The Only Place For All Your Computer Solutions!!!

Becoming a computer geek is now a piece of cake.Learn Computer Hacking,Mobile Hacking,Repair Windows,Game Troubleshooting,Computer Hardware Selection,Cracking, Game Reviews,Java,C++ Encoding And Much More!! FOR FREE!!

USEFUL INFO

Use Labels given below for organized navigation of this blog.

It is a well known fact that google is the most widely used search engine(around 80%).
But it is not known to many that while google-ingleads to easy acess to pubiclicly available info,it also can be used for accessing advanced info like C.V of people,downloading free music and all other stuff.Here is how it goes.You just need to type in special keywords for the various categories of data and you will be through!!

1. For C.V ,Personal info of people

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
To do this you just need to type in the following code
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.

filetype:xls inurl:”email.xls”

Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query

intitle:index.of finances.xls


2. For downloading Free Stuff

Ever wondered how to use Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.

“?intitle:index.of?mp3 eminem“

Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

Dats All Folks!!
Cheers!!

Well..many times you want to send mail to someone but without revealing your true e-mail address, or you want to stay anonymous or play some prank like sending a mail from say...bill@microsoft.com...but dont know how???...Well here in this post I am going to give you some gyan on this..

Well first let me give you an outline of what we are actually going to do..This is important to understand the concepts. Yahoo, Gmail and other popular mail services accept e-mails only from trusted servers and not from personal computers like the ones which you have at home..So what do we do?? ..well we will use a trusted server to send mail using fake email address..To do all this follow the procedure given below

1. Open an account with any of the free web hosting service providers that support "php" scripts. To make things easier for you, I would suggest www.x10hosting.com

2. Upload the scripts that I have attached with this post, using file manager to your server. And set the permissions for those scripts to maximum.
To Download Those Scripts -- DOWNLOAD SCRIPT

3. Ok once your are done with it..visit www.yourwebsite.com/sendmail.php Note- Replace "yourwebsite" with the name of your website.

4. Thats it!! :) Well for a live demo of this tutorial visit the link given below..

Well every now and then..you read in the newspaper or see on television that mail was sent from ABC cyber cafe..or XYZ city...etc etc...Have you ever wondered..how police or ATC are actually able to do this??? Well you really dont need a IT professional to trace an email..because its not that complicated and difficult..
In this post computervedas is going to teach you how its done..

Well here is the outline of what we are actually going to do..
First we will find the ip address(much like the identity of a computer on the internet) of the sender of the mail...then we will trace his location on a map using that ip address..Simple isnt it?

Ok now in this trick i am going to use yahoo mail....because thats what i normally use..Ip adresses are normally not shown in a mail..because they are found in Headers.
Headers are enclosed beween square brackets, for instance, [129.130.1.1]
So to find them do the following...

1. Log into your Yahoo! mail with your username and password.

2. Click on Inbox or whichever folder you have stored your mail.

3. Open the mail.

4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

•Click on Options on the top-right corner
•In the Mail Options page, click on General Preferences
•Scroll down to Messages where you have the Headers option
•Make sure that Show all headers on incoming messages is selected
•Click on the Save button
•Go back to the mails and open that mail
5. You should see similar headers like above

Or if you want to manually find the IP address, proceed to 6.

6. Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.

That is the IP address of the sender.


If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.

7. Now that you have the IP address of the sender..its time to hunt him down.. Enter the IP address that you want to trace in the dialog box and click on "Search”.






With just a click of a button you can find the following information for any given IP address.

1. Country in which the IP is located

2. Region

3. City

4. Latitude/Longitude

5. Zip Code

6. Time Zone

7. Name of the ISP

8. Internet Speed

9. Weather Station

10. Area Code and

11. Domain name associated with the IP address


Well in the following box you can see your location,IP address etc etc....For a demo you can enter the ip address given below in the box above.....hope u like my post...lookin forward for comments and suggestions.

Ok so nw i guess by now u guys must hve been familiar with windows registry..Now we are up for some real and serious hacking..many of us have wifi network at home or office..and we all normally keep it secured..but sometimes what happens is that some not so friendly neighbour hacks our wifi...and leaves no stone unturned to make sure that our internet bill burns our pocket...this post is aimed at illustrating some common security flaws with WEP.
WEP is wired equivalent privacy..It is generally the most commonly used algorithm in India to secure wireless networks.
Disclaimer: Attempting to access a network other than your own, or one you have permission to use is illegal. computervedas.blogspot.com is not to be held liable for any damages resulting from the use or misuse of the information in this post.

OOk so now this post unlike others is going to be little complicated..but hey i never said that its going to be that easy..
For this hack i am using HP Pavilion laptop with built-in Intel 4965agn network card
and Backtrack 4 linux OS.

Step1
Visit http://www.remote-exploit.org/backtrack_download.html and download backtrack 4 pre release iso and burn it on a DVD. Its free and can be run directly from the DVD so no need to install any OS. Once you have burned the iso boot your computer with the disc. If you dont know how to boot your computer with a dvd please post in comment, we would be happy to teach you.

Step2
Once you have succesfully booted linux you would be asked for username and password. so username is "root" and password is "toor". After entering the username and password type "startx" its a command used to load the kernel ..which is much like graphical user interface of windows.

Step3
Now you have to start the konsole. Its very much like Dos of windows. To start konsole click on a small "blank screen" like icon next to start.

Step4
Now you will have to capture wireless network packets without being associated with an access point. In simple words its called monitoring. To do this you will have to set the wireless card to monitor mode. To do this type the following command :-

iwconfig (to find all wireless network interfaces and their status)
airmon-ng start wlan0 (to set in monitor mode, you may have to substitute wlan0 for your own interface name)

Step5
Now next step is to find your target. For this type:-

airodump-ng mon0 (monitors all channels, listing available access points and associated clients within range)

It is best to select a target network with strong signal (PWR column), more traffic (Beacons/Data columns) and associated clients (listed below all access points). Once you've selected a target, note its Channel and BSSID (MAC address). Also note any STATION associated with the same BSSID (client MAC addresses).

Step6
Now the next step is to capture packets of our selected targets. For this type:-

airodump-ng -c 6 bssid 00:0F:CC:7D:5A:74 -w data mon0 (-c6 switch would capture data on channel 6, bssid 00:0F:CC:7D:5A:74 is the MAC address of our target access point, -w data specifies that we want to save captured packets into a file called "data" in the current directory, mon0 is our wireless network adapter)

You typically need between 20,000 and 40,000 data packets to successfully recover a WEP key.

Step7
Once you have collected enough packets you can crack the WEP key from the file in which packets have been stored. For this type the following :-

aircrack-ng data*.cap (assuming your capture file is called data...cap, and is located in the same directory)

and you will see the wep key in the console window..
hurrayyy..simple isnt it??

Well this hack is very simple if you follow procedures carefully. The only catch is that your wireless adaptor may not support monitor mode.
WEP within last few years has become very easy to hack..In few days we will teach you about WPA security..its difficult to hack but not impossible...we will be posting a tutorial on that also..