Archive

Archive for the ‘BEST TRICKS’ Category

HOW TO TRACE IP ADDRESS

May 30, 2011 Leave a comment
In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.
Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.
A sample snapshot of the results from ip2location.com is given below

You can also visually trace route any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination.

HOW TO FIND IP ADDRESS OF REMOTE COMPUTER

May 30, 2011 Leave a comment
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.
1. Download the IP Finder script (IP_Finder.ZIP) that I have created.
2. Open a new account in X10Hosting (or any free host that supports PHP).
3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.
4. You can rename the ip.php to any name of your choice.
5. Set the permission to 777 on ip_log.txt.
Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.
For your better understanding let’s take up the following example.
Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be
You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.
To find the recorded IP address check the logs using the following link.
The sample log will be in the following format
79.92.144.237 Thursday 07th of May 2009 05:31:27 PM
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM
NOTE: You have to replace abc with your subdomain name.

HACK A BSNL BROADBAND FOR YOUR SPEED

May 30, 2011 Leave a comment
If you are a BSNL broadband user, chances are that you are facing frequent DNS issues. Their DNS servers are just unresponsive. The look up takes a long duration and many times just time out. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS servers or run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:
208.67.222.222
208.67.220.220
Detailed instructions specific to operating system or your BSNL modem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features. After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.
Popularity: 10% [?]

HOW TO HACK AN ADSL ROUTER

May 30, 2011 Leave a comment
Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.
Before you proceed, you need the following tool in the process
Here is a detailed information on how to exploit the vulnerability of an ADSL router.
Step-1: Go to www.whatismyipaddress.com. Once the page is loaded you will find your IP address. Note it down.
Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
Suppose your IP is 117.192.195.101, you can set the range something as 117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.

Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.
I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to OptionsTools instead of

Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.
Step-5: Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below

If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack. 
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.
Warning!
All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

4 WAYS TO INCREASE YOUR BLOG TRAFFIC

May 29, 2011 Leave a comment
One of the most common complaints that I hear from bloggers is the fact that no matter how hard they try, they can’t grow their blogs past 100 or so daily page vies. Those early days are indeed the hardest, because you need to put hard work in without the certainty of achieving results.
If you are in that same situation, here is a simple strategy that will certainly increase your blog traffic and make you break the 1,000 daily page views mark. In fact, the strategy could be used even if your are already over that number but have reached a traffic plateau lately.
Just make sure to execute the 4 steps as planned and to spend the two hours and a half every day (obviously if you have more time available you can expand the time spent on each of the four steps proportionally).

First Step: Killer Articles (1 hour per day)

Spend one hour brainstorming, researching and writing killer articles (also called linkbaits, pillar articles and so on).
Notice that your goal is to release one killer article every week. If that is not possible aim for one every 15 days. So the one hour that you will spend every day will be dedicated to the same piece. In other words, expect killers articles to take from 5 up to 10 hours of work.
If you are not familiar with the term, a killer article is nothing more than a long and structured article that has the goal of delivering a huge amount of value to potential visitors. If you have a web design blog, for example, you could write an article with “100 Free Resources for Designers”. Here are some ideas for killer articles:
  • create a giant list of resources,
  • write a detailed tutorial teaching people how to do something,
  • find a solution for a common problem in your niche and write about it, or
  • write a deep analysis on a topic where people have only talked superficially
When visitors come across your killer article, you want them to have the following reaction: “Holy crap! This is awesome. I better bookmark it. Heck, I better even mention this on my site and on my Twitter account, to let my readers and friends know about it.”

Second Step: Networking (30 minutes per day)

Networking is essential, especially when you are just getting started. The 30 minutes that you will dedicate to it every day could be split among:
  • commenting on other blogs in your niche,
  • linking to the posts of bloggers in your niche, and
  • interacting with the bloggers in your niche via email, IM or Twitter.
Remember that your goal is to build genuine relationships, so don’t approach people just because you think they can help to promote your blog. Approach them because you respect their work and because you think the two of you could grow together.

Third Step: Promotion (30 minutes per day)

The first activity here is the promotion of your killer articles. Whenever you publish one of them, you should push it in any way you can. Examples include:
  • letting the people in your network know about it (don’t beg for a link though),
  • letting bloggers and webmasters in relevant niches know about it,
  • getting some friends to submit the article to social bookmarking sites,
  • getting some friends to Twitter the article, and
  • posting about the article in online forums and/or newsgroups.
If there is time left, spend it with search engine optimization, social media marketing and activities to promote your blog as whole. Those can range from keyword research to promoting your blog on Facebook and guest blogging.

Fourth Step: Normal Posts (30 minutes per day)

Just like a man does not live by bread alone, a blog does not live by killer articles alone. Normal posts are the ones that you will publish routinely in your blog, between the killer articles. For example, you could publish a killer article every Monday and normal posts from Tuesday through Friday. Here are some ideas for normal posts:
  • a post linking to an article on another blog and containing your opinion about it
  • a post informing your readers about a news in your niche
  • a post asking a question to your readers and aiming to initiate a discussion
  • a post highlighting a new resource or trick that you discovered and that would be useful to your readers
While killers articles are essential to promote your blog and bring new readers aboard, normal posts are the ones that will create diversity in your content and keep your readers engaged.

HOW TO HACK A MTNL INTERNET ACCOUNT

May 29, 2011 Leave a comment

Many persons asked me for how to hack mtnl account.Here is a general procedure to hack any DSL/cable account.I have already hacked MTNL triband and spectranet cablenet using this.
The actual procedure specifically for mtnl is damn simpler but this is the general method.Not for no

obs.
As they say,no pain no gain.
I am not responsible for any harm caused to you using this method.Though the method is damn simple,the detection is simpler.
This tutorial will explain to you how to hack someone’s internet account thru his router.
This hack is based on a secuirty exploit of the router’s default password and the stupidity of the user.
Explanation: when somebody buy’s a xDSL/Cabel router, the router is set to manufactory defaults like IP range, user accounts, router table, and most important the security level.
The last one we will exploit.
Most routers will have a user friendly setup menu running on port 23 (telnet) and sometimes port 80 (http) or both.
This is what we are looking for.

Step 1.
Get a multie IP range scanner like superscanner (superscanner is fast and easy to use).
Get a xDSL/Cabel user IP range. This is a single user IP 212.129.169.196 so the ip range of this Internet provider is 212.129.xxx.xxx most likely it will be from 212.129.1.1 to 212.129.255.255 .
To keep your scanning range not to big it’s smart to scan from 212.129.1.1 to 212.129.1.255 it also depends of your bandwidth how fast the scan will be finished.
The IP adres above is just a example any IP range from a xDSL/Cabel provider can be used for this hack.
before you start scanning specify the TCP/IP ports. You know that we are looking for TCP port 23 (telnet) and TCP port 80 (http) so edit the list and select only port 23 and port 80.
Now start scanning and wait for the results.
When finished scanning look for a IP that has a open port 23 and 80. Write them down or remember them.

Step 2.
Way 1
This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and address (56.9 modem for example) when connection to the victim’s router.
Now get a telnet program. Windows has a standard telnet program just go to start,
select run and type down “telnet” without the “, click or enter OK.
Select “connect” than “Remote system” enter IP adres of the victim in the “host name” field press OK.
wait for your computer to make a connection. This way only works when the router has a open telnet port service running.
Way 2
This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and adres (56.9 modem for example) when connection to the victim’s router.
Open a Internet explorer windows enter the IP address of the victim after the http:// in the address bar.
This way only works when the router has a open hyper text transfer protocol (http) service running.

Step 3
Entering the userfriendly setup menu. 9 out of 10 times the menu is protected by a loginname and password. When the user doesn’t change any security value’s the default password stay’s usable.
So the only thing you have to do is find out what type of router the victim uses. I use this tool: GFILanguard Network Security Scanner is good. When you find out the type of router that’s been used get the wright loginname and password from this list (not every router is on the list)

Step 4
When you have a connection in telnet or internet expolorer you need to look for user accounts.
PPP, PPtP, PPeP, PPoP, or such connection protocol. If this is not correct look for anything that maybe contains any info about the ISP account of the user.
go to this option and open it. Most likely you will see a overview of user setup options.
Now look for the username and password.
In most case the username will be freely displayed so just write it down or what ever….
The password is a different story. Allmost always the password is protected by ********* (stars) in the telnet way there is noway around it (goto another victim) but when you have a port 80 connection (http). Internet connection way open click right mouse key and select “View source” now look for the field where the star are at. most likely you can read it because in the source code the star are converted to normal ASCII text.
If not get a “******** to text” convertor like snadboy’s revelation V.2 move the cursor over the ****** and….
It’s a miracle you can read the password.
Now you have the username and password.
There a million fun thing to do with that but more about that next time.
Tips.
Beware on most routers only one person can be loget on simultaneous in the router setupmenu.
Don’t change anything in the router if you don’t know what you are doing.
Dont cause any unintentional harm.Dont overuse any connection as the sufferer may complain.

HOW TO PROPOSE A GIRL

May 28, 2011 Leave a comment
A girl is nature’s most wonderful creation. She can love like there is no tomorrow and hate like you wish you would die. She can be a protector, a healer a creator and a destroyer. For proposing a girl, certain things have to be kept in mind. It is a bit tricky but not impossible. We bring you some ideas for proposal to a girl. Following tips shall give you ideas of how to propose a girl.

* Do your homework. Get to know your girl well, before you pop the question. Get to know her interests, her dislikes, and her general nature that will help you plan your proposal in a better way. If she is shy and an introvert, propose when you two are alone. If she is sporty and loves adventure, then take her for rock climbing and propose when you reach the top.

* All girls love flowers. So get a huge bouquet of roses and tell her how much you love her and how much she means to you. Tell her you would like to spend the rest of your life with her or alone. Be ready to be smothered by a genuinely happy woman’s hug!
* Appreciate her for what she is. Tell her “you look beautiful” when she does not have any make up on. Tell her she looks amazing when she is having a bad day and mean it. She will love you for it and will readily agree when you propose. Just don’t overdo it, as it may look fake.
* Girls love to be pampered so when you intend to propose, make sure you are chivalrous enough to make her feel special and at the same time not look vulnerable. Women want a strong man, not a wimp.
* Don’t force her to say yes. The worst you can do is to push her around and threaten her dignity. Tell her to take her time and that you shall wait. Be a gentleman and respect her. Incase she doesn’t want a relationship, she will let you know of it then and there.

————————————————————————————————–


Rose – Symbolism & color


Color is definitely a personal preference. And while the red rose may be the first to come to mind, a rainbow of colors exists. The chart below matches some of the most popular rose colors with the sentiments they express

Color
Symbolism
Red
Love, respect
Deep Pink
Gratitude, appreciation
Light Pink
Admiration, sympathy
White
Reverence, humility
Yellow
Joy, gladness
Orange
Enthusiasm, desire
Red and Yellow
Gaiety, joviality
Yellow
Sociability, friendship

————————————————————————————————-

Meaning of Rose Colors
Different colors of roses represent different feelings and emotions. Most rose growers have a personal color favorite and aren’t concerned with the underlying meaning. However, it’s still fun to understand the traditional meaning behind the colors of roses.

The meaning of love that the red rose expresses is the most well known of all the rose colors. Red roses have long symbolized love and romantic relationships. If given red roses by a gentleman ladies know he has strong romantic feelings for her. Red roses are also seen as classic. When reading about roses in poetry, song or a novel you often imagine a full red rose.

Pink roses are commonly presented as gifts and lovingly grown by gardeners alike. Pink roses can mean quite a variety of things from “thank you for your assistance” to “I’m thinking of you.” Pink roses like yellow are the perfect gift for just about anyone. You can choose darker pink for someone with a wild outgoing personality and pale pink for a gift recipient who is shy or calm and collected.

White roses represent purity and true love. They can be an excellent gift for a fiancé, a spouse on a wedding anniversary or the birth of a child. You also have the benefit of knowing white roses will always match a picky recipients décor incase this is a consideration as well.

Yellow roses have traditionally symbolized friendship. They’re such a sunny and cheerful flower that they’ve also been given to acknowledge or congratulate someone for a recent good fortune or happiness. Yellow roses, like pink, have the benefit of being an appropriate gift for just about anyone. You could present them to a wife or girlfriend who loves yellow flowers as well as a coworker, grandparent, friend or sibling.

Orange roses could be considered to have a similar meaning as yellow roses. They can also represent excitement or something new. If you’re starting a new chapter in your life or embarking on an exciting adventure with someone special orange roses could be an excellent gift giving choice.

The key with giving roses and the meaning of the different flower colors is to first consider the gift recipient. It’s wonderful to give your wife or girlfriend red roses but maybe she actually prefers pink, yellow or white. For instance, my mother loves yellow and I’m an orange and pink girl. You’ll be more apt to truly wow that someone special if you take the extra time to discover their personal favorite.