Latest Post
Showing posts sorted by relevance for query Windows Download. Sort by date Show all posts
Showing posts sorted by relevance for query Windows Download. Sort by date Show all posts

Wi-Fi Hacking(Wifi Hacking Trick)

Wi-Fi Hacking




Wireless local-area networks – also called Wi-Fi networks or WLANs – are very popular. 
They are installed in offices, hotels, coffee shops, and homes...


This tool is the most possible way will help you crack 
wireless networks never so easily!
Bonus tool: WifiHackBeini122, hack any wifi, wireless networks just in a few steps.
Cracking WiFi Connections


How to hack a wifi network in a few minutes !

Most of the time, it is possible simply to either
have a laptop with WiFi or a PC with WiFi and connect to open networks
with the Windows built-in WiFi client.

Everyone has lots of internet connections
around their house, and frequently these connections are wireless.
Cheap, free, and easy wireless internet

Bonus tool: Commview for Wifi 6.3 build 695

Download here


WiFi Cracker AIO Tools

 

All tools you need to bypass Wifi. Easiest way
to crack wireless network keys !

A lot of helpful wifi, wireless tool. You can now
use free internet from everywhere.

List of tools:

+ CommView for Wifi
+ Wep Key Recovery
+ Pure Networks Magic
+ Easy Wifi Radar
+ AirCrack
+ Boingo Wireless v1.3
+ APSniff
+ Aerosol
+ ... and many other wifi, wireless tools.

Download WiFi Cracker

 

AIO MSN Hack Tools

 

A lot of MSN hack tools you can found here !

A must have tool for MSN users.

MSN hack tools include in this package:
+ MSN7UniversalPatcherPlus
+ Msn Auto Responder
+ MSN Flooder
+ MSN Hacker
+ MSN passwords
+ MSN Spy Lite v1.0
+ MSN Chat Monitor and Sniffer v3.2 include keygen
+ MSN Sniffer v1.2 with crack
+ MSN block check
+ MSN Password Retriever
+ ...

Download Here  (server 1)

Download here  (server 2)

 

 How To Hack A WiFi Network Both WEP and WPA Passwords 2012
Today ill tell you, how to hack WiFi Using Some Simple And Working Tricks You Can easily hack the WiFi network. I think you know that if you want to lock down your WiFi network, you will use WPA encryption because the WEP encryption is easy to crack. In this tutorial we will tell you how to crack WEP passwords, an older and less often used network security protocol. If the network you want to crack is using the more popular WPA encryption, See Below For Second Tutorial.
In This step-by-step tutorial, how to crack a Wi-Fi network with WEP security turned on.
Hack WiFi network

Requirements For WiFi Hacking :-

1. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. Here’s what you’ll need: A compatible wireless adapter—This is the biggest requirement. You’ll need a wireless adapter that’s capable of packet injection, and chances are the one in your computer is not.
2. A BackTrack Live CD
3. A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.
4. Patience with the command line. This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient.

Crack That WEP

To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. It’s right there on the taskbar in the lower left corner, second button to the right. Now, the commands.
First run the following to get a list of your network interfaces:
airmon-ng
The only one I’ve got there is labeled ra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface).
Now, run the following four commands. See the output that I got for them in the screenshot below.

airmon-ng stop (interface)
ifconfig (interface) down
macchanger --mac 00:11:22:33:44:55 (interface)
airmon-ng start (interface)

How to Crack a Wi-Fi Network’s WPA Password with Reaver :-

Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Here’s how to crack a WPA or WPA2 password, step by step, with Reaver—and how to protect your network against Reaver attacks.
Requirement For WiFi Hacking :-
The BackTrack 5 Live DVD. BackTrack is a bootable Linux distribution that’s filled to the brim with network testing tools, and while it’s not strictly required to use Reaver, it’s the easiest approach for most users.
  • A computer with Wi-Fi and a DVD drive. BackTrack will work with the wireless card on most laptops, so chances are your laptop will work fine. However, BackTrack doesn’t have a full compatibility list, so no guarantees. You’ll also need a DVD drive, since that’s how you’ll boot into BackTrack. I used a six-year-old MacBook Pro.
  • A nearby WPA-secured Wi-Fi network. Technically, it will need to be a network using WPA security with the WPS feature enabled. I’ll explain in more detail in the “How Reaver Works” section how WPS creates the security hole that makes WPA cracking possible.
  • A little patience. This is a 4-step process, and while it’s not terribly difficult to crack a WPA password with Reaver, it’s a brute-force attack, which means your computer will be testing a number of different combinations of cracks on your router before it finds the right one. When I tested it, Reaver took roughly 2.5 hours to successfully crack my password. The Reaver home page suggests it can take anywhere from 4-10 hours. Your mileage may vary.
How To Hack WiFi network :-

Step 1: Boot into BackTrack.

Step 2: Install Reaver

  1. Click Applications > Internet > Wicd Network Manager
  2. Select your network and click Connect, enter your password if necessary, click OK, and then click Connect a second time.
Now that you’re online, let’s install Reaver. Click the Terminal button in the menu bar (or click Applications > Accessories > Terminal). At the prompt, type:
apt-get update
And then, after the update completes:
apt-get install reaver

Step 3: Gather Your Device Information, Prep Your Crackin’

Find your wireless card: Inside Terminal, type:
iwconfig
Put your wireless card into monitor mode: Assuming your wireless card’s interface name is wlan0, execute the following command to put your wireless card into monitor mode:
airmon-ng start wlan0 Find the BSSID of the router you want to crack 

Step 4: Crack a Network’s WPA Password with Reaver

reaver -i moninterface -b bssid -vv 
For example, if your monitor interface was mon0 like mine, and your BSSID was 8D:AE:9D:65:1F:B2 (a BSSID I just made up), your command would look like:
reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv


 

Terrorist Takedown 3 (ENG/RIP)(Game Reviews)


Terrorist Takedown 3 (ENG/RIP)




Genre: Action
Publisher: City Interactive
Developer: City Interactive

The members of the terrorist organization took over a new chemical weapon and started blackmailing the authorities. Team Delta sent to Mexico to solve the problem. In the game Terrorist Takedown 3, you have to try on spetsuniformu fighter of special forces, to fight for peace and security in the world ...

Features :

* Use modern fire arms and special Ops technics allowing to quickly and efficiently locate and eliminate the enemy.
* Use advanced warfare equipment, including nightvision goggles, M84 flashbangs or S10 gas mask.
* The modified JupiterEX Engine delivers astonishing graphics that immerses the player in a realistic world of stunning detail, dynamic lighting and breathtaking effects.
* A covert firing system that allows the player to “blind fire” from behind walls or low obstacles.
* Bullet penetration: the player can shoot enemies - and be shot - through thin walls, adding a further tactical element.
* Weapon modification: the player can modify his main firearm for maximum results (sniper mode to assault mode at any time during the game).
* 8 different mission environments varying from small Mexican towns, and slums districts to Mexico City.

Features RIP :

* The basis is taken from the license City Interactive
* Audio & Video quality 100
* Cut the introductory videos, and video developers
* Nothing is converted
* Run the game with a shortcut on your desktop (Loader.bat)
* Author rip TPTB

System Requirements :

* Operating system: Microsoft Windows XP SP3 / Windows Vista SP1 / Windows 7even
* Processor: Intel Pentium 4 2.3 GHz or equivalent AMD Athlon 64
* Memory: 1 GB (Windows XP) / 2 GB (Windows Vista / 7)
* Video: 3D graphics adapter with 256 MB memory, compatible with DirectX 9.0 and supports Pixel Shader 3.0 (Nvidia GeForce 6800 GT or better)
* Sound: Sound card compatible with DirectX 9.0c
* Free hard drive space: 4 GB
* Additional software: DirectX 9.0c or DirectX 10
* Controls: A keyboard and mouse.

Size : 1.83 Gb

Download

http://www.filesonic.com/file/556209531/Terrorist.Takedown.3.RIP.part1.rar
http://www.filesonic.com/file/556231241/Terrorist.Takedown.3.RIP.part2.rar
http://www.filesonic.com/file/556890631/Terrorist.Takedown.3.RIP.part3.rar
http://www.filesonic.com/file/556286641/Terrorist.Takedown.3.RIP.part4.rar
http://www.filesonic.com/file/557741861/Terrorist.Takedown.3.RIP.part5.rar

OR

http://www.fileserve.com/file/fFt4rjZ
http://www.fileserve.com/file/QvcRa7Y
http://www.fileserve.com/file/QA8fxnM
http://www.fileserve.com/file/bbnvEvC
http://www.fileserve.com/file/4HHp6VR


 

How to Create Virus Using JPS (How-tos)

Virus and Fun image
This is a small but very useful software . With the help of this you can create any type of trojans and program it to do whatever you want.
This can be programmed to do the following things:
Disable Registry Editor
Disable Ms Config
Disable Task Manager
Disable Yahoo! Messenger
Disable Media Player
Disable Internet Explorer
Disable Time
Disable Group Policy
Disable Windows Explorer
Disable Norton Antivirus
Disable McAfee Antivirus
Disable Note Pad
Disable Word Pad
Disable Winows
Disable DHCP Client Service
Disable Taskbar
Disable Start Button
Disable MSN Messenger
Disable Command Prompt
Disable Security Center
Disable MSN Messenger
Disable System Restore
Disable Control Panel
Disable Desktop Icons
Disable Screen Saver
Hide Service Manager
Hide Outlook Express
Hide Windows Clock
Hide Desktop Icons
Hide All Process in Task Manager
Hide All Tasks in Task Manager
Hide Run in Start Menu
Change Explorer Caption
Clear Windows XP Password
Swap Mouse Buttons
Remove Folder Options
Lock Mouse & Keyboards
Mute Sound
Crazy Mouse
Allways CD-ROM Open
Turn Off Monitor (30 sec's)
Destroy Taskbar
Destroy Offlines (Y!Messenger)
Destroy Protected Strorage
Destroy Audio Service
Destroy Clipboard
Terminate Windows
Hide Cursor
Auto Startup
Restart-Logoff-Turnoff-Hibrinate Automatic After 30 minutes
Change Server Name After Install in Process
Change Server Name
Change XP Password
Change Computer Name
Change IE Home Page
Close Custom Windows
Disable Custom Service
Disable Process
Open Custom Website
Run Custom Command
Enable Convert To Worm - Auto Copy Server To Active Path With Custom Name & Time
Change Custom Icon For your created Virus (15 Icons)



NOTE
THIS IS A VIRUS MAKING SOFTWARE SO SOME ANTIVIRUS MAY DETECT IS AS A VIRUS BUT ACTUALLY IT IS NOT A VIRUS. SO DON'T WORRY.
CAUTION
DON'T TRY TO OPEN THE CREATED VIRUS ON YOUR OWN COMP.


 

Splinter Cell Pandora Tommorow ( RIP )(Game Reviews)


Splinter Cell Pandora Tommorow ( RIP )




Published by: Ubisoft
Developed by: Ubisoft Shanghai
Release Date: March 23, 2004
Genre: Third-Person Action Adventure

install notes:

1) Launch "Unpak.bat" to unpack/build datas.
2) Launch "GO.bat" to play.
3) Enjoy.


System Requirements:

Minimum System Requirements
Supported OS: Windows® 98/ME/2000/XP (only)
Processor: 1 GHz Pentium® III or AMD Athlon™ processor
RAM: 256 MB
Video Card: 64 MB DirectX® 8.1-compliant video card (see supported list*)
Sound Card: DirectX 8.1-compliant audio card
DirectX Version: DirectX 8.1 (DirectX 9.0 included on disc)
CD-ROM: 8X CD or 4X DVD (16X CD recommended)
Hard Drive Space: 3 GB
Peripherals: Windows-compatible mouse and keyboard required (Game pads and joysticks not supported)
Multiplay: Broadband modem, 64 Kbps upload


Recommended System Requirements:

Supported OS: Windows XP
Processor: 1.8 GHz Pentium 4 or equivalent
RAM: 512 MB
Video Card: 128 MB DirectX 8.1-compliant video card (see supported list*)
Sound Card: DirectX 8.1 compliant and EAX™
DirectX Version: DirectX 9.0 (included on disc)
CD-ROM: 16X CD
Hard Drive Space: 3 GB
Peripherals: Windows-compatible keyboard and mouse with wheel; headset optional (Game pads and joysticks not supported)
Multiplay: Broadband modem, 128 Kbps upload

Download
http://rapidshare.com/files/255623010/S.C.P.T.R.RaD.part1.rar

http://rapidshare.com/files/255623136/S.C.P.T.R.RaD.part2.rar

http://rapidshare.com/files/255623227/S.C.P.T.R.RaD.part3.rar

OR

http://www.mediafire.com/?zjtjyyiqdgz

http://www.mediafire.com/?hnnmwjd0i0g

http://www.mediafire.com/?naiwdivnlny


 

Desert Storm II Free download(Game Reviews)


Desert Storm II Free download





Genre: Third-Person Action
Publisher: SCi Entertainment Group
Developer: Pivotal Games

Part 2 in the series, Back to Baghdad is a squad-based shooter that picks up right where the first Desert Storm left off. John Bradley, Paul Foley, Mick Connors, and David Jones are back once again to team up and once again take on Saddam's henchmen. Whether it's protecting friendly choppers from enemy fire, the burning oil fields, Iraq's chemical weapons program, or secret superguns, there was apparently enough unfinished business left to serve as the basis for a second game. For the sequel, the developers improved on the team-mate AI and game UI, but the biggest attraction is once again the co-operative multiplayer mode.

Features :

Improved graphics, tougher enemy ai, more weapons and trigger levels; over 30 gull-war era weapons to maximizes your tactical options; command lour elite squad members through can hugelevels of special ops action.

Features RIP'a :

* The basis is taken from the license - SCi Entertainment Group -
* Audio & Video
quality 100%

* Cut all languages other than English (voice interface and English)
* Nothing is converted
* Tablet enclosing
* Installation time: 2-3 minutes
* RIPed by (Dotcom1)

System requirements :

* OS: Microsoft Windows 98 / 2000 / ME / XP
* Processor: Intel Pentium 3 1.0 GHz or equivalent AMD Athlon 1000 +
* Ram: 256 MB
* Video: 3D-graphics adapter with 64 MB memory, compatible with DirectX ® 8.0 (Nvidia ® GeForce ® 3 or better)
* Sound: Sound card compatible with DirectX 8.1
* Free hard drive space: 1.2 GB
* DirectX 9.0c
* keyboard & mouse

Size : 1 GB

Download

http://www.fileserve.com/file/tg2j9NK/Conflict_Desert_Storm_II_Dotcom1.part1.rar
http://www.fileserve.com/file/W5G96fu/Conflict_Desert_Storm_II_Dotcom1.part2.rar
http://www.fileserve.com/file/MeJtjc7/Conflict_Desert_Storm_II_Dotcom1.part3.rar

OR

http://www.filesonic.com/file/1179128864/Conflict_Desert_Storm_II_Dotcom1.part1.rar
http://www.filesonic.com/file/1179133824/Conflict_Desert_Storm_II_Dotcom1.part2.rar
http://www.filesonic.com/file/1179133834/Conflict_Desert_Storm_II_Dotcom1.part3.rar

OR

http://www.uploadstation.com/file/8dv4hYG/Conflict_Desert_Storm_II_Dotcom1.part1.rar
http://www.uploadstation.com/file/VGfwSNK/Conflict_Desert_Storm_II_Dotcom1.part2.rar
http://www.uploadstation.com/file/eRZby8Y/Conflict_Desert_Storm_II_Dotcom1.part3.rar


 

ProRAT(Hacking Trick)

To show you an example of a malicious program, I will use a well known Windows Trojan, ProRat using a Rat tool you can hack any email account in world facebook, yahoo,gmail,..etc.

1. Download ProRat. Once it is downloaded right click on the folder and choose to extract it. antivirus wil detect it as trojan but it is a false positive detection.
2. Open up the program. You should see the following:

3. Next we will create the actual Trojan file. Click on Create and choose Create ProRat Server. 


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options. 


5. Click on the General Settings button to continue. Here we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.
6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. In the example I will use an ordinary text document. 
7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I will stick with the default because it has icon support, but exe’s looks suspicious so it would be smart to change it. 
8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document. 



9. Finally click on Create Server to, you guessed it, create the server file. Below is what my server file looks like.

10. A hacker would probably rename it to something like “Funny Joke” and send it as an attachment to some people. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it. 
11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next. 
12. I’m going to run the server on my own computer to show you what would happen. Once I run it the trojan will be installed onto my computer in the background. The hacker would then get a message telling him that I was infected. He would then connect to my computer by typing in my IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to my computer and have full control over it. 


13. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all my computer files, he can shut down my pc, get all the saved passwords off my computer, send a message to my computer, format my whole hard drive, take a screen shot of my computer, and so much more. Below I’ll show you a few examples 


14. The image below shows the message I would get on my screen if the hacker chose to message me. 


15. Below is an image of my task bar after the hacker clicks on Hide Start Button. 


16. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.


 

How to Control your PC With Twitter(How-tos)


Okay, so here’s what happened. You were on a rush, and halfway across town, you realised that you forgot to shut down your personal computer. Your thinks-he’s-a-comedian flatmate is home and you know things are going to get ugly if he realises that he has access to your still-on personal computer as well as all your social networks and emails etc. What do you do?
Twitter birds in window
If you have already setup a remote desktop or vnc on your computer, things may be easier. You can control your PC from anywhere you are. But if you don’t have this set up, the only thing you could do is to make your way back across the day’s traffic to shut it down or face the backlash.
If setting up remote desktop is too technical for you, and this thing happens to you so often that there is a need for a contingency plan to be set up, let us show you how you can remotely shut down your computer with a tweet. Yes, a tweet, with TweetMyPC.

Tweet Command Your PC

To start sending a tweet command, go to the TweetMyPC download page and download the application for your Windows PC.
Open the downloaded file and click Install.
Once installed, launch the application and sign in with your Twitter account.
Enter your username and password, and click Authorize App.
You will be given a PIN, copy this pin.
Pin code
Go back to TweetMyPC application on your PC, paste the pin in the given column and click OK.
Now you are ready to send a command to your PC from your Twitter account. To find available commands, go to About and select Basic Command List.
This link will open a webpage on which there is a list of available commands you can tweet to your PC: shutdown, restart, lock, logoff and many more. There is also command to do a screenshot, for when you want to find out what’s going on, on your PC while you are not using it.
Command List
There are many commands available for your reference, you just have to tweet it on your Twitter account. If you want to command Standby, simply tweet ‘standby’, and your PC will follow the instruction.
When you tweet a command from your Twitter account, your tweet status will appear and TweetMyPC will recognize it and send an instruction to your computer. After the instruction is sent to your computer, it will then auto-post a tweet status to your Twitter account.
Tweet
On your computer, once the command is received, TweetMyPC will acknowledge the instruction with a notification popup.


 
 

Copyright © 2011. Tricks Duniya - All Rights Reserved