Wednesday, June 2, 2010

Hack The Game Game Simulation Become Hacker


HackThe Game hacking is a simulation game to be a hacker. When you play this game you will possess alone the role of a hacker who carry out various missions. When I try to play this game, it was pretty hard too much, we are obliged to know the syntax syntax-dos, are like the command ping, cd, telnet, etc.. (Better if the blogger buddies memorized) Hehehe
Game HackThe if my opinion is a decent game for my friend have, especially for bloggers who want to become hackers reliable but not confusion latian where, well this game HackThe solution, because the use of simulation, so rich so a hacker its very real. (There are also tables of sound effects,,,)

Game HackThe also supports the Indonesian loh much, so the easier it is to be studied and understood aja. To turn it into Indonesian bahsa format, first open the application it HackThe Game, then click the settings menu, then select the language bahsa Indonesia deh.
Restart Game HackThe her to become bahsa Indonesia.
To find out the mission given click menu incoming messages / inbox.
For how to play, please read the FAQs is beforehand (let not confused) Okeiiii
---
General
---
HackTheGame hacking is a simulation game. In it you take the role
a hacker who take on various tasks. During this task
You will be able to use the equipment (hacking) tools.
Try to complete the task as much as you can, without taxable traced
---
Mission
---
You receive your assignment by email. Read it carefully,
example contains the IP address of your machine must hack. I
will explain how you should go about the rest
Just remember These Things:
- After successfully connecting to the target host using Telnet, which
target system will start your backtrace. Do not let them fully
Your trail because it will bring you to an arrest. You can see
traces the process in the lower left corner for a Telnet session.
If you think you will not accomplish the mission before
trail is complete, and return quickly decided to try again.
- VERY IMPORTANT: You always delete the logfile before disconnect from
telnet session. Logfiles that are not always in the same place, because
every system is different. But usually in a folder named "Logs".
Finding the logfile (192.168.010.001) and Destroy (see equipment) it.
- If you get busted three times the game ends.
----
The toolbar
----
In the game you have various tools that you want. Some devices will
stolen should be stolen in the first system.
Function Button
- ---
Inbox: This is the inbox of your email. This is where you just received
task. read this email properly, it contains many
information you might need during the mission
Ping: After you read the mail, you need to ascertain whether there
target is online. You do this by using the Ping. Enter
target and ping the IP address this. Your computer will attempt to
contact the remote computer, and will tell if the ad is
online
Portscan: With portscan you can scan an IP address to be verified open
exploitable ports. Press the button and enter your Portscan
IP address of the target, along with the scanning range. Range
should be between 2000 and 4000 (this is usually to enter
values)
Telnet: If you know the IP address of the target AND exploitable open a port,
Telnet can be used to connect to the target system
Password: With this you can hack the password of the server by using animal
violence. When you connect to telnet but do not know the password, use
This device
This virus uploaded and installed a virus on the server. You need
in a telnet session to use this function. After that upload
Virus closes the window entirely, the console will automaticly
install viruses that are uploaded
Get File: When in a telnet session, you can access the target system using
dos commands like DIR and CD (see "Command Console"). If you find
files to be copied, click Get File. Input file name, and
if the file is found in the current folder, it will begin
download it.
Files are downloaded to your own (virtual) hard drive. All Downloads
placed in a folder named Downloads
Killing File: To destroy a file simply click Kill file. Enter the file name and
will damage the file, if it's found in the current folder
Console commands
------
PING (ip address)
For example: ping 127.0.0.1
ping sends a packet to the server. if online, he'll respond. This
how can you know whether the target online
Telnet (ip address) (port)
For example: telnet 127.0.0.1 21
This will connect to the server on an open port. After entry
Login system, you can access the target system
DIR (or LS)
This lists all the files from a remote computer. Example output is:
Command.com
Io.sys
Windows (DIR)
Log (DIR)
Where "Command.com" and "Io.sys" is the file, and "Windows" and "Log" is
folder
CD (foldername)
For example: cd Windows
This will change the folder you're viewing. After giving this command you can use
with the DIR command to view the file in the folder
To return to the root of the document used this command:
CD ..
CD \
CD ..
CD \
MD (foldername) (or mkdir)
For example: mk myfiles
This makes a new folder in the root of the file structure. You can not create
Other folders within folders (yet)
DEL filename> (or RM)
For example: del command.com
Let's you delete this file in the current folder. This can not be undone.
Ipconfig
This shows, among others, your own IP address
CLS
This clean screen
SAVE
Saves time games. Including changes made in
local filesystem. Which stores the files labeled with the handle / loginname. So that
if you play the game as a "soul stealer", you have to login next time
same name "soul stealer"
Load / Load
Loads SAVED last game was found by loginname
HELP
text show
shutdown
Exit game
-------------
Installation tool from the commandline
-------------
After you download the tool by downloading commands from a remote computer and
go offline, you can install the tool on your local system itself. Just navigate
downloaded to a folder and enter the name of the device.
Example:
cd ..
cd download
PortscannerW32.exe
* Press after entering each command
Good luck and have fun,, hehehe

Software Hacking Wifi

Sometimes we meet some of diprotect wifi hotspot, be it WEP or WPA2 with a password. Actually, the password can be broken with the intention and determination (which is bad of course hehehehe ...), but remember - keep in mind because this is all illegal though arguably not until the police arrested. Supposing we menduplikatkan someone's house key and opened the door of his house but did not steal, borrow only wear hehehe .... but if more than that NDA's I know deh ... hehehehe very creative name.

In fact, many virtual float – wifi hacking software ... kind of living we just want to learn and listen. Plus patience. Try typing in youtube hacking wifi, it will present berjibun how. Software that want me for is airowizard. This program is a form that is more user friendly than aircrack. Useful for reading packet data traffic Unprotect and protect good wifi. Then analyze it and menghacknya to find password. When manually tapping the data traffic and it took hours - an hour or spend a day - a day to unload WEP/WPA2 password, then airowizard only takes 5 minutes. Appropriate word - the word virtual world creators sih.Di very difficult to find this software because many parties are envious because this software can quickly unload the wifi password.


Actually, if you like it that way - the manual way then airowizard more comfortable and magic when used via linux OS that is Backtrack 3. Backtrack is designed for security. Fun again BackTrack is also available in USB versions so they can save on your USB capacity of 1 GB.
Download Backtrack 3: USB versionhttp://backtrack.mirrors.skynet.be/pub/backtrack/bt3final_usb.iso 783,42 Mb

My suggestion is to use a download manager to speed up downloading. Probably about six hours when telkom speedy stable.

Radmin Viewer 3.4 (32/64 bit) Portable Multilang


Windows Sofware | Radmin Viewer | 8.22 MB

Radmin (Remote Administrator) is fast and secure PC remote access software that enables you to work on a remote computer as if you were sitting right in front of it and access it from multiple places. Radmin includes full support for Windows 7 (32-bit and 64-bit), file transfer, multi-user text and voice chat, Windows security, Kerberos authentication, 256-bit AES encryption for all data streams, telnet access, multiple monitors support DirectScreenTransfer ™ technology and unique.

Title: Radmin Viewer
Version: 3.4 (32/64 bit) Portable Multilang
Developer: Famatech Corp.
Homepage: radmin.com
Updated: 2009.10
License / Price: Free
Language: Multilanguage
Platform: Windows 98/2K/XP/2K3/Vista/7
Size: 8:22 mb




Download
Radmin Viewer 3.4 (32/64 bit) Portable Multilang

How to Change Windows XP Limited User Account Into a Computer Administrator


One of the places I worked at a few hundreds of computers and it is shared by students. Each student has their own user who is a restricted user account. Sometimes the lecturer there will complain to me that the administrator password has been hacked and modified by the students. This can easily be done if they do not set the security password for BIOS and allows students to boot a computer with a CD that comes with a tool to reset local user account password.
When the teacher reported to me that the students managed to turn a limited user account into an administrator computer, my guess is the students reset the administrator password, login as admin and change the account type to administrator. Turn a limited account on a computer administrator, but I was wrong. It turns out that the students did not reset the admin password and they can do it without logging into Windows as administrator. After a little searching, I found a free tool that can change the Windows XP user account is limited to computer administrator.
PCLoginNow is easy to use tool to reset local administrator passwords and other account on Windows systems. No need to reinstall the system. This reset Windows passwords and Windows security settings instantly. All versions of Windows are completely supported. This is a great CD for Home users and Businesses. And most important, it is the most popular solution and is safe to delete your Windows password until now.
In addition to the password reset capabilities, PCLoginNow can also help you maintain, change accounts policy setting and properties. You can easily upgrade the general account to administrator level, lock or unlock those accounts you do not need anymore, And moreover, all this is done without booting your tedious, time-consuming Windows System.
PCLoginNow The most powerful feature is to support Syskey. SYSKEY is an optional feature since Windows NT 4.0 SP3. This is intended to protect against offline password cracking attacks so that the SAM database would remain secure, even if someone has a copy. Although the system registry is protected by Syskey, PCLoginNow can easily bypass this mechanism and reset the Windows password.
Just four simple steps required to activate a limited user account to the administrator. 1. Download PCLoginNow.
2. Burn the ISO image to CD / DVD.
3. Boot the computer with a CD / DVD.
4. Click the Next button when you see a message that says "PC Login Now! Ready to get started, please click NEXT to continue ..."
5. Select the Windows system found by PC Login Now program.
6. Select the user account that you want to edit, check "is Administrator" and click Next. Changes to the Administrator account User Limit
Change Limit User Account to Administrator
7. Reboot and the user's computer is now a local administrator.
I find this tool amazing because it can change the user from zero to hero. I understand that some students adventurous and want to install or configure the system the way they like it but they can not do with a limited user account. Therefore, they find a way to secretly upgrade their accounts are limited to local computer administrator and now they can do whatever they want. We can not set a BIOS password because if the students entered the wrong security password for 3 times, it will be locked and we had to call HP support and ask them to reset. If you have a way to prevent the students from editing user accounts without logging in as an administrator, please share with me.

Deep Freeze Enterprise v6.62.220.3058 Full Serial Crack

Deep Freeze Enterprise Full v6.62.220.3058 Serial Crack is a program that works to restore our computer operating system to its original state after a restart, or in other words we freeze the computer's operating system.
The difference with the standard version of the Enterprise:
Please check to www.faronics.com / html / DFFeatures.asp

How to Install and use Deep Freeze Enterprise Crack Serial Full v6.62.220.3058:

* Disconect Internet during the installation process if necessary block pake firewall
* Over use of internet access block programs below:
o C: \ Program Files \ Faronics \ Deep Freeze Enterprise 65 \ DFAdmin.exe
o C: \ Program Files \ Faronics \ Deep Freeze Enterprise 65 \ DFConsole.exe
o C: \ Program Files \ Faronics \ Deep Freeze Enterprise Server \ DFServerService.exe
* Do not ever for a program update
The file size is only 45 MB.
Interested?

In English :
Click here fro free downloads Deep Freeze Enterprise v6.62.220.3058 Full Serial Crack.

How To Get Free Rapidshare Premium Accounts and Megaupload


Definitely among my friends there are asking, is there still a way get a free premium account Rapidshare and Megaupload, the answer is no way get a free premium account Rapidshare and Megaupload. However, in this free premium account for Rapidshare and Megaupload.
We can get a free premium account by way of registers used (yes iyalah, where do ya like that, hehehe). You just kok. You lived given the choice of how many months, there is one month and three months. If I make a one-month aja. Kan already quite right? use not need a credit card or hell lah.
Anyway how to get a free premium account Rapidshare and Megaupload is free
If you want to list how to get a free premium account Rapidshare and Megaupload click here. Then, if they have to question or criticism about how to get a free premium account Rapidshare and Megaupload yach comments below.

ProRat_v1.9_Fix2 - Hacking Computer Remote Mode

To make process and connect to a PC with ProRat_v1.9_Fix2 you must create a server with your own properties by using the client.
Send the server to the PC you want to connect and make sure that he opened the server. IP address, port number and server password will be sent to the notification address you set when creating the server.
Write down all the information we send to the client and then Click on "Connect" button. You will be connected to the server. if you want to logoff from the server click on "Disconnect" button.

My opinion:
This can menghack ProRat_v1.9_Fix2 victim's computer with a remote system. Even if the victim computer has a webcam, you can see his movements using this ProRat_v1.9_Fix2.
I have tried, and ProRat_v1.9_Fix2, hacking software remote mode is highly inappropriate for you to try.


The file size is only 3 MB.
password: pro


Click here for free download ProRat_v1.9_Fix2.