Now you all can invite me on skype for any kind of help required as my username is krackoworld

31 December 2011

List of Infolinks Highest Paying Keywords Ever

Infolinks, as you all knows about it. One of the largest advertising-publishing company ever in text-link ads. They pay at a minimum threshold of $50 via PayPal or $100 via check. Monetizing your blog/website with it will be a better alternative to Google AdSense banned users. Infolinks pays high revenue to their publishers based on the criteria of net impressions, CTR and another factor called as Keywords which 90% of the people doesn’t know.Therefore, Today I have come up with an top 100 Infolinks highest paying keywords ever. All you have to implement this keywords in somewhere of your posts or meta tags etc. Below is the collection of it.


Top 100 Highest Paying Keywords in Infolinks :

1. Purchase Structured Settlements – 53.48
2. Mesothelioma Lawyers San Diego – 51.47
3. Secured Loan Calculator – 51.35
4. Structured Settlement Investments – 50.45
5. Endowment Selling – 50.35
6. Mesothelioma Patients – 50.23
7. Mesothelioma attorney san Diego – 50.07
8. Austin Texas dwi lawyers – 50.03
9. New York Mesothelioma Lawyers – 50.01
10. Phoenix dui lawyers – 50.01
11. Secured Loans – 50.01
12. Insurance Auto – 50.00
13. Phoenix dui attorney – 50.00
14. car free insurance online quote – 50.00
15. students debt consolidation loans – 49.96
16. Pennsylvania mesothelioma lawyers – 49.87
17. data recovery Denver – 49.71
18. adverse credit remortgages – 49.56
19. bad credit remortgages – 49.47
20. data recovery service los Angeles – 49.37
21. Consolidating Students Loan – 49.30
22. Students Loan Consolidation Rates – 49.17
23. Boston dui lawyers – 49.02
24. Memphis car insurance – 48.86
25. conference calling companies – 48.64
26. dui attorneys los Angeles – 48.60
27. Georgia car accident lawyers – 48.36
28. san Diego dui defense – 48.32
29. Phoenix Arizona dui lawyers – 48.28
30. Los Angeles dwi attorneys – 48.20
31. Student Consolidation Loans – 48.15
32. free quote for car insurance – 48.11
33. irs tax lawyers – 48.08
34. nj auto insurance – 48.08
35. dui san Diego – 48.01
36. Los Angeles Criminal Defense Attorney – 48.00
37. Consolidating Private Student Loans – 47.96
38. Personal Injury Lawyer Chicago – 47.83
39. Personal Injury Attorney Pennsylvania – 47.82
40. Auto Insurance – 47.81
41. Lemon Law California – 47.63
42. Students loan consolidation interest rates – 47.59
43. Los Angeles Criminal Attorney – 47.59
44. Arizona dui Attorney – 47.45
45. Consolidation Student Loan – 47.44
46. Structured Settlement Buyers – 47.31
47. Culinary Schools California – 47.10
48. Student Consolidation Loan – 47.06
49. Instant Car Insurance Quote – 47.00
50. Iva debt help – 46.90
51. UK home owner loan – 46.67
52. endowment policy sales – 46.58
53. sell structured Insurance settlements – 46.53
54. College Loan Consolidation – 46.49
55. dui attorney Sacramento – 46.48
56. car insurance quotes – 46.47
57. Philadelphia personal injury lawyers – 46.37
58. Remortgaging – 46.20
59. irs tax attorney – 46.19
60. Consolidation Student Loan – 46.18
61. buyer Structured Settlement – 46.17
62. California mesothelioma attorney – 46.14
63. home mortgages for bad credit – 46.02
64. selling structured settlements – 45.96
65. phoenix dui lawyers – 45.90
66. sell structured settlement payments – 45.72
67. Donate your car – 45.56
68. Student loan consolidation – 45.46
69. Consolidate School Loans – 45.45
70. Injury Lawyers 4 You – 45.44
71. homeowner consolidation loans – 45.42
72. Colorado Truck Accident Lawyers – 45.41
73. Mesothelioma doctor – 45.09
74. School Loan Consolidation – 45.09
75. dui attorney San Francisco – 44.95
76. ny car insurance – 44.83
77. Mortgage refinance new jersey – 44.77
78. Structured settlement payments – 44.43
79. Car Insurance Texas – 44.41
80. Virginia Car accidents Lawyers – 44.35
81. Raid Data Recovery Services – 44.33
82. College loan consolidation – 44.28
83. compare car insurance rates – 44.14
84. Break down covers – 44.14
85. Remortgages Loan – 44.05
86. Austin Criminal Attorney – 44.14
87. Car Insurance Quotes online – 44.14
88. Structured Settlement Consumer Info – 44.14
89. Arizona dui lawyers – 44.05
90. eloan mortgage – 43.98
91. Consolidation of Student Loan – 43.95
92. Student Loan Consolidation Calculator – 43.94
93. Injury Lawyers 4 You – 43.94
94. Managed Hosting Services – 43.93
95. Bad Credit Home Equity – 43.90
96. Los Angeles Criminal Attorneys – 43.88
97. Home improvement loan rates – 43.88
98. auto insurance in Michigan – 43.79
99. dwi fort worth – 43.78
100. Structured Settlement Companies – 43.77

That’s it! I hope all you will like it…. and best of luck for 2012 also. Blessings.

29 December 2011

Advices on How to Uninstall any Software Properly

Simple Tips for Uninstalling Any Software

Sometimes, it is necessary that you remove any software from your system, which you are not using anymore, to get some free space for new software. You always need to install any software before you start working on it, and if you install some new software, then it must not interfere the working of other programs.

Why Uninstalling Software is Necessary?

It is very important that you uninstall software that you are not using, because, if you keep those files, they may also corrupt other files and make your system performance slower and slower. By uninstalling unused software, you can speed up your PC.

When any program is installed on your PC, many changes are made i.e., space is reserved for the addition of new entries into the windows registry etc. Therefore, when a program is uninstalled, lots of changes are made in the system, the same way as done by the installation of any application. And, it is sometimes, difficult for simple computer user to keep track of all these changes. So, for these types of users, third party tools are available in market that offers big ease to them.

There are many companies available that are offering such software installers or uninstallers to provide users the ease of operation.  An uninstaller is a third party program that exactly knows where installed software had made changes. You can specify while using these software the kind of un-installation you want; partial or complete. If you select complete, then it will completely remove the installed files from your system and vice versa. Similarly, there are also such software apps available that provide their own uninstallers along with installers.

How Uninstalling Software Works?

Uninstaller software keeps track of all the software installed on your machine; the changes they made in the registry of your system, in the form of logger. And, in the logger, some lists are available along with all the actions you need to perform at the time of uninstalling a program. These software applications are designed to reverse the installation process. The advantage of this type of software is that there is no chance of mistake that you can commit while uninstalling any software manually.

There is also some supplementary tool facility available in these apps. These supplementary tools in an uninstaller perform little tasks like removing browser history and maintaining backup of your data. Using software uninstaller is considered the safest way to remove any software properly.

  • Backup Windows Registry: It is always suggested that before uninstalling any software, you must keep back up of your windows registry files, because it will save you from many problems.
  • Never Install Any Software, If you are not sure how to uninstall: You should always use such software that have authorized signatures and provide your complete installation guide.
  • Check Reviews: Do not forget to check reviews before choosing any uninstaller, because, there are many such programs available that uninstall any software, but, in the end, they create problems for your computer. Such software is very harmful for your system. Therefore, you should consult software reviews.

This article has been written by our Silver star guest author Tim Edmonds

28 December 2011

PC Data Recovery Tips and Tricks

PC Data Recovery Tips and Tricks

Data loss happens for a myriad of reasons. Sometimes there is a mechanical error and a drive fails. Occasionally, the computer gets shaken, dropped or worse. While there are other things that can lead to a loss of valuable data from your PC, one of the most common causes is accidental deletion, meaning human error.

Whatever the reason for your data loss, we understand that it stinks. The good news is that more often than not, you can get your data back. The bad news is that it may not be easy. The following tips and tricks should help you if you ever find yourself in need of recovering some data.

1.) Don’t Panic.

Depending on why you may need data recovered, panicking and trying to access your data could cause more harm than good. Take a deep breath and go from there.

2.) Try a powerful software data recovery solution first.

This only works if your PC still works. If there has been a mechanical error or an accident that caused physical damage to your computer, this may not work. Often, however, if you have accidentally deleted a file or have suddenly discovered that some files and folders have gone missing this could work.

Since you don’t want to keep writing on the disk where the missing files live, and risk overwriting your data, you should go with one powerful product like PCKeeper. You want the best odds of getting your data back while downloading or installing as little new software as possible.

3.) Shop around and ask questions.

If you don’t get results with PCKeeper, or are unable to try a software solution, you can use a data recovery service. Before you send it in, however, keep in mind that these services vary greatly in prices and what they offer.

Call multiple services and ask questions about more than just pricing. You want to know how long service takes. Ask if they use clean rooms. Find out how they intend on getting the data back to you. See how long the whole process will take. Ask if you are charged regardless of whether or not any data is recovered. Finally, ask if you can send in your PC or drive for a free estimate to know how much may be recoverable and what it is going to cost you.


When you need data recovery for your PC, it can be a scary time. Whether you are hoping to get back your digital home movies or the novel you have been slaving over, you want to get as much of your lost data back as possible. The three tips and tricks here can help to make this process less stressful and less expensive.

To make this even easier, consider downloading PCKeeper now. It is full of great features and functionality including data recovery. This way, in the event that any of your files or folders happen to mysteriously go missing, you have a great way to potentially get them back at your fingertips.


This article has been written by our Silver star guest author Tim Edmonds .

Increase the Speed of SATA Hard Disk’s in Windows Vista

Hello! there last night I have founded an trick to increase Windows Vista Speed by optimizing hard disks. By default Vista does not make use of the full potential of the new SATA hard disk’s. We do not get the full/actual power of the Hard disk that we use. Therefore, In order to get it, we just need to make a small change in it given below.

Procedure -

  1. Go to the Start menu and type Device Manager in the search box.
  2. Expand the Disk Drives section by clicking on the plus sign near it.
  3. Now Look for the internal SerialATA (SATA) drives under it.
  4. Right Click the disk and select properties.
  5. Go to the “Strategies” TAB.
  6. Now click the option “Enable Advanced Performance “ on it.
  7. Select OK and Close the Device manager.
  8. Restart your system and Done!.

Thanks ! Enjoy it na…

27 December 2011

PC Clean-up Techniques

PC Clean-up Techniques that Work

You'd be surprised what's hogging hard drive space and gumming up the registry database on your personal computer. If your computer is lagging a little or running remarkably slow, you probably need to give some thought to computer clean up techniques that will work to get your computer in tip top shape again.

Of course, removing spyware can help your personal computer run more quickly. Doing a spyware scan can help you detect and remove any spyware that has installed itself on your computer. Of course, most people don't want to have spyware on their computer anyway, so scanning for spyware and getting it removed can kill two birds with one stone, protecting your privacy as you get software off your computer that is using computer resources and causing it to drag.

Another important thing you can do to clean-up your personal computer, is delete multiple instances of a particular file from your hard drive. If you have duplicate files, the duplicates are just sitting there taking up space and loading your computer down with extra baggage. Removing duplicate files can get your computer running faster and more smoothly.

Use a disk clean-up tool to free up space on your hard drive. Freeing up space on your hard drive will help your computer run more efficiently. Empty the recycle bin on your computer and remove temporary files on your hard drive. Your disk clean-up tool will notify you about software programs and files on your hard drive that you can remove if you so choose, the hasten the speed of your computer. If there are optional Windows components that are not useful to you, delete them, for example. Get rid of programs that you installed that you no longer use.


Defragmentation of your PC can also help you clean it up and get it running more smoothly. Files may be fragmented and stored in separated locations on your computer. These fragmented files must be pieced back together by your computer whenever you go to use them, slowing your computer down significantly. If you do defragmentation (otherwise known as “defrag”) to clean up and reorganize the files on your computer, this will speed up your computer's overall speed.

Keeping your PC clean can save you tons of time as your computer ages. Computers need to have regular clean-ups in order to continue functioning in tip-top shape. In order to keep your computer running like it did when you first purchased it, do regular defragmentation and clean-up, checking it for spyware to free up resources on your computer as well as protect your privacy.


This article has been written by our Silver star guest author Tim Edmonds

Free Virus Protection

The Effectiveness of Free Virus Protection

Free Virus Protection software protects computers all over the world from some viruses some of the time. But how effective is it really?

Typically, free virus protection software provides the barest essentials as far as the security of your computer is concerned. Of course, free virus protection software is designed to motivate you to want to purchase more expensive, paid versions of anti-virus software. Free virus protection software will often scan your computer for malware (software that was created with a malicious intent), sometimes automatically, but the free version usually leaves out a variety of desirable features that most people decide that they “need”.

In reality, paid virus protection programs fail to protect computers from viruses 100% of the time, especially as viruses have become more sophisticated over the years. So, even if you pay for virus protection, you won't be completely safe. However, special features included in paid anti-virus software programs that protect Internet users from identity theft is often regarded as valuable. Parental controls to protect children surfing on the Internet often entice people to upgrade. However, these features do not necessarily contribute to virus protection per se. Rather, these features simply add to the value of the product overall, manipulating many would-be free virus protection users into upgrading.

Some free virus protection programs offer features like a firewall and behavioral malware detection software. Behavioral malware detection is an important feature these days. Free virus protection software that has behavioral malware detection is able to determine whether software is malware based on how it behaves on your computer.

Perhaps one of the reasons why people most often choose to go with a paid anti-virus product is because of the technical support. Typically, free virus protection does not come standard with technical support. Some free virus protection software will include email support, but paid virus protection software, in contrast, often comes with 24 hour help that many people feel they need when their computer is infected by a virus. It makes sense that anti-virus software developers would not be able to offer their technical support to people downloading virus protection freebies (because they have to pay people to staff the technical support lines). And it may be worth it to pay extra for this aspect of anti-virus software in some instances. Use your best judgment and take into consideration the way you tend to use your computer when making the decision. Many free virus protection software programs will provide you with the protection you need, as long as you stay smart and stay safe when you search the Internet, avoid sharing CD's, and opening suspicious attachments.

This article has been written by our Silver star guest author Tim Edmonds


25 December 2011

Skype Credit Adder and Generator

Skype, as you all knows that it is a name of the company of Microsoft which allows its users to interact with the world by audio or video calling through VoIP solutions. But the only drawback is that we can call anybody through it unless until he/she should also be online at that time. He should have an proper username and id. If we want to call him anytime, we should require credits which is not free and available at premium levels. Therefore, today I am going to provide you some free software's below like Skype credit adder, generator, cracker etc. which would easily help you to add as many credits/money you want.

Download links -

1. Skype Credit Adder

2. Skype Credit Generator v3 or Skype Credit Generator v5.2

3. Skype Credit Cracker

4. For more, you can also search on Google and torrents itself.

Note- Don’t misuse this softs because it is made up for educational purposes only and i am taking no responsibility for any kind of damage you done by this.

24 December 2011

MAC Data Recovery

Get you lost data back, without paying a single dollar!

While, quickly removing junk files from your hard disk, you may also mistakenly drag one of the important files into the trash bin and empty it, without even thinking of losing any important file. Oh! I deleted my important files! It happens almost with all of us. You think it’s gone into the ether? Well, that’s not the case, it’s still hanging in there, and you can get it back, without even getting freaked out.

All you have to do is to find a way out for your lost files… but the question is, how? It’s very simple. With the right data recovery tools; it’s just a matter of few clicks, but data recovery tools won’t come for free, right? What if you get one or may be two for free? Yes, if you have recently lost a file, and biting your nails to find a way, then stop and install either one of the tools mentioned below to get your lost data back again:

Test Disk & Photo Rec

Test Disk is an exceptional data recovery tool for Mac computers. You have to believe the power of Test Disk to restore lost files. Test Disk is specifically developed to retrieve data from lost hard drive partitions and fix the faulty disks, which fails to boot. Basically, all these issues are initiated by corrupt application, or errors caused by users, such as mistakenly removing files from the hard drive. Test Disk allows you to recover your lost files, without putting up too much effort!

Photo Rec is a handy feature included with Test Disk, which will mesmerize you with its cool features. Photo Rec is basically developed to recover mistakenly deleted files from external devices, such as memory card, USB drive, and external hard disks. You can even recover lost files from the standard hard drive and CD drives. If you have lost files from your hard disk or external device, install Test Disk to recover lost files. However, Test Disk doesn’t have any graphical interface, but it’s not a big deal to steer this application, as it offers you instructions at each step.

Exif Untrasher

Exif Untrasher is the next free data recovery tool in line for Mac users. If you have mistakenly lost your birthday pictures, or any other important pictures gallery, and you’re freaked out, then stop regretting, and install Exif Untrasher to restore files within couple of minutes. Yes, couple of minutes! Exif Untrasher is a strong data recovery tool, which allows you to recover deleted or formatted pictures from external devices, such as USB stick and digital camera on Mac OS X.

Though, Exif Untrasher is of great help in recovering lost pictures, but it only allows you to recover JPEG formats. Exif Untrasher allows you to restore lost or deleted JPEG pictures from your camcorder or digital camera. Although, it’s a big drawback of this tool, but still, you can install it for free to recover the deleted JPEG pictures from your Mac. You never know, when it comes in handy for you. So, install it on your Mac, and stop worrying about losing your important pictures.

About the guest author-

This guest article is by Tim Edmonds who is a software development writer interested in Mac fix software.

Download McAfee Mobile Security App for iPhones

McAfee app for iPhonesNow a days Apple iPhones are loosing its security concern because many people are doing jailbreaking and installing third party applications on it. This lead to viruses and hacking mainly. Therefore, one of the best Security developer McAfee comes into play to launch a new app for iPhones named as McAfee WaveSecure which includes protection from coming viruses and hacking/cracking of useful information etc.. This is known as Mobile Anti-Theft App for iPhone. Below is the screenshot of it.


Some features of this App are -

1. Allow users to backup pictures, videos, contacts.

2. Remotely track location using location & track.

3. Restore online data.

4. Upload media and sharing.

Requirements -

This iTunes app is compatible with the iPhone, iPod touch and iPad mainly, but it requires the iOS 4.0 or later.

Costs -

This app costs around $20 from Apple iTunes store.

Size -

1.20 MB.

Download now -

Click here to download.

That’s it !

23 December 2011

Post on KrackoWorld My Forums – Grow Community

logoWell! your wait is over as our new Forum has been launched and ready to use it powered by Nabble. Now you can post your threads for free and get answered by me or by other people. we have to grow our community and spread the word of Ethical Hacking and Security Tips. Below is the screenshot of my new Forum…

1. Have a look at My Forums


2. Be a part of this Forum by login and registering there


3. Post Questions, Answers, Messages, Notifications, Jobs, anything etc. related to our site niche


4. Discover people and his/her posts


Note by admin - Please post off topic questions related to any article in my site at here and be a part of this forum plus tell others about that.


22 December 2011

Antispyware Freeware Review

Spyware, a real threat that can overwhelm you!
As its name says it all, the word “spyware” refers to undercover software, which is spread by advertising agencies to spy on you. Spyware is also recognized as “adware”. Spyware is basically malicious software, which gets installed on your computer inevitably. Some of the advertising agencies use spyware to lure you into purchasing their software. A spyware usually shows you false pop-ups and fake error messages, which seem to be quite genuine to attract you, so that you can click on them.
The fake error messages or pop-ups usually appear as banners, ads, apps and so on. Once you click on any of the pop-ups, you are taken to the malicious website. Some types of spyware can even record what keys you type on your keyboard. In order to avoid spyware infections, you have to install anti-spyware.

Why anti-spyware is important?

Most of the anti-spyware software offers real-time protection that can block spyware installation. In addition, anti-spyware programs are capable enough to track your web surfing activities, and lock your browser, so that it can’t be changed by spyware. The anti-spyware techniques come in very handy for online surfing that is why, anti-spyware programs are recommended to download. Here are some free anti-spyware programs for Mac OS X:

Sophos Anti-Virus for Mac

Sophos Anti-Virus Home Edition is completely free and simple to install on your Mac. It is really very easy to use. It keeps your Mac protected from viruses, spyware, Trojan horses, and worms, without even affecting the processing speed of the system. Best thing about Sophos Anti-Virus is that it offers comprehensive anti-virus solutions. You receive top quality 24/7 business-grade protection support from SophosLabs experts. Sophos just not only protects your system from the known threats, but it also saves you from unknown threats.
Sophos Anti-Virus offers wide range of strong and powerful features that you expect from a top quality paid anti-virus. Sophos efficiency and reliability is well-known, it will not annoy you with unnecessary warnings. Once it’s installed on your Mac, it will quietly run scans in the background. All you need to do is to check it rarely to make sure everything is smooth and on track. It also allows you to run custom scans. So, it totally depends upon you, how you want to use it.

ClamXav for Mac

ClamXav is a free anti-virus program that gives you limited real-time protection against security threats. ClamXav has the ability to scan email attachments and run custom scans. ClamXav supports limited Mac operating systems, such as Tiger, Leopard, Panther, and Jaguar. It is based on ClamAV scanning search engine, which allows it to offer protection against both Intel based and PowerPC systems. ClamXav is best suited for home-based Macs. If you’re a corporate Mac user, then it’s best for you to go for any other free anti-spyware tool, because it offers only limited features. ClamXav might not attract you with complete set of features, but it’s free to download, and worth giving a shot!


About the Guest Author-

This guest article has been contributed by Timothy Edmonds. Tim Edmonds is a freelance technical writer with over a decade of professional experience. He is currently interested in the reviews of mac cleanup software and have his website at here.

21 December 2011

Website Hacking Technique through DNN

DNNIn the past articles, I have covered almost all type of website hacking methods by explaining you with complete details. Therefore, today I have founded a new way of web hacking known as DNN - DOTNetNuke which allows us to upload any thing to the web server of your victims domain etc.. Actually DotNetNuke is an open source web content management system based on Microsoft .NET technology. Please perform this attack in Google chrome, Mozilla Firefox or Opera only. Below is the procedure to perform it by simply using Google search engine.


1. Open

2. then search this dork to find vulnerable sites using Google or you can also find it yourself by doing other methods also…


3. Now you will find many websites in the Google search as given below-

google hack DNN

4. Choice one of the sites above and open it in the browser.

5. For ex- you choose-  where xyz is domain name

6. Now replace-  /Home/tabid/36/Language/en-US/Default.aspx
                                        with this

7. and hit enter…

8. Hence, you will see this screen in the browser-


8. Choose the 3rd option above and then at the address bar, type this JavaScript below-


9. Done! Now you have the upload option coming at the site like this-

demo 2

10. Now you can upload any type of file you want as for ex- txt, swf, jpg, gif, pdf Files etc..

11. After uploading files, your file is save in root folder and your address will be such as and have full access.

12. Chapter closed here…

Tip - You can also use Google dork such as inurl:"/portals/0" to find more vulnerable sites above.


Download SniperSpy for MAC Users

Well SniperSpy Mac is the cutting-edge solution or software to expose the truth on a Mac OS X based computer. After you install the hidden logger program onto the Mac, it will begin silently recording ALL activities and upload them to a secure online account. You can view logs from any other computer, smartphone or web browser. Activities recorded include keystrokes typed and complete chat conversations in iChat, Yahoo! Instant Messenger, AIM and Skype. Also recorded are websites visited, applications ran and pasteboard logs. The program also captures screenshots for a graphical representation of the activity. Unlike any other Mac monitoring software, SniperSpy Mac allows you to securely perform LIVE surveillance and control on your remote Mac from anywhere. You can also view the remote screen like a television and perform other commands instantly.

Steps to install it -

1. First of all you need an account on the SniperSpy Mac server. Go to the Register Account page to create your username and password. This step can be done from any computer or smartphone web browser.

2. On the target Mac you intend to monitor, download the SniperSpy Mac Logger Application here.

3. Once the Logger downloads, double-click the logger.pkg file to execute the installer…

4. Follow the on-screen prompts to complete the installation below.

sniperspy inst

5. After the program is successfully installed, the Logger window will open. At this point, input your username and password and click Verify. Then proceed to configure Sniper Spy to suit your needs. Make sure to click Save anytime you make a change.

6. Once you have configured the Logger to suit your needs, allow 15 minutes to pass before checking your logs for new records. To view your records, you will need to sign into your online viewer account.

For more help, check out the SniperSpy Mac User Guide.

Editors Choice- 4.5/5.0

Also see Sniperspy for PC here and for mobile at here.

Rapidshare Premium Link Generator

Hi! friends I am back with a post on Rapidshare premium link generator and this contains websites which provide ultra fast speeds from Rapidshare downloading by changing its url to new premium one. This should be necessary because now a day Rapidshare are giving very slow and poor speeds to free user and every time concentrating on the premium accounts which are on payments means. Therefore, Below is a screenshot of Google about the websites providing these services( i.e fast downloading from Rapidshare for free ) etc. Enjoy !


All you have to do is visit one of these sites above and follow their criteria for downloading.

That’s it ! The Power of Google….

Hack Facebook and Twitter Password on Wi-Fi Using Firesheep

Accessing your Facebook or Twitter account on public networks like your college, office or any unsecured Wi-Fi always possess a risk to be hacked. This is why because they are not using httpsprotocol like Gmail or any other. Therefore, today we are going to learn a simple trick to hack Facebook and twitter accounts on Wi-Fi and also the method of protection from it etc..


1. First of all Download firesheep which means an Firefox extension.

2. After installing it, now it can open a sidebar window into your Firefox browser.

3. Therefore, it will show all the people who are connected to unsecured Wi-Fi network at that place. Once they login into your Facebook or twitter account, you will get a notification and with a single click you can login into their accounts easily.

Principle of Working behind it – Cookie Hijacking mainly.

Protection - The best way to protect yourself from such a hacking trick is to avoid using your Facebook or twitter accounts on a unsecured Wi-Fi networks as it is security less loopholes in it.

Note:- This article is purely for the educational purposes only.

19 December 2011

Secret Hack Codes in your Android

Now a days as you all know great smartphones are coming with the Google best OS known as Android. This is my first post on Android and starting from secret hack codes etc. This codes are successfully tested by me on my latest Samsung galaxy Android 2.2. Note- Do not usually play with these codes because sometime it may destruct your phone also.


1. Complete Information About your Phone 



  • Phone information
  • Battery information
  • Battery history
  • Usage statistics

2. Factory data reset



  • Google account settings stored in your phone
  • System and application data and settings
  • Downloaded applications

It'll not remove:

  • Current system software and bundled application
  • SD card files e.g. photos, music files, etc.

3. Format Android Phone


It'll remove all files and settings including the internal memory storage. It'll also reinstall the phone firmware.

Note: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think it twice before giving this code above.

4. Phone Camera Update


It shows following 4 menus such as:

  • Update camera firmware in image (Don't try this option)
  • Update camera firmware in SD card
  • Get camera firmware version
  • Get firmware update count

5. File Copy for Creating Backup


This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.

6.  Service Mode


This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.

7. WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests…)

*#*#232338#*#*                  - Shows Wi-Fi MAC address

*#*#1472365#*#*                - GPS test

*#*#232331#*#*                  - Bluetooth test

*#*#232337#*#                    - Shows Bluetooth device address

8. Codes to get Firmware version information:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate

*#*#1234#*#* - PDA and Phone

*#*#1111#*#* - FTA SW Version

*#*#2222#*#* - FTA HW Version

*#*#44336#*#* - PDA, Phone, CSC, Build Time, Change list number

9. Codes to launch various Factory Tests:

*#*#0*#*#* - LCD test

*#*#0842#*#* - Device test (Vibration test and Backlight test)

*#*#2663#*#* - Touch screen version

*#*#2664#*#* - Touch screen test

*#*#0588#*#* - Proximity sensor test

*#*#3264#*#* - RAM version

That’s it !

15 December 2011

iPhone, iPod Touch and iPad Jailbreaking

Jailbreaking is the process by which Apple’s mobile operating system known as iOS is completely modified to run unsigned applications or code in order to gain access to files that Apple wouldn’t normally let you access. Thus limitation imposed by Apple should be removed. Such devices include the iPhone, iPod touch, iPad, and Apple TV.

Jailbreaking adds an unofficial application installers to your iOS device such as Cydia, which let you download any 3rd-party applications, tweaks, and extensions that are unavailable through the App Store.

What is Cydia ?

In short words, Cydia is like the App Store of jailbreak applications which includes lots of apps, tweaks, and mods etc. Just like the App Store, you can download and install Cydia apps effortlessly.

Is Jailbreaking Legal ?

Yes, Jailbreaking is completely legal for a long time. First Jailbreaking was considered illegal by the US government based on copyright litigation but in July of 2010, the US government passed a rule that made Jailbreaking legal.

What are the different types of jailbreaks ?

The are 3 types of jailbreaks:

tethered, semi tethered and untethered mainly.

Benefits of Jailbreaking-

The main reason behind Jailbreaking is to have the ability to install third party applications and tweaks that Apple doesn’t or wouldn’t approve in the App Store. For ex, Apple doesn’t allow you to customize your iPhone by changing app icons or the general user interface of your device but thanks to the jailbreak community which allows us to change the way of your iPhone looks.

Does it Cost Anything to Jailbreak ?

No. You should never pay for a jailbreak.

Is Jailbreaking the Same thing as Unlocking ?

No, Jailbreaking and unlocking are two different things.

How to Perform Jailbreak ?

Section Coming Soon…

That’s it !

Reliance 3G Speed Hack 2011- 100% Working

Hey guys! Again back with a bang to show you Reliance 3G hack for High speed downloading and surfing at broadband terms. All you have to do the following trick plus some settings to enjoy it responsibly. This trick is tested by me in Punjab successfully and hope will work fine in all other states of India etc..


Trick 1-

Note: Always try at low balance only.

Subscribe Internet by trying *123*099# and to check your Usage – dial #367 and listen. If you are getting Message as ” Unable to Process request ” then keep on trying. This Message is due to network problem. The plan offers 2.5 GB for 1 month + additional 99 rs of net usage.
You can use both rcommms and rcomnet.
Here is settings for Different APN working with Reliance.
1. rcomnet – Just write APN as rcomnet and leave everything as default. No proxy and port needed.
2. rcommms / rcomwap – APN – rcommms (No disconnection) or rcomwap
Proxy no. – or
Port Port- 8080
When your 2.5 GB is over then u can re-subscribe the plan again by-
First u need to unsubscribe by sending sms Unsub 8024 to 155223 or Unsub 8022 to 155223. If u get no Default configured message then call 155223 and then select language by pressing 1 for English and 2 for Hindi.
Then type code as 2084 and press 1 to confirm. After that u will also get message as you have successfully unsubscribed.
Now subscribe again by dialing *123*099# and enjoy the plan trick/hack again.

Trick 2-

New Reliance Free GPRS Trick with UC Browser 7.7 & Opera Mini 6 Handler.
Step 1 - Download Opera Mini Handler from Here
Step 2 -Install it in your Mobile and use your default RCOMWAP Settings for s60 users.
Step 3- Now in the handler menu just use these settings below by the backstring box.
Step 4 – Done ! Now Enjoy Free Gprs in your Reliance Mobile.
Note - Minimum Balance will be 1 rs to use this trick.
Enjoy Free Gprs in Reliance Mobile for Lifetime.

Comments are welcomed !

Internet Downloader Manager 6.7 Cracked | Full 100% Working Patches

Now a days Downloading means everything to Internet thus I am getting lots of request from my readers to give an full cracked downloader for downloading things. Therefore, I thing IDM is the best for you people because it has many great features like increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages.

It supports many proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads.

Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

Note- First Download uTorrent software from Google and then click downloading below.

Download Here

14 December 2011

What is Penetrating Testing ?

Well! Its being an long time of 3 weeks when I have not posted an single article on my blog due to my final exams of ECE but now my exams are over and get ready to write as much I can in my holidays. So therefore, today I am going to tell you about Penetrating Testing and its types properly. Penetration Testing is the act of evaluating the Security of system or network by exploiting vulnerabilities or is a method of evaluating the security of a computer system/network by simulating an attack from malicious outsiders and malicious insiders etc.. This will determine whether unauthorized or malicious activity is possible in a system or not.

Why Penetration Testing only ?

  • Penetration testing can identify the vulnerabilities that is not identified by an automated vulnerability scanners.
  • Determining the feasibility of a particular set of attack vectors
  • Determining the Critical Vulnerabilities .
  • Testing the ability of network defenders to successfully detect and respond to the attacks
  • Testing stability of the system against the DDOS attack and many more.

White Box vs.. Black Box

Penetration testing can be performed in different ways as given below. The methods can be classified into three types based on the knowledge about the System being tested.
White Box:
In white box testing, Pen Tester know everything about the system such as source code,network diagrams, IP addressing info.
Black Box:
Black box testing assumes no prior knowledge of the infrastructure to be tested. The testers must first determine the location and extent of the systems before commencing their analysis.

Web application penetration testing :

This testing will be used to find the following web application vulnerabilities:

  • SQL Injection
  • XSS(Cross site Scripting)
  • DDOS
  • Clickjacking
  • Buffer overflow
Penetration Testing Tool:
Penetration Testing tools are used as part of a penetration test to automate certain tasks, improve testing efficiency, and discover issues that might be difficult to find using manual analysis techniques alone.
As a Penetration Tester, you will need lot of Penetration testing tools to test the Security of system. Searching ,downloading and installing the required software may take time. You can use a Penetration Testing Distribution instead.
What is Pen Testing Distribution?
Penetration Testing Distribution is an open source Operating System(Derived from Linux/BSD) that combines all required application for testing the security of system. It is specially developed for Security Professionals(Pen Testers/EthicalHackers/Forensic Officers... e.g.. Backtrack 5 Linux .
What is the advantage of Penetration Testing Distribution?
All Required application for security test are gathered in a single Operating system. You don't need to search for application, Save your time. Penetration Testing Distribution are open source and free to use. You can install in pen drive and bring it anywhere.

Thanks !

20 November 2011

Bangladesh Supreme Court Website Hacked


Wow! on 11/11/2011, the official website of the supreme Court of Bangladesh was hacked by the Bangladeshi Underground Hacker 3xp1r3 Cyber Army. Very soon it was recovered by the information technology experts of the court around 8:00pm. In this process, all the data was safe because they want to give them simple warning.

Head of IT department of the apex court Quddus Zaman confirmed the restoration of the site, Earlier, Supreme Court registrar A K M Shamsul Islam told , "A person from Singapore called me up in the morning & said the website of the Supreme Court has been hacked. Several others also phoned me later and complained about it."

That’s it from the KrackoWorld’s News Centre.

Learn How to Hack Twitter Accounts

twitter accI thing all of you know that Twitter is one of the greatest social networking sites ever at present in which fans and followers plays a vital role. Its Alexa rank is 9 and contains over 4,842,211 links as per now. Therefore, Today I am going to tell some hacks and cracks about it which make hacking interesting and enjoyable because I am coming lots of email regularly regarding it (that how to hack Twitter).

1. Phishing Attack via Fake Login Page

1. First of all download Twitter Fake Login Page from Here.
2. Extract all the files in a separate folder.
3. Now make an account at and after being registered, upload all the data I have provided in step 2.
4. Done! Hence Copy the twitter.htm url in your 110mb account and distribute it in your friends to sign in and watch.
5. Once your victims entered his/her login information at that page, all his/her sensitive information along with its username and password comes into your account with the help of a file named as pass.txt
6. Enjoy… you have successfully hacked your victims Twitter account.

2. Keylogging

Hence keylogging makes Twitter account hacking very easy. You can read my post on Sniperspy Keylogger here and Hardware keyloggers at here.

3. Social Engineering and Primary Email Address Hack

4. Cracking passwords via Dictionary Attacks

Read my previous post here to understand the concept of Dictionary attacks via Brutus.

5. Harmful Scripts and Viruses

6. Cookie Stealing techniques

Click here to know more…

Check your Chinese Phone Whether its IMEI No. is Original or Not ?

check-imei-number-onlineAs you all knows that IMEI stands for International Mobile Equipment Identity which means every phone has its unique IMEI No. for its identity. Last year, our government has banned many Chinese phone and also other brands like Alkatel, Sigmatel, GFIVE, Spice, Carboonn etc. due to their invalid IMEI number. So its your duty to first check any phone IMEI no. before buying it by the given process below-


1. Press *#06# on your mobile handset and note down the 15 digit IMEI number carefully.
2. Now Compose a new message from your mobile >> Type your 15 digit IMEI number >> Send it to 53232
3. If you get “Success” as the reply, then your mobile IMEI number is valid.
4. If you get “Invalid IMEI” as the reply, that means your IMEI number is not valid.
5. Done!

Never Believe in Readymade Software's like Facebook Password Hacker and Crackers

Now a days people are getting curious to know about Facebook Hacking and Other cracks because they want to be a perfect hacker like me and another fact is that they also don't want to do nothing instead of tiring readymade software's like Facebook Password Hacker,Cracker, PayPal money adder, Gmail username & password Cracker etc. Hence the result is simple they get failed or fed up. As Hacking or cracking happens with our best knowledge,tricks and a small help of any software. So in this post, I wanted to say that don’t believe in such software's which says Hacking in 1 click and on payment seats. Many websites claim that their services can hack/crack Facebook passwords just for $50-100 in minutes, in real they are all scam and time wasting issues. Google,Facebook,Yahoo are that companies which cannot be fooled or hacked by any such single software in KBs because if it is possible then what the security experts of these companies are doing to bring the people…

Fb hacker and cracker softs

Final point

Never believe in above Readymade Software's which are on Payment basics or says that they can hack any accounts in seconds. So just avoid goggling about that software's. Here is the real ways of Facebook Hacking.

If you have liked the post, then just donate us some amount to my email- and be a valuable reader.

18 November 2011

Top Hacker Tools 2011

The "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date & easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.

Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.

Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol

TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.

Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).

DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.

GFI Languard
GFI Languard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil's advocate alerting you to security vulnerabilities.

Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.

OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.

Kismet is an 802.11 wireless network sniffer - this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.

NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.

John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix.

IP Filter
IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.

fport identifys all open TCP/IP and UDP ports and maps them to the owning application.

OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.

SAINT network vulnerability assessment scanner detects vulnerabilities in your network's security before they can be exploited etc.

Thanks! Enjoy…

11 November 2011

Hack Facebook Accounts Via FB Trusted Friends Password Recovery Feature

Its being a long time since I have posted an hack on Facebook Accounts, but today we are going to do it by some twist which means it is all different than Phishing, Keylogging and other Social Techniques. Hence, the process is Simply Facebook Trusted Friends Password Recovery Feature which is announced by Facebook earlier which is easily exploitable by us. Also Note- Last month Facebook has announced that around 60,000 accounts gets possibly hacked by this and they are going to fix it soon by doing some changes to it.

What is Facebook Trusted Friends Recovery feature ?

In this, if you ever lost your password and you don’t have any access to your default email address than this feature will comes into play by sending request to your 3 trusted friends and hence gaining your account password again.
For this technique you need to create 3 fake Facebook accounts and you need to surely add these as friends into your victims account.

After success full addition of your fake accounts into victims account as friends follow the below steps-
1. Go to and click on Forgot your Password ?

2. Than you will get something like below just enter the details you know about him i.e. Username, email address and full name.

Fb pic

3. After entering everything, click on search button.

4. Now next click on No Longer Access to These.

5. After that, Facebook will say you to enter new email account that you have now full access to send you the recovery details. Note-I suggest you to enter a Fake or Temporary email address for safety purpose.

6. Than it will promote you to enter the Security question, well if you have some guesses about that one than that’s ok but if you don’t know it than simply enter 3-4 wrong answers and it will take you to the 3 trusted friends recovery page like below-

Fb pic 2

7. Now just click continue & Facebook will ask you to choose 3 trusted friends, choose the 3 fake profiles of your which you have created earlier and added into the victims account.

8. After selecting 3 accounts Facebook will send security codes to these accounts, just enter these codes and you will get Password Resetting email from Facebook on the account you created in Step 5.

9. Note- If you and your 3 friends are agreed to hack a single person account (victims), then this trick is considered as the best one because your 3 friends will easily give you security codes etc.. Condition- Your 3 friends will be added to your victims account.

That’s it ! You have hacked Facebook Account.

Introduction to Reverse Engineering

Acc. to Wiki, Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function & operation. It often involves taking something (e.g., a mechanical device, electronic component, software program, or biological, chemical or organic matter) apart and analyzing its workings in detail to be used in maintenance, or to try to make a new device or program that does the same thing without using or simply duplicating the original etc..

Reverse-engineering is especially important with computer hardware and software. Programs are written in a language, say C++ or Java, that's understandable by other programmers. But to run on a computer, they have to be translated by another program, called a compiler, into the ones and zeros of machine language. Compiled code is incomprehensible to most programmers, but there are ways to convert machine code back to a more human-friendly format, including a software tool called a decompiler.
Reverse-engineering is used for many purposes: as a learning tool; as a way to make new, compatible products that are cheaper than what's currently on the market; for making software interoperate more effectively or to bridge data b/w different operating systems or databases; and to uncover the undocumented features of commercial products.
Reverse-engineering can also expose security flaws and questionable privacy practice.
With the help of Reverse Engineering we can modify a software at own way... Like we can change the name of Software and also convert Trial Software to License one... n many more.
So Reverse Engineering is a hacker friendly tool... Use it n Enjoy responsibly..!!


1. OLLYDBG TOOL: Important one !
Download Link:

The Hex Workshop Hex Editor is a set of hexadecimal development tools for
Microsoft Windows, combining advanced binary editing with the ease and flexibility
of a word processor. With Hex Workshop you can edit, cut, copy, paste, insert, and delete hex, print customizable hex dumps and export to RTF or HTML for publishing. 
Download Link: HexWorkshop Tool


Have a great day! Peace…

Steganography‎- Hide Files beyond Images

In actual, Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. But here we will use Steganography to hide files beyond images acc. to modern Computer world. Therefore below I am writing the procedure plus some other steps to restore things again when Steganographed.

How Can We Hide the File In Image...

1. Gather the file you wish to bind, and the image file, and place them in a folder. I will be using D:\New Folder
-The image will hereby be referred to in all examples as xyz.jpg
-The file will hereby be referred to in all examples as New Text Document.txt
2. Add the file/files you will be injecting into the image into a WinRAR .rar or .zip. From here on this will be referred to as (secret.rar)
3. Now Open command prompt by going to Start > Run > cmd
4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd D:\New Folder]
5. Type [copy /b xyz.jpg + secret.rar xyz.jpg] (remove the brackets)
Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are 2 options that you can follow
a) Change the file extension from xyz.jpg to xyz.rar, then open and your file will be there.
b) Leave the file extension as is, right click, open with WinRAR and your file will be there.

Enjoy Hacking...

Mobile Bluetooth Hack

bluetooth-hackWell all of you know that Bluetooth is used to send/receive data from one phone to another phone, but today I am going to tell you the real power of Bluetooth to take advantage of your victims phone and do whatever you want from the given topic below with the help of a software (jar file) named as Super Bluetooth Hack 1.8. Enjoy !

Here is a list of what you can do when you have hacked the other phone.

  • Read Messages. (They are no more personal)
  • Read Contacts. 
  • Change Profile !
  • Play Ringtone even if the phone is silent (Annoy your classmates!)
  • Play songs from the hacked phone in the same phone.
  • Restart the phone (Show some magic to your friends!)
  • Switch off the phone (Ultimate thing that you can do!)
  • Restore Factory Settings (Do this to the most organized one and run away quickly!)
  • Change Ringing Volume (You have enough experience how to use it. Don’t you?)

Follow these steps to hack any Bluetooth enabled mobile phone.

  1. Download Super Bluetooth Hack 1.8 and also check that your mobile is in the list of supported handsets from the link provided. After you have downloaded the .jar file, install it in your mobile.
  2. There is no need to install the software in the mobile which you want to hack.
  3. Turn on the Bluetooth of your handset and open the Super Bluetooth Hack Application.
  4. Select the connect option and then Inquiry Devices to search for any of mobile that has its Bluetooth turned on nearby.
  5. Your friend’s Bluetooth must also be turned on to be found. Pairing between the devices is also necessary sometimes.
  6. Once your friend’s phone has been found, try out above functions!

10 November 2011

Cryptography and Its Types

Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). In this, conversion of recognizable data into an encrypted code for transmitting it over a network (either trusted or untrusted) takes place. Data is encrypted at the source, i.e. sender's end and decrypted at the destination, i.e. receiver's end.
In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into cipher text, which will in turn (usually) be decrypted into usable plaintext using different encryption algorithms.

The Purpose of it :

1) Authentication : The process of proving one's identity. 
2) Privacy/confidentiality : Ensuring that no one can read the message except the intended receiver. 
3) Integrity : Assuring the receiver that the received message has not been altered in any way from the original. 
4) Non-repudiation : A mechanism to prove that the sender really sent this message.

In general, cryptographic algorithms are classified into three main categories given below :

1) Symmetric Key Cryptography (SKC) : Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). This was the only kind of encryption publicly known until June 1976. Uses a single key for both encryption and decryption.
2) Public Key Cryptography (PKC) : Whitfield Diffie and Martin Hellman proposed the notion of public-key Cryptography. Uses one key for encryption and another for decryption.
3) Hash Functions : Uses a mathematical transformation to irreversibly "encrypt" information.

That’s it !

27 October 2011

Get 3G Speed in 2G plans - Nokia Switching Network Techniques In All Operators

Wow! Its KrackoWorld official technique of hacking 3G in 2G plans for all operators like Aircel,Tata DoCoMo,Airtel,Reliance,Bsnl and Vodafone. Last night I am surfing 2G in my Nokia C6 phone and suddenly switched my network to UMTS and you will be shocked to know I am getting 3G signals along with 3G speed(around 75% of 3G speeds). Then I tried this scheme in all operators and worked 100% successfully. This trick or we can say hack is working best with Aircel.

Procedure of this trick

Note- This trick is for Nokia Mobiles only because they support Switching the gears(Network) technique.

1. First connect your phone with Nokia pc suite or ovi software in GSM mode(2G mode).
2. After your Nokia modem gets connected successfully to the internet, adopt this trick given below-
                  Go to menu-settings-phone-network and change GSM to UMTS.
3. Done! you have hacked 3G and always make sure to change to GSM after disconnecting your phone to PC etc..

PS: Please make sure while you connect next time your phone to PC, the phone must be in 2G mode and after get connected, switch to 3G otherwise your balance will be deducted according to 3G plans.

Enjoy na! Please pass your comments…

Concept Of Network Hacking and Tools Used

Network Hacking generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat etc. It also includes OS Fingerprinting, Port Scanning and Port Surfing using various tools. Therefore, Below I am telling about 4 tools with their definition along with example to clarify things b/w you.

1. Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--


example:- c:/>ping

2. Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--

c:/>netstat -n

3. Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--


By default telnet connects to port 23 of remote computer.
So, the complete syntax is-

c:/>telnet port

example:- c:/>telnet 21 or c:/>telnet 21

4. Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--


example:- c:/>tracert


Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.
various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.
The information obtained by using tracert command can be further used to find out exact operating system running on target system and much more.

That’s it! This chapter is over…


Recent Posts

Review this blog on

Recent Comments

| KrackoWorld (KoW) © 2014. All Rights Reserved | Style By All Web Designing | | Contact |