks album eminem dimana Anda dapat men-download lagu-lagu pilihan Anda. Alih-alih Eminem,Anda dapat subtitute nama album favorit Anda. Untuk mencari ebooks yang harus Anda lakukan adalah mengganti "eminem" dengan nama buku favorit Anda. Juga mengganti "mp3" dengan "pdf" atau "zip" atau "rar".

PERINGATAN
Post Ini Saya Buat Sekedar Pengetahuan saja
TOLONG!!!!!!
jangan di salah gunakan