Showing posts with label whats how. Show all posts
Showing posts with label whats how. Show all posts

Sunday, September 20, 2015

Genuine Home Based Part time / Full time Job Opportunity

Hi This is Kumar, and we are Friends Team from Hyderabad, India.

We Provide Home Based Works for Typing Peoples, Students, Employees, House Wife's, Small to Large Group's or Teams & Company's also.


    Benefits to joining our team:

·      No registration fee to start work.
·      You can work as part time or full time.
·      We provide work to people of all countries.
·      You can work from anywhere in this world.
.       We provide work for Individual's and Team's


Benefits of Joining into SFI Business



Click to Start Earning



.      Free to Join
.      Connect with people all over the world
.      You can earn money and Points when your downline people purchase any thing.
.      Even you can purchase so many Items for very low price.
.      Learn a lot from the Internet Marketing.
.      There so many options to earn money using SFI





Just click on the below Image to get started now











Wednesday, March 2, 2011

How To Install A Second IDE Hard Drive On Older PC’s

Background On IDE Interfaces

IDE was a significant limiting factor in older PCs. Though modern machines will often include a single IDE connection for the sake of backwards compatibility, most machines from the IDE era of computing were equipped with two IDE sockets – each connection being referred to as an IDE “channel”. On each channel, you could add up to 2 IDE devices – so that meant a maximum of 4 hard drives and/or CD-ROM drives.
On each channel, there is a master and a slave device. The master device is connected in the middle of the cable, and the slave at the end of the cable. Each device must also be set with a hardware switch (a jumper) as to whether it is supposed to be the master or the slave. This is where almost all headaches and problems came in.

IDE Cables

Let’s look at some standard IDE cables and connectors. There are 3 identical looking connectors – one at either end and one in the middle. However, one of the gaps between the end connectors and the middle connector is longer – this is the end that plugs into your motherboard.
how to install a new hard drive

On the motherboard end, the socket looks like this. On my fairly modern motherboard, the cable is actually colour coded so you know which end plugs where – but more than likely your old PC won’t be, so you’ll need to figure which end of the cable is longest and plug that into the board. There is a notch on one side of the connector to prevent you plugging it in the wrong way, so make sure you align that.
install a hard drive

The Drives & Jumper Settings

Whether it’s a CD-ROM drive or hard disk, IDE drives are identical in terms of connectors.
The power cable you will plug in has four female plugs in it, and will only go in one way due to the shape of it, so that shouldn’t be too hard. Take a look at one of your other devices to work out which the power cables are in your case. The IDE connector is also easy, the same as the motherboard it has a notch in it which you can align.
The difficult part is the jumper settings, which will vary according to your device. Basically, you’re looking for something that mentions CS or Cable Select, as well as Master, and Slave. There will be a diagram somewhere. The digrams indicate which pins a jumper should connect. You should be able to remove a jumper with your finger nails, if not then use a pair of very small needle nose pliers and don’t bend the pins.
how to install a hard drive

As you can see, some drives have helpful diagrams just above the jumper pins. Others will have a note on the drive label instead:
how to install a hard drive

Figure Out Your Existing IDE Scheme

It’s more than likely you currently have both a CD-ROM drive and hard disk plugged in through IDE. Write out a quick table to figure out how it is currently set up, like this:
CHANNEL 1, MASTER:
CHANNEL 1, SLAVE:
CHANNEL 2, MASTER:
CHANNEL 2, SLAVE:
Probably your hard dive is configured as Channel 1 Master, with the CD-ROM either on separate channel as Master, or Slave on Channel 1.
Now figure out where your additional drive is going to go. A couple of things to consider though:
1. Try to keep your CD-ROM either on a separate channel, or as a slave.
2. The cable length will affect your choice too, as IDE cables are usually quite short. If the CD-ROM is far from the hard drives, you will need one cable for the hard drives, and another going to the CD-ROM.

Set The Jumpers & Plug In

Since I only have a single IDE CD-ROM and single hard disk to show you today (as well as only a single physical IDE connector on my motherboard), I’ve opted to make the hard disk as Master and the CD-Drive as slave.
For the CD-ROM, the diagram indicates that 2 is Slave setting. What does this mean? Well, looking at the back of the device, we have 3 pairs of pins. So, to make it a slave device, I place a jumper over the central (second) pair.
install new hard drive

The hard disk is similar, but this time I chose “Master with Slave Present“. Then I connect the cable up, bearing in mind that the hard drive as the master should be connected to the centre of the cable, with the slave CD-ROM drive being added at the end.
install new hard drive

Note: You wouldn’t normally run devices outside of the case like this, but for the purposes of checking if they work, it’s a lot easier than unscrewing them and poking around inside a cluttered case.
Sure enough, the BIOS shows two devices loaded and functional.
how to install a new hard drive

Thursday, February 3, 2011

How To Hack Any Email Account

How To Hack Any Email Account

So lets start with some of basics,
This has become a very common way to hack any email account, It is also known as Phishing attack  in the language of the hackers.

Yes,This is the very famous
 phishing attack. This is the most concerned security threat prevailing in the society
As the target of this kind of attack are the social people.


There are two types of phishing attack :-

1.Normal Phishing.
2.Desktop Phishing.

The basic idea behind the phishing attack is to make victim fool by redirecting him to a website same as original site,while saving his password,

which he thinks is login in to his account and gets hacked.




Okay, so basics must be clear now LET'S START.

To Hack Any Email ID you have just follow the following simple steps,


1. Firstly , You have to create you website or to have a account on any Free Webhosting service which have php enabled service.

[For most of the newbies,i would recommend you to register for a free Webhosting service such aswww.110mb.com or any free Webhosting service
that comes with php enabled in it.But 110mb is best because of its user friendly service they provide]


2. After you have setup your account on any free Webhosting service,you have to upload your phisher on to the the file directory of your site.


3. For that you have to make your own phishing page which is discussed on this webpage -

click here to get how to create your own phishing page

how-to-create-your-own-phisher

[Phisher page will be the login page same as of the Email service your victim is using for example :-Gmail, Orkut, Yahoomail, PayPal etc.
It will Look Just as same as you are asked to login to your Email account, That's where the victim gets tricked aka HACKED]


4. There will be another file needed also named as "login.php" .Which will give the condition to save the username and password typed by the user.

[NOTE:- I will not be providing the login.php to you,You have to get the login.php by yourself.
if you have some knowledge about the php language you can make your own login.php
For those who don't have knowledge about php language i recommend you search for login.php on Google,you will surely get that file.]


5. So,After you have created you phisher it is time to edit them,so as to make them save the username and password typed by the victim.

Here are the simple steps to edit the phisher :-


i. Open your phisher in a web browser,Right click in Somewhere in middle of the web browser and then click on View Source.


ii. A new windows will pop up,click on Edit>Search and type action in the search box,and then click on search.


iii. It will take you to the First action String, after the equals two mark type login.php in replace of the the text written after it.


iv. Click on Search again,this time it will take you to another action string,after the equal to mark type http://www.your-site.yourservice.com/login.php in replace of the text written in front of the equals to mark.


NOTE: you have to type you your sites name in replace of your-site,and your free Webhosting service against your service in http://www.your-site.yourservice.com/login.php.
written over in step iv.

6. So, Now you have done the difficult part it is time for some HACKING.

NOTE: You have to upload all the files on your free Webhosting service directory,including in index_files Folder in the directory.Or it won't work.
The Directory Will be :-

i. index.html
ii. index_files [Folder which you saved]
iii. login.php
iv. login.txt



7. Now you have to just send the victim to your phisher site http://www.your-site.yourservice.com/



You can send him the message to visit your phisher for example :-

Hi,
How is it going.
You know what, i visited a site yesterday it is a new look of [Victims Email Service].
just check out.
its http://www.your-site.yourservice.com/
Its really good.
bye.

You can make your own message and send it to victim.


9. To view the saved password you have to just logon to your free Webhosting service account and open login.txt to view the saved password.


10. And you are done, In just ten steps you have leaned the phishing attack.

How To Create Your Own Phisher

How To Create Your Own Phisher
Phisher page is the login page same as of the service your victim is using for example --> Gmail, Orkut, Yahoomail, PayPal, Facebook, twitter etc.
It will Look Just as same as you are asked to login to your Email Account, That's where the victim gets tricked aka HACKED.

So,Lets start.
To create Your Own Phisher you have to follow these simple steps ----

1. You have to go to the website for which you want to make your phisher for ex. Gmail, Yahoomail, Orkut, PayPal etc


2. When you are there at the login page just click on File>Save As
[ remember to rename it as index.html while saving the web page ]


3. When you have saved the web page,open the index.html in notepad.

4. Search for .gif and replace the text written before the image name with
http://www.your-site.yourservice.com/index_files/


You Have To Do that for all the images named there, Or you can use replace all option.

5.There will be another file needed also named as login.php .Which will give the condition to save the username and password typed by the user.

[NOTE:- I will not be providing the login.php to you,You have to get the login.php by yourself.
if you have some knowledge about the php language you can make your own login.php
For those who dont have knowledge about php language i recommend you search for login.php on Google,you will surely get that file.]

6. After you have done this,click on Edit>Search and type action in the search box,and then click on search.

7. It will take you to the First action String, after the equals two mark type login.php in replace of the the text written after it.

8. Click on Search again,this time it will take you to another action string,after the equal to mark type
http://www.your-site.yourservice.com/login.php
in replace of the text written in front of
the equals to mark.
NOTE: You have to type you your sites name in replace of your-site,and your free Webhosting service against your service in
http://www.your-site.yourservice.com/login.php.

9. Now you are all done.

NOTE: You have to upload all the files on your free Webhosting service directory, including in index_files Folder in the directory.Or it won't work.
The Directory Will be ---
i. index.html
ii. index_files [Folder which you saved]
iii. login.php
iv. login.txt

10. You can Make any websites phisher by these steps for example -- Gmail, Orkut, Yahoomail, PayPal, Facebook, Twitter etc.

Happy Hacking

Wednesday, December 29, 2010

Cashout from st0l3n Credit cards !!!

Cashout from st0l3n Credit cards !!! Educational Purposes Only lol! »


How To CashOut Money «


»My New Tutorial will show you, how you can make money with Credit Cards from EVERYWHERE!!! «

»INPORTANT : READ MY TUTORIAL BEFORE YOU ASK QUESTIONS!«

»At first check your equipment..«

»1st : Onlinegame «

»2nd: Proxy «

»3rd : Creditcard «

-----------------------------------------------------------------------------------

»Your Tool to Cashout.«

At first you have to register on a online game site, maybe where you can play poker or backgammon

its only important, that you can play with REAL MONEY...

Onlinegames like: http://www.pokerstars.com

You need 2 account... One of them must be your own and the second have to be like the Creditcard user.

To make account is in most onlinegames for free.

-----------------------------------------------------------------------------------

»Proxy«

Then join your Proxy... Its nice if you use the same Proxy like your creditcard comes from.

for example : German creditcard and German Proxy .

-----------------------------------------------------------------------------------

»Creditcard«

Now when you connect to the Proxy, join your faked account to play online...

Then purchase Real money from the hacked or stealed Creditcard.

Dont use your own Creditcard . It wouldnt have any effeckt Big Grin

-----------------------------------------------------------------------------------

»» How to Cashout««

Join the game with your Account (your faked and your real) to play.

You have to click on the "Play with Real Money" Button.

To play you need more then 2 players on the Table.

You can make more accounts to shit with all your accounts on the table

but i played with some hackerfriends. So they knowed what i did.

Then Play Big Grin

IMPORTANT : Your real account need some real money too ... 10 Lira is enough Big Grin

ok continue :

Then your firends have to give up the round, so that only YOU AND YOUR FAKED account is in .

Like 1 on 1.

Then Press the "All-In" Button with your faked Account .

And with your real Account the Same...

The effeckt : your faked account will set all the money from the hacked/stolen Credit-card

and your real account will set 10 € or Lira or $ .

Then your faked account have to lose... like give up.

So you will taken all the money and logout from the Game.

Press " Cashout" to cashout your Money to your real Credit-card.

Then go to the Restaurant and Buy Xinkali (Xinkali - Georgian delicacy)

If you have some questions. Ask me Big Grin

P.S. With that i made more than 1500€ in 3 times Big Grin

There are very very easy ways to cash out too.....






hay this is a copied data from some other place so try at your risk........