Word Excel Office PDF Rar Password Unlocker

Posted by Asir Mohamed On Friday 30 April 2010 0 comments


Word Excel Office PDF Rar Password Unlocker
Free Download (Feb 2010) | 14 Mb



Great build for all situations, it collected for the utility to recover passwords office applications and archives. More details ....

Word Password Unlocker 4.0

Word Password Unlocker effective tool for recovering passwords to documents of Microsoft Word.
Lost a password for opening a document of Microsoft Word? Lost a password for saving changes to a document? For WORD Password Recovery is not a problem! This small tool will be able to make your job easier both at home and in the office!
Features:
* Recovery of passwords for all versions of Microsoft Word from 97 to 2007
* Recovers the password to open a Word file
* Removes the password to open and edit documents
* Fast recovery of passwords in precision
* Allows users to customize the mask the password, if known to any part of the password

Excel Password Unlocker v4.0

Excel Password Unlocker eliminates passwords with sheets of Excel. If you are faced with the problem of editing protected pages
Microsoft Office Excel, you will appreciate the need to use this program. Excel Unlocker enables you to change the password to the worksheet in your Excel Workbook, thus obtaining access to the opportunities that have been closed by someone through negligence or willful misconduct later, or that you yourself have closed, and the password is successfully forgotten.

Office Password Unlocker v4.0

Office Password Unlocker a program for the return of passwords for Office. The program returns the passwords to MS Word and MS Excel quickly, easily and efficiently. This program supports three types of attack to guarantee you receive it. Also, you can not only view a document after you receive it, as well as edit dokument.Prosto show the path to the application Office, you want to decrypt, and then click Start and the program itself will do its job. The program is very easy to use and does not require any special skills, so that even a child can safely handle it.

With three modes of cracking the password, the program works fast and effectively. This program will automatically perform a complete scan of the document and will look for the password until it finds the result. The main characteristic of the program is that the program is developing a special scheme for each password cracking. For example, you can choose to brute force, if anything at all do not remember or do not know about the password. Also, you can choose to brute force with a hidden attack, if you remember at least a piece of the password, for example length. If you are sure that you know most of the password, you can try to attack mode reference.

Features:
Recovers the password for opening documents.
Removes the password to open and modify the document.
Support to recover passwords for Word, Excel, PowerPoint and Access.
Support for all versions of Office from 97 to 2007.
The ability to minimize recovery time, if known, any feature of the password.

Features:
Three modes of cracking:
Brute force if anything at all do not remember or do not know the password
Brute force with a hidden attack if you remember at least a piece of the password, for example the length of
Background mode of attack if you think you know most of the password
High speed cue. Full support for multicore processors.
The ability to create their own databases and dictionaries.
Ability to stand prioretit processor to improve performance.
Automatic saving of the recovery process and resume if accidentally stopped.
Turn off the computer after the recovery.
Convenient and easy to use interface.

PDF Password Unlocker v4.0

PDF Password Unlocker it is an effective program to recover passwords encrypted Adobe Acrobat PDF documents. This is the easiest to use program to recover passwords and return program that allows you to not only open the encrypted PDF files and edit them and perform actions such as selecting text and graphics, add or edit comments, copied to the clipboard, change the contents of the document raspechatyvat.Prosto and show the path to Adobe Acrobat PDF, which you want to decrypt and click Start button and the program itself will do its job. The program is very easy to use and does not require any special skills, so that even a child can safely handle it.

With three modes of cracking the password, the program works fast and effectively. This program will automatically perform a complete scan of the document and will look for the password until it finds the result. The main characteristic of the program is that the program is developing a special scheme for each password cracking. For example, you can choose to brute force, if anything at all do not remember or do not know about the password. Also, you can choose to brute force with a hidden attack, if you remember at least a piece of the password, for example length. If you are sure that you know most of the password, you can try to attack mode reference.

Features:
Support for creating PDF documents in Adobe and other applications.
Recovers the password for opening documents.
The speed above nearly doubled compared with similar programs.
The rate of selection of the 4,000,000 options in the second for single prosessorov and to 8,000,000 in the second for multi core.

Features:
Three modes of cracking:
Brute force if anything at all do not remember or do not know the password
Brute force with a hidden attack if you remember at least a piece of the password, for example the length of
Background mode of attack if you think you know most of the password
Support for Adobe PDF versions from 3.x to 9.X.
Support for PDF files created by other applications.
Gives the opportunity to remove restrictions on copying, printing, etc. ..
Supports 40 bit RC4 ,128 bit RC4 ,128 bit AES and 256 bit encryption AES.
The ability to minimize recovery time by adjusting, if known to any part of the password.
Ability to create your own vocabulary.
Automatic saving of the recovery process and resume if accidentally stopped.
Convenient and easy to use interface.

Rar Password Unlocker v3.2

Rar Password Unlocker program that allows to quickly reveal any zaporoleny archives, including SFX archive (self extracting) with an arbitrary length password (both digital and alphanumeric content) and file size not more than 3 GB. Works with any of the ways to encrypt the contents of RAR archive (with encrypted / unencrypted file names). It has a large number of settings and options that allow the most rapidly and effectively to achieve the desired result.

Hacking is done by removing the password from the registry backup. This method does not require daily or even annual expectations, depending on other programs, burglary in which the method of enumeration values. This program was developed by a foreign company Haksoft and recently hit the market in Russia (July 2008), gaining a huge popularity from domestic users. This version is equipped with an English interface, but it does not hamper its use.

Operating system: Windows 2003/2000/XP/Vista/Seven
Language: English
Size: 14.3 MB

Download Link 1
Download Link 2

A Good Hacker Is Never Hacked

Posted by Asir Mohamed On Thursday 29 April 2010 0 comments





Protect Urself !
Follow These Simple Guidelines n u are done



  1. Stop using Internet Explorer and make the switch to Opera, it's more secure, plain and simple.
  2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.
  3. Get Adaware SE and immediately update it.
  4. (Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)
  5. Update your anti virus
  6. Boot into safe mode and run all three scans
  7. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.
  8. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it.
  9. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.
  10. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.
  11. Make sure your firewall doesn't have strange exceptions.
  12. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your passwords.
  13. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.

Good luck!

Can you do this?

Posted by Asir Mohamed On 0 comments




You can not make any folder named any of the following :

CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9

And many more...

Reason :
This is because these are windows inbuilt 'Reserved Device Names' .
Just avoid these words and name anything else !


Find who is Invisible on Yahoo messenger

Just go to

http://www.invisible.ir

and enter victims Yahoo! ID… Click go and you are done!
credit : site contributer :


it works !!

Sometimes some of your friends who appear offline in yahoo messenger may not be actually offline,they may in the 'Invisible' mode.This maybe if they are trying to ignore you or are too busy to talk to anyone.

There is this small trick that you can use to find out what the truth is.

Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check.The chat window will open obviously.

Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.
After loading the Doodle imvironment there can be two possibilities

1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously .See in the picture below:

Rename any folder with Extension

Posted by Asir Mohamed On 0 comments





Rename any folder with Extension {645FF040-5081-101B-9F08-00AA002F954E}
Example :
If you have a folder like : games
Press F2 or right click --> rename
Then type : games.{645FF040-5081-101B-9F08-00AA002F954E}
You can see the Magic!

The Folder icon change to Recycle bin and the file are Hidden

Then If you want to roll back as Folder
Removing Extension using Note pad
just Type
ren games.{645FF040-5081-101B-9F08-00AA002F954E} games

Then save as bat file
Example : key.bat

Then Double Click the: Key.exe
You can see the games folder

-cheers-

Top 10 Hacks of all Time

Posted by Asir Mohamed On 0 comments




My favorites At least

Here is a list off the top 10 hacks of all time.

  • Early 1990s
  • Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.

  • November 2002
  • Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.

  • 1995
  • Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.

  • 1990
  • When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.

  • 1983
  • Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.

  • 1996
  • US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.

  • 1988
  • Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.

  • 1999
  • The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.

  • 2000
  • MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.

  • 1993
  • They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.

Hacking into your own Account.

Posted by Asir Mohamed On 0 comments




The most Common type of trap some Novice HACKERS try to trick is somewhat like this:


Step-by-step Yahoo hacking!!! So many have been victimized by this, sending their passwords and hoping that they can retrieved a targeted account by following these:
It goes this way:


Log in to your own yahoo/Hotmail or any other E-Mail account. Compose an e-mail to: eg:
recoversecretcode@yahoo.com
. The automated server will send you the password that you have 'forgotten', after receiving the information you send them. STEP 3- In the subject line type exactly: password retrieve...etc, etc...

Don't ever fall into this !!!!!!!

It's a real scam. The only way to recover your password is going to your site and authenticate from there.

You will be asked for "secret questions" which you have filled during your sign-up. Thereafter the original passwords will be emailed to your alternate email account, which also you have provided during sign-up. It is very important to keep those "sign-up" information for your future use.

Some are earning so much money on this scam. They will ask you to send money, before they start the process. After receiving the payment, they're gone.

If there is a great need for you to crack or retrieved someone's email password, there are some who can provide it to you, choose the best, someone who will send you proofs such as screen shots, sent items or address book before they ask for payment.

But its all False. Do Slap these articles by commenting them where ever you find them.















" We do not promote/sponsor Hacking in any form, rather this website will help you gain entry into the minds of seasoned computer criminals, so that you can forestall their attempts and pre-empt all harmful attacks, you will be hence well equipped to detect the ways in which hackers can infiltrate your system."

This Blog would be idle place to share your thoughts. The Blog would focus mainly on Hacking E-books , Hacking Tactics , Hacking Tools ,Latest Software and More.... I would appreciate for your free reviews and comments. Please avoid unparlimentary words as well as racial words. Please contribute for a better success. Hope you all enjoy!!!