domingo, 20 de marzo de 2011

new cookies premium

20/03/2011

new hotfile cookies 20/03/2011

56abae195a9c5f0cdafafbd13d3f815e95ae7fe4367fe24bca9a3172b2c6cdc6
c45a52d27770c18da02f5001756e81371926dcbdf7ee52d820ee5b3c6b4ca15c
976ac0d0b539c1b7e58154a796c98137e7f634237fa268d812cb6ff71fcc9540
b1b2d0abaf5b9b90dc5f9b208239814d82f1552f1c443a204f0b727c3505cb5c
8e2e84c3b95f872280b18b228e15817965387bd0fd707b8a7c7367e11ed80f2e

accountes hotfile premium 20/03/2011

login : hackedbymavras
pass : narobm

login : newrozpirozbe
pass : bijuae
hotfile cookies 20/03/2011

12a512ec3d4110b4f22ef18abe42815580f2ab9a3c07a4c267ba8ffe47cecb4c
73d719cb079903525cd464110dcb8169c74bec7a5ecc4e8fb28c0f9fc2a4b606
56abae195a9c5f0cdafafbd13d3f815e95ae7fe4367fe24bca9a3172b2c6cdc6
b1b2d0abaf5b9b90dc5f9b208239814d82f1552f1c443a204f0b727c3505cb5c
c45a52d27770c18da02f5001756e81371926dcbdf7ee52d820ee5b3c6b4ca15c


accountes hotfile premium 20/03/2011

login :bosskosta
Pass :12341234

loign :asidin2001
Pass :asidin21062008

loign :man_x0
Pass :pa22w0rd
accountes uploading 20/03/2011

login : mzeares@yahoo.com
pass : m60a3tts

login : zero194@yahoo.com
pass : paul62

accounte extabit 20/03/2011


Login: letitbitkeys.ru@yandex.ru
Pass: Letitbitkeys/(ru

accounte megashare 20/03/2011

login:lavhack@gmail.com
pass:4d2a2262950a3

accounte easy-share 20/03/2011

login: ohioan
Pass: 111n122

accountes turbobit 20/03/2011

login : dev.spiritix.eu@dev.spiritix.ru
pass : dev.spiritix.eu

login : realdreamzru@rambler.ru
Password: tid4kcAr

login: anons-ozersk.ru@mail.ru
pass: anons-ozersk.ru

login: www.vipkeys.net@yandex.ru
pass: gold-shop

login:sputnik9215@mail.ru
pass:SpirITix Company

login: 55555sergej@mail.ru
pass: 5sssss5

Login: letitbitkeys.ru-website@yandex.ru
Pass: letitbitkeys


loign: gold-mix@list.ru
Pass : gold-mix.ucoz.ru


accounte Unibytes 20/03/2011

Login: letitbitkeys.ru@gmail.com
Pass: letitbitkeys.ru


Login: www.letitbitkeys.ru@yandex.ru
Pass: letitbitkeys.ru


user: www.letitbitkeys.ru@yandex.ru
pass: 17788154

accounte hitfile.net 20/03/2011

Login: letitbitkeys.ru@gmail.com
Pass: weletitbitkeys


login: goldman3013@mail.ru
pass: stopvirus.org.ru

[TuT] Make your own radio station for FREE + VirtualDJ Pro 6 + crack [+Pics]

I don't know where to put this tutorial so i putted it here...Mod/Admin move i if you like!

Do YOU ever wanted to have your own radio station?
Well i can make it true.Today im gonna show you how to make your own radio station for FREE!

TIP: You must have strong internet speed.

Let's Start:

0.1)Go to http://www.listen2myradio.com/reg.php and register (You need to confirm your e-mail)

0.2) Then go to http://www.listen2myradio.com/exec.php?do=ins
And fill out boxes

Code:
Broadcaster password:
Admin password: (REMEMBER THIS...YOU'LL NEED IT LATER)
Radio name:
Radio url: (just fill username anythingyouwant ex. haxor.listen2myradio.com

Alright..We have setted up radio.


1)Now download VirtualDJ Pro (crack inside)
Code:
http://www.mediafire.com/?n3qezzq3xn5lrmq

2) Install and open it..

3) Go to "Record"

4) On left side click "Brodcast" and click "Config"

5) Now you need to enter your server details (from listen2myradio.com)
To view them go here http://www.listen2myradio.com/exec.php?do=del
Now you will have this
[Image: 98RFKnoI83Yt72y-listen2myradioco.png]
In config enter next:
[Image: Dbl5gWLROyUq17S-Wholescreen.png]

6) Click OK...Go to http://www.listen2myradio.com/exec.php?do=cmd
And turn ON radio

7) Back to DJ...Just click Start Brodcasting..If it ,under the "Start Brodcasting" button show the song and timer,then you are succesfuly made your radio..In other hand if it shows *Brodcast Error* than you somwhere made a mistake...

That's it...Please reply and don't let this thread die! Black Hat



lunes, 14 de marzo de 2011

Wifi Radio LCD Display Schematic

Giving Yourself a Sixth Sense for Wireless Networks

Giving Yourself a Sixth Sense for Wireless Networks




What? How?

Amaze your friend(s) and terrify your enemies by granting yourself the ability to supernaturally sense wireless network hotspots! (Well, apparently supernaturally, anyway.)

You will easily and quite literally "feel" wireless access points in the vicinity and automatically sense their signal strength as easily as you feel the wind on your cheek.

All you need is a few parts and some careful electronics work.

What This Is

This project is for a small electronic unit that allows the user to sense the presence and relative signal strength of wireless hotspots. It can be worn as a pendant or carried in a pocket. It is "always on" and communicates the presence and signal strength of an in-range hotspot by way of sequences of pulses - like a heartbeat you can feel. The stronger and faster the "heartbeat", the stronger the wireless signal detected.

It does not actually authenticate or otherwise interact with a hotspot in any way. It is a 100% passive device, meaning it transmits nothing --- it can detect hotspots, but cannot be detected itself.

How It Was Made

This project consists of a microcontroller, some custom interface electronics, a small vibe motor, and an off-the-shelf Wi-Fi detector - the one I used is by D-Link and is keychain-sized.

Here is the sensor I used, and some pictures of the construction. Details of the design will follow.










How It Works

The microcontroller periodically "presses" the button on the detector to initiate a reading. Then the microcontroller "reads" the output from the indicator LEDs on the detector, and uses this as the basis for pulsing out a signal on the vibe motor, which the wearer can feel.

In this way, the unit keeps you updated on the presence and signal strength of a wireless hotspot in your vicinity. No pulses means no signal. Short pulses means a weak signal. Faster, more frequent pulses means a stronger signal. This feedback is very much like a heartbeat, and is extremely intuitive to interpret.

How To Make Your Own

First of all, I use a microcontroller in this project. If you aren't familiar with terms like 12F629 or .HEX files and how to blast them into a PIC, you will have trouble with this project.

The D-Link sensor I used works like this -- press the button and the LEDs light up in a "scanning" pattern while it looks for a signal. It can be in this scanning pattern for up to a few seconds. Afterwards, it lights up either one, two, three, or four of the green LEDs to indicate relative signal strength. If there is no signal detected, a single red LED is lit. The LED(s) remain lit for a few seconds, then the sensor shuts off.

If your chosen sensor works differently, you will need to adjust the electronic interface and the program in the microcontroller accordingly.

Click for larger versionThe electronic add-on part interfaces to the sensor in two basic ways:

  1. The "Button Hitter"

    This is how a digital output from the microcontroller "pushes" the activation button on the sensor. A digital "0" to the spot indicated on the graphic triggers the sensor.

  2. The "LED Watcher"

    This is how the microcontroller senses which LEDs are lit (or not lit) and reads them as digital inputs. As shown on the diagram above, the indicated spots beside each LED can be read as a digital "0" when the LED is lit.

Operation

This is a basic description of how the unit works (the code in the microcontroller is a little more complicated, but this will tell you what happens).

The microcontroller program is a big loop that does the following tasks asynchronously: activates the sensor every 10 seconds or so, checks to see if any LEDs are lit solidly (a signal strength reading is ready), pulses an appropriate "heartbeat".

  1. Activate the sensor. (Note that the "scanning" - where LEDs light up momentarily back-and-forth in an old-school Cylon-eye fashion - can take up to a few seconds to complete.)

  2. Watch those LED outputs and wait until one or more LEDs remain lit for at least 500ms.

  3. Did any LEDs remain lit? If so, then check which one(s). This tells us the signal strength. Then depending on the signal strength, set the "heatbeat rate" to reflect the strength of the signal detected:

Signal strength 4 (highest): pum-pum-pum-pum-pum-pum

Signal strength 3 (high): pum-pum ... ... pum-pum ... ... pum-pum ... ...

Signal strength 2 (low): pum ... ... ... pum ... ... ... pum ... ... ... pum ... ... ...

Signal strength 1 (lowest): No change (provides hysteresis beftween LOW and NO signal).

Signal strength 0 (none): No heartbeat.

  1. Every 10 seconds, repeat #1.

Specific Design Information

Click for Larger ImageHere is a schematic of the interface and electronics. The sensor and electronics run on a 3V supply (provided by CR2032 cells in parallel) and the vibe motor has a separate power supply. A couple AAA cells or even another CR2032 cell should do the trick.

I used the Microchip 12F629 microcontroller, and Melabs' PICBasic compiler.

Download the source code

Download the .HEX file

I ignore the lowest signal strength LED for purposes of reading the sensor's output (I actually do not read it, and as a result it acts as a "no change"). This provides some hysteresis between the LOW SIGNAL and NO SIGNAL results.

The HIGH SIGNAL and NO SIGNAL are OR'd together on GP5 on the PIC. This saved me an I/O pin at the time. Since a HIGH SIGNAL reading lights all the signal LEDs, if GP5 is low (active) then I can check GP4 (the next signal LED down) to determine the "real" reading. If GP4 is also low, then the HIGH led was lit. If GP4 is not low (led not lit) then the NO SIGNAL led was lit. This is explained more fully in the source code -- but the short version is that I saved an I/O pin by doing it this way. (The I/O pin I "saved" (GP1) is unused in the schematic -- this is intentional as I was actually having quite a lot of trouble with it, so I simply avoided the problem and just left it alone.)



How-To: Build a WiFi biquad dish antenna

biquad antenna

Wireless enthusiasts have been repurposing satellite dishes for a couple years now. This summer the longest link ever was established over 125 miles using old 12 foot and 10 foot satellite dishes. A dish that big is usually overkill for most people and modern mini-dishes work just as well. The dish helps focus the radio waves onto a directional antenna feed. We're building a biquad antenna feed because it offers very good performance and is pretty forgiving when it comes to assembly errors. Follow along as we assemble the feed, attach it to a DirecTV dish and test out its performance.

Why? With just a handful of cheap parts, a salvaged DirecTV dish and a little soldering, we were able to detect access points from over 8 miles away. Using consumer WiFi gear we picked up over 18 APs in an area with only 1 house per square mile.



Building the antenna

Biquad antennas can be built from common materials, which is nice because you don't have to scrounge around for the perfectly-sized soup can. We did have to buy some specialized parts before getting started though.

parts

The most important part here is the small silver panel mount N-connector in the center of the picture; the entire antenna will be built on this. We purchased it from S.M. Electronics, part# 1113-000-N331-011. The "N-connector" is standard across the majority of commercial antennas and you can connect them to your wireless devices using "pigtails." The longer pigtail in the picture is a RP-TNC to N-Male pigtail that we'll use to connect our antenna to a Linksys WRT54G access point. The short pigtail is a RP-MMCX to N-Male pigtail so we can connect to our Senao 2511CD PLUS EXT2 WiFi card which is pictured. We also purchased 10 feet of WBC 400 coax cable so we wouldn't have to sit with the dish in our lap. We got our surplus DirecTV dish from Freecycle. We'll cover the reason for the mini butane torch later.

Trevor Marshall built one of the first biquad WiFi antennas found on the internet. We followed the slightly more thorough instructions found at martybugs.net. Here are the raw materials we started with:

materials

The wire is standard solid-core 3-conductor wire used for most house wiring. We didn't have any copper printed circuit board material laying around so we used this thin sheet of copper and supported it using the 1/4-inch thick black plastic pictured.

The first step in building the element was stripping and cutting a 244mm length of wire.

stripped wire

We marked the wire every 31mm with a permanent marker and began bending the wire into a double diamond shape. We tried to make the length of each leg 30.5mm.

first bends

The easiest way to make really sharp bends in the solid copper wire is to use two pairs of pliers. With the pliers held perpendicular to each other bend the wire against one of the sets of jaws.

clamped

The element with all bends completed:

element completed

Next we cut out a 110mm square of black plastic to use as a base for the reflector. We drilled a hole in the center to clear our connector.

panel

We then soldered a piece of copper wire to the center pin of our N-connector.
outside pincenter pin
Next we soldered a piece of of wire to the outside of the connector. We ran into some trouble here. Our cheapy iron was not capable of getting the connector's base hot enough to make a good solder joint. We bought a butane torch and used that to heat up the surfaces. This worked pretty well except it desoldered our center pin. We recommend you solder the outside piece of wire first before doing the center one.

reflector
After the connector had cooled it was attached to the black plastic base using epoxy. The thin copper sheet was attached to the front with epoxy and trimmed to fit.

We let the epoxy cure for a while before proceeding. The next step was to solder our bow tie shaped element to the vertical wires. The element was supported by two pieces of scrap copper trimmed to 15mm to ensure proper positioning.

standoffs

Then the extra wire was trimmed off and the outside wire was soldered to the ground plane to complete the antenna.

finished antenna

To make mounting to the dish easy we modified the original feedhorn. Here is what it originally looked like.

housing

After removing the housing, internal components and shortening the feedhorn looked like this.

modified

The antenna is attached by inserting the N-connector into the tube and then connecting the coax cable.

connected

Here is a picture of the final antenna assembly ready to be attached to the dish.

assembly

Since the satellite dish has an off-center feed it looks like it is pointed at the ground when it is level with the horizon. Even though there are no angle markings for setting the dish at 0 degrees inclination we can still ensure that the dish is pointing at the horizon by setting the dish angle to 45 degrees and mounting it on a tube with a 45 degree angle.

mounted

Test results

The Engadget Corn Belt Testing Facility has broadband access provided by a local WISP. So we knew if we plugged in our antenna we were sure to pick up something in the area. We pointed the dish at the closest grain elevator, where the WISP mounts their antennas. We connected the dish feed to our Senao card and started up Kismet.

kismet1

We expected to get one AP, but five is even better. Looking through the info strings we were able to determine where the APs were since the WISP had named them according to the town they are in. The AP on channel 5 is the one we pointed at in town A, 2.4 miles away. The AP on channel 6 is located in town B, 8.2 miles away. The two APs on channel 1 are a bridge between town A and town C which is located 2.6 miles directly behind the dish.

Our next test was to hook our WRT54G up to the dish and point it at a hill 1 mile away. We drove to the top of the hill and used an omnidirectional mini whip antenna with our Senao card to detect it.

kismet2

Our router was picked up easily. The found 14 other WISP APs including town D, 7.8 miles away. The WISP is definitely using some high powered equipment if we're just picking this up with an omnidirectional antenna.

For a final test we put the dish on the roof rack and parked on top of the hill to see if we could pick up any more APs.

subarukismet3

Our final count is 18 APs, 17 of those belonging to the WISP. This was a pretty fun project and shows that you can build decent wireless solutions using consumer gear.

For the curious: The WISP gives its subscribers a patch antenna with a built in power-over-ethernet access point. Once the antenna is mounted to the roof they run a single ethernet cable into the house which means they don't have to worry about signal loss from coax. These client boxes are manufactured by Tranzeo.




[TUT] HACKING AN EMAIL USING GOOGLE

Credit goes to Lonavista


This tutorial was created and modified by me.

Hacking your first email seems boring and needs time,but after reading this tutorial you find it simple and easy !!

1)Go to www.google.com and type in the search bar this code "ext:sql intext:@hotmail.com intext:e10adc3949ba59abbe56e057f20f883e"
Resized to 44% (was 1157 x 681) - Click image to enlargePosted Image


2)Choose any one of the displayed pages,scroll a bit down ,then something like this should appear,Hash codes and emails.
Resized to 38% (was 1345 x 502) - Click image to enlargePosted Image


3)Now go to : http://www.h4ckforu.com/md5/index.php , then copy the HASH CODE (ex:127359f404a2b735de9ba1336c66f480) depending on the email you choosed to the box. Press Crack it, wait few seconds.

Resized to 61% (was 820 x 739) - Click image to enlargePosted Image


4)Some sites will appear saying "not found" other sites will give you the password of the hash code you entered that belongs to the email you choosed.[As shown in the picture above ]

5)You are done!! Enjoy the email you hacked :D...some emails won't work since the have their passwords changed, or the hash codes results are null.:yeye::thumbsup:
Resized to 52% (was 971 x 427) - Click image to enlargePosted Image

Regards,
Lonavista.

[TUT] Hacking Admin Passwords of any Operating system!!..[Windows, Mac, Linux]

Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access.

Password image

Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.

Windows

Windows is still the most popular operating system, and the method used to discover the login password is the easiest. The program used is called Ophcrack, and it is free. Ophcrack is based on Slackware, and uses rainbow tables to solve passwords up to 14 characters in length. The time required to solve a password? Generally 10 seconds. The expertise needed? None.

Ophcrack --Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). Insert the CD into a machine you would like to gain access to, then press and hold the power button until the computer shuts down. Turn the computer back on and enter BIOS at startup. Change the boot sequence to CD before HDD, then save and exit.

The computer will restart and Ophcrack will be loaded. Sit back and watch as it does all the work for your. Write down the password it gives you, remove the disc, restart the computer, and log in as if it were you own machine.

Mac

The second most popular operating system, OS X is no safer when it comes to password cracking then Windows.

The easiest method would be to use Ophcrack on this, also, as it works with Mac and Linux in addition to Windows. However, there are other methods that can be used, as demonstrated below.

If the Mac runs OS X 10.4, then you only need the installation CD. Insert it into the computer, reboot. When it starts up, select UTILITIES > RESET PASSWORD. Choose a new password and then use that to log in.

If the Mac runs OS X 10.5, restart the computer and press COMMAND + S. When at the prompt, type:

Quote:Quote:fsck -fy

mount -uw /

launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist

dscl . -passwd /Users/UserName newpassword


That’s it. Now that the password is reset, you can login.

Linux

Finally, there is Linux, an operating system quickly gaining popularity in mainstream, but not so common you’re likely to come across it. Though Mac and Linux are both based on Unix, it is easier to change the password in Linux than it is OS X.

To change the password, turn on the computer and press the ESC key when GRUB appears. Scroll down and highlight ‘Recovery Mode’ and press the ‘B’ key; this will cause you to enter ‘Single User Mode’.

You’re now at the prompt, and logged in as ‘root’ by default. Type ‘passwd’ and then choose a new password. This will change the root password to whatever you enter. If you’re interested in only gaining access to a single account on the system, however, then type ‘passwd username’ replacing ‘username’ with the login name for the account you would like to alter the password for.

Conclusion
There you have it – that is how simple it is for someone to hack your password. It requires no technical skills, no laborious tasks, only simple words or programs. The moral of the story? Encrypt your data to keep it safe. Don’t use only a password, but actually encryption, such as Blowfish or AES-128. There are a number of programs that can do this – TrueCrypt for Windows, or the native encryption found on Ubuntu, creating a disk image in Mac, etc.

Downloads----
>> Ophcrack

I hope you liked the Tutorial...
Alll credits to Blair Mathis from LaptopLogic.com..who wrote this wonderfull tutorial...
Rep is appreciated...

Tutorial: How to Hack PSP 3004 [Latest PSP SLIM Hacking Guide]

After a long wait I finally decided to hack my PSP 3004 with custom firmware to enable the homebrew goodness, If you have been waiting for easy beginner’s guide on how to soft mod PSP 3004, then here is a way to go, I will be providing you a easy step by step tutorial/guide to hack the PSP 3004 with custom firmware that will allow you to run homebrew applications, emulators, ISO/CSO backup of games that will increase your PSP experience manifold.

Step by step guide to hack PSP 3004

Pre requirements and getting ready

  • PSP 3004 and USB data cable
  • Full Charge your PSP battery
  • You must have PSP firmware less than or 5.03, if you have higher firmware, then you are out of luck as there is no way to downgrade firmware as of now.
  • Original Sony Pro Duo memory stick or Sandisk Pro Duo memory stick, I used Sandisk 8 GB Pro Duo

Important Note: If you don’t have original Pro Duo card for your PSP, I recommend not to use my tutorial, as chances of data corruption and reading errors while hacking might brick your PSP 3004 and currently there is no way to unbrick PSP 3004.

How to check if your Pro Duo is original:

Go to memory stick, press Triangle button on your PSP, then go to Information, press X, if MagicGate Supported, then you have the original Pro Duo card, if its MagicGate: Unknown or anything else, 100% chance is that you have a fake memory stick Pro Duo.

  • Lets begin the PSP 3004 Hack : Upgrade Firmware to 5.03 (STEP 1)

First you have to upgrade your PSP firmware to 5.03, Download this 5.03 Firmware file, connect your PSP to PC in USB mode, Double click on downloaded exe file. It will copy firmware data EBOOT.PBP on your PSP, Now go to GAME -> Memory stick -> Firmware 5.03 -> Press X , this will upgrade the firmware to original 5.03 firmware in a couple of minutes.

  • PSP 3004 Hacking Tutorial: Installing ChickHEN R2 (STEP 2)

Download ChickHEN R2, extract to PSP 3000 folder on desktop and double click on EZ503HenSLIMversion.exe, it will bring up this

PSP 3000 hacking tutorial

Connect your PSP and click Install, It will copy necessary files to your PSP

Press O to disconnect from USB mode and go to PHOTO -> Memory stick->ChickHEN -> Press X -> PSP will boot in ChickHEN R2 mode, you can verify this by going to System-> System Information , it will show ChickHEN 5.03 now

  • PSP SLIM Hacking Tutorial: Install 5.03GEN-a Custom Firmware (STEP 3)

Once you have ChickHEN 5.03 now you can go forward and install 5.03GEN-a, which will allow you to run ISO/CSO image backups of your PSP games on PSP 3004.

Download PSP 5.03 Custom firmware

Extract the files to PSP 3000 folder on desktop

PSP 3000 HACK files

Double click on Launch-Me.exe, Enter the letter of your PSP memory card, In mine it was E, click START.

PSP 3000 hacking tutorial CFW GUI

Files will be copied on your PSP, wait 20 seconds. Disconnect from USB mode, go to Game -> Memory card -> INSTALLER LOADER -> Press L or R Trigger -> Press O to boot in custom firmware

Congrats, You have successfully hacked your PSP 3004.

Try not to restart or shut down your PSP, you will be saving a lot of trouble

Note: This hack will be gone once you restart your PSP, so keep your PSP in suspend/standby mode.