Thursday, September 22, 2011

how to protect your computer from key loggers

lets start from basics

What is Keylogger?
Keylogger is basically a software tool which clones your key strokes pressed and writes them into log files. Some smart or simply say advanced keyloggers are retrieves the saved passwords in web browsers and other windows applications. Hackers use keyloggers to hack users email account passwords and other passwords and monitor their day to day activity.
How the Keylogger Works?
Lets explain this in very simple way, Whenever you press any key on your keyboard or laptop your machine generates a simple key code which depends on the keyboard format you are using. That key code tell your operating system that you have pressed a particular key. Now what keylogger does it save your key stroke into a file. Now further processing depends upon type of Keyloggers. Basically there are two types of keyloggers:
1. Physical keylogger
2. Remote Keylogger
The above processing is same for both physical and remote keyloggers. The difference lies in how they are gonna use a log file.
Physical keyloggers requires physical access to a victim's system, so that hacker can install it manually. He may be your friend, brother, sister or some close one who actually has physical access to your PC or laptop. Now for getting logs also he has to manually access your PC to check logs. But nowadays few good physical keyloggers are there which sends logs on email address. So nowadays we only need one time Physical access and that's just to install Keylogger and configure an email address to send logs.
Remote keyloggers are a bit different as there name suggest they can be installed from remote, means you don't need any physical access. Remote keyloggers during configuration generates a server that we can send to victim and which does not need any installation. Remote keylogger maintains the records into log files and when victim connects to internet it send the logs to hacker's email address or FTP account that he has putted during configuration time to receive logs.
There are lot many solutions available on web but most easy one is a software called keycrambler
it is important to know how it works
The Crucial Path in the Operating System
When you try do something online, for example access your checking account on your bank's website, your keystrokes will travel along a path in the operating system to reach the destination application. Many places along this path, malware can be physically or remotely planted by cyber criminals to intercept your keystrokes so they can steal your user name and password, which is why keystroke logging (keylogging) poses such a serious threat and is a thorny problem to solve.

KeyScrambler secures your keystroke data through the crucial path. How does it work?

  1. As you're typing on the keyboard, KeyScrambler is simultaneously encrypting your keystrokes at the keyboard driver level. Because KeyScrambler is located in the kernel, deep in the operating system, it is difficult for keyloggers to bypass the encryption.
  2. As the encrypted keystrokes travel along the crucial path, it doesn't matter if they get logged, or whether the keyloggers are known or brand new, because your keystrokes are completely indecipherable the whole time.
  3. When the encrypted keystrokes finally arrive at the destination app, the decryption component of KeyScrambler goes to work, and you see exactly the keys you've typed

    KeyScrambler uses both standard symmetric-key and asymmetric-key encryption. The algorithm used for symmetric-key encryption is Blowfish (128-bit). The algorithm for asymmetric-key is RSA (1024-bit).
    you can download a free version from

glarysoft a perfect computer utility

glarysoft is a software company which provides all in one utilities for your pc.It is most efficient to use and alsio very nice GUI.most important is it is completely is also compatible with windows 7.
it provides sojme of features like
1)registry cleaner
2)temporary file cleaner
3)spyware remover
4) start up mnanager
5)optimize and improve
6)privacy and security........................
what not it is a complete package

it is mostly recommended by software professionals.If you like the software then just buy the software and support glary soft ltd.

Sunday, July 24, 2011

send fake mails with attachements

Hello friends, today i am going to explain you how to send fake or anonymous mails to anyone using anyone's email ID and in this more cool feature is that with attachments. Fake mailing is really helpful for Phishing attempts, as we can send emails without even using our email ID. In technical terms fake mailing is called email spoofing. That i have already discussed in Hacking class 21 : Email Spoofing. If you forgot then let me provide you brief information again.

Note: This is for educational purposes only. Please Don't misuse it.

What is fake emails or Email Spoofing or forging?
Email spoofing refers to the process of sending an email message from one source, but making it appear as though the email was sent from a different source. For example, an email originates from but it appears to be from Another method of spoofing is to make the message appear to come from an unknown user within your domain name. For example, the message appears to be from
This does not mean that your email account was compromised. It means that the sender has fooled the mail client into believing the email originated from a different address.
This is usually done for malicious reasons, either to distribute unsolicited email or to distribute email viruses. Unfortunately, there is no real way to prevent spoofing from occurring. If you receive an email that has questionable content, it is recommended to delete the email message or use an antivirus program to scan the message before opening it.

Lets today discuss how to do it. I will explain this tutorial using Emkei's Fake mailer.

Steps to send fake or anonymous emails:
1. Go the Emkei's Fake mailer website (click here to visit).
Now you will see something like this:

2. Now as you see there are several boxes like:
a. From Name: Name of person from which you are sending the email. Put the senders Name there.
b. From Email: Email of sender that is from which email address you are sending fake or anonymous email. Note: This email address should be in friends list of victim.
c. To: In this box you have to put the email address whom you want to send the fake mail.
d. Subject : In this box here you have to enter the subject of email that you want to send, its like subject of normal emails.
e. Attachment: Select the file that you want to attach.
f. X-mailer: Select the service from which you want to send.
g. Text/Plain or Text/Html: If you wanna wanna send normal text mail select text/Plain and if you wanna send phish mails then you need to select Text/Html.
h. Text : Here you have to enter the message you want to sent in fake mail.

3. Now enter the captcha and click on send.
That's it, isn't that easy enough.

Guide to learn basics of hacking

hackers are people that are computer enthusiasts using computers in unorthodox and creative ways. Hackers are people that think outside the box. Hackers learn to manipulate code, hardware, and software.


There are an infinite amount of people in the world. Everyone is different. There are no duplicates. The same can be said in the world of hackers. Not all hackers are the same, and a lot of hackers have different views on “Hacking”, but it is not the fact that we are all identical that makes us one entity; it is the big idea. See, what makes us hackers is the desire to learn, the urge to tweak any object we encounter, we want control, we don’t want to be controlled, we want to be anonymous, and we are intellectually years ahead of others; I would go on on this list if boredom didn’t exist. So, how do you know if you have the “Hacker Mindset”?
Read this document. It is titled “The Hacker Manifesto”.

[Image: glider.png]


One of my favorite things about the hacker community is how open it is to anyone. Quoted from the Hacker Manifesto “We exist without skin color, without nationality, without religious bias” In your days of being a hacker you will make friends from more than one country, you will meet someone that is a different religion than you, and you will encounter numerous people with a different mindset than you; but it doesn’t matter. You, as well as them, will be accepted as long as you follow the basic guidelines.

But, you don’t come into the hacker community as the best. Do not expect to be treated as a god when it is your first day. It takes work to earn the respect of a great hacker (i.e. Dennis Ritchie, Ken Thompson, Kevin Mitnick, or Phiber Optik). There are three main categories of hackers, and they are:

Script-Kiddies: These are the people who use other people’s tools and documents/resources available online. Script-kiddies usually have no idea what is going on ‘behind the scenes”, they just run their programs because they know that they work. These hackers usually have minimal skill level, but take up a large portion of the hacker community.

Intermediate Hackers: These are the halfway hackers. Intermediate hackers know quite a bit more than script-kiddies, and are decent enough to get by by themselves. They know about computers and networks, and use well-known exploits. A lot of halfway hackers want to be masters, and with the appropriate amount of work and dedication, they can be.

Elite Hackers: These are the skilled hacking experts. Elite hackers code many of the programs the the script-kiddies use, and develop exploits that intermediate hackers use. They can hack into almost any system, and cover their tracks, and sometimes, even make it look like someone else did it. They are often very secretive and only share their information with “subordinates” when they are deemed worthy. Elite hackers are very few in numbers, which is good for security companies.

There are many things that you have to learn to reach that glorious “Elite Hacker” status. Every hacker must make their own path, but in this tutorial I will attempt to help you achieve this goal to my greatest ability.
So, what can you do to up your status a little bit? Well there are plenty of things:

  • Write useful software
  • Help debug other peoples programs
  • Publish useful information
  • Server other hackers

One word that I used more than once on that list was “useful”. That is what will earn you some status in the hacker culture; being useful. Don’t just be there, be there and do something.

What to Learn

There are so many things that you need to learn in order to be a successful hacker, it is almost overwhelming. But I will try to sum this up for you:
  • Security (PC & Network)
  • Website Hacking (SQLi/XSS/etc.)
  • The Jargon (Slang)
  • Social Engineering (Human Hacking)
  • Encryption
  • WiFi Hacking
  • Linux/Unix
  • Programming (Any language)

There are things that can and should be added to that list, and it is by no means in order. This is not a tutorial on how to do each and every one of the things on this list, but it is here to point you in the right direction.

If I were to tell you where to start-- assuming that you have very little experience-- I would tell you to learn html. This is not meant to be your main programming language (unless you get unbelievably good at it), but it is a great starting point. Html will help you understand a lot of the problems that you will encounter online, and if there is ever a point where you would like to make a website, it would help you there too.

If I were to tell you where to go from there, I would tell you to learn a minimal amount of batch coding. This field is very much meant for beginners, and most hackers start out just trying to learn more about it (which then develops in to much more useful skills). Batch is just Command Prompt and Notepad. Watch some tutorials on YouTube, or look at the Batch ,Shell, Dos and Command Line Interpreters section ( Learning this won’t make you an Elite Hacker, but it will get you used to two things:

  • Basic Programming
  • Basic Command Line

Programming will help you all around, but the command line is mostly for Linux. If you don’t already know, Linux is an operating system. Linux is evolved from the Unix Operating system, which was developed in 1969-- That’s 12 years before windows! Linux was released in 1991 by Linus Torvalds. Linux actually stands for “Linux is not Unix”. Now, if you are still reading after that boring history lesson, then that means you are showing a great virtue that every hacker needs.... Patience. I would advise you to head on down to and pick up your own version of Linux. NOTE: Linux will run side by side with windows, you can have two operating systems on one machine.

Social Engineering is another thing that is vital for you to become a successful hacker. Social Engineering is the art of human hacking, and is often abbreviated at SE. It will do countless things for you in your career. See, flaws in a computer network get patched, but human flaws will never diminish. Kevin Mitnick was said to be one of the greatest social engineers ever. Kevin could convince anyone that he was someone else-- whether it be on the phone, or emailing, he was perfect at getting his way. The great thing about social engineering is that you can use it in everyday life, wherever you go. Out of all the skills that you could learn to be a great hacker, this may be one of the most important.


Hackers can’t always be at the computer, and although there is no real substitute for hacking, there are plenty of things that you can do to that can do to feel somewhat connected to the art of hacking.

Learn to write well: Hackers aren’t like the media makes it seem where you only are allowed to talk in numbers. Most great hackers have near-perfect grammar and spelling. It will also help people understand you better (this is especially useful if English isn’t your main language. And I know by experience that it will earn you some more respect as well.
Watch Star Trek: It’s just a great movie. There are all of the T.V. episodes too, but the movie was awesome.

Mystery books are a good thing: A lot of hackers will tell you to read sci-fi, but mystery books make you think. Thinking is good.

Nerd? Don’t worry about it: As mentioned earlier, real hackers don’t care if you are a nerd. We exist without a bias, and most people follow that golden rule. Anyone who doesn’t isn’t a real hacker.

Meditate: It may seem weird if you have never done it before, but meditation will make you a ridiculously better person. If I was to recommend you a guide for mediation, it would be

Have an ear for music: Learn to appreciate more than one style of music. Most hackers prefer either rap, or techno (dubstep) and some develop a love for both. The ability to enjoy any music though, is a great trait.

Be a genius: I always strive to be a genius, no matter how much of a stretch it may be. It keeps your mind active, and it will make you, obviously, smarter. Being a genius will make it infinitely easier to learn about hacking, and it will make you much more aware of everything going on around you.

If there is one thing that you shouldn’t do however, is use silly/immature screen names. How respected do you think you will be if your name is “I_Rape_Yung_P00dles”? You won’t ever be taken seriously like that, and it makes you look like a waste of time. Another thing that you should avoid doing is flaming. I am not saying that you should be a brownnoser to everyone that you meet, but avoiding conflicts, and decent amount of respect for the people who deserve it will make you a well liked hacker.

Further Resources This is the document that I read that got me started hacking. It is a great starting point. This website is very secret, and not many people know about it. It will answer any question that you will have on your journey. Is a small site with the purpose of showing the world hacking isn’t bad. It has a couple of the same resources listed here. The hacker manifesto. This was listed in the document as well. Social Engineering hub A great Social Engineering book


This guide was made entirely by Eminent. If you see this posted by anyone else, please notify me. If any of the links are ever faulty, please post in this thread, and I will fix it as soon as possible. If you have any requests for a guide then contact me and there is a great chance that I will do that for you, if not, then I will reference you to a guide that I know is better than one that I could write. Anyone who needs help further than this then I will gladly assist you (Note: I will not help you if you have not read this thread. I will not help you if you have not tried everything in this thread first).