Computer Hacking

HOW TO SHUTDOWN UR COMPUTER WITH A CELL PHONE


Just imagine you have to leave your computer running at home to perform some tasks. Now, you will be able to turn your computer off from anywhere you have access to email– even from your mobile phone!

We will configure Outlook to do the shutdown task when it receives an email.

We will need:
– Microsoft Outlook
– A phone or computer that can access internet and send emails
– 2 email accounts (in this post, we name them account1@gmail.com and account2@gmail.com

Tested with Windows 7, Outlook 2010 and Nokia 5800.

Create a shutdown bat file

1. Open notepad and type in: c:\windows\system32\shutdown -s -f -t 01 (01= 1 minute, this means your computer will be shutdown in less than 1 minute)

2. Save it as shutdown.bat. You can save it anywhere you like.




II. Configure Outlook.

We use account1@gmail.com with Outlook. Make sure you’ve already configured your email with Outlook before we continue

1. Go to File->Options.



2. Now, go to Advanced tab and click on Send/Receive button.



3. When the window pops up, please config it like below

.



4. Go to
File->Manage Rules & Alerts.



5. Choose
New rule… at the pop up window and choose Apply rule on messages I receive, click onNext.



6. In the next step, choose
with specified words in the subject, on this computer only and then click on specific words

.



7. Type in
shutdown when the Search text box appears, click on add and then Ok. Click on Next to jump to the next step




8. In this step, you
MUST choose Start application and Delete it (so when Outlook receives your shutdown email, it will perform the shutdown task and then delete the email. If you leave the email there, your computer will be shutdown the next time you launch Outlook ). Click on application to choose the Shutdown.bat file.




9. After that, you can hit the
Finish button (Don’t worry, there’s nothing in the next step). Your Rules and Alerts window will look something like this:




III. From your phone or computer:

1. Simply log into account2@gmail.com from your phone browser (or email client), send an email toaccount1@gmail.com with subject: shutdown (you can write anything in the body of the email) and see what will happen with your computer

Notes: To perform this task, make sure to keep Outlook running on your system.

Guys, please leave a comment blow on facebook comment box or live chat box if this works with earlier version of Outlook  !!




How to enter Windows XP computer without entering the Password in the log on screen

Note from the Web Owner:I am not responsible for whatever you do with this trick.This is only for Educational Purposes.


Hello, I M Qasim

Here is a trick from which you can access any friends computer physically without entering there password on the log on screen.


This works only on WINDOW XP Operating Systems.


Do to this trick,wait for User Log In Screen to appear while Turning On the computer->




Now Just Type the following Keys---> 
Alt+Ctrl Button and Two times Delete Button

.



This Type of Dialogue Box will open on pressing the Above Key Combination.--->



Type the Username as 
Administrator and leave the Password field Blank and hit ENTER.


After you do this,the computer will Open and you can access your Friend's Computer.

 

How to hack a computer 

Hacking a computer can be a very useful and sometimes important skill to know. Weather you just need access an account of an untrustworthy person, or your son/daughter that you’re worried about, hacking into a computer is not necessarily always bad and sneaky. Nevertheless, it can be pretty complicated if you are not computer savvy. We have compiled a few resources for you to begin your process of learning

Before you start read THIS:

Hacking a computer can have pretty serious consequences, especially if done on a public or school computer. Please be aware that there are privacy laws protecting each personal computer.

So, How do I hack a computer? There are few things to consider before hacking a computer. What information are you looking to obtain? If you are in a need of read someones personal emails, chances are  you most likely need to obtain a password to his online email inbox

If you are looking to see who the person is talking to, you need to get a keylogger. I can’t tell you which one is the best as there are literally hundreds of companies selling keyloggers that help to hack a computer. Software to hardware based keyloggers will range from 15-30 dollars and they do the job. Make sure you’re purchasing from a trusted company and that they keylogger runs silently in the background to avoid detection.
A more simple approach to hack someones computer can be found in our PDF tutorial. If you are interested in this simple 10 min method then go ahead and download it below. The book is a little long but after reading it you can pretty much own any computer you like.



HOW to hack a computer with prorat

1. First of all . Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:



3. Next we will create the ProRat Trojan server. Click on the "
Create" button in the bottom. Choose "Create ProRat Server".




4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.




5. Now Open
General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:




6. Click on the
Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.



7. Click on the
Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.



8. Click on
Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.



9. After this, press
Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.




12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.




13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.




14. Below is an image of the victims task bar after the hacker clicks on
Hide Start Button.




15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.




As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs....

No comments:

Post a Comment