Search This Blog

Monday, September 13, 2010

posted by michael sangster webs
Since the introduction of the personal computer in the late

1970s, the vocation of computer hacking has not only grown in scope

and membership, but the dynamics of the institution have changed as

well, as a result of the changing role of technology in society.

Consequently, the public image of the "typical" hacker has been

transformed from harmless nerd to malicious techno-criminal.

Fuelled by media sensationalism and corporate zealousness, their

activities have been criminalized and hackers are now being legally

persecuted on a scale disproportional to the actual threat they

pose. Hackers want their motivations and ethics to be viewed as

legitimate, or at least understood, instead of being simply written

off as devious teenagers who have nothing better to do than crash

every available computer.



Despite this, there has not been much sociological research

done on hackers and their culture. I find this strange; the

academic community widely accepts the concept of the "Information

Society", yet this future version of common society has not been

given its due within the discipline of sociology. The prospect of

a dual-class society, in which the population is segregated into

the information-rich and the information-poor, certainly qualifies

as a serious social problem. The computer hacker community, and

the important role this subculture plays in the Information

Society, must therefore be studied with equal attention.



Most of the available studies approach the subject from one of

two perspectives: one, a criminological perspective, employing

deviance theory to explain the formation and organization of the

hacker community; two, a civil-liberties approach that focuses on

current computer-crime laws and how apprehended hackers are being

denied their Constitutional rights. (All such studies focus on

United States constitutional law - a similar comprehensive

treatment on Canadian hackers has not yet been done.)



Although these approaches are essential to understanding the

hacker culture, it must be also be studied from a number of diverse

perspectives in order to properly show its depth and richness of

content. Therefore, this project will analyze the hacking

subculture as a form of organized revolutionary collective, by

utilizing a theory of social movements developed by Stewart, Smith,

and Denton (1984). Through its activities, this subculture

actually plays a vital role in the progression of technology, and

also performs a regulatory function for social control, by

protesting, mocking, and subtly undermining state and corporate

control through computers and related technologies.



It will be shown that the hacker's relatively harmless

activities are forms of such protest; yet, this cannot be

effectively vocalized to the public because of the nature of the

activities, ie., hacking is widely considered illegal. As with any

revolutionary subculture, the hacking movement is stigmatized,

discredited, and persecuted by the media and corporate culture as

juvenile, disruptive, and criminal. And, all the while, being

generally misunderstood. Because of this problem, it is necessary

to bring the hacker's plight to the attention of sociologists

through a theoretical framework; that is the primary purpose of

this paper.



Because of the lack of current, comprehensive studies

available, this is a largely exploratory project. By surveying

common hacker communications, the various social and political

themes of their activities can be examined, and conclusions drawn

about what hacking represents for the participants. Hacker

communications on electronic bulletin board systems (BBSes) -

electronic message and file transfer bases that are connected to by

a computer and modem - are generally considered "underground".

Private, heavily screened, and generally short-lived, these

bulletin boards are invisible to the general public, and most

require private invitation. Such types of communication are

therefore difficult to observe and study; a different channel of

hacker communication will be utilized here.



As with any subculture which has been sparsely studied,

various definitions of what constitutes a "hacker" abound, and

these definitions vary according to the socio-political position of

the defining group or individual. For the purposes of this study,

hackers are defined as computer enthusiasts who have an ardent

interest in learning about computer systems and how to use them in

innovative ways (Denning, 1991:25).



This definition, therefore, does not include, for instance,

malicious hackers who deliberately crash systems and delete files,

but those hackers who explore systems purely for the intellectual

challenge and leave no traces of their wanderings. In addition,

there are often misuses of the term, as the computer underground is

made up of not only hackers, but other kinds of computer

enthusiasts - for instance, phreakers, software pirates, and

carders as well. For a complete discussion of the organization and

topography of the computer underground, see Meyer, "The Social

Organization of the Computer Underground", 1989.





Literature Review



As previously mentioned, the hacker culture is a relatively

new phenomenon and major writings on it have only begun to surface

in the past 10 years, beginning with the 1984 publication of Steven

Levy's landmark work, _Hackers: Heroes of the Computer Revolution_.

Levy examines the evolution of the Hacker Ethic, a sextet of credos

that emerged from the activities of the "pioneer" hackers of the

late 1950s:



1. Always yield the Hands-On Imperative! Access to

computers - and anything else which might teach you

about the way the world works - should be unlimited

and total.



2. All information should be free.



3. Mistrust Authority - Promote Decentralization.



4. Hackers should be judged by their hacking, not

bogus criteria such as degrees, age, race, or

position.



5. You can create art and beauty on a computer.



6. Computers can change your life for the better.



(Levy, 1984)





This original code of ethics forms the political basis of the

modern hacker's activities. Although the methods used by the

hacking community have changed somewhat over time, the principal

motivations and ethics have remained the same. This point is

reiterated in several studies and commentaries (Felsenstein, 1992;

Meyer, 1989; Sterling, 1992). There is also much support for the

contention that the hacking community is rich in cultural diversity

(Levy, 1984; Hafner and Markoff, 1991; Meyer and Thomas, 1990;

Wessels, 1990).



However, contradictory findings are available; there are also

those studies and media reports that reinforce the stereotypical

image of the hacker as a teenage loner, devoid of social skills,

who is often petty and malicious in their actions and hold

absolutely no morals or ethics whatsoever (Forester, 1987; Parker,

1991; Stoll, 1989; Turkle, 1983). Sensationalist "pop culture" TV

shows such as Geraldo and NBC Dateline have featured episodes on

hackers; such episodes are wildly exaggerated in their claims and

portray the featured teenage hackers as brilliant-but-devious

thieves that spend their days stealing credit information.



These latter works are often ill-researched; their opinions

and "facts" come not from extensive observation, contact with the

diverse hacker community, or investigations into the motivations

behind the actions of hackers, but rather from media reports and/or

encounters with only one particular breed of hacker. To base

entire judgements on the findings from a segment of a culture,

rather than a representative whole, leads to inaccurate reports and

certainly does the hacker community no good in having their side

properly understood.



Reports like these simply perpetuate the popular image of the

lonesome computer criminal, without making crucial divisions

between the anarchists and the explorers, for instance. Yes, there

_are_ hackers who destroy files and crash systems intentionally, but

they certainly do not comprise the overwhelming majority of

hackers; they are in fact only a small percentage. Many hackers,

as is their primary intention, go completely unnoticed on the

systems they choose to hack and are never discovered. Leaving no

path or trace is of the utmost importance to hackers.



And at this point, many people assume we would then

proceed to copy everything we find and then trash the

system so we could then sell the only remaining copy of

the data to the highest bidder, preferably a foreign

agent or the richest competitor of the company...



It makes no sense. We thirst for knowledge and

information, and then you can possibly think we are going

to destroy that which is sacred to us? To take away

someone else's chance to succeed in getting in as we did?

To fuel an already terrible reputation and increase our

chances of getting caught and thus have our lives and

careers effectively ruined? ("Toxic Shock", 1990)





For this reason, it is often difficult to estimate the number

of active hackers at any given time (Denning, 1990; Landreth,

1989). Not only is leaving no trace on a system intellectually

challenging and part of the "hack", but leaving a trace makes it

much easier to lead the law enforcement authorities right to you -

and, most importantly, any detection will likely lead to the

hacker's stolen user account to be changed or deleted by the system

administrator.



On the other hand, the studies and commentaries from the

hacker's point of view are often written by current or ex-members

of the computer underground. This "insider's view" is most likely

to present a more balanced picture, of the type that only a member

of the studied culture can produce. These studies explain the

primary motivations behind hacking and how the original code of

ethics is adhered to in the modern computer community.

Publications such as _Computer Underground Digest_ and _2600: The

Hacker Quarterly_ strive to show a balanced view of hackers that is

both academic and well-debated, as a contrast to often erroneous

media hype.



In addition, the literature strongly supports the notion that

the hacking culture contains a strong element of rebellion and/or

(Denning, 1990; Hollinger, 1991; Levy, 1984; Meyer and Thomas,

1990; Sterling, 1992). Hacker groups often compile their own

newsletters and electronic journals, as well as debate topics on

BBSes, many of which are devoted strictly to those with a

rebellious and anarchist bent. Such electronic publications will

be discussed in detail in Methodology, and will comprise the data

set for this project.





Theoretical Approach



As stated earlier, the majority of approaches to studying

hackers are either criminological or civil-liberties ones. This

paper will employ theory of social movements, in order to

demonstrate the existence of socio-political protest within the

hacker culture. Stewart, Smith, and Denton (1984) outline the six

essential requirements for the existence of a social movement:



1. A social movement has at least minimal

organization.

2. A social movement is an uninstitutionalized

collectivity.

3. A social movement proposes or opposes a program for

change in societal norms, values, or both.

4. A social movement is countered by an established

order.

5. A social movement must be significantly large in

scope.

6. Persuasion is the essence of social movements.



Through the application of this criteria, the hacking

subculture can clearly be considered a social movement:



1. Minimal organization: the hacking culture has a significant

membership of "followers", and its share of "leaders". Such

leaders may be "gurus" - programming experts who are legendary

for their knowledge and helpful expertise (Raymond, 1993) - or

outspoken members of the community, such as "Emmanuel

Goldstein" (editor and publisher of 2600: The Hacker

Quarterly). Hackers often form small groups of their own,

which network with other groups through various channels of

communication; this type of organization efficiently serves

the needs of the community without the necessity of a large-

scale single organization.



2. Uninstitutionalized collectivity: The social movement is

always an "out group" and is criticized for not handling

the controversy through normal, proper channels and

procedures - even when the channels and procedures are

denied to the movement. The movement has virtually no

powers of reward and punishment beyond personal

recognition and expulsion, and expulsion often leads to

competing organizations created by the exiled. (Stewart,

Smith, and Denton, 1984: 5)



Hackers have always been considered an "out group", in schools

(where the hackers are simply "nerds") and in larger society

(where they are labelled "criminals"). They are not

considered part of any social institution. In addition, they

are often denied their own voice in the mass media, which

often leaps at chances to discredit and undermine members of

the hacking community.



3. Proposes or opposes change: this is what the hacking culture

is all about. Hackers wish to change the attitudes of the

mass public towards technology, and believe above all that

knowledge is power. If people are not willing to learn all

they can about technology, they are allowing themselves to be

controlled by state and corporate power; therefore, their

activities both oppose current norms and propose new ones.



4. Countered by an established order: The enemy of hackers are

those who try to oppress them the most - the state and large

corporations. Hacking, as a form of socio-political protest,

is therefore vilified and denounced through the media by these

two institutions. Hackers' innate knowledge of this manifests

itself in various forms: in anarchist collectives, in anti-

establishment collective action (Meyer and Thomas, 1990), and

the fact that corporate and state computers are most often the

intended targets of hackers.



5. Significantly large in scope: As stated earlier, it is often

difficult to estimate the number of hackers currently

operating because of the lack of trace they leave on systems.

However, there have been several estimates as to the number of

hacker bulletin board systems currently operating - another

difficult survey because most hacker BBSes are "underground"

and the phone numbers are not widely available - Meyer and

Thomas (1990) estimate that there are currently a few hundred

in the United States alone, compared to over a thousand non-

underground boards. Hacking is an international phenomenon,

and its membership cuts across ethnic, racial, gender, and

vocational lines. For instance, there have been many

documented reports of extensive hacking activity in Europe

(Hafner and Markoff, 1991; Stoll, 1990).



6. Persuasion: The typical uninstitutional, minimally-

organized social movement enjoys few means of

reward or punishment necessary either to

coerce people to join or to remain loyal to a

cause or to coerce the established order to

capitulate to all or some of its demands. ...

Persuasion is pervasive when a movement

attempts to bargain. For instance, a social

movement that decides to bargain must convince

both supporters and opposition that it is

serious, that it is operating from a position

of strength, and that it has something of

value to exchange for concessions. (Stewart,

Smith, and Denton, 1984: 11)





Persuasion, in this case, is also present. For the first part

of the defintion, the hacking culture complies by offering a subtle

system of reward or punishment to its members. For instance, the

code of ethics is strongly enforced; if a member derides this and

deliberately deletes some files, for instance, other hackers will

in turn deride him or her. Snitching, backstabbing and turning one

another in to the authorities is not uncommon ( Hafner and Markoff,

1991; Sterling, 1992). This is done primarily out of fear and

mistrust of authority and the law - that if they do not offer

information, they will be prosecuted as an associate in the crime -

rather than out of spite for a fellow hacker.



As a bargaining chip with state and corporate powers, hackers

offer the explanation that they are doing them a favor by

unearthing security holes in their systems (Denning, 1990;

Goldstein, 1990; Hittinger, 1991; Landreth, 1989.) In the words of

one hacker:



A major problem in Cyberspace is the lack of

communication between hackers and non-hackers.

Corporations are fully entitled to their privacy, and so

they feel threatened by the hacker "menace". ... If

hackers and corporations and security companies and

software companies, etc., were to overcome their

differences much could be done. By trading bits and

pieces of knowledge, the two opposing groups could

together develop revolutionary advances in computing that

would benefit all. ("The Dark Adept", 1990)



Therefore, through this model of social movement construction,

the assertion can be made that the hacker community indeed

comprises such a movement. An analysis of relevant data will

further support this conclusion.





Data and Methodology



This project utilizes an ethnographic approach, using

qualitative data and document analysis, to studying the hacker

culture. By analysing various electronic hacker journals and

commentaries, support for the theory of hacking as a social

movement, employing socio-political protest, can be found. As

discussed previously, "underground" communications such as those

found on BBS message bases provide much richer and representative

sources for study; hacker journals and commentaries are mainly

representative of only the more outspoken members of the culture.

However, there are several methodological problems inherent in

gathering BBS data.



Firstly, hacker BBSes are very well-guarded, and difficult for

an outsider (even a well-meaning researcher) to access. There are

"new-user" questionnaires to fill out, and such questionnaires

usually include technical questions, in order to test the potential

worth of the new user (Meyer and Thomas, 1990). Sometimes the new

user is given a small test, such as finding the unlisted phone

number to a certain computer, or asked to provide a piece of

information such as a account name and password to a well-secured

corporate system.



Such tests serve as filters for worthy and un-worthy potential

new members; it is imperative that new users be screened properly.

If a system operator (referred to as a "sysop" - the one who

maintains the bulletin board system) does not screen users

properly, any kind of computer user could gain access - even a

police officer or government agent. It is in the sysop's best

interests to weed out unsuitable members, for if the user is not

going to contribute in the sharing of information on the board,

there is really no use for them; if all they do is constantly take

information or files and not contribute anything equal in value

(referred to as a "sponge"), they are ridiculed and their account

deleted from the board.



Secondly, there is an innate mistrust of new users among the

hacker community. This is fuelled by the fact that police officers

or government agents often try to gain access to the board under

false pretenses - and quite a few succeed. Anyone, upon discovery,

claiming to be simply a sympathetic reporter or researcher will

likely be instantly shut out, and blacklisted on other hacker BBSes

- the word gets around fast. The mode of computer communications,

where you cannot see, hear, or physically speak to another person,

makes it easy to masquerade as someone you are not.



Law enforcement people with an excellent technical knowledge

of computers and some conception of the underground culture can

easily pass as a hacker. For this reason, phone numbers of hacker

BBSes are closely guarded and are not publicly distributed. Lists

of other hacker BBS numbers are often maintained and are available

on the board; but these lists are often outdated, since BBSes are

extremely volatile and usually have extremely short lives (Meyer,

1989).



For these reasons, I have chosen to employ as data underground

hacker publications and newsletters rather than BBS communications.

Although not as representative of the diverse hacker community as

BBS data, publications and newsletter analysis avoids the problems

inherent in ethnographic research, such as winning the trust and

cooperation of the members of the underground in order to gain

entry to the culture - which, because of their justifiably paranoid

nature, would take a very long time. As well, there is the problem

of being intrusive in the culture.



It is important to avoid intruding on the way the group

normally functions. Nothing sinks a field project faster

than interfering with the group's way of thinking and

doing things. At the very least, such intrusiveness will

change the situation you have come to study; at the

worst, it may result in your expulsion. (Northey and

Tepperman, 1986: 71)





By utilizing document analysis, however, these problems are

avoided, without a difference in quality of data. Many passionate

debates on underground BBSes are summarized by individuals and

submitted to hacker journals, which (with a limited amount of

technical skill, research, and Internet access) can be found on

several public archive sites. These are still the words of

hackers, yet it is not completely necessary for this study to enter

the culture itself as an observer.



As mentioned, several hacker journals and newsletters comprise

the data set. Each journal or newsletter is comprised of articles,

usually on a specific how-to topic (eg., "Hacking Answering

Machines", by Predat0r; "The Improved Carbide Bomb", by The

Sentinel), as well as commentaries, written by various authors. As

with underground BBSes, hacking journals and newsletters tend to

spring up and disappear in a very short time, with no explanations.

The ones used for this study, in no particular order, are:



PHRACK: (A contraction of the words Phreak/Hack) This

journal is generally recognized as the "official"

electronic publication. (The other "official"

publication, 2600: The Hacker Quarterly, is

available only in print form.) Phrack is the

oldest hacker journal in existence, with its first

issuance in 1985.



COMPUTER UNDERGROUND

DIGEST: Known as CuD. This weekly electronic newsletter

features both academic articles and commentaries

from members of the underground community, and

began publication in March 1990.



DIGITAL

MURDER: Issued first in October 1991. A general

hacking/phreaking/ newsletter.



FBI: (Freaker's Bureau Incorporated) General

newsletter, started in September 1991.



HACKERS

UNLIMITED: Began in December 1989.



INFORMATIK: (The Journal of Privileged Information), 1992.



MAGIK: (Master Anarchists Giving Illicit Knowledge), 1993.



THE NEW FONE EXPRESS: June 1991.



P/HUN: (Phreakers/Hackers Underground Network) One of the

better-known and longer-running journals, began in

1988.



NARC: (Nuclear Phreakers/Hackers/Carders) Another long-

lasting journal, started in 1989.



TAP

ONLINE: (Technical Assistance Party) First established in

1972 as YIPL (Youth International Party Line) by

Abbie Hoffman, and soon thereafter changed its name

to TAP. Recognized as the "grandfather" of hacker

publications (Meyer, 1990).



TPP: (The Propaganda Press) Barely a year old, and one

of the "fly-by-night" newsletters.



NIA: (Network Information Access) Another relatively

new publication, bearing the motto "Ignorance,

There's No Excuse".



H-NET: Begun in June 1990.



LOD/H TECH

JOURNALS: These are the technical journals of LOD/H - the

elite Legion of Doom/Hackers group. This four-part

set was released in January 1987 as a one-time

release.





These periodicals constitute a rich cross-section of the

computer underground culture. The authors of articles that appear

in these journals and newsletters are generally considered the more

"elite" or knowledgeable hackers in the culture, especially those

who write the how-to articles. Therefore, these periodicals can be

considered adequately representative of the culture's ethics,

beliefs, and values.



The following sections will provide and discuss data, culled

from these periodicals, supporting each of the six characteristics

of social movements outlined by Stewart, Smith, and Denton (1984).

These six points were provided as the theoretical framework for

this study - please refer back to Theoretical Approach for an

outline of this model.





Characteristic #1: Minimal Organization



Gordon Meyer (1989), in "Social Organization of the Computer

Underground", provides a comprehensive study of how hackers and

computer underground members organize through BBSes and other

illicit channels of communication, such as corporate voice-mail

bases and telephone "bridges". These methods allow hackers to

share vital information such as who's been arrested or searched,

which systems have shut down, new numbers to try, security holes

that have been discovered, etc. Although hacking is primarily a

solitary activity, hackers need to network, through BBSes and other

channels of communication, into groups to share information and

technique, and also to give a feeling of community.



Such groups usually do not have leaders in the real sense

(Meyer, 1989), but some members are bound to know more than others,

and the veterans of the group act as "big brothers" and guides to

novice hackers. For instance:



I learned as much as I could as fast as I could, and

after several months of intensive hacking and

information-trading, the Cracker was no longer a novice.

I knew a lot about hacking by then, and because I liked

to share what I knew, I gained the reputation of being

someone to go to if you were having trouble. ... As the

Cracker's reputation grew, answering such requests became

a matter of pride. (Bill Landreth (aka "The Cracker"),

1989: 16)





In addition, hackers regularly get together socially, whether

in small groups, or at large national gatherings called "cons"

(conventions). Cons are organized by elite groups and tend to draw

fairly large crowds. Cons feature guest speakers, who are usually

elite and well-known hackers, and occasionally academic or

professionals in the computer fields as well. Once planned, cons

are advertised on underground boards and through hacker

publications. Each convention has a unique name - the HoHoCon in

Houston, SummerCon, PumpCon at Halloween, and DefCon, to name a few

main ones. Conventions as social gatherings, however, have their

own set of problems:



Friday, October 30, 1992, Pumpcon began, at the Courtyard

of the Marriott, in Greenburgh, NY. All in all, about 30

hackers showed up, and had a great time. At least until

the evening of Oct. 31st, when 8-10 members of the

Greenburgh police force showed up and raided the Con. A

few hackers who had been out driving around during the

time of the bust returned a few hours later, and when

they were seen by police, they were immediately taken to

255 and questioned. (They were walking down the hall,

when a cop appeared, and told them to step into a room.)

The cops asked them if they were hackers, and when they

didn't answer, one police officer reached into the coat

pocket of one of the people, and produced an auto dialer.

This in itself was enough to send the three to room 255,

where the rest of the hackers were being held for

questioning. My question to you - isn't that just a bit

illegal? Bodily search without probable cause OR a

warrant? Ooops - I'm forgetting - we're HACKERS! We're

ALL BAD! We're ALWAYS breaking the law. We don't have

RIGHTS!. ... In one of the rooms, there were about 2

dozen computer magazines which were apparently

confiscated, although the warrant did not specify that

magazines could be taken. But, when you're busting

HACKERS, I suppose you can take what you want. After

all, hackers are evil geniuses, and don't have the same

rights as NORMAL criminals do. (by "Someone





Characteristic #2: Uninstitutionalized collectivity



Hackers have always been considered an "out" group in society.

In schools, hackers are seen as "nerds" and "loners" without social

skills (Levy, 1984; Turkle, 1983); in larger society, they are

prosecuted by those in power. In the words of a hacker:



"I am a hacker." If I ever told that to anyone, it would

immediately be assumed that I am a malicious,

vandalising, thieving, pseudo-terrorist out to take over

the computers of the world for personal gain or quite

possibly to glean some morbid satisfaction from deleting

megs upon megs of valuable data.



"I am associated with the computer underground." If I

ever told that to anyone, there would be a flash flood of

foolish associations in that person's mind between myself

and The Mafia, with Saddam Hussein, Syria, Libya, Abu

Nidal, and who knows what else.



Almost universally, among the ignorant majority, we

hackers are considered to be dangerous thugs whose sole

purpose in life is to cause as much damage as we can in

as little time as possible to the largest number of

people.



Sure, there are those little kiddies (mental and

physical) who call themselves "hackers" and fit the above

descriptions. There are also people who call themselves

"human beings" that rape, murder, cheat, lie and steal

every few minutes (or is it seconds, now?). Does that

mean that all "human beings" should then be placed in

prison? ("Toxic Shock", 1990)





As with any minority group, hackers are judged as outcasts,

and social, economic, and political resources are withheld from

them as a result. The commentary on the police raid at the PumpCon

convention (see page above), as well as the commentary above,

are reflections of hackers' anger at being constantly derided and

looked down upon as a worthless menace. The hacking culture is

definitely not a part of any established institution. However,

hackers often express a wish to work with an established

institution, such as the police, for both personal gain (less

chance of being prosecuted yourself) and for the good of the

movement (hackers feel that police should be spending their time

and resources going after the real computer criminals, such as

corporate embezzlers).



We cannot, we WILL not, allow this tyranny to continue!

The United States Government has ignored the voice of the

Electronic Community long enough! When we told the

government that what they were doing was wrong, they

refused to listen! When we formed political action groups

to bring our cases to court and before Congress, we were

told that we were using loopholes in the law to get away

with crime!!! We have, in a peaceful and respectful

manner, given our government more than reasonable

petition for redress of our grievances, but if anything

the situation has gotten worse!



Government administrations use computer crime as a weapon

in internal battles over jurisdiction. Government

officials, who have only the slightest understanding of

computer science, use computer crime as a tool for career

success. Elected Representatives, who have absolutely no

understanding of computers, use "information

superhighways", computer crime, and cryptography to gain

constituent money and voter support! The Electronic

Community, the only group who fully understands the

issues involved here, and the only group who is effected

by the decisions being made, has been completely ignored!

("The White Ninja", 1994)





Characteristic #3: Proposes or opposes change



Here, hackers definitely qualify under this criteria. As

stated previously, a primary hacker ethic is that information and

knowledge is power (Denning, 1990; Landreth, 1989; Levy, 1984). In

fact, the motto of the electronic hacker journal NIA (Network

Information Access) is "Ignorance, There's No Excuse". There is a

general call to the public to educate themselves in technology,

lest it be used to control them:



As we can see, this has not been the case. The computer

system has been solely in the hands of big businesses and

the government. The wonderful device meant to enrich

life has become a weapon which dehumanizes people. To

the government and large businesses, people are no more

than disk space, and the government doesn't use computers

to arrange aid for the poor, but to control nuclear death

weapons. The average American can only have access to a

small microcomputer which is worth only a fraction of

what they pay for it. The businesses keep the true state

of the art equipment away from the people behind a steel

wall of incredibly high prices and bureaucracy. It is

because of this state of affairs that hacking was born.

("Doctor Crash", 1986)





Most, if not all, of us think information should be

exchanged freely... If everyone is kept abreast of the

newest technologies, techniques, what have you, then

everyone can benefit...The more each of us knows, the

fewer past mistakes we will repeat, the greater knowledge

base we will have for future developments. ("Toxic

Shock", 1990)





Many hackers share a common utopian vision - that of an

electronic society where information is free and uncontrolled,

democracy reigns on the "information highway", and creativity and

ingenuity are revered traits:



The hackers are needed again. We can solve problems, get

it done, make it fun. The general public has a vested

interest in this! The public has a vested interest in

electronic privacy, in secure personal systems, and in

secure e-mail. As everyone learns more, the glamour and

glitz of the mysterious hackers will fade. Lay people

are getting a clearer idea of what's going on. ("Johnny

Yonderboy", 1990)





For further reference, see Steven Levy's landmark work,

Hackers: Heroes of the Compu





Characteristic #4: Countered by an established institution



As was seen in the previous section, hackers are angry at the

way they are portrayed in the mass media. In this case, the

"established order" includes most of those - the legal authorities,

the corporations, the government - that have a vested interest in

keeping hackers and their socio-political messages at a standstill.



This is our world now... the world of the electron and

the switch, the beauty of the baud. We make use of a

service already existing without paying for what could be

dirt-cheap if it wasn't run by profiteering gluttons, and

you call us criminals. We explore... and you call us

criminals. We seek after knowledge... and you call us

criminals. We exist without skin color, without

nationality, without religious bias... and you call us

criminals. You build atomic bombs, you wage wars, you

murder, cheat, and lie to us and try to make us believe

it's for our own good, yet we're the criminals.



Yes, I am a criminal. My crime is that of curiosity. My

crime is that of judging people by what they say and

think, not what they look like. My crime is that of

outsmarting you, something that you will never forgive me

for. ("The Mentor", 1986)





Hackers are very prolific on this topic, and certainly don't

mince words when it comes to voicing their anger at those

institutions that oppress them:



But, even as I type this, I begin to realize just why we

are such a feared group of people...



We are misunderstood by the majority.



You cannot understand someone who judges others by what

they say, think, and do, rather than how they look or how

large their income is.

You cannot understand someone who wants to be honest and

sharing, instead of lying, stealing, and cheating.



You cannot understand us because we are different.

Different in a society where conformity is the demanded

norm. We seek to rise above the rest, and then to pull

everyone else up to the same new heights. We seek to

innovate, to invent. We, quite seriously, seek to boldly

go where no one has gone before.



We are misunderstood, misinterpreted, misrepresented.



All because we simply want to learn. We simply want to

increase the flow of information and knowledge, so that

EVERYONE can learn and benefit. ("Toxic Shock", 1990)





Such oppression, without a proper venting of anger and

frustration, can lead to anarchy - and many hackers have an

anarchist/rebellious bent for this very reason (Meyer and Thomas,

1990).



There is one last method of this war against computer

abusers. This is a less subtle, less electronic method,

but much more direct and gets the message across. I am

speaking of what is called Anarchy. Anarchy as we know

it does not refer to the true meaning of the word (no

ruling body), but to the process of physically destroying

buildings and governmental establishments. This is a

very drastic, yet vital part of this "techno-revolution."

("Doctor Crash", 1986)





Many anarchist newsletters and journals began circulation in

1989 and 1990, which were the beginning years of a massive legal

crackdown on hackers in the United States. Suspected hackers'

houses were raided, equipment confiscated (and to this day, much is

not yet returned), and various charges laid.



Several high-profile trials went to session, such as that of

"Knight Lightning". One of the more paranoia-fueled raids was done

on Steve Jackson Games, a company that produced role-playing

simulation games. The accompanying book for one game, GURPS

Cyberpunk, was admonished by legal authorities as "a manual for

computer crime" (Sterling, 1992: 142). For a complete discussion

of these raids and accompanying legal hassles hackers faced, refer

to The Hacker Crackdown by Bruce Sterling (1992). These arrests

and trials were also closely monitored by the Electronic Freedom

Foundation, a lobby group started as a response to this crackdown.

Various commentaries, responses, and angry manifestos regarding

these raids are also published regularly in The Computer

Underground Digest.





Characteristic #5: Significantly large in scope



As mentioned, the hacker culture is not unique to North

America; many hackers in other countries have been similarly

prosecuted and hounded by the media. The best-known case of this

is the hackers of Europe. One group, the Chaos Computer Club, has

members in France and Germany. The Netherlands has their own

prominent group, HACK-TIC. These groups, as well as others from

around Europe, gather each year for the Chaos Computer Club's

annual conference in Germany.



Contrary to the name, the CCC is well-organized, publishes its

annual conference proceedings, and is generally considered a

resource base for other European hackers. Most famous of the

German hackers is Markus Hess, whose long-distance explorations

into American systems was documented by Cliff Stoll, in his 1989

book The Cuckoo's Egg. Another example of large-scale organization

are the hacker conventions in the United States. Also, the number

of hacker bulletin board systems in the United States alone,

previously stated as somewhere around a few hundred, are a

testament to the wide scale of this phenomenon.



Hackers maintain that there are others just like them all

around the world, and when they realise they are intellectually and

mentally different than most other people, it's like a revelation.



And then it happened... a door opened to a world...

rushing through the phone line like heroin through an

addict's veins, an electronic pulse is sent out, a refuge

from the day-to-day incompetencies is sought... a board

is found.



"This is it... this is where I belong..." I know everyone

here... even if I've never met them, never talked to

them, may never hear from them again... I know you all...



I am a hacker, and this is my manifesto. You may stop

this individual, but you can't stop us all... after all,

we're all alike. ("The Mentor", 1986)





Characteristic #6: Persuasion



As previously discussed in Theoretical Approach, the hacker

culture often employs reward and punishment in keeping their

movement together. Hackers that defy the ethics and values of the

underground are castigated, and the word of the deed and the

offender quickly travels through the social network.



For instance, in Out of the Inner Circle, Bill Landreth (aka

"The Cracker") documents the development of the Inner Circle, an

elite group of hackers which he helped create. The Inner Circle

had unwritten rules similar to the Hacker Ethic, and such rules

were strictly enforced:



The fact that we tried to invite only those people who

already met these two requirements quickly resulted in an

unwritten "code of ethics" that was, and remained, the

philosophy that held the Inner Circle together. ... We

had many good reasons to follow these basic rules. But

the most important, as far as the Inner Circle was

concerned, had to do with the basic principle of

respecting other people's property and information. We

wre explorers, not spies, and to us, damaging computer

files was not only clumsy and inelegant - it was wrong.

(Landreth, 1989: 18)





Some hackers think the time has come - that those in power are

finally willing to listen to them:



Just exactly how far should the government go to protect

companies and their data? Exactly what are the

responsibilities of a company with sensitive, valuable

data in their computer systems? There is a distinct

feeling that private-sector companies should be doing

more to protect themselves. Hackers can give an

important viewpoint on these issues, and all of a sudden

there are people willing to listen. ("Johnny Yonderboy",

1990)





Others become activists, and one hacker actively seeks out the

corporate sector by submitting technical security articles to The

Computer Underground Digest, a journal that is widely read by both

hackers and computer professionals alike:



... I hope to break down this barrier of resentment by

crossing over the lines of the Underground into the

"real" world and providing valuable information about

systems, security, interfacing, etc. I hope other will

follow suit, and that the private sector will reciprocate

by allowing technical information to flow into the

Underground. Ultimately, I hope there will be a rapport

between hackers and members of the private sector so that

we may learn from each other and make the best use

possible of this greatest of inventions, the computer.

("The Dark Adept", 1990)





Overwhelmingly, it looks like The Dark Adept's vision is not

being realised so far. Hackers continue to be raided and charged

under newly-constructed computer crime laws that are vague at best,

and constitutionally improper at worst. This largely misunderstood

culture is extending the symbolic olive branch to corporate

industry, by offering to share their knowledge and expertise to

create better technology for everyone.



However, corporate culture constantly denies this offering.

Preliminary experiments have been done in the United States, with

hackers being hired by companies to test their systems, and the

results have been overwhelmingly positive (Denning, 1990). Why,

then, is this practice not adopted widely? A discussion of the

implications of this, including power relations and econo-political

control, could easily comprise another thesis; for this reason, it

will not be delved into here.





Conclusions and Summary



In this paper, the conception of the computer hacking

phenomenon as a social movement has been explored. Working with a

theoretical model of social movements developed by Stewart, Smith,

and Denton (1984), various hacker writings have supported the idea

of the existence of social collectivity. As the hacker culture is

relatively new and astonishingly under-studied, these conclusions

can be taken as preliminary. I hope this study has laid a

groundwork for further sociological study of the computer

underground.



As the proliferation of hackers' anarchist tendencies

suggests, this culture desperately needs some understanding, as

well as a sympathetic ear. We have seen that corporate industry

rejects the knowledge and technical expertise of hackers; could not

a higher level of technology be realised if these two factions were

to work together? The answer to this will be found in the future.

As the possibility of a global Information Society draws closer,

people must be willing to take their technical education into their

own hands. We could all learn a valuable lesson from hackers: that

intellectual hunger and the quest for knowledge should be central

in our society.



The coming of the Information Society has been heralded by

academics and non-academics alike. The notion of a free,

democratic, electronic society has been beholded as a sort of

utopia, where information flows unencumbered and freedom of speech

is key. However, there is a dark side to this as well.

Information is becoming increasingly private, and many people fear

the Information Society will actually be a sort of Orwellian 1984-

type society instead:



There's something wrong with the Information Society.

There's something wrong with the idea that "information"

is a commodity like a desk or chair. ... Knowledge is

power. The rise of computer networking, of the

Information Society, is doing strange and disruptive

things to the processes by which power and knowledge are

currently distributed.



I don't think democracy will thrive in a milieu where

vast empires of data are encrypted, restricted,

proprietary, confidential, top secret, and sensitive. I

fear for the stability of a society that builds

sandcastles out of databits and tries to stop a

real-world tide with royal commands. (Sterling, 1992)





The debate goes on; either we can sit, wait patiently, and see how

it all turns out; or we can act, educate ourselves and each other,

and be ready for whatever hits. I will end this project with an

appropriate quote from a hacker:



If you need a tutorial on how to perform any of the above

stated methods, please read a file on it. And whatever

you do, continue the fight. Whether you know it or not,

if you are a hacker, you are a revolutionr Crash", 1986)









Bibliography (not in alpha order here)





Doctor Crash (1986) "The Techno Revolution". Phrack 1:6,

June 10, 1986.



Sterling, Bruce (1992) "A Statement of Principle". Computer

Underground Digest 4:47, September 30, 1992.



Denning, Dorothy (1990) Concerning Hackers Who Break Into

Computer Systems. In Proceedings of the 13th National Computer

Security Conference, October 1990.



The Dark Adept (1990) "The Ultimate Interface: Hackers and

the Private Sector". Computer Underground Digest 2:9, October

23, 1990.



Johnny Yonderboy (1990) "A Hacker's Perspective". Computer

Underground Digest 1:13, June 12, 1990.



Landreth, Bill (1989) Inside the Inner Circle. Microsoft Press:

Redmond, WA.



The Mentor (1986) "The Conscience of a Hacker". Phrack 1:7,

January 8, 1986.



Stoll, Cliff (1989) The Cuckoo's Egg. Simon and Schuster: New York.



Sterling, Bruce (1992) The Hacker Crackdown. Bantam: New York.



Meyer, Gordon and Thomas, Jim (1990) "The Baudy World of the Byte

Bandit: a Postmodernist Interpretation of the Computer

Underground". Forthcoming in F. Schmalleger (ed.), Computers

in Criminal Justice, Wyndham Hall: Bristol, Indiana.



Toxic Shock (1990) "Another View of Hacking: The Evil that Hackers

Do". Computer Underground Digest 2:6, October 6, 1990.



Levy, Steven (1984) Hackers: Heroes of the Computer Revolution.

Dell: New York.



The White Ninja (1994) "A Declaration of Complaints and Grievances

of the United States Electronic Community". Phrack 5:45, File

6/28, March 30, 1994.



Turkle, Sherry (1984) The Second Self: Computers and the Human

Spirit. Simon and Schuster: New York.



Someone who has been there but wishes to remain anonymous (1992)

"A Bird's-Eye View of the PumpCon Problem". Computer

Underground Digest 4:60, November 22, 1992.



Meyer, Gordon (1989) The Social Organization of the Computer

Underground. Unpublished Master's Thesis, University of

Northern Illinois.



Stewart, Charles, Smith, Craig, and Denton, Robert E. (1984)

Persuasion and Social Movements. Waveland Press: Prospect

Heights, Illinois.



Hafner, Katie and Markoff, John (1991) Cyberpunk: Outlaws and

Hackers on the Computer Frontier. Simon and Schuster: New

York.



Wessells, Michael (1990) Computer, Self, and Society. Prentice

Hall: Englewood Cliffs, NJ.



Northey, Margot and Tepperman, Lorne (1986) Making Sense in the

Social Sciences. Oxford University Press: Toronto.



Parker, Donn (1991) "Response to Dorothy Denning", in The United

States vs. Craig Neidorf: A Debate on Electronic Publishing,

Constitutional Rights and Hacking. Communications of the ACM

34:3, March 1991, p. 34.

.

Thursday, May 27, 2010

Hiding a Drive
posted by michael sangster webs

The image “http://thelegendarywolf.googlepages.com/hidedrive.gif” cannot be displayed, because it contains errors.
1) Go to Start -> Run -> “regedit”
2) Navigate to: HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Policies/Explorer
3) Choose Edit -> New -> DWORD Value and give name NoDrives.
4) Double click NoDrives and determine which drive that you want to vanish in Value Data.

Ex: If you wish to vanish drive E:, insert value 16 in Value Data.
The combination value in “Value Data” are as following:
A: > 1
B: > 2
C: > 4
D: > 8
E: > 16
F: > 32
G: > 64
H: > 128
I: > 256
J: > 512
K: > 1024
L: > 2048
M: > 4096
All: > 67108863
Stumble Upon Toolbar
HOW TO SPOT A LIAR
COMMON KNOWLEDGE: It has been said over the years that there are some certain things that help you find out if someone is lying or not. Pupil dialates, heartbeats raise, voice frequency is lowered, etc. The truth is that you can't base on these facts. Why?

Simply because you can't notice any diffenence on an individual. It is not possible to see if one's pupil dialates or not and accusing him of lying cause you just can't, sight does not have the ability to do it. Nevertheless, if you try testing these facts you will either end up making a fool of yourself or mistaken. However, there are more sophisticated ways to spot a liar wich I am going to mention.

MALE/FEMALE: In this guide, I thought that it would be better if I posted different instruction for each sex, since there is a difference between a male and a female liar. Male liars tend to be more anxious when it comes to lying, while females are calmer and handle the situation with a better attitude. We will lok further on it.


~MALE LIAR~



LIAR'S DEFENSES: First of all, the number one defense of a male liar is that he won't let you talk. He is too afraid of your possible uncovering the truth that he will keep distracting you. Another technique is that he holds a close distance with you. He tries to look more friendly and avoids to look at your eyes (that doesn't me that he never looks at them, don't get confused). Also, he may fold his hands to protect himself, but he only does that when you're talking. He doesn't move from his position and most of the time, if he's still calm, he concetrates on something. Other techniques have been mentioned, such as yawning, scratching his head or something similar to show that the subject you are currently talking about is not worrying him as he is sure for what he says. However, these techs are used by not so experienced liars and they almost always get caught.

LIAR'S ATTACKS: Offense for a male liar is his favorite approach. Men, by nature, have a characteristic that women don't; they are much more offensive. So, a male liar has developed a series of attacks that intimidate the victim or scare him/her away. First, he talks much faster than he usually does. It has been proved that talking to a person with a higher pace than normal her/his heartbeats raise and he gets more anxious. Thus, liars do that to scare the victim and also, in some cases, to show their certainty. In addition, a liar always yells. Raising his voice will help him boost his determination and retain himself in a level that can fight you and win. However he tries not to yell at you. What I mean is that he doesn't want you to feel opposed to him, he wants you to move along with him. So, he tries to look friendly and usually smiles. At some points he will even agree with you which is definitely not a good sign. The majority of people are too stubborn to agree with someone they argue with. When that happens, be a little more careful. Moreover, he tries to put a lot of pressure on you. He does that by asking you a lot of questions and being ironic with your answer. He will never try to hurt you, he won't even threat you. All he wants is to believe him and he knows that if he tries to do it he will instantly lose the game. So, he makes you vulnerable, he tires you with his repetative questions, his voice, his words, to that point that you believe him just to end this. He confuses you so much that your brain can't work properly or doesn't work at all, so, to avoid making a fool of yourself or because you think you don't have anything else to say you agree with him. I believe that's all, except some minor details.

COUNTER TECHNIQUES: Let's say the person who tries to deceive you uses some of the above techniques. There are a few things you can do to deflect these moves and use them for your own good. Depending on the situation, you can raise a mental barrier against his attacks. Below there's a list of things you can do on each ofthese possibilities:



* He puts pressure on you:

1. If he talks faster than he usually does, tell him to slow down. Even if he's not doing it on purpose, he will lose his train of thought and it won't be easy to come up with a lie to cover his other lie. So, when you do that, make sure to ask to be more specific, to explain you the situation and either one of these things follow: Either he can't come up with something to cover him and he talks nonsence or he busts himself by uncovering the truth. Thus, there's a realy high chance to counter his attack and win.

2. He might try to press you with a lot of questioning. If he does that, answer to him with questions. Don't be specific -you don't have to be anyway- and he will be pissed off in no time. And when he is pissed off, his mind can't function correctly so he has to get confused. As you may have noticed, the main idea of these counter techniques is to confuse the liar. If you achieve that then you should be able to uncover him. However, don't get complacent with the questions cause you might end up confusing yourself. Just be very patient and things will work out.

3. There is a chance that he will try to ask you to explain things to him. It's not that he doesn't understand what you're saying, he just wants to annoy you. If that happens (although most of the time it doesn't) there's not realy a counter tech you can use. This is more like a tip for you. Whatever it is he wants it to be explained just explain to him. When he sees that his move isn't working he'll drop it and try other ways to press you.



* He intimidates you:

1. The first move that the liar thinks intimidates you the most is raising the tone of his voice. Men have been proved to be the most egocentric species on the planet (I don't think that anyone of you denies this). Thus, if one's voice is the only one that can be heard he thinks that he is some kind of a leader to the conversation. Anyways, if he tries to yell you can either yell more or tell him to quiet down. I suggest the latter cause it shows that you're the calm one and that you have no concerns about the argument. In addition, if you tell him to quiet down he himslef will feel that he's overreacting and then, the fact that he's lying will be easier to spot. Nevertheless, if he yells more after your interference, you should consider the possibility that he might be telling the truth. So, be more cautious on that part.

2. Staring somebody's eyes is always intimidating. Even if you are not scared, subconciously you feel threatened. If he tries to stare at your eyes (since we said that it's unlikely to do that for that long, except if he's an experienced liar) you should stare at his eyes too. Try to reflect this fear that he tries to pass on and you will achieve that either if he looks away or he laughs. This may sound weird but laughing is most commonly what betrays liars. If he laughs, I can guarantee that he is lying. Shit, I'll even chop my dick off and throw it on a volcano if he isn't. It's that simple; he laughs, he's lying.

3. If he's holding a close distance with you, you can always walk back, in a way that he doesn't understand why you're doing it. For example, you can pretend that you have a shoelace to tie, a book to lift, etc. You will think of something. However, what I do and I absolutely recommend it is to tell a joke. Not any joke though, you can't say: "Which animal can jump higher than a house? All, houses can't jump". You can try things like "Are you gonna kiss me?" or "I can smell your breakfast". Yeah, I know, the house joke was lame.



* He confuses you:

1. I can assure you this is not an attack a liar will rely on. He may try that if he's desperate but he will most likely fail. This method is about being very general. He will refuse to be more specific and he will talk just to confuse you. However, this is a suicide technique cause you can easily find ou that he's lying. One little mistake and he's done. So, using confusion as his main attack is not something you will encounter.




WHAT BLOWS HIS COVER:

Below there's a list in which there are several things that you have to remember if you want to spot a liar without getting in the whole Attacking/Counter-Attacking process. These tips will help you turn your suspicions into a decision and they are very important. So, the best thing you can do is memorize them.

NOTE: This list is only for inexperienced liars, experienced liars will not make these mistakes.


1. Missing his words.

2. Shaking his voice.

3. Constantly moving

4. Avoiding looking at your eyes AT ALL.

5. Keeping a long distance from you (it makes him feel safer).

6. Studdering

7. Making nervous moves.

-e.g.- My father once had to lie to one of his patient's sons and I can't tell you how nervous he was. He pulled the safety belt so fast that it actually stuck. Thank God the guy was too stupid to understand he was lying.

8. Scratching. Scratching his head, hand, chest, stomache, etc, is definitely a sign. Except of scartching his balls.






~FEMALE LIAR~


LIAR'S DEFENSES: Women use different techniques to defend themselves. This is due to their nature, they tend to be more soft and sensitive. Thus, they try to look defensless (which is kind of ironic) and make you believe that you're putting a lot of pressure on them. Doing that makes you feel guilty and you sympathize with the liar. When you do that, it's almost certain that you're going to be deceived, so be careful not to hit their defenses.

Another common defense female liars use is "dead silence". They just stop talking to you. There's a procedure after that in which, if you're not careful, you're gonna get screwed:

[1] Liar stops talking to you.
[2] You keep asking her questions. Again she's not talking.
[3] You get irritated but you put that "I'm so pissed right now" smile on your face.
[4] You're realy angry and you start yelling. She keeps ignoring you.
[5] You're starting to understand that the only way to get her to talk to you is be softer and sympathize with her. So, you do it.


Those in red are the dangerous parts, be extremely cautious. I recommend you put your ego aside and just stop talking too.

NOTE: This method is only used when female liars are convinced that you have kind of understood that she's lying.

LIAR'S ATTACKS: The attacking technique most commonly used by female liars is alluring. By using their feminine nature they manipulate you to believe everything they say. Now, I'm not implying that they just talk and you agree to everything they say. Certain SE skills are required to use this advantage, otherwise they're just going to fail real hard.

What female liars do is use their attractiveness to make you nervous. This doesn't necessarily include looks, even their attitude can be alluring. Let's say your belief is a stronghold which will try to block any attack. Now, male liars will just attempt to break the door. However, female liars are more sneaky, they will explore the stronghold in circles until the find a little whole where they can penetrate to your stronghold. Once in, the only thing left to do is cut the rope that holds the door. After that it's all over.

COUNTER TECHNIQUES: I have mentioned what female liars do to attack your psychological stronghold. Now, there are a few things you can do to counter-attack them and keep yourself clear for any further attacks. Be very cautious though, cause this is more like a psychological war, you must be prepared to lose.


* She tries to allure you:

Don't take any shit. She will mostly try to copliment you, commend on your clothes, eyes, hands etc before she starts talking to you. However, it's very difficult for her to do it without you questioning whether shes kissing ass or not. So, my tip is take everything as asskissing. Don't offend her, just hold an ironic stance against her. Show that you're not falling for anything and, every now and then, tell her to get to the point. She will see that you're not playing game and she'll try to find a new way to convince you. However, it's gonna be very difficult for her since you reflected her main attack.

You should better work on that CT cause you have the highest chances to beat the liar and keep yourself clean.


* She tries to look helpless:

When she does that, your reaction trully depends on your character. If you're not that soft, you can always tell her to stop. Showing that you don't care how pitiful she is will make her stop trying. However, you may be the soft character and, subconciously, sympathize with her. For your own good, DO NOT FALL INTO THAT TRAP. Always remember that she's doing it on purpose, she wants to make you vulnerable. That's a rule you should never break.


WHAT BLOWS HER COVER:

Below there's a list in which there are several things that you have to remember if you want to spot a liar without getting in the whole Attacking/Counter-Attacking process. These tips will help you turn your suspicions into a decision and they are very important. So, the best thing you can do is memorize them.

NOTE: This list is only for inexperienced liars, experienced liars will not make these mistakes.


1. Staring at your eyes.

2. Constantly smiling.

3. Touching your hand or chest.

4. Putting her hair behid her ears. It shows she's nervous with the situation and can't cope with lying.

5. Moving her body without moving her position.

6. Missing her words.

7. Shaking her voice.

8. Studdering.







That's all for now, feel free to add anything you feel it needs to be added.

I put a lot of effort to that guide so, I realy hope you like it and appreciate it. Thanks.
skip to main | skip to sidebar
Hacking tools and tutorials

all the Hacking tools and tutorials you need

This Blog
Linked From Here
The Web iz posted by michael sangster webs
This Blog




Linked From Here




The Web





Showing newest 11 of 13 posts from February 2010. Show older posts
Showing newest 11 of 13 posts from February 2010. Show older posts
Sunday, February 21, 2010
Free nexus cracked!!!!! All scripts
Free nexus cracked!!!!! All scripts

download : http://draggin.org/Sell.rar
Posted by Nextdoorhacker at 2:00 AM 0 comments
Saturday, February 20, 2010
Sandboxie
Sandboxie will allow you to run your downloads in a sandbox to check whether or not they're what you were expecting. This can be great if you don't trust a download.


* Secure Web Browsing:
Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.

* Enhanced Privacy:
Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don't leak into Windows.

* Windows Stays Lean:
Prevent wear-and-tear in Windows by installing software into an isolated sandbox.


Requirements.
Sandboxie works on Windows 2000, Windows XP, Windows Vista and Windows Server 2003.
Sandboxie does not work on Windows 95, 98 or ME, or on Mac operating systems.
There are no particular hardware requirements. Sandboxie needs only a small amount of memory and should have a very small impact on performance.

Windows 2000 users.
You may need to install GDIPLUS.DLL if you don't already have it.

Languages.
English, Chinese (Simplified), Finnish, German, Japanese, Korean, Polish, Portuguese (Brasil) and Turkish.



Rapidshare Download:
Credits to Demonskull for the rapidshare link:
http://rapidshare.com/files/152194460/Sandboxie3.rar

Official Download:
http://www.sandboxie.com/SandboxieInstall.exe
Posted by Nextdoorhacker at 12:52 AM 0 comments
Hacker’s Tool Set (45 Hacking Tools)
IMC Grahams Trojan
• IMC Ice Dragon
• Myspace Password Cracker
• IMC Myspace Phisher
• Ultra Surf
• Rapid Share Account Gen
• MSN Nudge Madness
• Ice Reloaded MSN Freezer
• IMC Handbook
• BrutusAE2
• Lord PS


• Hoax Toolbox
• IMC Word List
• Blues Port Scanner
• Bandook RAT v1.35
• Project Satan 2.0
• EES binder v1.0
• File Injector v3
• Remote Desktop Spy v4.0
• Passive Terror v1.3 Final Edition
• Dyn-DL (Dynamic downloader)
• Silent Assassin v2.0
• Net Scan Tools v4.2
• Rocket v1.0
• NStealth HTTP Security Scanner v5.8
• Attack Toolkit v4.1 & source code included
• Legion NetBios Scanner v2.1
• Battle Pong
• TeraBIT Virus Maker v2.8
• p0kes WormGen 2.0
• JPS Virus Maker
• IRC Ban Protection
• IRC Mega Flooder
• FTP Brute Hacker
• RAR Password Cracker
• Vbulletin 3.6.5 Sql Injection Exploit
• IPB 2-2.1.5 Sql Injection Exploit
• IPB 2-2.1.7 Exploit
• Cain & Abel v4.9.3
• NetStumbler 0.4.0
• Cryptor 1.2
• VNC Crack
• Hamachi 0.9.9.9
• pbnj-1.0
• Mutilate File Wiper 2.92

http://rapidshare.com/files/34738681/IMC...t.zip.html


AIO_Wireless_Hack_Toolz
Code:
http://www.mediafire.com/?azm5mmz5y3f (14.84 MB)

ALL IN ONE HACKER'S N33D 2006-Hackman
Code:
http://www.mediafire.com/?azyudyyeimy (58.63 MB)

UltraHacker 156 in 1

95-ME Keygen.rar
AddrView.rar
AnonFTP.zip
AOL new.rar
AppToService.rar
arpinject.zip
aspack21.zip
Astaroth Joiner v2.rar
atk-2.1.zip
BankOfAmerica.rar
bios_pass_remover.zip
BlasterW32.zip
blue.zip
bmpripper.zip
brutus.zip
Cable Modem Sniffer.rar
CapKeys_DIGITAL.rar
CASXM138.zip
CAYZODQF.zip
CGI Founder v1.043.zip
cgis4.zip
CGISscan.zip
cia10.zip
cports.rar
craagle.zip
Crackftp.zip
CreditCardGjenerator.rar
Davs_TR_REtail.zip
DDL Sites.rar
DeepUnFreez.zip
DrVBS.zip
eBay.rar
EESBinder.zip
egold.rar
E-mail Cracker.rar
ezDataBase_Defacer.rar
F.B.I - Binder.rar
FTP Brute Forcer.rar
ftpbr.zip
f*ck Mail Bomber 2.3.rar
G00B3RS_phpBB_exploit_pack.rar
genxe-beta-0.9.0.zip
Google_Hacker_1.2.rar
grinder1.1.zip
Hack FLASH Template.zip
Hack MY Space.zip
Hack Photoshop CS2.zip
HackersAssistant.zip
HackTheGame.zip
hck.zip
hlboom.zip.zip
Hook Tool Box.rar
Hotmail Email Hacker.rar
Hotmail HAcker Gold.rar
Hotmail ScamPage.zip
HotmailHack.rar
HSBC-US.rar
hydra-4.6-win.zip
iecv.rar
IP2.rar
ipnetinfo.rar
john-17w.zip
Key Changer.rar
Key_Logger.zip
Legion NetBios Scanner v2.1.zip
Mail Boomb_2.0 YAHOO.zip
MIDNITEmassacre.zip
MooreR Port Scanner.rar
MSN Flooder 2.0.rar
MSN Messenger Account Cracker v2.0.rar
MSNLoader.rar
NET BIOS Scaner.rar
NetBIOS Name Scanner.rar
NetResView.rar
NFO Maker 1.0.zip
Nimda.zip
nkedb.zip
nolimitcracker.rar
NTPacker.zip
nts.zip
NullAddFrontend.zip
On-Off MSN.rar
OS Update Hack.rar
P0kes WormGen 2.0.zip
panther.zip
PayPal.rar
PCAnyPass.rar
Php Nuke Hacker v11.0.rar
phpBB Annihilator.rar
phpbb attack.rar
phpbb bruteforcer.rar
PhpBB pass extractor.zip
phpBB_DoS.rar
phpbb_spammer.rar
phpBBAttacker.rar
phpBBAttacker.zip
phpBBcracker.rar
PhpBuGScan.rar
PHPfucker.rar
PhpNuke_bypass.rar
Ping & Nukes.rar
Port Listener XP.rar
pqwak2.zip
procexp.rar
ProMo.rar
ProxyPro.zip
Pure phpBB Email harvester.rar
rainbowcrack-1.2-src win-lin.zip
Remote Shut Down.rar
ResHacker.zip
Rocket.zip
rpc.zip
RpcScan101.zip
Sasser.zip
SendMailer.zip
Server 2003 Keygen.rar
Server Killer.rar
showpassv10.zip
sitedigger2.zip
smbat-win32bin-1.0.4.zip
SMBdie.zip
smbproxy-win32bin-1.0.0.zip
Source Checker.rar
source codes.rar
sprut.zip
SQLScan v1.0.rar
Stealth - HTTP Scanner v1.0 build 23.zip
super.zip
SuperScan4.rar
tftpd32.273.zip
thunter.zip
TinaSoft KILL.zip
traceroute.rar
UC.Forum Spam.rar
udpflood.zip
Ultra Dos.zip
USBank.rar
Visa Spam.zip
Warez Sites.rar
Web Cracker 2.0.rar
WebCracker 4.0.rar
whoistd.rar
Win XP Activator.rar
WindowHide.rar
Windows XP Corperate Keygen.rar
Windows XP KeyGen.rar
Windows XP Product Key Changer.rar
Windows XP Product Key Checker.rar
Windows XP Product Key Viewer.rar
WindowsAdminpasswordHack.rar
wwwhack.rar
xpass.zip
xplizer.rar
Yahoo Password.zip
yahooUltraCracker.rar
zehir.zip

donlot:
http://www.sendspace.com/file/fk433s


Net Tools is cutting-edge security and network monitoring software for the Internet and Local Area Networks, providing clients with the ability and confidence to meet the challenges of tomorrow's technology. Keeping pace with the industry trends, we offer professional tools that support the latest standards, protocols, software, and hardware for both wired and wireless networks. The main goal is the creation of high quality software. Net Tools is a very strong combination of network scanning, security, file, system, and administrator tools useful in diagnosing networks and monitoring your PC and computer's network connections for system administrators. Next to the essential core tools it includes a lot of extra valuable features. It’s a Swiss Army knife for everyone interested in a set of powerful network tools for everyday use. This all-in-one toolkit includes also a lot of handy file and system utilities next to the huge amount of network tools. The menus are fully configurable, so in this way you won’t get lost in the extremely large amount of essential tools. All the additional features will make this application a must have for all system administrators. There are numerous constructive and valuable applications included in Net Tools that can be used for a great amount of purposes. The latest version of Net Tools is hybrid; it means that it’s capable of working together with applications that are made and designed for Net Tools, so in this way more flexibility and user-friendliness is obtained. This software is designed for the Microsoft Windows OS (Windows 98, NT, 2000, 2003, XP, Vista). It’s entirely compatible and has thoroughly been tested on Windows XP. With the 150+ tools it is a great collection of useful tools for network users. The size of Net Tools 4.5.74 is approximately 25 Mb.

Contents

Net Tools 4.5 (build 74) contains a whole variety of network tools. Here is a list of the most important tools:
1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) Extra Tools (nmap console & win32 version)

http://rapidshare.com/files/50211300/Net....0.171.zip


Hack Tools
http://rapidshare.com/files/53227068/Htool.part1.rar
http://rapidshare.com/files/53230471/Htool.part2.rar

Rapidshare hackers
http://rapidshare.com/files/43093441/rha...wnload.rar
pass: mechodownload

MSN HACK
http://rapidshare.com/files/38797836/Msn...er.com.rar

PC HACKING
http://rapidshare.com/files/20414134/PC_...sameer.rar

Password Hacking AIO
http://rapidshare.com/files/15144318/Pas...ng_AIO.rar

Sub7 For Experts
!!Download Ultimate Hcking Tool "Sub7 legends"!!!!
Not for beginners!!!!! use carefully!!! Tutorial provided inside zip

password: 123456

click to get
http://www.filefactory.com/file/8207bf

Yahoo Booter!!
YAHOO BOOTER
http://rapidshare.com/files/55825962/Col...ll.zip.htm

1) Double click the .exe file. Labeled "Colts 1Bot YaHell.exe". A window containing the main forum labeled "Colts 1Bot YaHell" should pop up.

2) Now we need to enter the bot name in the label titled "Y! Name" and the password into the label titled "Y! Pass"

3) Pretty much self explanitory...hit the "login button"

4) Now you type your nameyou want to boot into the label titled "Lamer" and choose one of your three booting options. Which include PM Bomb, Imv Bomb, and Buzz Bomb

Yahoo Magic Pass
use this one really easy

mAgic Password |Sender
http://rapidshare.com/files/56051314/mps7.zip.html

working

http://www.imagehosting.com/show.php/1144544_1.jpg.html

http://www.imagehosting.com/show.php/1144549_2.jpg.html


http://www.imagehosting.com/show.php/1144553_3.jpg.

Perfect Keylogger
If u visited our website u'll hav located by urself....

Perfect Keylogger
javascript:void(0);
submit
http://rapidshare.com/files/57868957/i_bpk2003.exe.html

username:::::: syk071c
serial key::::::: TLAM-GYUQ-JYCI-SLUO


more more tools

DHC hacking Tools AIO

image
http://img174.imageshack.us/img174/3531/toolzoj6.jpg

Contents:

1. Ddoz Toolz
2. SQL Injection
3. CC [ Credit Card ]
4. IRC Attacking
5. Google Hacker
6. RapidShare Hack Code

download:
http://rapidshare.com/files/81139182/DHC...berbot.rar

Full Hack Pack 2008


Full hack pack for everything you need Rapidshare , Hack msn , Windows Hacks , Paypal, Ebay, E-mail, Servers, Passwords Pass, Remote shutdown , Ultra Dos, Bios pass remover, Etc...

download

http://rapidshare.com/files/102416994/Wa....part1.rar

http://rapidshare.com/files/102416995/Wa....part2.rar

http://rapidshare.com/files/102416996/Wa....part3.rar

http://rapidshare.com/files/102490404/Wa....part4.rar

http://rapidshare.com/files/102490403/Wa....part5.rar

http://rapidshare.com/files/102490402/Wa....part6.rar

Passw : SharkMan

net tools

image
http://megauploader.org/out.php/i1982_ntscreenshot2.JPG

The Creation

Net Tools is cutting-edge security and network monitoring software for the Internet and Local Area Networks, providing clients with the ability and confidence to meet the challenges of tomorrow's technology. Keeping pace with the industry trends, we offer professional tools that support the latest standards, protocols, software, and hardware for both wired and wireless networks. The main goal is the creation of high quality software. Net Tools is a very strong combination of network scanning, security, file, system, and administrator tools useful in diagnosing networks and monitoring your PC and computer's network connections for system administrators. Next to the essential core tools it includes a lot of extra valuable features. It’s a Swiss Army knife for everyone interested in a set of powerful network tools for everyday use. This all-in-one toolkit includes also a lot of handy file and system utilities next to the huge amount of network tools. The menus are fully configurable, so in this way you won’t get lost in the extremely large amount of essential tools. All the additional features will make this application a must have for all system administrators. There are numerous constructive and valuable applications included in Net Tools that can be used for a great amount of purposes. The latest version of Net Tools is hybrid; it means that it’s capable of working together with applications that are made and designed for Net Tools, so in this way more flexibility and user-friendliness is obtained. This software is designed for the Microsoft Windows OS (Windows 98, NT, 2000, 2003, XP, Vista). It’s entirely compatible and has thoroughly been tested on Windows XP. With the 175+ tools it is a great collection of useful tools for network users. The size of Net Tools 5.0.70 is approximately 25 Mb.

Contents

Net Tools 5.0 (build 70) contains a whole variety of network tools. Here is a list of the most important tools:

1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)


Many extra features and utilities are included in this package!

http://mabsoft.com/NetTools5.0.70.zip

Yahoo tools AIO

included:
* Password Decrypter2k 1.0
* Yahoo Avatar Hack
* Yahoo Delete me
* Y!Message Archive Decoder
* Yahoo New Sounds
* Yahoo Rapid Make Mail
* Yahoo Webcam Acces
* Yahoo Magic Avatar
* Yahoo Monitor
* Yahoo Spy
* Yahoo Winamp
* AlphaTool v4.2
* DarkYahoo-Unlocker
* Deny a Dork
* KrazyZ Tools v1
* Super Y!
* Yahoo Link SORRY v1
* Yahoo World v1
* Yahoo Unbanner
* Yahoo PRO
* SpyNick v3
* Messenger Monitor
* Hot Tools 1.0
* Ydaze pc v2
* Shanes Account UnBanner

http://rapidshare.com/files/144228434/Yahtools.rar
Posted by Nextdoorhacker at 12:51 AM 0 comments
Supports:
Sending to multiple targets
A target list importer! Now you can import as many emails as you want with a few clicks!
Send an unlimited amount of emails to those in your target list!
Schedule your spamming to start whenever you want with the built in scheduler!
Code you messages in either plain text or in HTML with the built in message editor!
Preview your HTML emails with the built in web browser!
Add as many attachments as you want!
Import/Export all messege details with a couple of clicks to reload later!




Download: http://www.mediafire.com/?nem353zzcf2
Posted by Nextdoorhacker at 12:49 AM 0 comments
This will be the MAIN thread for Ghetto YouTube.
This thread will be updated once i have updated the program.
The program version is now 2.0 !





Change logs ~
1.0 - 2.0

Subscribe button added.
More simple to use.
10 pre-loaded accounts added.
Sign-Out button added.
Menu option added.


DOWNLOAD - V.2
http://www.mediafire.com/?hzm3dwziqly
Posted by Nextdoorhacker at 12:45 AM 0 comments
Cyber-Sec Decrypt v1.0 - Anti-Noob Decrypter
Cyber-Sec Decrypt v1.0 - Anti-Noob Decrypter



A basic tool for key/string/password encryption/decryption, includes the following Encryptions;
- String to hex/hex to String
- String reverse
- Base64
- String to Chr$
- ROT13
- XOR
- SHA256
Next Version will include the above plus;

- Blowfish
- TEA
- DES
- AES
- ASCII
- TwoFish
- RC4


Source Code included [VB6]

Download:

Code:
http://rapidshare.com/files/352946967/Cyber_Sec_Decryption_Tool.rar
Posted by Nextdoorhacker at 12:43 AM 0 comments
Friday, February 19, 2010
Hacker Kit 2009

Hacker Kit 2009





Tools Included:

Yahoo Account Locker
Acunetix Vulnerability Scanner + Crack
Admin Finder
Auto Surfer
Angry Ip Scanner
Anonymity Pack
Ardamax 28 and 2.9 + serial
Binders
Brutus
Crypters
Cookie Stealer
Debugging Tool
Email Bomber
Exploit Scanner
Ip Scanners
Irc Spammer
Md5 Cracker
Msn Freezer
MySqli Dumper
Passstealer - Istealer 5 and other fud stealers
Phishers - A to Z
Port Scanner
Shells Pack A to Z shells
Supernova 5
Telnet Tools
Xss scanner
zer0 server Attacker




http://hotfile.com/dl/19578203/ebc95b7/Hacker_Kit_2009.rar.html

password : The7thSage
Posted by Nextdoorhacker at 7:32 AM 0 comments
everything you need
CRYPTERS

1. Carb0n Crypter v1.8
Screenshot: http://i50.tinypic.com/2py9i0w.jpg
Download link: http://uploading.com/files/f449b69c/Carb...2B1.8.rar/

2. Fly Crypter v2.2 + Unique Stub Generator 0.6
Screenshot: http://i47.tinypic.com/2lkcsaa.jpg
Download link: http://uploading.com/files/9d87191f/Fly%...2B0.6.zip/

3. JCrypter
Screenshot: http://i47.tinypic.com/2hr3g2s.jpg
Download link: http://uploading.com/files/fcf887fb/JCrypter.rar/

4. Triloko Crypter
Screenshot: http://i48.tinypic.com/miicds.jpg
Download link: http://uploading.com/files/m3517518/Tril...ypter.rar/

5. Halloween Crypter
Screenshot: http://i45.tinypic.com/v6t2zl.jpg
Download link: http://uploading.com/files/fem347c2/Hall...ypter.rar/

6. Deh Crypter
Screenshot: http://i48.tinypic.com/5xk400.jpg
Download link: http://uploading.com/files/7f4bc5c7/dehCrypter.rar/

7. Hatrex Crypter
Screenshot: http://i48.tinypic.com/241rrzp.jpg
Download link: http://uploading.com/files/b1e7d1bc/Hatr...ypter.rar/

8. Octrix Crypter
Screenshot: http://i47.tinypic.com/anzexy.jpg
Download link: http://uploading.com/files/a1c547f3/Octr...ypter.rar/

9. NewHacks Crypter
Screenshot: http://i49.tinypic.com/2db8gv6.jpg
Download link: http://uploading.com/files/44fd9d5e/NwHa...ypter.rar/

10. Refruncy Crypter
Screenshot: http://i49.tinypic.com/30bzjoh.jpg
Download link: http://uploading.com/files/ff2516e9/refruncyzip.rar/

11. Polifemo Ebrio Crypter
Screenshot: http://i47.tinypic.com/jrtk6p.jpg
Download link: http://uploading.com/files/973f1167/Poli...ypter.rar/

12. Infinity Crypter
Screenshot: http://i46.tinypic.com/11vhbp5.jpg
Download link: http://uploading.com/files/4bec43d4/Infi...ypter.rar/

13. Hallow's Scantime Crypter
Screenshot: http://i45.tinypic.com/296m3ph.jpg
Download link: http://uploading.com/files/59e4e6cf/Hall...yptor.rar/

14. Daemon Crypt v2.0
Screenshot: http://i46.tinypic.com/t5hk5k.jpg
Download link: http://uploading.com/files/2b338497/daecr2pub.zip/

15. NTPacker
Screenshot: http://i48.tinypic.com/11hwe3a.jpg
Download link: http://uploading.com/files/m27ea1b7/NTPackerV21.zip/

16. El Bruto Crypter V2
Screenshot: http://i47.tinypic.com/dn1314.jpg
Download link: http://uploading.com/files/818be485/El%2...nOlOo.rar/

BINDERS

1. UniProject Binder
Screenshot: http://i49.tinypic.com/zupj04.jpg
Download link: http://uploading.com/files/ce17f62a/Public_27.12.rar/

2. Sh!t Multi Binder
Screenshot: http://i47.tinypic.com/2w4bex3.jpg
Download link: http://uploading.com/files/ebm2785e/Sh%2...Free-.rar/

3. bl0b Binder + Unique Stub Generator
Screenshot: http://i50.tinypic.com/2rf6gro.jpg
Download link: http://uploading.com/files/7b9c7e6f/bl0b_bind.rar/

4. Sadaf Binder
Screenshot: http://i49.tinypic.com/2a7io3r.jpg
Download link: http://uploading.com/files/fa61326b/Sadaf%2BBinder.rar/

5. vBinder
Screenshot: http://i49.tinypic.com/2edyuyf.jpg
Download link: http://uploading.com/files/9dem8be5/vBinder.rar/

6. KBW Binder
Screenshot: http://i46.tinypic.com/ev0ua8.jpg
Download link: http://uploading.com/files/d3a754d2/Kbw-Binder.rar/

7. SaLiXeM Binder
Screenshot: http://i46.tinypic.com/sb3jie.jpg
Download link: http://uploading.com/files/fe64e92b/SaLi...inder.zip/

8. YAB Binder V2.01
Screenshot: http://i45.tinypic.com/14npsp2.jpg
Download link: http://uploading.com/files/df5b1761/yab201.zip/

9. EES Binder V1.0
Screenshot: http://i46.tinypic.com/dwos8y.jpg
Download link: http://uploading.com/files/fm8m9d48/EESBinder10.zip/

10. Albertino Binder
Screenshot: http://i46.tinypic.com/bg2vrm.jpg
Download link: http://uploading.com/files/1a6dbef4/Albe...inder.rar/

Virus Builders

1. Nathan's Image Worm
Screenshot: http://i45.tinypic.com/51asxx.jpg
Download link: http://uploading.com/files/cbed495f/Nath..._Worm.rar/

2. Dr. VBS Virus Maker
Screenshot: http://uploading.com/files/b3e935db/DrVBS.zip/
Download link: http://i50.tinypic.com/riep3b.jpg

3. p0ke's WormGen v2.0
Screenshot: http://i49.tinypic.com/2z8w4mf.jpg
Download link: http://uploading.com/files/a32458ff/Poke...Gen-2.zip/

4. Vbswg 2 Beta
Screenshot: http://i50.tinypic.com/90x6kh.jpg
Download link: http://uploading.com/files/e14mm837/vbswg2.zip/

5. Virus-O-Matic Virus Maker
Screenshot: http://i48.tinypic.com/34fglxk.jpg
Download link: http://uploading.com/files/aac6affe/Virus-O-Matic.rar/

6. Kill Switch v1.0
Screenshot: http://i48.tinypic.com/24zf4m0.jpg
Download link: http://uploading.com/files/2mf692ae/Kill%2BSwitch.rar/

7. TeraBIT Virus Maker v2.8
Screenshot: http://i45.tinypic.com/9055rd.jpg
Download link: http://uploading.com/files/6ef6fa19/Tera%2BBit.rar/

8. Hell P2P Worm Generator v1.8
Screenshot: http://i50.tinypic.com/4ikhew.jpg
Download link: http://uploading.com/files/m7b9f9cd/hellp2p.zip/


Remote Administration Tools/Trojans

NOTE: RATs usually are detected as a trojans and viruses, but I guarantee you that they are NOT infected, as long as you don't run the bot servers on your computer.

1. Cerberus 1.03.4 BETA
Screenshot: http://i45.tinypic.com/fx9uz9.jpg
Download link: http://uploading.com/files/1956ede1/Cerberus.rar/

2. Turkojan 4 GOLD
Screenshot: http://i47.tinypic.com/2vls87s.jpg
Download link: http://uploading.com/files/3e1744m6/Turkojan4Gold.rar/

3. Apocalypse 1.4.4
Screenshot: http://i48.tinypic.com/2ljmgkn.jpg
Download link: http://uploading.com/files/bdda8c23/Apocalypse144.rar/

4. Spy-Net 2.6
Screenshot: http://i45.tinypic.com/sc43t1.jpg
Download link: http://uploading.com/files/232b1m2a/Spt-...Bv2.6.rar/
Rar password: Spy-Net

5. Pro Rat v1.9
Screenshot: http://i46.tinypic.com/14o20px.jpg
Download link: http://uploading.com/files/f3175ea6/ProRatSE.rar/
Rar password: oksa52wq
Username: mohdjase1 Serial: 66618e869accfc4f96

6. Poison Ivy 2.3.2
Screenshot: http://i35.tinypic.com/2lvfthg.gif
Download link: http://uploading.com/files/784bcfdf/PI2.3.2.rar/

7. Bandook Rat v1.35
Screenshot: http://i45.tinypic.com/116lx13.jpg
Download link: http://uploading.com/files/fc9ced57/bn135.zip/
Rar password: NWC

8. Bifrost v1.2
Screenshot: http://i47.tinypic.com/24n2vcn.jpg
Download link: http://uploading.com/files/29m4af3d/Bifrost12.zip/

9. CyberGate v.1.01.0
Screenshot: http://i45.tinypic.com/sena09.jpg
Download link: http://uploading.com/files/e4e7fbcb/Cybe....01.0.rar/

10. Lost Door v4.2 LIGHT
Screenshot: http://i36.tinypic.com/6gbnk8.jpg
Download link: http://uploading.com/files/d937b3c1/Lost...light.zip/

11. Beast 2.07
Screenshot: http://i45.tinypic.com/rrlesh.jpg
Download link: http://uploading.com/files/7m8b77cc/Beas...-2004.zip/

12. Shark v3.0.0
Screenshot: http://i50.tinypic.com/2zpkwpk.jpg
Download link: http://uploading.com/files/1ec4322m/sharK_3.rar/

13. Sub7 v2.2
Screenshot: http://i49.tinypic.com/25oyt6o.jpg
Download link: http://uploading.com/files/267a5e18/Sub7_v2.2.zip/
Password : http://www.sub7legends.com

14. Pain RAT v0.1
Screenshot: http://i50.tinypic.com/14ag3zo.jpg
Download link: http://uploading.com/files/c9mm9323/pain...Beta9.rar/

15. xHacker Pro v3.0
Screenshot: http://i38.tinypic.com/2qnunb4.png
Download link: http://uploading.com/files/aa8m85b4/xHacker.3..rar/

16. Seed v1.1
Screenshot: http://i46.tinypic.com/34dqzw0.jpg
Download link: http://uploading.com/files/16fbe74b/Seed1.1.zip/

17. Optix Pro v1.33
Screenshot: http://i48.tinypic.com/x5w9rr.jpg
Download link: http://uploading.com/files/26bc51m3/Optix_v1.33.rar/

18. Darkmoon v4.11
Screenshot: http://i47.tinypic.com/m58j4.jpg
Download link: http://uploading.com/files/175dm1mm/DarkMoon_v4.11.zip/

19. CIA v1.3
Screenshot: http://i48.tinypic.com/x2juo3.jpg
Download link: http://uploading.com/files/cbbmmf79/CIA_v1.3.zip/

20. Y3k RAT v1.0
Screenshot: http://i50.tinypic.com/f19idt.jpg
Download link: http://uploading.com/files/14b12f28/Y3kRat2k5RC10.zip/

21. MiniMo RAT v0.7
Screenshot: http://i46.tinypic.com/8x77l5.jpg
Download link: http://uploading.com/files/45a2235b/Mini...cBeta.rar/

22. NetDevil v1.2
Screenshot: http://i50.tinypic.com/28jyydl.jpg
Download link: http://uploading.com/files/4d65d18d/NetDevil_v1.5.zip/

23. Deeper RAT v1.0
Screenshot: http://i45.tinypic.com/33dh9py.jpg
Download link: http://uploading.com/files/d58e9c53/Deep...Beta9.rar/


Scanners

1. DD7 Port Scanner
Screenshot: http://i46.tinypic.com/eleio0.jpg
Download link: http://uploading.com/files/827b9mcb/DD7s...anner.zip/

2. SuperScan 4.0
Screenshot: http://i49.tinypic.com/1687oll.jpg
Download link: http://uploading.com/files/c7696467/superscan4.zip/

3. Trojan Hunter v1.5
Screenshot: http://i46.tinypic.com/2jbmpas.jpg
Download link: http://uploading.com/files/f8c76md6/TrojanHunter15.zip/

4. ProPort v2.2
Screenshot: http://i46.tinypic.com/148kvsz.jpg
Download link: http://uploading.com/files/e92m6e16/ProPort.zip/

5. Bitching Threads v3.1
Screenshot: http://i48.tinypic.com/339ka6e.jpg
Download link: http://uploading.com/files/d8mmb431/bitchinthreads.zip/

6. Blue's Port Scanner V5
Screenshot: http://i49.tinypic.com/14j3hwn.jpg
Download link: http://uploading.com/files/2mc7e3c9/bluesprtscn.zip/

7. Angry IP Scanner 2.21
Screenshot: http://i47.tinypic.com/2rqolld.jpg
Download link: http://uploading.com/files/cee3m756/angr...anner.exe/

8. XSS Scanner
Screenshot: http://i46.tinypic.com/30lor4w.jpg
Download link: http://uploading.com/files/d623c545/Xss%2Bscanner.rar/

9. TE Port Scanner
Screenshot: http://i45.tinypic.com/104ghld.jpg
Download link: http://uploading.com/files/dfad3b3c/te%2...anner.rar/

10. Free IP Scanner
Screenshot: http://i50.tinypic.com/2ymwytu.jpg
Download link: http://uploading.com/files/728m6536/HLDL...anner.rar/

11. Bobup Scanner v2.1.2
Screenshot: http://i48.tinypic.com/jj6z35.jpg
Download link: http://uploading.com/files/fd3872a3/bobup.rar/


DoSers, DDoSers, Flooders and Nukers

1. rDoS
Screenshot: http://i45.tinypic.com/2lvdztf.jpg
Download link: http://uploading.com/files/4169e19a/rDos.rar/

2. zDoS
Screenshot: http://i50.tinypic.com/2wqeioj.jpg
Download link: http://uploading.com/files/fe5dd9ee/zDoS.rar/

3. Site Hog v1
Screenshot: http://i46.tinypic.com/rwujbs.jpg
Download link: http://uploading.com/files/72d66468/Site...lease.rar/

4. SYN Flood
Screenshot: http://i45.tinypic.com/x26s2b.jpg
Download link: http://uploading.com/files/beddcmd2/SYN-flood.rar/

5. BFF DoS
Screenshot: http://i50.tinypic.com/ztxfu9.jpg
Download link: http://uploading.com/files/4425a9ac/BFF_..._v1.0.rar/

6. Good Bye v3.0
Screenshot: http://i46.tinypic.com/dzi33q.jpg
Download link: http://uploading.com/files/91a56185/Priv..._v3.0.rar/

7. RPCNuke 1.0
Screenshot: http://i50.tinypic.com/2nvgnrq.jpg
Download link: http://uploading.com/files/b1d759ea/rpcnuke.zip/

8. Rocket v1.0
Screenshot: http://i45.tinypic.com/2v2fhv8.jpg
Download link: http://uploading.com/files/4cacacmc/RocketV1_0.zip/

9. Panther Mode 2
Screenshot: http://i45.tinypic.com/2v2fhv8.jpg
Download link: http://uploading.com/files/a18665f3/PM2.zip/

10. Final Fortune 2.4
Screenshot: http://i46.tinypic.com/35ddspd.jpg
Download link: http://uploading.com/files/9f6ef8b4/fortune.zip/

11. Click v2.2
Screenshot: http://i45.tinypic.com/2iufk0g.jpg
Download link: http://uploading.com/files/857c862d/clik2.zip/

12. BattlePong
Screenshot: http://i50.tinypic.com/nwx5c8.jpg
Download link: http://uploading.com/files/mee78dfe/b4ttl3p0ng.zip/

13. Assault V1.0
Screenshot: http://i49.tinypic.com/15wfdl1.jpg
Download link: http://uploading.com/files/4ebcf7f6/ass4ult.zip/
Host Booters

1. MeTuS Delphi 2.8
Screenshot: http://i50.tinypic.com/2en3ymx.jpg
Download link: http://uploading.com/files/2173fa81/MeTu...i-2.8.zip/

2. XR Host Booter 2.1
Screenshot: http://i50.tinypic.com/11l7si1.jpg
Download link: http://uploading.com/files/9214d6a3/X-R.zip/

3. Metus 2.0 GB Edition
Screenshot: http://i49.tinypic.com/2r3wbjs.jpg
Download link: http://uploading.com/files/d756e6cd/Metu...ition.zip/

4. BioZombie v1.5
Screenshot: http://i50.tinypic.com/rlc590.jpg
Download link: http://uploading.com/files/5a8c4c4b/BioZombie.zip/

5. Host Booter and Spammer
Screenshot: http://i50.tinypic.com/a9n4go.jpg
Download link: http://uploading.com/files/15cb9571/Host_Booter.rar/


Stealers

1. Dark Screen Stealer V2
Screenshot: http://i50.tinypic.com/2d9o974.jpg
Download link: http://uploading.com/files/6b94b4fm/Dark...%2BV2.rar/

2. Dark IP Stealer
Screenshot: http://i50.tinypic.com/f3xocm.jpg
Download link: http://uploading.com/files/79777m85/Dark...5olia.rar/

3. Lab Stealer
Screenshot: http://i46.tinypic.com/17c0a0.jpg
Download link: http://uploading.com/files/5fee1a42/LabStealer.rar/

4. 1337 Steam Stealer
Screenshot: http://i45.tinypic.com/110vss9.jpg
Download link: http://uploading.com/files/26732m6f/1337...ivate.rar/

5. Multi Password Stealer v1.6
Screenshot: http://i46.tinypic.com/ae5ikl.jpg
Download link: http://uploading.com/files/1mc44bac/Mult...r_1.6.rar/

6. Firefox Password Stealer
Screenshot: http://i50.tinypic.com/ek510k.jpg
Download link: http://uploading.com/files/9f2efbam/FF%2...mcafe.rar/

7. PassStealer v3.0
Screenshot: http://i45.tinypic.com/14aaoo8.jpg
Download link: http://uploading.com/files/c978fcc9/Pass...Bv3.0.rar/

8. PWStealer V2.0
Screenshot: http://i48.tinypic.com/j7g5le.jpg
Download link: http://uploading.com/files/14ff968a/PWstealer_v2.0.rar/

9. Universal1337 V2
Screenshot: http://i47.tinypic.com/zno7q8.jpg
Download link: http://uploading.com/files/7596f771/Univ...%2BV2.rar/

10. Lord PS
Screenshot: http://i46.tinypic.com/339t8xh.jpg
Download link: http://uploading.com/files/me2a1m29/lps.zip/

11. JPS 1.8
Screenshot: http://i49.tinypic.com/2zptiiv.jpg
Download link: http://uploading.com/files/b5m5c54d/jps18.zip/

12. spam Stealer
Screenshot: http://i48.tinypic.com/ir23ad.jpg
Download link: http://uploading.com/files/bf3bdb48/%255...ealer.rar/

13. Aura Stealer v1.0b
Screenshot: http://i48.tinypic.com/spviie.jpg
Download link: http://uploading.com/files/52m15789/AuraStealer.rar/

14. BKL Stealer V2.0
Screenshot: http://i49.tinypic.com/vxgcog.jpg
Download link: http://uploading.com/files/5fd465a1/BKL_..._v2.0.rar/

15. spam Stealer/Keylogger
Screenshot: http://i46.tinypic.com/30kyr7b.jpg
Download link: http://uploading.com/files/c7197bm4/Builder.rar/

16. iStealer 3.0
Screenshot: http://i48.tinypic.com/wrxehk.jpg
Download link: http://uploading.com/files/dc86a322/iSte...252C0.rar/

17. iStealer 4.0
Screenshot: http://i47.tinypic.com/14o5et0.jpg
Download link: http://uploading.com/files/8cc4b465/iStealer%2B4.0.rar/

18. iStealer 5.0 (MOD)
Screenshot: http://i48.tinypic.com/358w9c6.jpg
Download link: http://uploading.com/files/88a88mm9/istealer_5.0.rar/

19. Midnight Stealer 1.5
Screenshot: http://i48.tinypic.com/nn1kbr.jpg
Download link: http://uploading.com/files/353ca8d8/Midn...2B1.5.rar/

20. Ref Stealer v1.0
Screenshot: http://i48.tinypic.com/dwdvu1.jpg
Download link: http://uploading.com/files/49e9fme2/Ref_...__FUD.rar/

21. Remote Penetration v2.2
Screenshot: http://i45.tinypic.com/jtt846.jpg
Download link: http://uploading.com/files/c9c53b64/Remo...Bv2.2.rar/

22. SimpleStealer v1.2
Screenshot: http://i50.tinypic.com/2iho7xg.jpg
Download link: http://uploading.com/files/a777c942/Simp...2.4.1.rar/

23. Unlimited PW Stealer v0.4
Screenshot: http://i47.tinypic.com/t8x16e.jpg
Download link: http://uploading.com/files/8a3m52b6/UNLI...2B0.4.rar/


Keyloggers

1. Albertino Simple Keylogger
Screenshot: http://i49.tinypic.com/2ntzm9w.jpg
Download link: http://uploading.com/files/763dc9cc/Albe...ogger.rar/

2. Ardamax 2.8 Keylogger
Screenshot: http://i46.tinypic.com/bj9vdv.jpg
Download link: http://uploading.com/files/a62debf3/Ardamax_2.8.zip/

3. A++ Keylogger
Screenshot: http://i50.tinypic.com/2vsi39g.jpg
Download link: http://uploading.com/files/52m6b2bd/Aplus.zip/

4. Basic Keylogger
Screenshot: http://i48.tinypic.com/3yedw.jpg
Download link: http://uploading.com/files/246ce22f/Basi...ogger.rar/

5. BKB Keylogger
Screenshot: http://i45.tinypic.com/xaubo2.jpg
Download link: http://uploading.com/files/mba221mc/BKB%...FIXED.zip/

6. Black Oil v1.1
Screenshot: http://i49.tinypic.com/j97hah.jpg
Download link: http://uploading.com/files/e4ee548f/Blac...Bv1.1.rar/

7. bLaCkOut Keylogger
Screenshot: http://i46.tinypic.com/116ne2r.jpg
Download link: http://uploading.com/files/3b83dm62/bLaC...ogger.rar/

8. Cyb3rK3yl0gg3r
Screenshot: http://i46.tinypic.com/vr5w5z.jpg
Download link: http://uploading.com/files/97a4e3ff/Cyb3rK3yl0gg3r.exe/

9. Duh Logger
Screenshot: http://i46.tinypic.com/ivee69.jpg
Download link: http://uploading.com/files/fdc1b226/DuhLogger.rar/

10. Easy Logger v1.1.1
Screenshot: http://i50.tinypic.com/28ap6w2.jpg
Download link: http://uploading.com/files/53647b21/Easy...1.1.1.zip/

11. EgySpy Keylogger v1.13
Screenshot: http://i45.tinypic.com/2zjdzqo.jpg
Download link: http://uploading.com/files/996db6af/EgySpyv1.13.rar/

12. Elite Keylogger V1.0
Screenshot: http://i45.tinypic.com/105cz29.jpg
Download link: http://uploading.com/files/f4e1eaa2/elit...g3r10.zip/

13. FKS 2.0
Screenshot: http://i49.tinypic.com/bgpoax.jpg
Download link: http://uploading.com/files/aa6d9d4m/fks_2.0.zip/

14. Fresh Keylogger
Screenshot: http://i49.tinypic.com/289gbqd.jpg
Download link: http://uploading.com/files/39fm738e/Fres...ogger.rar/

15. Ftw Logger
Screenshot: http://i50.tinypic.com/2u53qf5.jpg
Download link: http://uploading.com/files/27e71ae9/Ftw%...ogger.rar/

16. KeyLogger
Screenshot: http://i45.tinypic.com/zyhx61.jpg
Download link: http://uploading.com/files/71fd2f47/FUD_Keylogger.rar/

17. General Keylogger v1.0
Screenshot: http://i47.tinypic.com/1059ti1.jpg
Download link: http://uploading.com/files/c659cm19/Gene...Bv1.0.zip/

18. Gids Keylogger
Screenshot: http://i46.tinypic.com/1hbe53.jpg
Download link: http://uploading.com/files/6e7mbmdd/Gids_Keylogger.rar/

19. J.E.T Keylogger
Screenshot: http://i47.tinypic.com/110d3zt.jpg
Download link: http://uploading.com/files/4d21mcfe/J.E....52529.zip/

20. J-Logger
Screenshot: http://i46.tinypic.com/8ze8uf.jpg
Download link: http://uploading.com/files/d84f3ebe/J-Lo...ublic.rar/

21. KBW-Logger
Screenshot: http://i49.tinypic.com/suvq7l.jpg
Download link: http://uploading.com/files/fam35bb6/Kbw-Logger.rar/

22. LethalLogik Keylogger V1
Screenshot: http://i49.tinypic.com/x4hx1k.jpg
Download link: http://uploading.com/files/7mm2c968/LogikLogger.zip/

23. Modest Keylogger
Screenshot: http://i46.tinypic.com/34sfrwm.jpg
Download link: http://uploading.com/files/46m37232/Mode...ogger.rar/

24. Predator Keylogger
Screenshot: http://i45.tinypic.com/ir598i.jpg
Download link: http://uploading.com/files/3f51f7c9/Pred...%2521.zip/

25. Rapid Keylogger V1.0
Screenshot: http://i46.tinypic.com/2efkmz8.jpg
Download link: http://uploading.com/files/25b39734/Rapi...v_1.0.rar/

26. Sadaf Keylogger
Screenshot: http://i45.tinypic.com/2qjy4us.jpg
Download link: http://uploading.com/files/m4839594/Sada...ogger.rar/

27. Silent Keylogger v1.6
Screenshot: http://i48.tinypic.com/15g0sy.jpg
Download link: http://uploading.com/files/e1259a1m/Sile...BUNNN.rar/

28. Vaqxination v5.1
Screenshot: http://i47.tinypic.com/2rygayq.jpg
Download link: http://uploading.com/files/mb796c8d/Vaqx..._v5.1.rar/


Fake Programs

1. PayPal Money Hack
Screenshot: http://i48.tinypic.com/ra9bhy.jpg
Download link: http://uploading.com/files/9mcem5cd/Payp...Bhack.exe/

2. Windows 7 Serial Generator
Screenshot: http://i46.tinypic.com/2s01xye.jpg
Download link: http://uploading.com/files/e3ff956m/Wind...rater.exe/

3. COD MW2 Keygen
Screenshot: http://i46.tinypic.com/2dcg9yt.jpg
Download link: http://uploading.com/files/c423bfed/Cod%...crypt.exe/

4. COD MW2 Key Generator
Screenshot: http://i45.tinypic.com/nbuc7a.jpg
Download link: http://uploading.com/files/6a666957/CoD-Mw2-Keygen.exe/

5. DDoSeR 3.6
Screenshot: http://i45.tinypic.com/b66p6r.jpg
Download link: http://uploading.com/files/4a343ma2/ddoser%2B3.6.rar/

6. Dice Rigger
Screenshot: http://i47.tinypic.com/30jma6h.jpg
Download link: http://uploading.com/files/3bma8245/Dice%2BRigger.exe/

7. DoXiE v1.2
Screenshot: http://i48.tinypic.com/w02tk2.jpg
Download link: http://uploading.com/files/bf8cm613/DoXiE%2B%2B1.2.exe/

8. Steam KeyGen
Screenshot: http://i46.tinypic.com/mm75ea.jpg
Download link: http://uploading.com/files/5dfmcm7f/FAKE...eygen.exe/

9. Emblem Crypter
Screenshot: http://i49.tinypic.com/2nvq7o9.jpg
Download link: http://uploading.com/files/fmba4a7c/emblem_crypter.rar/

10. Flex Bot RuneScape
Screenshot: http://i46.tinypic.com/2gwuhqc.jpg
Download link: http://uploading.com/files/f718279a/Flex...scape.exe/

11. Flooder
Screenshot: http://i47.tinypic.com/2aka8vd.jpg
Download link: http://uploading.com/files/5d73b5ba/Flooder.exe/

12. Gamebattles Credit Adder
Screenshot: http://i47.tinypic.com/2dr989v.jpg
Download link: http://uploading.com/files/7abf71c2/Game...Adder.exe/

13. Kaspersky KeyGen
Screenshot: http://i47.tinypic.com/33xitm1.jpg
Download link: http://uploading.com/files/cce8a1c5/KasK...vised.exe/

14. Microsoft Point Generator
Screenshot: http://i50.tinypic.com/33axiex.jpg
Download link: http://uploading.com/files/914m334m/Micr...rator.exe/

15. MSN Password Cracker
Screenshot: http://i47.tinypic.com/2sageuf.jpg
Download link: http://uploading.com/files/6mem444m/MSN%...acker.exe/

16. MSDN Admin Maker
Screenshot: http://i46.tinypic.com/28wl4dw.jpg
Download link: http://uploading.com/files/d7649ca5/MSDN%2Badmin.rar/

17. Multi Hacker
Screenshot: http://i46.tinypic.com/14lrrmc.jpg
Download link: http://uploading.com/files/63cc3m6m/Multi-Hacker.exe/

18. MW2 Serial Generator
Screenshot: http://i48.tinypic.com/4jm5hu.jpg
Download link: http://uploading.com/files/ecb6ff7d/MW2%...rator.exe/

19. Norton 2010 KeyGen
Screenshot: http://i49.tinypic.com/2lxupuv.jpg
Download link: http://uploading.com/files/f4d2f146/Nort...eygen.exe/

20. PayPal Account Verified
Screenshot: http://i47.tinypic.com/ip4nzm.jpg
Download link: http://uploading.com/files/65cf3c8d/PayP...ifier.exe/

21. PayPal Money Hacker
Screenshot: http://i49.tinypic.com/10on3bk.jpg
Download link: http://uploading.com/files/7b4mm74a/PayP...acker.exe/

22. xBox 360 Account Hacker
Screenshot: http://i48.tinypic.com/6gxy4p.jpg
Download link: http://uploading.com/files/7cm5m11e/XBox...acker.exe/

23. WoW Account Hacker
Screenshot: http://i50.tinypic.com/2jzmdf.jpg
Download link: http://uploading.com/files/474a7657/WoW%...acker.exe/

24. Windows Activator
Screenshot: http://i49.tinypic.com/2afn8n5.jpg
Download link: http://uploading.com/files/3df39e26/Wind...vator.exe/

25. TeamViewer Patcher
Screenshot: http://i48.tinypic.com/2ivi3cm.jpg
Download link: http://uploading.com/files/48c7469b/team...patch.rar/

26. Runescape Stat Changer
Screenshot: http://i46.tinypic.com/5mfj7m.jpg
Download link: http://uploading.com/files/e7171495/Rune...anger.exe/

27. RapidShare Extender
Screenshot: http://i45.tinypic.com/s4ayrq.jpg
Download link: http://uploading.com/files/f81me97b/Rapi...ender.exe/

28. Poker Hack
Screenshot: http://i46.tinypic.com/2zpi25w.jpg
Download link: http://uploading.com/files/2ee3cbm2/Poker%2BHack.exe/
Posted by Nextdoorhacker at 7:31 AM 1 comments
more tools
Hello guys i have compiled all the tools which i found very usefull for me.Please suggest me if i should add more tools and also which tools.

1 - PLAYSTATION EMULATOR -- You can play ps2 games on your pc with this utility,a very handy tool for gamers,its better than bleem in compatibility.
http://uploading.com/files/d29ba697/epsx...lator.rar/

2 - Windows Admin Password Reset (Small Linux disk) -- Its a small linux image which can resets the admin password.
http://uploading.com/files/14747c2e/Wind...nload.rar/

3 - RAPIDSHARE ACCOUNT CHECKER(New Mask Added) -- Title says it all.
http://uploading.com/files/51cd3m24/RS%2...ECKER.rar/

4 - SQL FUZZER WITH VIDEO TUTORIAL(Only 1.5mb) -- Powerfull tool for sql injection.
http://uploading.com/files/253aaa2a/SQL%...ORIAL.rar/

5 - Ca0s SQL Perl Inj3ct0r v1 -- Good SQL injection tools source code.
http://uploading.com/files/9me23443/Ca0s...%2Bv1.rar/

6 - Milw0rm_Search_Utility_v1.0 by skyweb07 -- Small utility which can search exploits for you.
http://uploading.com/files/bfaem73d/Milw...web07.zip/

7 - Vaqxine Keylogger -- A very good tool by reputed member,it might not be FUD now but its a good tool.
http://uploading.com/files/69df2e18/Vaqx...ublic.rar/

8 - Hackers Tool Box -- Many handy tools.
http://uploading.com/files/3fm492c2/Hack...%2Bv1.rar/

9 - Nathans Image Worm -- It replaces every image on victim's pc with your defined image
http://uploading.com/files/3fe18118/Nath...BWorm.rar/

10 - HTTP Recon 7.3 -- Use it know weather an exe is backdoored or not.Basically its for Fingerprinting and vulnerability analysis.
http://uploading.com/files/fmd19969/httprecon-7.3.zip/

11 - JKymmel's Crypter -- For crypting you viruses.
http://uploading.com/files/e4m6514m/JKym...2B1.2.rar/

12 - Icon changer -- Change the icon of any file
http://uploading.com/files/6ad6aff5/IconChanger.rar/

ANONIMITY TOOLS

13 - Proximitron -- It proxifies every program you use even the command prompt.
http://uploading.com/files/ma6bm24e/proxo.rar/

14 - RAT proxy -- A tool to proxify yourself.Full info. attached.
http://uploading.com/files/64125a83/rat%2Bproxy.rar/

15 - Multi Proxy --Changes Your proxy on just one click or every few seconds.
http://uploading.com/files/7d5m5c98/multi%2Bproxy.rar/

16 - Jasager_Firmware_1.0 -- Its a Wifi MitM Tool for faking Your Access Point,it has lots of deadly features.
http://uploading.com/files/14bm1md3/jasa...0.tar.rar/

17 - Hide my windows installer -- Hides your running programs instantly
http://uploading.com/files/827m8b65/hide...aller.zip/

SECURITY TOOLS

18 - TrueCrypt Setup 6.2a -- It uses a powerfull encryption system used by government and agencies to encrypt your data.
http://uploading.com/files/d292b4a1/True...B6.2a.rar/

19 - NortOn GoBack -- This tools has saved me lots of time from serious error,this is a must have tools,it can restore your pc to exact date and time.Its 1000 times better than system restore.
http://uploading.com/files/c197mf2m/Nort...B2005.rar/

20 - Anti_keylogger_sheild_v3.0 -- Now you don't have to worry about keyloggers and stealers,very usefull to have.
http://uploading.com/files/b9daed94/Anti..._v3.0.rar/
VIRUS SCAN
Spoiler (Click to View)


21 - Process Explorer -- A utility for listing all the processes running.
http://uploading.com/files/a42dd34f/Pokm...lorer.rar/


REVERSE ENGINEERING TOOLS

22 - Resource Hacker -- A good tool for reverse engg.
http://uploading.com/files/e3c829a6/ResHacker.rar/

23 - xvi32 -- A easy to use hexing tools.Very handy tool.
http://uploading.com/files/43c594a9/xvi32.rar/

24 - PE.Explorer for Reverse engg. -- More advanced tool for hexing.
http://uploading.com/files/461f31fe/PE.E...engg..zip/


DDOS TOOLS

25 - ProDoS v1.0 -- Powerfull tool to ddos websites.Just like site hog
http://uploading.com/files/b9fb62mf/ProDoS%2Bv1.0.zip/

26 - Ddos any site in this WWW -- Title says it all.
http://uploading.com/files/67cmb1f7/Ddos...2BWWW.rar/

27 - Site_Hog_v1 -- One of the most powerfull ddos tool.
http://uploading.com/files/e2e8f85e/Site...lease.rar/

28 - BFF DoS (Ping) v1.0 -- A good ddoser by BFF Productions
http://uploading.com/files/3838478a/BFF%...Bv1.0.rar/

29 - zDoS -- Again a powerfull ddoser.
http://uploading.com/files/4f9fd9ed/zDoS.rar/

30 - Secret Downloader -- Makes your victim download a trojan and run it hidden.
http://uploading.com/files/44b5eeb8/Tiny...r_V31.rar/

NEWLY ADDED TOOLS

31 - MD5 CRACKER BY XDEMO -- A good md5 Cracker.
http://uploading.com/files/a2e6848f/MD5CRACK.rar/

32 - PHISH GRABBER -- This tool will try to brute directories and files for the password log.In short it will hijack someone elses phishing log and their "hard work".
OCX and premade work list is included
http://uploading.com/files/c723368b/PHIS...ABBER.rar/

33 - MASSIVE XXX PASSWORDS DUMP -- TITLE SAYS IT ALL
http://uploading.com/files/b422251c/MASS...BDUMP.rar/

35 - KeyScrambler -- It encrypts all the keys you presses on the keyboard thereby protecting you from keyloggers,its a very usefull tool and it works great for me.
http://uploading.com/files/311a5f23/KeyS...Setup.rar/

36 - FUD GMAIL HACKER -- Awesome tool to hack gmail passwords,just needed little social engg.It makes victim feel that he/she is hacking a gmail id.
http://uploading.com/files/e2a839ee/Gmail_Hacker.rar/

VIRUS SCAN FOR GMAIL HACKER BUILDER
Spoiler (Click to View)

VIRUS SCAN FOR STUB
Spoiler (Click to View)


37 - VNC CLIENT FOR YOUR MOBILE -- A VNC Client for J2ME (Java 2 Mobile Edition)
http://uploading.com/files/8816af8f/VNC-...40519.rar/
Posted by Nextdoorhacker at 7:30 AM 0 comments
1000 + Hacking Tutorials (a Must have)

1000 + Hacking Tutorials (a Must have)

Create Bootable XP SP integrated CD,Create One-click Shutdown And Reboot Shortcuts.txt Creating a Board aka Forum on your own PC !.rtf
Creating Universal Ghost Usb Boot Disk And Cd.txt
Data Capacity of CDs [Tutorial].txt ,Debug, Learn how crack windows.txt,Delete An undeletable File.txt,Delete Files From The Recent File List In Windows.txt,Digital Camera Guide.txt
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt 2.20 kB
Digital Photo Id Cards, Greate Info.txt 2.88 kB
Direct Link To Any Page You Want To In Hotmail.txt 1.95 kB
Directx Explained.txt 7.66 kB
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt 0.43 kB
Disable The Send Error Report, to Microsoft.txt 0.51 kB
Disable Windows Logo Key.txt 0.62 kB
Discover New Music You'll Probably Love.txt 1.08 kB
Download Free Music legally,, legally.txt 3.24 kB
Download from a paypal site without paying a penny!.txt 0.95 kB
Download From Ftpz, Using Ftp Search Sitez.txt 8.12 kB
Download Mp3's Without Using Filesharing.txt 0.69 kB
Download Music And Video With ,edia Player9, quick and easy!.txt 0.66 kB
Download Timeframes.txt 0.33 kB
1.39 kB
Dual Boot After The Fact.txt 1.37 kB
Dvd Copying-ripping Definitions.txt 1.25 kB
DVD Regions Information.txt 3.84 kB
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt 0.94 kB
Easily Disconnect-reconnect From Broadband.txt 0.30 kB
Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt 1.40 kB
Ebay Hackcracktip.txt 0.50 kB
General Keyboard Shortcuts.txt 7.54 kB
Get In Windows 2000 As Administrator.txt 0.39 kB
Get the Most Out of Your DVD Recorder.txt 11.25 kB
Get The Music You Want To Hear.txt 0.90 kB
Get unlimited bandwidth from your host for free.txt 2.88 kB
Getting A 1gb Yahoo China Account.txt 0.98 kB
Getting Counter-strike Source To Work.txt 3.36 kB
getting movies, mp3,games using google.txt 0.75 kB
Getting older programs to run on Windows XP.txt 2.96 kB
Getting started with Linux for nOObs!.txt 17.37 kB
Go to Windows updates anonymously.txt 0.40 kB
Google Crack Search.txt 0.14 kB
Google secrets.txt 0.98 kB
Google Tips & Tricks, (utilizing search engine).txt 5.81 kB
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt 2.45 kB
Guide For Getting Free Stuff.txt 10.33 kB
Guide to IIS Exploitation.txt 27.77 kB
Guide to Slipstreaming Service Pack 2.txt 2.82 kB
Hard drive Gone Bad.txt 5.55 kB
Hardware Firewall.txt 3.02 kB
How To Add An Option To Print, the Contents of a Folder!.txt 1.47 kB
How To Add Your Own Windows Tips.txt 0.48 kB
How to Back Up the Registry.txt 0.76 kB
How To Backup Ps2 Games.txt 7.71 kB
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt 1.51 kB
How To Block Websties Without Software, block websites.txt 0.64 kB
How To Boot Xp Faster (updated).txt 1.66 kB
How to build a black box.txt 7.79 kB
how to burn quicker in windows xp.txt 0.28 kB
How to Bypass BIOS Passwords.txt 9.05 kB
How To Bypass Web Filters, tutorial.txt 6.20 kB
HOW TO CAPTURE STREAMING MEDIA.txt 1.68 kB
How To Change A Cmos Battery.txt 3.18 kB
How to change the serial number used in Windows XP, Valid for XP Corporate.txt 1.11 kB
How To Change Thumbnail Size And Quality.txt 0.90 kB
How to clear Bios info 2.txt 23.55 kB
How to clear Bios info.txt 11.75 kB
How To Convert File System, fat - fat32 to ntfs.txt 0.52 kB
How To Copy A Dvd Which Will Play On A X Box.txt 1.01 kB
How to copy songs from your iPod to your PC.txt 1.40 kB
How To Customise Your start Button.txt 1.54 kB
How To Delete Those Persistent Nasty Files.txt 0.53 kB
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for How to find MP3's real quickly.txt 0.35 kB
How To Find Serial Numbers On Google.txt 0.79 kB
How to fix corrupted files in XP.txt 1.48 kB
How to fix Windows Installer problem.txt 0.96 kB
How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB
HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB
How to Get someones ISP password, Get free internet.txt 2.65 kB
How To Get Top Ranking, Search Engines.txt 6.58 kB
How To Hack Windows Xp Admin Passwords.txt 2.52 kB
How to hack-change your Windows XP Boot Screen.txt 1.52 kB
how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB
How To Make An Animted Logo.txt 5.26 kB
How To Make Free Phone Calls.txt 2.29 kB
How to make key generators.txt 8.83 kB
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB
How To Make XP Go Faster.txt 5.58 kB
How To make your own Radio Station 2.txt 3.26 kB
How To Make Your Own Radio Station.txt 1.58 kB
How to Remove DRM Protection for Video Files.txt 2.29 kB
How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB
How To Remove Signin Details Of Msn Passport.txt 1.04 kB
How To Remove The Default Admin$ Shares.txt 1.03 kB
How to remove the Links folder in IE Favorites.txt 0.59 kB
How to Remove WinXP Splash and See Operations.txt 1.19 kB
How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB
How to Rename File Extensions.txt 3.11 kB
How To Rename Multiple Files In Winxp.txt 0.56 kB
How To Restrict Login Hours Allowed.txt 0.58 kB
How to safeguard your files when computer crashes.txt 2.94 kB
How to save Windows xp updates.txt 0.63 kB
how to search google for RAPIDSHARE links.txt 0.98 kB
How To See Hidden Files, Using Dos.txt 0.08 kB
How To Set search For All Files In Winxp.txt 0.71 kB
How to set up a http server running from you computer.txt 3.06 kB
How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB
How To Set Up Direct Connect.txt 26.96 kB
HOW TO SET UP FTP SERVER.txt 1.79 kB
How To Set Up Proxies In Your Browser.txt 1.63 kB
How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB
How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB
How To Speed Up A Slow Computer.txt 1.21 kB
How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB
How To Stop Spam.txt 8.05 kB
How to swear in all languages.txt 28.32 kB
How To Unload Cached Dll Files To Free Memory.txt 0.56 kB
How to Use and How to Chain Multiple Proxies!.txt 9.70 kB
How To Use File Compression In Windows Xp.txt 4.19 kB
How To Use Google To Download Mp3's, and applications.....txt 0.60 kB
How To Use Newsgroups.txt 0.56 kB
How To Use You Gmail With Msn Messenger.txt 0.37 kB
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB
HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB
Important Faqs For Sp2.txt 9.47 kB
Improve Doom 3's Performances!!, simple but efficient trick for every1.txt 4.22 kB
Improve your dialup modem preformance.txt 0.73 kB
Increase XP Folder Settings.txt 0.79 kB
Insert Your Serial For Office 2k, auto install office.txt 1.06 kB
Install A New Hard-disk.txt 5.16 kB
Install Xp From Dos.txt 0.84 kB
Installing Apache on Windows.txt 6.29 kB
Installing Gentoo Linux, Amazing step by step tutoria.txt 0.19 kB
Installing IIS On Windows Xp Pro.txt 3.04 kB
Installing Slackware Linux.txt 34.73 kB
Instructions For Removal Of Advertising In Msn Messenger.txt 2.59 kB
Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.65 kB
Irc How To Downlaod From, How to downlaod from IRC.txt 3.95 kB
Irc Servers On nix, For people who want to start own IRC net.txt 0.48 kB
Keep Files Private.txt 1.51 kB
Keep Folders Hidden.txt 0.46 kB
Keyboard Shortcuts Result in Excel 2000 - Movement.txt 1.57 kB
Keyboard Shortcuts, Microsoft Word.txt 2.37 kB
Keyboard Shortcuts, must read.txt 3.72 kB
Kill Microsoft Instant Messenger.txt 0.28 kB
Lamination Tips, Its a Fast TUT......txt 1.98 kB
Leet Way To Get Your Ip In Windows Xp.txt 0.26 kB
Linking Your Xbox To Your Computer.txt 33.52 kB
Linux Howto's.txt 0.08 kB
List Of Sites Not To Go To.txt 4.32 kB
Little help for anonymous mailer.txt 1.56 kB
Lots Of Windows Xp Tips, Take A Look !.txt 12.43 kB
Lyrics With Google.txt 0.08 kB
Make A Autorun File For Ur Cd.txt 0.66 kB
Make A Batch File To Clean UR PC!!, All In One!!.txt 1.37 kB
Make A Roughly 16 Hour Video Dvd.txt 1.01 kB
Make Acrobat Reader 6 load faster.txt 0.42 kB
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.41 kB
Make Mp3 Files Smaller Without Losing Quality.txt 0.73 kB
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3.00 kB
Make Your Pc Faster, Guaranteed.txt 6.23 kB
MakeXPgoFaster.txt 5.74 kB
making a .cue file, in notepad.txt 0.53 kB
Making A .txt Executable Server.txt 1.60 kB
Making Bootable Floppy Disk to Boot into Windows.txt 4.82 kB
Making Cd Version Of Doom3 Into Dvd Version.txt 0.75 kB
Making Web Page Fonts Consistent and Uniform.txt 0.80 kB
Manage Saved Ie Passwords.txt 0.75 kB
Mastering The Windows XP Registry.txt 5.79 kB
Maximize Dial-up Modem Settings.txt 2.31 kB
Microsoft's Really Hidden Files, Reveled Hidden files.txt 33.95 kB
mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.37 kB
mIRCcommands.txt 10.10 kB
Misc Linux Tips & Tricks.txt 18.55 kB
Missing Administrator Account.txt 0.52 kB
Mobile Secret Codes.txt 31.09 kB
Modify .exe Files And Crack A Program.txt 3.06 kB
More Hacking/A beginners guide to Hacking UNIX.txt 5.61 kB
More Hacking/A Cracking Tutorial/C101-90.000 3.85 kB
More Hacking/A Cracking Tutorial/C101-90.001 32.32 kB
More Hacking/A Cracking Tutorial/C101-90.002 30.93 kB
More Hacking/A Cracking Tutorial/C101-90.003 14.75 kB
More Hacking/A Cracking Tutorial/C101-90.004 54.91 kB
More Hacking/A Cracking Tutorial/ED!SON.NFO 1.58 kB
More Hacking/A Guide to Internet Security- Becoming an Uebercracker.txt 8.56 kB
More Hacking/A Guide to the Easiest Hacking there is.txt 4.58 kB
More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands.htm 23.03 kB
More Hacking/A Small Guide to Hacking HOTMAIL.txt 3.02 kB
More Hacking/A UNIX Hacking Tutorial.txt 82.20 kB
More Hacking/Almost Everything You Ever Wanted To Know About Security (but.txt 47.52 kB
More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt 40.84 kB
More Hacking/An Introduction to Denial of Service.txt 44.78 kB
More Hacking/An Introduction to the Computer Underground.txt 17.03 kB
More Hacking/Basic Networking.txt 14.04 kB
More Hacking/BBS Crashing Techniques.txt 3.72 kB
More Hacking/BRUTE- A brute force approach to hacking Unix passwords.txt 3.31 kB
More Hacking/Closing the Net.txt 30.69 kB
More Hacking/Compression and Cracks for Dummies.txt 52.75 kB
More Hacking/Computer Bulliten Boards and the Law.txt 56.06 kB
More Hacking/Computer Chrime - Current Practices, Problems and Proposed So.txt 96.53 kB
More Hacking/Computer eMail and Privacy.txt 19.18 kB
More Hacking/Computer Hackers News Articles.txt 5.89 kB
More Hacking/Computer Rights vs First and Forth Amentment Right.txt 44.24 kB
More Hacking/Computer Security.txt 63.52 kB
More Hacking/Computer Security_2.txt 51.94 kB
More Hacking/Computer Viruii.txt 19.98 kB
More Hacking/Computerized Governmental Database Systems Containing Persona.txt 40.34 kB
More Hacking/COPS and Robbers-Unix System Security.txt 35.18 kB
More Hacking/Copyright Guides for Photographers.txt 17.02 kB
More Hacking/Crash Course in X Windows Security.txt 12.45 kB
More Hacking/Crime and Puzzlement.txt 62.34 kB
More Hacking/Cultural Formations in Text-Based Virtual Realties.txt 257.27 kB
More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion.txt 20.53 kB
More Hacking/Dark Angel's Phunky Virus Writing Guide .txt 18.90 kB
More Hacking/Defamation Liability of Computerized Bulliten Board Operators.txt 101.36 kB
More Hacking/Dept of Treasury Letter.txt 11.25 kB
More Hacking/Electronic Bulliten Boards and 'Public Goods' Explainations o.txt 45.84 kB
More Hacking/Electropolos - Communication and Comunity on IRC.txt 112.45 kB
More Hacking/Ethload User's Guide.txt 81.28 kB
More Hacking/Formulating A Company Policy on Access to and Use and Disclos.txt 12.14 kB
More Hacking/Free Speech in Cyberspace.txt 244.25 kB
More Hacking/Gender Issues in Online Communications.txt 24.86 kB
More Hacking/Government Computer Security Techniques.txt 7.88 kB
More Hacking/HACKDICT.TXT 272.00 kB
More Hacking/Hacker Test.txt 20.84 kB
More Hacking/Hackers A-Z.TXT 256.00 kB
More Hacking/Hackers Who Break into Computer Systems.txt 57.40 kB
More Hacking/Hacking Bank Of America's Home Banking System.txt 5.79 kB
More Hacking/Hacking Compuserve Infomation Service.txt 7.43 kB
More Hacking/Hacking Faq.txt 42.06 kB
More Hacking/Hacking GTE Telemail.txt 19.12 kB
More Hacking/Hacking IRC - The Definitive Guide.txt 13.72 kB
More Hacking/Hacking PC-Pursuit Codes.txt 8.10 kB
More Hacking/Hacking Techniques.txt 8.52 kB
More Hacking/Hacking TRW.txt 2.58 kB
More Hacking/Hacking TYMNET.txt 5.79 kB
More Hacking/Hacking Unix System V's.txt 10.93 kB
More Hacking/Hacking Wal-Mart Computers.txt 4.09 kB
More Hacking/Hacking Webpages.txt 3.90 kB
More Hacking/How the Traditional Media Clasifications Fail to Protect in t.txt 40.50 kB
More Hacking/How to crash AOL.txt 4.75 kB
More Hacking/How to dial out of a UNIX System.txt 3.49 kB
More Hacking/How to find Security Holes.txt 15.99 kB
More Hacking/How to get a Shell in 24 hours.txt 7.98 kB
More Hacking/How to Hack UNIX System V.txt 10.93 kB
More Hacking/How to login to a C.B.I. System.txt 3.00 kB
More Hacking/How to send ICQ Bombs.txt 2.33 kB
More Hacking/Information of Hacking AngelFire Websites.txt 3.21 kB
More Hacking/Introduction to Denail of Service.txt 44.78 kB
More Hacking/IP addressing, and gaining IP's.txt 13.70 kB
More Hacking/IP Addressing.txt 13.70 kB
More Hacking/ISSN Numbers- An Introduction.txt 5.96 kB
More Hacking/Junk Mail- How Did They All Get My Address.txt 12.70 kB
More Hacking/LENROS~1.TXT 184.58 kB
More Hacking/LENROS~2.TXT 7.41 kB
More Hacking/MEMETICS.TXT 45.79 kB
More Hacking/MINDVOX.TXT 64.57 kB
More Hacking/MORRIS~1.TXT 31.18 kB
More Hacking/NEIDOR~1.TXT 41.02 kB
More Hacking/NFS Tracing.txt 34.20 kB
More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt 20.86 kB
More Hacking/NY_2'S Guide to Obtaining An IP Address. .doc 10.50 kB
More Hacking/Organizational Analysis in Computer Science.txt 65.00 kB
More Hacking/PGP Startup Guide.htm 26.00 kB
More Hacking/Presumed Guilty.txt 153.76 kB
More Hacking/Raising Hell with Unix.txt 12.91 kB
More Hacking/Remarks of the President and Vice President to Silicon Valley.txt 37.70 kB
More Hacking/RIGGSB~1.TXT 54.03 kB
More Hacking/RIGGS_~1.TXT 54.03 kB
More Hacking/RIGHTS~1.TXT 7.99 kB
More Hacking/RIVERA.TXT 26.43 kB
More Hacking/Security holes.txt 11.77 kB
More Hacking/Seisure Warrent Documents for Ripco BBS.txt 72.01 kB
More Hacking/Site Security Handbook.txt 247.43 kB
More Hacking/SJ-DEC~1.TXT 45.03 kB
More Hacking/SJ-RESP.TXT 69.59 kB
More Hacking/SMTP-Simple Mail Transfer Protocol.txt 117.61 kB
More Hacking/Summary of FBI Computer Systems.txt 5.07 kB
More Hacking/SUNDEVIL.TXT 100.17 kB
More Hacking/SUPREM~1.TXT 56.70 kB
More Hacking/TCP packet fragment attacks against firewalls and filters.txt 4.39 kB
More Hacking/Telenet-The Secret Exposed.txt 9.91 kB
More Hacking/The Basics of Hacking- Introduction.txt 24.82 kB
More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt 85.17 kB
More Hacking/The Constitution in Cyberspace.txt 46.60 kB
More Hacking/The Cracking Manual.txt 86.38 kB
More Hacking/The Electronic Communication Privacy Act of 1986 - A Laymans .txt 10.04 kB
More Hacking/The Greatest Hacker of all time.ASC 25.02 kB
More Hacking/The Hacker's League.txt 12.37 kB
More Hacking/The Inner Circle Book's Hacking Techniques.txt 1.96 kB
More Hacking/The Lamahs-Guide to Pirating Software on the Internet.txt 12.21 kB
More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
More Hacking/The National Information Infrastructure-Agenda for Action.txt 96.49 kB
More Hacking/The Newbies Handbook- ' How to beging in the World of Hacking.txt 43.83 kB
More Hacking/The Newbies-User's Guide to Hacking.txt 47.35 kB
More Hacking/The Pre-History of Cyberspace.txt 60.25 kB
More Hacking/The Price of Copyright Violation.txt 73.11 kB
More Hacking/The REAL way to hack RemoteAccess.txt 12.12 kB
More Hacking/The Secret Service, UUCP,and The Legion of Doom.txt 19.63 kB
More Hacking/the UNIX operating system (Berkley 4.2).txt 13.55 kB
More Hacking/Theft of Computer Software-A National Security Threat.txt 12.22 kB
More Hacking/Thoughts on the National Research and Education Network.txt 19.72 kB
More Hacking/Tips on Starting Your Own BBS.1 8.04 kB
More Hacking/undocumented DOS commands.txt 23.17 kB
More Hacking/UNIX Computer Security Checklist.0 49.34 kB
More Hacking/UNIX Use and Security - By the Prophet.txt 153.74 kB
More Hacking/UNIX Use and Security From The Ground Up.htm 135.60 kB
More Hacking/UNIX- A Hacking Tutorial.SIR 82.26 kB
More Hacking/Viruii FAQ.txt 4.07 kB
More Hacking/Virus-Trojan FAQ.txt 1.95 kB
More Hacking/What Files are Legal for Distribution on a BBS.txt 20.83 kB
More Hacking/What To Look For In A Code Hacking Program.htm 5.56 kB
More Hacking/What To Look For In A Code Hacking Program.txt 5.46 kB
More Hacking/What You Should Know About Computer Viruses.DNA 16.91 kB
More Xp Tips and tricks make your computer more faster.txt 46.14 kB
Moving and Removing the Start Button.txt 0.66 kB
Msn Messenger & Gmail.txt 3.69 kB
My Flash Bookmarks, long list of tutorials.txt 2.98 kB
Myth about WPA ( How it is done ), Windows Product Activation Technique.txt 45.54 kB
Nero How To Verify The Validity Of The Sn U Use.txt 0.88 kB
New Hacking Ebooks/A Basic UNIX Overview.rtf 22.46 kB
New Hacking Ebooks/A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB
New Hacking Ebooks/A Novice's Guide to Hacking 2004.txt 40.75 kB
New Hacking Ebooks/A Novice's Guide To Hacking.txt 8.58 kB
New Hacking Ebooks/A Short HACKER SPEAK Glossary.txt 9.78 kB
New Hacking Ebooks/A simple TCP spoofing attack.txt 14.60 kB
New Hacking Ebooks/Accessing the bindery files directly.txt 3.97 kB
New Hacking Ebooks/An Architectural Overview of UNIX Network Security.htm 53.27 kB
New Hacking Ebooks/Anonymity complete GUIDE.rtf 28.90 kB
New Hacking Ebooks/ANONYMOUS emails.txt 3.15 kB
New Hacking Ebooks/Anonymous FTP FAQ.htm 28.14 kB
New Hacking Ebooks/ANSIBombs II Tips And Techniques.txt 10.05 kB
New Hacking Ebooks/attacks on networks how to stop.htm 67.77 kB
New Hacking Ebooks/Backdoor.txt 18.71 kB
New Hacking Ebooks/Backdoors.txt 19.15 kB
New Hacking Ebooks/BBS CRASHING TECHNIQUES.txt 3.72 kB
New Hacking Ebooks/Bust Avoidance For Dipshits.txt 5.82 kB
New Hacking Ebooks/Firewall Protection how to.rtf 33.12 kB
New Hacking Ebooks/Guide to Hacking with sub7.doc 106.00 kB
New Hacking Ebooks/hacking and phreaking.doc 168.00 kB
New Hacking Ebooks/Hacking for Dummies Volume 2.doc 147.00 kB
New Hacking Ebooks/Hacking For Newbies.doc 54.00 kB
New Hacking Ebooks/hacking in telnet http://ftp.rtf 57.47 kB
New Hacking Ebooks/hacking on Telnet explained.doc 16.25 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB
New Hacking Ebooks/hacking password protected site.doc 26.50 kB
New Hacking Ebooks/Hacking Password Protected Website's.doc 3.06 kB
New Hacking Ebooks/hacking passwords.doc 26.50 kB
New Hacking Ebooks/How to learn to hack in easy steps.doc 100.00 kB
New Hacking Ebooks/How to use the Web to look up information on hacking.doc 16.28 kB
New Hacking Ebooks/IP how to.rtf 5.15 kB
New Hacking Ebooks/NetBios explained.doc 26.68 kB
New Hacking Ebooks/Proxy how to.rtf 3.13 kB
New Hacking Ebooks/Routing Basics.pdf 30.25 kB
New Hacking Ebooks/telnet trick port 25.doc 1.76 kB
New Hacking Ebooks/Yahoo Chat Commands how to.rtf 0.93 kB
New Pc Or New Motherboard.txt 3.77 kB
New Way To Relive Some Zinio File.txt 1.95 kB
news groups the how to do.txt 11.40 kB
Nice list of windows shortcuts.txt 7.50 kB
No Text Icons.txt 0.29 kB
Ntfs Cluster Size, better harddrive performance.txt 1.34 kB
Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt 0.91 kB
Open Windows Explorer To A Different Default Direc.txt 0.74 kB
Optimize Broadband & Dsl Connections.txt 1.91 kB
Optimize Emule Connection.txt 1.20 kB
Outpost Rules, Outpost rules for system & app.txt 7.32 kB
Outsmarting System File Protection.txt 5.37 kB
Overclocking_Tutorial.txt 7.67 kB
Packet Attacks - Version 1.1, { Packet_Attack_Exlained}.txt 25.94 kB
Part 0 Dc++.txt 4.11 kB
Part 1 Bittorrents.txt 4.19 kB
Part 2 Irc (mirc).txt 4.91 kB
Part 3 http://Ftp.txt 2.71 kB
Partitioning Your Harddisk With Fdisk.txt 2.13 kB
Pc File Extention Listing.txt 26.48 kB
Pc Maintenance Guide.txt 10.20 kB
Peer2mail Tutorial.txt 9.37 kB
Performance Increase Through My Computer.txt 0.53 kB
Phreaking/2600 Hertz Single Tone Generator Schematic.txt 1.95 kB
Phreaking/A List of every TeleNet code that there is.txt 1.96 kB
Phreaking/A List Of Government BBS Numbers.txt 13.07 kB
Phreaking/An Extensive Guide to Bell System Man Holes.txt 10.10 kB
Phreaking/An Introduction into TeleScan.txt 3.98 kB
Phreaking/An Introductory Guide To TeleNet Commands.txt 2.20 kB
Phreaking/Area Codes and Time Zones.txt 4.90 kB
Phreaking/Becoming A Phreaker - The Quick n' Easy Way.txt 17.09 kB
Phreaking/Bell Hell Volume #1.txt 10.29 kB
Phreaking/Bell Hell Volume #2.txt 15.92 kB
Phreaking/Breaker B0X.txt 1.96 kB
Phreaking/busybox.txt 1.61 kB
Phreaking/Cellular Listening with a TV .txt 1.96 kB
Phreaking/Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB
Phreaking/Drake's Phreaking Tutorial.txt 3.34 kB
Phreaking/Hacking VoiceMail Systems.txt 25.89 kB
Phreaking/How BT phone cards works.txt 4.18 kB
Phreaking/How Phone Phreaks are Caught.txt 12.00 kB
Phreaking/How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB
Phreaking/How to make a Free Phone Call.txt 2.16 kB
Phreaking/How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB
Phreaking/Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB
Phreaking/Phreakers Handbook.txt 9.83 kB
Phreaking/Quick Phone Modifications.txt 4.12 kB
Phreaking/The ABC's of Payphones part 1.txt 2.58 kB
Phreaking/The ABC's of Payphones part 2.txt 2.12 kB
Phreaking/The ABC's of Payphones part 3.txt 2.21 kB
Phreaking/The ABC's of Payphones part 4.txt 2.64 kB
Phreaking/ThE Beige BoX .txt 6.23 kB
Phreaking/The History of British Phreaking.htm 8.29 kB
Phreaking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
Phreaking/The Moterola Bible.txt 116.99 kB
Phreaking/The Myth of the 2600Hz Detector .txt 6.55 kB
Phreaking/The Official Phreaker's Manual.txt 499.25 kB
Phreaking/The Phreakers Handbook-1.txt 62.87 kB
Phreaking/The Telephone Works.txt 9.25 kB
Phreaking/The Ultimate Phreaking Guide .txt 1.96 kB
Phreaking/Understanding the Telephone System.txt 16.34 kB
Phreaking/Zen and the Art of Fone Phreaking `97 .txt 66.74 kB
Play Games On PS2 Without ModChip.txt 5.37 kB
Play On A Bnet Emulator, and f off cd key check =).txt 1.81 kB
Port Numbers.txt 40.19 kB
Problem With Internet Navigation, Clean Host File.txt 0.47 kB
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt 1.77 kB
Quick Msc.txt 0.50 kB
Quick Shutdown for XP, How to create a shutdown shortcut..txt 0.54 kB
Quickly Start The Shared Folder Wizard.txt 0.40 kB
Rapidshare hack!!!!! Free premium acount for all.txt 3.08 kB
Rapidshare Hacked, unlimited upload, no countdown.txt 1.72 kB
Rapidshare Timelimit.txt 0.98 kB
Read This! Av Compare!.txt 7.56 kB
Recover A Corrupted System File.txt 1.10 kB
Recover a Quick erased CD RW.txt 3.89 kB
Reformat&Reinstall.txt 2.58 kB
Regedit.exe & Regedt32.exe, Whats the difference.txt 2.87 kB
Registry Disassembled a basic tutorial.txt 7.10 kB
Reinstall Internet Explorer 6.txt 1.13 kB
Release Codes, Read, and Learn....txt 2.29 kB
Remote Desktop Through Company Firewall.txt 2.59 kB
Remote Shutdown.txt 1.22 kB
Remove Linux From Your Pc Safely, ...and restoring your MBR.txt 1.66 kB
Remove Msn Messenger From Xp, several ways...txt 4.99 kB
Removing Banners From Free Webhosts.txt 2.69 kB
Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt 0.97 kB
Rename 'recycle Bin' To Whatever You Want.txt 0.66 kB
Reregister All .dll Files Within Registry.txt 1.54 kB
Reset your lost Bios Password.txt 4.24 kB
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt 1.28 kB
REVERSE CODING.txt 15.11 kB
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt 0.44 kB
Running A Board forum From Your Own Pc.txt 2.32 kB
Running Vanishing Console Programs With A Click!, Ever had a console program that vanis....txt 1.13 kB
Safely Editing the Registry....txt 1.86 kB
Save Your Desktop Icon Settings.txt 2.18 kB
Saving and loading Photoshop actions.txt 1.79 kB
Scheduled Tasks - Defrag, how to set up scheduled defrags.txt 1.92 kB
ScreenLock Professional v2.0.41.txt 0.04 kB
SEARCH eBOOK in FTP SEARCH ENGINE.txt 0.43 kB
Search For Ebook Server With Google.com.txt 0.35 kB
Search like a real warez d00dz, for warez of course!.txt 0.57 kB
Searching For Something To Download, This may help.txt 0.34 kB
Secret Backdoor To Many Websites.txt 2.09 kB
Secrets Of Lock Picking.txt 53.74 kB
Securing WinXP Pro (with what win-xp has to offer.txt 9.60 kB
Securing your WINDOWS XP computer.txt 1.19 kB
Set Google as your Default Search in IE.txt 0.55 kB
Set Win Explorer to open the folder you want!, Little trick.txt 0.23 kB
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt 3.21 kB
sidebar fix.txt 0.57 kB
Simple Tweaks For Peak Pc Graphics Performance.txt 10.16 kB
Single Click Shutdown.txt 2.82 kB
Single-click To Open An Item..., IF the Folder Options is grayed out.txt 1.19 kB
Slow Loggon Time, one fix for problem.txt 0.96 kB
Slow Opening Of File Dialogs.txt 1.10 kB
Some Cool Site For Tutorials.txt 0.41 kB
Some Google Tricks, again.txt 1.74 kB
Some More Tips To Improve Your Winxp.txt 24.09 kB
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt 10.71 kB
Sp2 Tweaks.txt 3.44 kB
Speed Up Internet.txt 4.46 kB
Speed up menu display.txt 0.54 kB
Speed up Mozilla FireFox.txt 0.45 kB
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt 1.02 kB
Speeding up menus in XP.txt 0.27 kB
Speeding up your internet connection under Linux and Windows.html 11.75 kB
Spoofing emails, via telenet.txt 0.41 kB
Standard ASCII Character Set.txt 1.79 kB
Steps to Clean Install XP.txt 8.23 kB
Stop A Restart Process In 3steps.txt 0.29 kB
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt 1.23 kB
System Changes To Foil Hackers And Browser Hijacke.txt 7.65 kB
System File Checker For Windows Xp.txt 2.26 kB
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt 50.96 kB
Testing Wattage Consumption Of Your Computer, Measuring your computer's wattage.txt 9.33 kB
The Antivirus Defense-in-Depth Guide.txt 2.77 kB
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt 3.69 kB
The Modern Phreakers Guide To Beige Boxing.txt 4.32 kB
The Modern Phreakers Guide To Payphones.txt 6.98 kB
The Port Guide, Port number and info.txt 24.64 kB
The Ultimate Guide To Installing Windows Xp Sp2.txt 3.14 kB
Three Ways Of Bypass Starforce Cd Protection.txt 2.48 kB
Tip for shutdown windows - virus.txt 0.39 kB
Tips And Tricks, Windows XP.txt 41.24 kB
Tired Of Reinstalling Windows.txt 2.31 kB
To Get And Show The Ip Via Javascript.txt 0.62 kB
Top 5 Myths About Safe Surfing, PC Magazine.txt 3.36 kB
Transferring Data.txt 6.45 kB
Translating Binary To Text.txt 6.22 kB
Translating Binary to Text2.txt 5.72 kB
Trojan Ports.txt 13.83 kB
Turn MSN Messenger Display Pix into User Pix on XP.txt 2.50 kB
Turn Off Unneeded Services, speed up pc.txt 1.56 kB
Tutorial Get the serial number you need.txt 0.88 kB
Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt 2.17 kB
Tutorials - blacksun.box.sk/coding/Base Number Systems.html 7.78 kB
Tutorials - blacksun.box.sk/coding/BASIC C Socket Programming In Unix For Newbies.txt 21.50 kB
Tutorials - blacksun.box.sk/coding/Basics of am 3mp33j3w.txt 18.64 kB
Tutorials - blacksun.box.sk/coding/Batch File Programming.txt 41.70 kB
Tutorials - blacksun.box.sk/coding/BOOLEAN LOGIC GATES.html 14.04 kB
Tutorials - blacksun.box.sk/coding/C++ Tutorial By Clayman.html 23.77 kB
Tutorials - blacksun.box.sk/coding/Creating A Simple Hit Counter In PHP.html 8.77 kB
Tutorials - blacksun.box.sk/coding/Creating A Simple Search Engine In PHP.html 9.62 kB
Where Is Winipcfg In Winxp.txt 0.62 kB
Who's Seeding The Net With Spyware.txt 5.33 kB
Why wait 35 Seconds at eZshare.txt 1.55 kB
Win 2000 Dr. Watsson.txt 0.23 kB
Windows 2000 Tips & Tricks.txt 4.58 kB
Windows 2003 System Restore, How to activate system restore in W2K3.txt 5.47 kB
Windows Scan Count Down Time.txt 0.54 kB
Windows Shortcuts.txt 12.84 kB
WINDOWS TRUE HIDDEN FILES.txt 9.46 kB
Windows Tweak, Hack Your Start Button.txt 3.25 kB
Windows Xp - Speed Up Your Network and Internet Access.txt 2.70 kB
WINDOWS XP HIDDEN APPS.txt 2.59 kB
Windows XP Registry Tweaks.txt 34.05 kB
Windows XP Startup and Performance Tweaks.txt 1.76 kB
Windows Xp Tips 'n' Tricks.txt 28.51 kB
Windows Xp Tweaks, A work in progress.txt 2.98 kB
Windows XP Tweaks.txt 2.37 kB
WinRar Tutorial - Compression profiles, passwords and more.txt 5.78 kB
Winsock 2 Repair.txt 2.10 kB
WinXP 3 Tips.txt 1.87 kB
Winxp Application Defrag, faster access for used programs.txt 0.30 kB
Winxp Applications Startup Time, Decrease your Applications startup time.txt 1.16 kB
WinXP Bootable CD.txt 2.19 kB
Winxp System Response, reboot whitout rebooting.txt 0.61 kB
Winxp Tips And Tricks, Winsock 2 repair.txt 2.19 kB
Xp Auto Install.txt 1.79 kB
Xp Folder View Does Not Stay To You're Setting., Grab your registry editor and join in.txt 1.87 kB
XP REPAIR INSTALL.txt 5.92 kB
XP Tweaking.txt 15.75 kB
Yahoo + geocities Posts.txt 3.07 kB
Yahoo Messeger, no ad's.txt 0.83 kB
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt 1.47 kB
Your Home Page Nevr Being Changed.txt 0.50 kB
Your Own Home Server - Introduction.txt 11.25 kB

And Alot more than on the list
http://rapidshare.com/files/80437171/1000HTT.rar
http://www.megaupload.com/?d=KAH97R6Q

Password = crazy-coderz.net

hope these come in handy =)
Posted by Nextdoorhacker at 7:29 AM 0 comments
tools
Resource Hack
This tool will help you to steel any software you want by changing the details that make the product refers to a certain company and you can make it your by introducing your name inside.
This tool should be combined with the next tool "psp editor" for best results
http://uploading.com/files/WZFNC5VM/Reso...k.zip.html


PSP editor
This software will help you to see the source code of the product and will give you many options that can help you to modify the product the way you want.
A combination of this tool and the one before "Resource Hack" will make your job easier
http://uploading.com/files/PYWCP7IV/pspa...n.exe.html


Paypal phish page
Many people were asking for a good paypal phish page since the .css file is causing some problems to there phish job and that the phish page doesn't look conviniant so here is a good one
http://uploading.com/files/MJED5PNN/paypal.zip.html


Mess Bomber
This is also a spammer bot. Same as the previous one , can be used to spam any email you want quickly and easily.
http://uploading.com/files/9ERNY2O6/Mess...r.zip.html


Fill-er-up collection
This 3 softwares are spammers. you can use these tools to spam any email you want very quickly and in only few steps. Ability to attach a file and to stop any time you want. Very effective. All credit go to Nathan72389
http://uploading.com/files/D8FJXYLU/Fill...n.rar.html


Bomb Them!
This is also a spammer bot. Same as the previous one , can be used to spam any email you want quickly and easily. Ability to attach a file and to stop any time you want. All credit go to Nathan72389
http://uploading.com/files/1GES5BS6/Bomb...!.rar.html


Shock Labs File Binder v1.0
This is was posted long time ago in the forum and i think he did get the reputation he should. This is very good tool to bind (mix) an ".exe" with a ".jpep" or a ".mp3"
You can use this one if you want to attack a virus or trojan to a pic. One of the best binder in the domain so far
http://uploading.com/files/YIZE26JR/Shoc...0.zip.html


Portable.Wireless WEP Key Password Spy v1
A very good software to hack any wireless wep connection that your wireless device can detect very quickly. You can use now your neighbor connection to do your dirty jobs and to get away with it. Remember always use proxy with it.
http://uploading.com/files/5ORJONUI/Port...l.rar.html


Ardamax Keylogger 3.1
This is a keylogger. You can register now any pressed key in a log file so you can check it later. Hide it from the eyes of the PC users and register there types. Ability to remote the log file via email to a email you have already specified. Very effective to spy on someone and especially kids in order to protect them from abuse.
http://uploading.com/files/KXK28WI2/Arda...1.rar.html


Server Attack
Do a DDos attack to any website and paralyze it by increase the UDP Data sent to this website. In other words you will increase the request to open the webpage to 200 request at the same time which should paralyze the website targeted.
http://uploading.com/files/C1ZR8BH9/Serv...4.zip.html


Satan's Byte Adder 1.0
This tool is very useful to increase your applications size. Just drag and drop the file inside this tools and indicate how many KB you want to add. I use it very useful and works perfectly. All credits go to SpawnOfSatan.
http://uploading.com/files/18158IPR/Sata...0.zip.html
Posted by Nextdoorhacker at 7:29 AM 0 comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

share trading
Search This Blog


powered by

Blog Archive

* ▼ 2010 (13)
o ▼ February (13)
+ Free nexus cracked!!!!! All scripts
+ Sandboxie
+ Hacker’s Tool Set (45 Hacking Tools)
+ Supports: Sending to multiple targets A target lis...
+ This will be the MAIN thread for Ghetto YouTube. T...
+ Cyber-Sec Decrypt v1.0 - Anti-Noob Decrypter
+ Hacker Kit 2009
+ everything you need
+ more tools
+ 1000 + Hacking Tutorials (a Must have)
+ tools
+ some tools
+ Huge Fake Program Collection