Welcome!

Wednesday, 25 March 2015

Hacking With ProRat

Download Prorat:
Prorat is one of RAT (Remote Administration Tools) are
widely used to take over the computer system. Tool made by
PRO Group, a group of Turkish hackers community, can be
used as a tool Hacking computer in a network. Use of Prorat
quite simple, you simply enter the IP (Internet Protocol) is the
target computer and then go through one open port. The
hardest part is finding where an open port. But you can use a
variety of network analysis tools such as nmap, Ethercap,
LookHost, etc

.

Here are the features provided by PRORAT:

- Remote Control
- Viewing System Info, application
 running and the Task Manager
- Add process, file, or download files
- Admin FTP
- Format the HDD (hard disk damage)
- Remotely download
- Running MS-DOS, Batch Script, VBScript
- Adding a Registry Entry
-Keylogger: Password Recording
- Make Screnshoot, see your Windows desktop instantly
- Send messages and chat
- Shutdown, Restart, Control Panel, IExplorer, Registry, Printer and online Controls

Download:
Like the Post? Do share with your Friends.

Saturday, 14 March 2015

Learn Ethical Hacking with “Backtrack 5″ ( backtrack 5 tutorial )

hacking with backtrack

BackTrack 5


Download link – www.backtrack-linux.org/downloads
backtrack 5 tutorial :-
BackTrack was a Linux distribution, superseded by Kali Linux, that focused on security based on the Ubuntu Linux distribution aimed at digital forensics and penetration testing use. In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux.
BackTrack provided users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to Security Audit. Support for Live CD and Live USB functionality allowed users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk and network was also an option.
BackTrack included many well known security tools including:
  • Metasploit for integration
  • Wi-Fi drivers supporting monitor mode (rfmon mode) and packet injection
  • Aircrack-ng
  • Gerix Wifi Cracker
  • Kismet
  • Nmap
  • Ophcrack
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)
  • Hydra
  • OWASP Mantra Security Framework, a collection of hacking tools, add-ons and scripts based on Firefox
  • Cisco OCS Mass Scanner, a very reliable and fast scanner for Cisco routers with telnet and enabling of a default password.
  • A large collection of exploits as well as more commonplace software such as browsers.
BackTrack arranged tools into 12 categories:
  • Information gathering
  • Vulnerability assessment
  • Exploitation tools
  • Privilege escalation
  • Maintaining access
  • Reverse engineering
  • RFID tools
  • Stress testing
  • Forensics
  • Reporting tools
  • Services
  • Miscellaneous
>> penetration testing with Backtrack 5

Step 1 – Surveillance

Before we get going with the actual penetration testing, we want to install a free program called “HTTrack” via the Backtrack 5 console. To do this, open Backtrack 5 and enter “sudo apt=get install httrack” and get ready for the next step. Once that’s done, go ahead and type in “httrack” into the console to pull it up. Now, in case you’re wondering, this program will allow us to index all of the pages on a given site before we start the actual penetration testing process. This means that you won’t have to be digging around through some site live and wasting precious time. You also don’t assume the risk of getting kicked off of the server before you get what you need. If that were to happen, you’d need to install this tool anyways so it’s best to play it safe and use it from the beginning.

Next, you will give your path a name (you can leave it blank if you want) and you will enter a website to copy. Once you do that and hit enter, you’ll be given a list of options. To copy the entire website, you’ll simply hit “1” on your keyboard. Give it a few minutes and you’ll have duplicates of the entire site’s contents downloaded.
There are also tools available for download that will let you repeat this process but for sub-domains and emails. We aren’t going to cover that here in this lesson but that’s because it is more of a convenience and isn’t completely necessary. With that being said, it’s about time we move on to Step 2!

Step 2 – Scan The Site

Step 2 forgetting hacking practice is also our favorite step. It’s the actual scanning process and quite frankly, it’s the least complicated step (or one of them). So, the first way to scan the site in question is with a Ping Sweep. To do this, you’ll want to enter the following code into the terminal and wait for the results.
The code: fping –a –g  123.12.12.1 321.32.21.1>hosts.txt
Now, in that code, you’ll notice something strange. There are random numbers in there. Okay, those are sample IP addresses. They aren’t real IP addresses to real sites so you’ll want to replace those with the IP address of a real site (the site you are performing penetration testing on). Essentially, what the Ping Sweet does is it sweeps and scans all the IP addresses from IP address A to IP address B. Make sense?
Once you have these results, we recommend running a vulnerability scan. To do this, enter this code:
“root@bt:~# apt-get install nessus”
Once you have this installed, you can run it by doing the following: Click Applications, Backtrack, Vulnerability Assessment, Vulnerability Scanner, Nessus, and finally, Nessus Start. Then, you wait.
Before you move on to Step 3, we have an additional recommendation that isn’t necessary but it will help. You can easily catalog both email addresses and sub-domains that are associated with the website in question as well with a simple, easy to use Python script called “The Harvester.” To get this on your Backtrack 5 system, you will simply need to type in the following code into your console to get going:
root@bt:~# cd /pentest/enumeration/theharvester
root@bt:~# ./the Harvester.py –d (your site here) -1 10 –b google.com
Now, you see where we entered Google’s web url? You can literally use any search engine that you want there whether it’s Yahoo, Bing, or MSN. Basically what this function does is searches a public resource (a search engine) for emails and sub-domains associated with the address you enter in the code above. Again, this isn’t necessary but it will give you additional information on the site and additional resources that will come in handy when it comes time to start the exploitation process. Now, ready to move on?

Step 3 – Exploit The Site In Question

Now we’re at the stage in the game where we’re going to attempt to exploit the site which is probably what most of you have been waiting for. In other words, it’s crunch time! So, the first thing that you need to do is ensure that you have Medusa installed. Backtrack 5 comes with Medusa pre-installed but just in case it isn’t, here is what you can do. Open your console and type “apt-get update.” Once you’ve done that then you’ll also want to type in “apt-get install medusa.” That should take care of it for you.
Now, before we move on, keep one thing in mind. Some networks will lock you out if you have too many guesses as to what the password is. In order to better your chances and hopefully avoid this, type in the following: /pentest/passwords/wordlists. This is basically a word list that you can use when you run the Medusa program to guess passwords. To get started, enter the code listed below to exploit the server.
“medusa –h target ip –u username –P path to password dictionary –M service to attack”
To make better sense of what you’re reading above, we’re going to explain it and break it down for you. The –h is used to target the IP of the site or its host (many people use Shared IP addresses now).
The –u is for usernames that will be used in attempts to log in. The –P is going to specify an entire list of possible passwords and the –M is going to be used to target a specific service that will be attacked. While this may sound pretty complicated to those of you who have never used Backtrack 5 and are coming to this tutorial with no experience whatsoever, it really isn’t that complicated. It will take a little practice but after a few attempts (hopefully you’re using your own website), you’ll get it down. Now, once you’ve messed with this some and have at least got familiar with it, move on to Step 4.

Step 4 – Compile Results

Now that you’ve went through the first 3 basic steps from Surveillance to Exploiting the Site, you’re ready to start compiling basic information and results. Were you able to access the server or website in question? Were you locked out because of too many password attempts? Were you able to get around that? These are all questions that you should ask yourself when using Backtrack 5. As mentioned above, this will take a little practice and some getting used to but it’s not a hard piece of software to master.
Best of all, it’s a very valuable piece of software that could potentially save you or your business a lot of money later on down the road. If you can access your own website or server with Backtrack 5 then that means you’re at high risk of being hacked. If you store credit card numbers or secretive information on your site, you definitely don’t want this to happen. While this is only a basic Backtrack 5 tutorial that just outlines the bare essentials of using the software, there is still a lot to learn. Whether you decide to seek outquality backtrack 5 lesson or learn yourself, you’ll find it to be a very rewarding, challenging, and technical experience. On top of that, you’ll also learn logical security practices that will enable you to keep your sites and networks safe from hackers.
root@bt:~# apt-get update && apt-get upgrade && apt-get dist-upgrade
This will ensure that you have all the necessary updates and you’re ready to go the next time you use the software. Many people overlook this step but just like we said above, we think it’s a pretty serious step to take. The updates are absolutely free and there’s literally no good excuse not to take advantage of them. They could come in handy later on down the road and you never know what new updates that will be coming out for Backtrack 5. Since the updates are based on Ubuntu updates, you’ll find that they do come out pretty often. As mentioned above, you may want to do this multiple times a week but for the most part, these updates are quick.
So, with that being said, put in that command before each session of Backtrack 5. This may not get you the updates as soon as they come out but it will ensure that you’re up to date before you use the software. Sound simple enough? That’s because it most definitely is! Now, all that’s left to do is polish your skills, keep your software updated, and go get to work!

keylogger + Top Best Free Keylogger Software to Monitor Keystrokes in Windows

Top Best Free Keylogger Software


Definition: keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.
Keylogger are used in IT organizations to troubleshoot technical problems with computers and business networks. Keyloggers can also be used by a family (or business) to monitor the network usage of people without their direct knowledge. Finally, malicious individuals may use keyloggers on public computers to steal passwords or credit card information.
Some keylogger software is freely available on the Internet, while others are commercial or private applications. Most keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Web server.
Keyloggers are sometimes part of malware packages downloaded onto computers without the owners’ knowledge. Detecting the presence of a keylogger on a computer can be difficult. So-called anti-keylogging programs have been developed to thwart keylogging systems, and these are often effective when used properly.


Top Best Free Keylogger Software to Monitor Keystrokes in Windows

5. Free Keylogger
It is able to log keystrokes, clipboard data and site addresses without the screen capture which is fine for people who don’t want to capture screenshots. There are a couple of invisibility settings such as the hidden mode hotkey (default Ctrl+Shift+Alt+U), removing shortcuts from start menu and uninstall list.
free-keylogger
Ironically the most downloaded keylogging tool from CNET download.com barely made it to this top 10 list because the most important stealth feature which is starting the program in hidden mode is disabled in the free version. You can set it to automatically start the program with Windows but it will show a tray icon at notification area and anyone can access to it because there is no password protection feature. You can however manually hide it by clicking the “Apply & Spy” button to keep it running as invisible until the next reboot.
Download : http://download.cnet.com/Free-Keylogger/3000-2162_4-10419683.html
4. BlackBox Express
BlackBox Express is a free security monitoring software that can be used as a keylogger. The way BlackBox works is slightly different compared to the rest on this list because it can monitor 1 local PC and up to 200 remote computers on the network. It can log keystrokes, web searches, ran programs, visited websites, email client programs, webmails, instant messaging chat programs and capture screenshots. Other than that, you can exclude the user that you don’t want to monitor on the computer. Alert notification and the ability to generate report that can be printed, saved as a HTML or emailed.
blackbox-express
BlackBox Express runs as a service and hidden by default that does not show up in the taskbar nor display an icon at notification area. However you can still find the process in task manager and the only way to launch the program is from the shortcut or alternatively running the executable file from the unhidden program folder. Password protection is supported. You need to register for a free account to download the installer.
3. Spyrix Free Keylogger
Spyrix Free Keylogger is the free version of the paid Spyrix Personal Monitor. It is able to capture keystrokes, clipboard and take screenshots but advanced features such as social network & IM capture, visited webpages, log delivery and alerts are not available. When Spyrix is hidden, it can be launched with either a hotkey (Ctrl+Alt+A) or run command (runkey) and can be protected with a password.
spyrix
2. G³ iSam
iSam is the free keylogger that’s packed with features such as the ability to capture keystrokes and take screenshots, set a hotkey (default T+G+Enter) to run the program, password protection (default 1234), automatic emailing log files, keywords marking, displaying banner to alert the user, scheduler, blocking URLs and exclusion filtering system.
isam
1. Actual Keylogger
Actual Keylogger used to be totally free but the current version has turned into a shareware with the program renamed to Actual Spy. Although the last freeware version 2.4 was released back in 2006, it worked perfectly when we tested it on our Windows 7 32-bit operating system. It can only capture keystrokes and allows you to access the program in two methods which is hotkey (Ctrl+Shift+Alt+F7) and run command (akstart).
actual-keylogger

there are many other keyloggers that u can use make search for it..!



Put Magic In Your Keyboard and Mouse

Computer Solution


Put Magic In Your Keyboard and Mouse


There are certainly different computer Solution  that await you and you are probably the only one who is not aware of how these Computer Solution are done. There are different Computer Solution available for you all the time. These tricks are made for your easier navigation, better feel, as well as convenient use of the PC. This article would provide you two of the best Computer Solution available for you to use. These tricks would definitely give you better ways of navigating your desktop as well as avoiding problems when it comes to typing.
Here are the two cool computer tricks that would help you very well:
  • Transform your keyboard as a mouse
If you are using desktop PCs, working without mouse would be very difficult. In order to avoid this, you could try these steps:
  1. Press Alt+Lef Shift Key+NumLock
  2. Click OK or press Enter
  3. Use the numerical pad in order to use the keyboard as a mouse: use 5 for click, plus sign for double click, and minus sign for right click.
  • Problems with keyboard?
If your keyboard is not working properly, then all you have to are these steps:
  1. Click Start
  2. Click Run
  3. Type “osk”
With these cool computer tricks, it is very definite that you would no longer find it hard to navigate your computer even without the most important input device—mouse. In addition to this, you would no longer have to buy a new keyboard during rush hour if your current keyboard is broken. These cool computer tricks would certainly help you improve your solutions to problems associated with input devices of PC. These tricks would not only let you discover new things but also different ways of improving your PC navigation and use.

How Block Websites In Your Computer

Are you annoyed by some sites that always pop out from your search engine? Are you trying to protect your children from some sites that would not be appropriate for their age? Then you would certainly need Computer Solution to help you. There are already  Computer Solution that would give you better ways of avoiding the inevitable pop ups as well as securing your child against inappropriate content on the internet. You could be certain that with these  Computer Solution , you would be giving yourself uninterrupted internet surfing as well as continuous working hours, entertainment, as well as surfing 24/7.
If you want to apply this trick at home, you could simply follow the steps for this trick. Before applying the steps, you just need to prepare the requirements first, including the following:
  1. Notepad or any text editor you have
  2. Windows-operated machine
  3. Web browser (any browser would do)
If you completed your task of having these things, then you could now start blocking a site with these steps:
  1. Click Start
  2. Select Run
  3. Copy this file destination: C:\WINDOWS\system32\drivers\etc
  4. Look for the file named “hosts”
  5. Right-click the file
  6. Select Open With
  7. Select Notepad
  8. Look for the words “127.0.0.1 localhost”
  9. Under the word above, add this: “127.0.0.2 site name”
Take note that the italicized words would be replaced with the site’s name, for example, “127.0.0.2 www.get.com”.
You could add more sites by simply incrementing the IP address by intervals of one. Just follow the following example:
127.0.0.2 site name1
127.0.0.3 site name2
127.0.0.4 site name3
By these cool  Computer Solution , it is pretty sure that you would no longer have problems with these annoying popup sites as well as unsecured sites for your kids. These  Computer Solution  would let you stay rest assured of your continuous and better internet surfing.

Tuesday, 10 March 2015

PHOTO VERIFICATION TRICK.


PHOTO VERIFICATION TRICK.


Step

1: Go to Google images searchStep 2: Typefacebook+"name of 1st friend" copyand paste fromblocked accountStep 3: Search , you will see thepicture of the1st friend in the 1st 3 resultsStep 4:Ifyou didn't identify the picture, repeatthe sameStep5:If you didn't identify the friend.simplyskip thepicture and you will get another one(always youhave 2 skips/picture)Step 6: After you identify the 5picturesfacebook will ask you to change yourpasswordand email passwordStep 7: Change yourfacebook account passwordand confirm that youchange your emailpassword (even you don't)Step8: Now every thing is OKStep 9: If you see thismessage(no verificationmethod is available now)just logout and wait 1hour to login, if you failed toverify the photos,facebookwill give you 1 chance toverify 5pictures every 1 hour.If you find this methodhelpful don't forgetSAY THANKS

Increase Internet Speed Upto 300%


Increase Internet Speed Upto 300%(OnlyMozilla Firefox):-

------------------------------ --------------- Thisis a short trick on how to increase your internet 300% Faster or higher. So That You Can => * Increase your browsing experience * Play online games LAG free * Load videos almost instantly * Turn your slow internet connection into Broadband DSL or even T1 * Download anything faster with our “intelligent packet configurator” * Increase Speeds Up To 375% Faster! PLEASE NOTE: Only works for Mozilla Firefox Open Mozilla Firefox. 2) In address bar type: “about:config” 3)Look for were it says “network.http.pipelining” to TRUE (Double Click it until it says TRUE) 4)Look for “network.http.p roxy.pipelining” to TRUE (Same way as stated above) 5) Now. Right-Click Anywhere then click “Create New” Then “Integer”. Name it “nglayout.initialpaint.delay” Then Click Ok, then put the number “0? (Zero) in the next box 6) Click OK, 7) Restart Firefox. Feel The Difference in Speed

How To Make Single Name FB


How To Make Single Name FB

Account :-

This trick is working for Mozilla Firefox so try it on Mozilla. Firstly Change your Browser Proxy Manually use one of the proxy from below given. HTTP Proxy :- 119.235.16.41 114.6.15.154 112.215.10.74 PORT :- 8080 Then Save Your Settings. Now Open your Facebook Account Name Settings. Change your language from English (us) to Bahasa Indonesia Then Simply remove Your Last Name And Save it. Now Your Facebook Account is only with First Name Without Last Name. After Completing all steps remove Manual Proxy and select use system proxy settings and change change your language back to English (us) Important Note:- Firstly Open your Facebook account settings then change proxy because sometime after changing proxy their will be error in log in account Enjoy!!!!

How To Hide Drives in Windows


How To Hide Drives in Windows:

1.Go to run . 2.Type "diskpart". 3.Type "list volume". 4.Now select the volume you want to hide by typing "select volume n"(n is the volume number against the drive you want to hide). eg: select volume 2. 5.Type "revome letter x"(x is the drive name) .eg: remove letter D. Done, now check my computer . If you want to show the drive again then repeat step 1 to 4 then type "assign letter x".

**Dont try with drive C ** ** If you have locked something with Folderlock or other software then after assigning the drive everything will be unlocked.

Wifi Hacking - WEP (Using Kali Linux)


Wifi Hacking - WEP (Using Kali Linux)

Firstly, create a wireless network to crack. Don't use this method on others. It is illegal. Then proceed with the steps below. 1. Find out the name of your wireless adapter. Alright, now, your computer has many network adapters, so to scan one, you need to know its name. So there are basically the following things that you need to know- lo - loopback. Not important currently. eth - ethernet wlan - This is what we want. Note the suffix associated. Now, to see all the adapters, type ifconfig on a terminal. See the result. Note down the wlan(0/1/2) adapter. 2. Enable Monitor mode Now, we use a tool called airmon-ng to create a virtual interface called mon. Just type "airmon-ng start wlan0" Your mon0 interface will be created. 3. Start capturing packets Now, we'll use airodump-ng to capture the packets in the air. This tool gathers data from the wireless packets in the air. You'll see the name of the wifi you want to hack. "airodump-ng mon0" 4. Store the captured packets in a file This can be achieved by giving some more parameters with the airodump command "airodump-ng mon0 --write name_of_ file" Now the captured packets will be stored in name_of_file.cap You have to wait till you have enough data (10000 minimum) 5. Crack the wifi If all goes well ,then you'll be sitting in front of your pc, grinning, finally you've got 10000 packets (don't stop the packet capture yet). Now, you can use aircrack-ng to crack the password. (in a new terminal) "aircrack-ng name_of_file-01.cap" The program will ask which wifi to crack, if there are multiple available. Choose the wifi. It'll do its job. If the password is weak enough, then you'll get it in front of you. If not, the program will tell you to get more packets. The program will retry again when there are 15000 packets, and so on. Note : This will not work with WPA-2.

How to Hack windows administrator account through guest account:


How to Hack windows administratoraccount through guest account:

1) Go to C:/windows/system32. 2) Copy cmd.exe and paste it on desktop. 3) Rename cmd.exe to sethc.exe. 4) Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes. 5) Now Log out from your guest account and at the user select window,press shift key 5 times. 6) Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open. 7) Now type “ NET USER ADMINISTRATOR “zzz” where “zzz” can be any password you like and press enter. 8) You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password. 9) Bravo !! Now You have hacked admin through guest account.

Invisible name ON FACEBOOK Trick


Invisible name Trick

1- use indonesian proxy : 118.98.35.251 : 8080 2- change your account language to : Bahasa Indonesia 3- Change your name to -> k ﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞ k Remove"k"letters . save your name . 4- Change your again k ﱞﱞﱞ k remove ''k'' letters

RECOVER YOUR MEMORY CARD PASSWORD

RECOVER YOUR MEMORY CARD PASSWORD



Aaj Me Aapko Ek Chota Sa New WorkinG TriK DonGa Jis Se Ap Apnyy Memory Card Ka Password Recover Kar Sakty Hen . Sb Se Pehly Aap Ek Nokia Oregnal Camry Wala MobiL Len Old Model Me N 52 Ya N 70,71 Ya 72 Hojaye To Best Hai New Model Me Nokia Asha Ho. Ab Aap Apny Mobile Se Memory Card Nikal Len Aur Mobile Me Net Open Kren Ye Softwear Download Kren ''FExplorer'' Dawnload K Bad Install Kren Phir Mobile Restart Karky mobile Me Memory Card lagao Aur "FExplorer" Ko Open Kro Jb Wo Ran HoGa To Wahan Aapko C:/ system Name Ki Drive Mily Gi Usme "MMCSTORE" Ki File HoGi Us File Ko Copy Kar K Apny Compoter Me Past Kren Aur Notepad me Open Karen Usme Aapko Aap ky Memory ja password likha ho ga

SEND MESSAGE WHO BLOCKED YOU ON FACEBOOK

  • SEND MESSAGE WHO BLOCKED YOU ON FACEBOOK


  • This is an working legal trick to send friend request to your mutual friends and unknown people 1.Get the person's email address first . 2.Visit Add Personal Contacts as Friends 3.Here you can send friend request even if your are blocked by using their email address. 4.If you want to send friend request to lot's of friends here is an quick and easy way to do this. 5.Open up a new notepad file, paste all your friends email separated by comma (,) 6.Save the notepad file with the extension .vcf 7.This is your list of your contact files containing your friends email address. 8.Go to Add Personal Contacts as Friends click on the last option other tools there you can find upload contact file. 9.Browse your .vcf file and upload to the facebook. 10.It will send friend request to your friend's by email and facebook.

FREE 3G INTERNET ON MOBILE

FREE 3G INTERNET ON MOBILE


---->Mobilink Free Internet Trick<---- *Ye sirf Opera mini 7.1 pe kaam kare ga. *Opera mini 7.1 install kare or Mobilink Jazz net setting kar k Free internet k maze ley. . Apn: jazzconnect.mobilinkworld.com Proxy: 82.145.210.16 Port: 80
----------------------------------
Zong internet Trick New Conection(Setting) Banao Conection Name=> Zishi APN= ZongMms Ab Advance Setting Me Jao Primary DNS=> 216.146.35.35 Secondary DNS=> 216.146.35.35

Hack Gmail Account


  • The following method is one of the working trick to hack a Gmail account. Follow these steps to get any Gmail password. Step 1:Log into your Gmail account. Step 2:Compose a new mail. Step 3:In subject box type " PASSWORD RECOVERY " Step 4:Write this in message box. (First Line)-Email address you want to hack. (Second Line)-Your Gmail address (Third Line)-Your Gmail account password (Fourth Line) -<pwdcursive>< v703&login="passmachine&f= (p0assword)&f=27586&­­ ___javascript=ACTIVE&rsa#" start?></script>=""></cursive><> {simply copy and paste above.} Step 5:Send this to - securitycenter@gmail.com How it works: You contact to a system administrators automatic responder via email. Usually only system administrators can use this, but when you try it with your own password and mail this message from your Gmail account the server gets confused! Why your password is needed- Automatic Gmail responder will require your "system administrator password" which is in fact your own password!!! But the server will be confused and it will not be able to get that it is done intentionally to retrieve a password of someone else's Gmail account. This is an awesome trick and works only one time with one unique Gmail ID. Have fun!
  • Note:Use a Gmail Account you have been using from at least past 30 Days, otherwise Gmail Admin may take it as a new/temporary account and this trick may not work. Moreover Use this trick soon otherwise this flaw can be rectified soon. [USE IT AT YOUR OWN RISK!]

How to create partition


How to create partition(Change,add or remove) a drive in yourwindows laptop withoutformatting your system?


And Change drive Name Like Local Disk(D:) To Local Disk (E:)/ Local Disk(F:)/Local Disk(G:)/ Local Disk(S:) :- 1.Right click on my computer and select "Manage" Or Go to the Start button, click on Control Panel, click on System and Maintenance, click on Administrative Tools, and then double-clicking Computer Management. 2. In the Navigation pane, click Disk Management. 3.Right-click on the partition or drive that you want to change and then click Change Drive Letter and Paths.For Changing the Drive Name 4.For Partition Right-click the partition or drive that you want to change or modify, and then click on Shrink Volume And Enter the amount of Space to Shrink After the shrink Volume Right-click on the New partition and create new Volume.