Friday, September 30, 2011

http://www.innocenthacker.com/

Surf Blocked Websites Using Softwares ! Khalid-Wafa Email This ULTRASURF "Browse the world without any limit for free with safety" New revolution in the field of proxy, simple to use and faster. No more slot limitations, time limits, geographical limits, bandwidth problems in same old proxies. Switch to UltraSurf 8.9 UltraSurf is the flagship software product from UltraReach Internet Corp. for Internet anti-censorship. It enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. As the safety and convenience of the users is our first priority, the most prominent features of UltraSurf 8 are that it has implemented a complex proxy with complete transparency and a high level of encryption on the Microsoft Internet Explorer (IE) platform. UltraSurf 8 enables users to browse any website freely just the same as using the regular IE browser while it automatically searches the highest speed proxy servers in the background. UltraSurf 8 implements almost all browser functions based on HTTP and user needs, such as browsing websites, login and posting on web forums, using Web mail, uploading and downloading data files, real time audio, video and other multimedia programs, etc. Please refer to the “UltraSurf 8 Users Guide” for detailed information. UltraSurf 8 is a green software, which means no installation process is needed nor system setting is required to change when using the software. It is simply an executable on Windows platform. Download the UltraSurf 8 client software now Download Ultrasurf Download the UltraSurf 6 User Guide in English at: Download Ultrasurf userguide Note: The English version is for ultrasurf 6. You may use it as the reference for current version ultrasurf 8. FREEGATE FreeGate is a software utility that enables Chinese and Iranian surfers to view websites banned by their government (see Internet censorship in the People's Republic of China). Developer Dynamic Internet Technology (DIT) estimates Freegate has 200,000 users.The software takes advantage of a range of proxy servers assigned to changeable internet addresses, which allows users in China, Iran and Myanmar access to sites banned by the Chinese, Iranian and Myanmar governments. The program exploits open proxies, which allow users to penetrate firewalls used to block web sites Download - Download Freegate

http://tools.email-checker.com/MyIpAddress.aspx/

How to Detect Anonymouse IP Addresses???


How to Detect Anonymous IP Addresses???


Detect-Proxy

As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.
 
1. Credit Card Frauds
For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which thebilling address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit cardfraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.
 
2. Bypass Website Country Restrictions
Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in thepaid survey.
 

Proxy Detection Services

 
So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind andFraudLabs to detect the usage of proxy or spoofed IP from users participating online.
Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
 
How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
 
How to Tell Whether a given IP is Real or a Proxy?
There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
Detect Anonymous Proxy
So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments.

HACKING???



Hello friends,
              Here is a Detailed tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works , downloads and also Prevention from Keyloggers etc.

2.) Types of Keylogger ?
There are two types of keyloggers, hardware and software.


a.) Hardware Keyloggers - Hardware keyloggers record typing, by plugging a tiny device into the computers keyboard.
b.) Software Keyloggers - The second method of recording typing is via a software keyloger. This works by the user installing some software on the operating system of the computer, usually Windows 98/XP/Vista.

3.) How Keylogger works ?

Once the keylogger is installed on a PC via yourself or through any hidden virus (which is made my a hacker), it starts operating in the background (stealth mode - No one can see that file,not in "Program Files",not in "Task Manager" , not in "Start Menu" ...or anywhere in pc) and captures every keystroke of the victim on that PC.

Let’s take up a small example:
The victim goes to http://mail.yahoo.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs file. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup (starts with every restart automatically), runs in the background and captures each and every keystroke.
4.) How to install the keylogger ?
A keylogger can be installed just like any other program you install on your window.Just follow the screen instructions and you’re done.The Detail ,"How to use Keylogger" that i will explain in the next ICA article.

5.) Do I need any special knowledge to install and use the keylogger?

Absolutely NOT ! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills or any type of programming language.Even keyloggers are used in offices also to track the workers there.But now keylogger become the best tool for hack anyone.

6.) Once I install the keylogger can the victim come to know about it’s presence?
It depends upon the security of the computer.If the victim having a good antivirus then may be keyloggercan be identified and deleted,But mostly people dont update there antivirus....so ,The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed thekeylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.Even now FUD technology also comes.Fud means Fully Undetectable.That means no antivirus can detect it.This can be possible via using some good crypter or binders.I will explain the  use of Binder and Crypter in next article.But for now its enough to know that for ICA members.

7.) Can I be traced back if I install the keylogger on some other computer ?

As a normal people the answer is - NEVER ! it’s almost impossible to trace back to you for installing thekeylogger on other’s PC.
But as an security expert the answer can be  - YES ! I can decode the keylogger virus to find out the details to its maker.So,friends the main purpose of ICA is to  make Every members of ICA as advance as I am. And I thing I am doing great job for this via ICA.OKay,now i will explain the security methods of Keylogger later.

8.) Which keylogger is the best ?
Today there exists hundreds of keyloggers on the market and most of them are no more than a scam.So I tested some of the top keyloggers and conclude that the following is the best one.
a.) Ardamax Keylogger 3.0 
b.) Award Keylogger v1.27 
c.) All In One Keylogger 3.1
d.) Sanmaxi Keylogger
e.) Keylogger Actual Spy software
f.) Ecodsoft Keylogger v2.1 Incl Keygen
g.) KGB Spy Keylogger v4.2
h.) Autokeys Simple Keylogger 
i.) BlazingTools Perfect Keylogger v1.7.5.0 
j.) Family Keylogger v4.14
k.) SpyBoss KeyLogger PRO 4.2.3 
l.) iSafe AllInOne Keylogger 2.1.8 
m.) Ecodsoft Keylogger 2.1 
n.) Perfect Keylogger 1.6.7

9.) How  To use Keylogger to hack someone ?
Hey ICA members,In my next article,I will explain that HOW TO USE KEYLOGGERS  ,So please keep in touch to get the ultimate stuff...

10.) Can I install Keylogger on a local computer ?
If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply Double-click the setup filename to execute it.Installation on your pc may help you to understand the functioning of Keylogger.You can test it first.

NOTE : YOUR ANTIVIRUS CAN DETECT IT AS A VIRUS,ONLY BECAUSE ITS A HACKING TOOL,BUT DEFINETLY NOT HARMFUL FOR YOUR PC.

11.) How keylogger will send you data of Victim ?
Keylogger will be 1st installed in victim pc.Then it will record every keystroke in log files.When victim once connect to internet,All data will automatically Emailed to you or will be uploaded to your FTP. ( That depends upon the configuration you do while making keylogger intallation virus file for the victim )

12.) Why Keylogger is the best ?

* It supports REMOTE INSTALLATION feature. This feature is not present on most of the keyloggers.
* It is fully compatible with Windows 98/ME/2000/XP/Vista and bypasses ANY Firewall.
* It is more reliable than any other keylogger program. You need not rely on your email account to receive the logs.Instead you can just login to your online SniperSpy account to receive the logs.
* It captures full-size screenshots of the activities on the target PC.
* Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.
* It is more easy to install and requires no extra knowledge.
* It is recognized by BBC, CNN, CBS and other news networks. Hence it is reputed and trustworthy.

So now the question is clear to all members that "what keylogger is ??" - I hope "YES" !!

How to Recover Hacked Email Accounts?


How to Recover Hacked Email Accounts?


Email Hacked?
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
 

For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Resetprocess to fail. If this is the case then you need to contact the Gmail support team by fillingout the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
 

For Yahoo and Hotmail:

 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your loginpage and proceed as per the screen instructions.
 
I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected!
Email:khalid_wafa_i_t@yahoo.co.uk