Latest Entries »

Telnet is a service gives the users to access a host and perform as if they were working, If you call yourself a Hacker you must be able to do telnet.It can be done in many ways, be careful not to try from your home because a tons of hackers have been busted for doing this.
Hack a remote computer with telnet Method 1:

Before looking at this method to Hack with telnet you must know that what are ports?There are two kinds of ports-Physical(HardWare) and Virtual(Software)You may be thinking of ports to be the slots behind your CPU to whichy ou connect your Mouse or Keyboard or your monitor. These sockets are called physical ports .We are here interested in only virtual ports.It is nothing physical but it is kind of a virtual pipe through which information can go in and out of the computer.

A particular computer can have a large number of ports. All ports are numbered .Now at each port a particular service is running. A software which runs on a port is called service . For interchanging different kinds of information different ports are used. A typical list shows the various ports.
Ping : 7
Systat : 11
Time : 13
NetStat : 15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110
Method 2

You can connect to a remote computer at a particular port. When you are connected to that port then you can interchange information related to that particular port only. Ports can be open or closed. If a particular port of a computer is closed then you can not connect to that computer
on that port. Generally most of the computers have atleast 5 or 6 ports open

First goto run and type telnet:
Once the Telnet windows pops up click on Connect->RemoteSystem then in the host name type the host i.e. the IP address of the remote computer or the website you want to connect to . Then in the Port select the port you want to connect to . You can only connect to ports which are open on the host computer.Almost always leave the TermType to vt100.We use vt100 as it is compatible with most monitors .

Then click connect and you will be connected to the remote machine in some time. The syntax of the telnet command from DOS prompt is C:\>telnet.
By default port is taken as 23. Scroll down and read more about ports

The first thing you have to do if you want to hack with Telnet, is find your local Telnet phone number.This can be done many ways. One way that always works, is to call up your local computer store, tel them that you recently purchased The Source or something like that, but that you lost the sheet that has the phone no. written on it.They’ll tell it to you. (People who work in computer stores usualy aren’t very smart
about that sort of thing.)

Call the number with your computer. Once the connection is established,
press twice. the computer will display “TERMINAL=” Type again. The computer will then display an at sign: “” Type in the access code here.:below are some access codes listed

(But please don’t misuse it)
————————————————————————
Telemail
——–
To use the Telemail feature of Telenet, type mail at the “” prompt.
User id’s are usually the first initial of the user’s first name, plus
the last name.
eg- William gates= Wgates
————————————————————————-
C 20120 – VM 370 ONLINE
C 20124N- NEW YORK TIME INFORMATION SERVICE
C 20125 – NJIT ELECTRONIC INFORMATION
C 20130
C 20133
C 20138
C 20148
C 20154
C 20165
C 20166
C 20167 – WARNER COMPUTER SYSTEMS
C 20168 – WARNER COMPUTER SYSTEMS
C 20171
C 20182 – BANKERS TRUST CUSTOMER SERVICE
C 20184
C 20222
C 20225 – COMSHARE “COMMANDER II”
C 20246
C 20247 – GSD TIMESHARING
C 20270 – GSD TIMESHARING
C 202124- GENERAL MOTORS WARREN
C 202133
C 202138- (TYPE .HELP *)
C 202139- (TYPE .HELP *)
C 202140- (TYPE .HELP *)
C 202143
C 202144- (TYPE .HELP *)
C 202148
C 202149
C 202175 – HONEYWELL
C 202222 – GM PARTS
C 202229 – PRIMENET
C 20321 – WYLBUR
C 21221 – PRIMENET
C 21224 – PRIMENET
C 21225 – INTERACTIVE MARKET SYSTEMS
C 21226 – INTERACTIVE MARKET SYSTEMS
C 21228 – BURROUGHS NYC DATA CENTER
C 21229 – LANDART SYSTEMS
C 21231 – E.F.HUTTON
C 21233 – UNIVAC 1100
C 21247
C 21248
C 21252
C 21253 – VM/370 ONLINE
C 21256 – CITIBANK CASH MANAGER
C 21264 – CITICASH MANAGER INTERNATIONAL
C 21265 – CITICASH MANAGER INTERNATIONAL
C 21269
C 21281 – BANKERS TRUST CUSTOMER SERVICE
C 21284 – DATAMOR TIME SHARING
C 21288 – S-K WDC SYSTEM 1/ONLINE
C 212136 – (TYPE NEW/TSC)
C 212141
C 212142
C 212151 – CITICASH MANAGER INTERNATIONAL
C 212152
C 21255 – PRIMENET
C 21256 – PRIMENET
C 212160 – TELSTAT SIGMA 6
C 212167 – RSTS V.7.0-07
C 212168 – RSTS V.7.0-07
C 212171
C 212172
C 21284 – DATAMOR TIME SHARING
C 21325 – PRIMENET
C 21335 – MARKETRON RESEARCH AND SALES
C 21336 – MARKETRON RESEARCH AND SALES
C 21341
C 21360
C 21365
C 21366
C 213170 – DIALOG
C 21370 – XCC-WEST SYSTEM X2
C 21371 – XCC-WEST SYSTEM X3
C 21372 – XCC-WEST SYSTEM X3
C 21373 – XCC-WEST SYSTEM X1
C 21375 – XCC-WEST SYSTEM X2
C 21379 – INTERACTIVE SYSTEM/ONE
C 21384
C 21385
C 21386 – IAS PROGRAM DEVELOPMENT SYSTEM
C 21388
C 213105
C 21520 – TPF&C ONLINE
C 21534 – PRIMENET
C 21538
C 21722
C 21725
C 21726 – U OF I COMPUTING SERVICES
C 30121 – NASA RECON
C 30124 – SOURCE SYSTEM 10
C 30126 – DISTRIBUTIVE NETWORK
C 30128 – SOURCE SYSTEM 13
C 30134 – INTERACTIVE(GAITHERSBURG)
C 30135
C 30136
C 30138 – SOURCE SYSTEM 11
C 30147 – SOURCE SYSTEM 12
C 30148 – SOURCE SYSTEM 15
C 30149 – SOURCE SYSTEM 14
C 30320 – COMPUTER SHARING SERVICES
C 30330 – COMPUTER SHARING SERVICES
C 30335
C 30337 – PRIMENET
C 30339 – PRIMENET
C 30340 – PRIMENET
C 303125
C 30520
C 30522
C 30531
C 30532 – C.S.I. TIMESHARING SERVICE
C 30523 – C.S.I. TIMESHARING SERVICE
C 31231 – C.I.C. TIMESHARING
C 31232
C 31235
C 31236
C 31240
C 31247
C 31248
C 31249
C 31250
C 31254
C 31279
C 31289
C 312124
C 312127
C 31325
C 31327
C 31340 – ADP NETWORK
C 31341 – ADP NETWORK
C 31345 – PRIMENET
C 31359 – GENERAL MOTORS WARREN
C 31360 – GENERAL MOTORS WARREN
C 31361 – GM PARTS
C 31363 – VM/370 ONLINE
C 31370 – GM DECSYSTEM-20 TIMESHARING
C 31422
C 31423
C 31424 – MCAUTO VM/370 ONLINE
C 31425 – MCAUTO VM/370 ONLINE
C 31426
C 31432
C 31435 – PRIMENET
C 31444
C 31726 – RSTS V06C-04
C 40420
C 40434
C 40822
C 41520 – DIALOG
C 41527 – STANFORD IBM-3033A
C 41548 – DIALOG
C 41556
C 41560
C 41561
C 41562
C 41567
C 41580 – HARPER GROUP INFORMATION NETWORK
C 41587 – BUSSIPLEXER
C 51632
C 51633
C 51634
C 51638
C 51646
C 51647 – VM/370 ONLINE
C 51729
C 60320 – DARTMOUTH COLLEGE COMPUTING
C 60322
C 60324
C 60328
C 60331
C 60720
C 60942
C 60945
C 61114
C 61115
C 61118
C 61120
C 61221
C 61724
C 61735 – (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL
C 61748 – PRIMENET
C 61750 – PRIMENET
C 61760 – (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL
C 61766 – PRIMENET
C 61767 – PRIMENET
C 61770 – NDC-SYSTEM#
C 61774
C 61776 – NDC-SYSTEM#
C 61777 – NDC-SYSTEM#
C 61778 – PRIMENET
C 617120
C 617121
C 617124
C 617125
C 617127
C 617133
C 617135 – VM/370 ONLINE
C 61737 – VM/370 ONLINE
C 617138 – MASSACHUSETTS INSTITUE OF
C 617139 – MASSACHUSETTS INSTITUE OF
C 617140 – VM/370 ONLINE
C 617151
C 617152
C 617159
C 61763
C 61769 – (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK
C 61770 – BPL-INFORONICS
C 617171 – INTERACT LINE
C 617177 – ERT ENVIRONET
C 617178
C 617179 – ERT ENVIRONET
C 61780 – (TYPE HELP)
C 71424 – GLOBAL DATA TIMESHARING
C 71431 – (TYPE HELP)
C 71620 – UNION CARBIDE
C 80331
C 80423 – CONTROL DATA INTERCOM
C 80424 – CONTROL DATA INTERCOM
C 80426 – BABCOCK AND WILCOX
C 81623
C 81625 – UNINET
C 81626 – UNINET
C 90995D – TELENET NEWS SERVICE
C 91930
C 91931
C 91933 C 91934

Hope you liked the post,Pass the comments

Wondering to know how to hack an email account? Well, before you can do that, you need to understand the real ways of hacking that actually work and also that are simply scam and do not work.

So, here in this post, I am going to discuss some of the Real and Working Ways to hack emails; along with that, I am also going to make you aware of the common myths and scams associated with email hacking.

On a regular basis, a lot of people contact me about suspecting their boyfriend or girlfriend of cheating, and ask me how to hack their email password so as to find out the truth. If you are in a similar situation where you want to hack into someone’s email account, then this post might help you!

With my experience of over 8 years in the field of ethical hacking and computer security, I can tell you that, there exists only 2 foolproof methods to hack emails. All the other methods are simply scam or don’t work.

Possible Ways to Hack an Email Account

1. Keylogging: The Easiest Way!

Keylogging simply refers to the process of recording each and every keystroke that a user types on a specific computer’s keyboard. This can be done using a small software program called keylogger (also known as spy software). Once you install this program on the target computer, it will automatically load from the start-up and start capturing every keystroke typed on that computer including usernames and passwords. A keylogger software will operate in a complete stealth mode and thus remains undetected.

In order to use this software, you don’t need to have any special knowledge of hacking. Anyone with a basic knowledge of computer should be able to install and use this software with ease. I recommend the following keylogger as the best for your monitoring needs.

Here is a summary of benefits that you will receive with SniperSpy software:

1. You can ACCESS ANY PASSWORD

With SniperSpy, you can gain access to any password protected material such as Facebook, MySpace or any other email account.

2. REMOTE INSTALL Feature

SniperSpy has a Remote Install feature using which it makes it possible to install this software on a remote computer. This feature can be very handy when you do not have physical access to the target computer on which you want to install this software.

3. MONITOR EVERY ACTIVITY on the Target Computer

With SniperSpy, you can not only capture the passwords, but also spy on their IM conversations and take screenshots of the activities on the target computer.

4. NEVER GET CAUGHT

Since SniperSpy runs in a complete stealth mode, it’s presence on the target computer remains undetected. So you need not worry about being caught or traced back.

5. Extremely EASY TO USE

Since SniperSpy is designed for novice computer users, it requires no special skills to install and use.

6. Works on Both PC and MAC

SniperSpy is fully compatible with Windows 2000/XP/Vista/7 and Mac.

Can I Install SniperSpy on a Local Computer?

Yes, you can install SniperSpy on a Local or Remote computer. It supports both Remote and Local installations. So, you need not worry whether it is a local or a remote computer.

How Safe is to Use SniperSpy?

SniperSpy is completely safe and secure since it neither collects any information from your computer nor contact you in any way.

So, what are you waiting for? Go, grab it now and expose the truth!

2. Phishing: The Difficult Way

Phishing is the other most commonly used trick to hack email passwords. This method involves the use of Fake Login Pages whose look and feel are almost identical to that of legitimate websites. Fake login pages are created by many hackers which appear exactly as Gmail or Yahoo login pages.

Once you enter your login details on such a fake login page, they are actually stolen away by the hacker. However, creating a fake login page and taking it online to successfully hack an email account is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. Also, phishing is considered as a serious criminal offense and hence it is a risky job to attempt phishing attack. So, I recommend the usage of keyloggers as the best to hack email password.

Common Myths and Scams Associated with Email Hacking

Today, there are many scam websites out there on the Internet which often misguide users with false information. Some of them may even rip off your pockets with false promises. So, here are some of the things that you need to be aware of:

1. There is no readymade software program (except the keylogger) that can hack emails and get you the password instantly just with a click of a button. So, if you come across any website that claims to sell such softwares, I would advise you to stay away from them.

2. Never trust any hacking service that claims to hack any email for just $100 or $200. All I can tell you is that, most of them are no more than a scam.

3. I have seen many websites on the Internet that are distributing fake tutorials on email hacking. Most of these tutorials will tell you something like this: “you need to send an email to passwordrecovery@gmail.com along with your username and password” (or something similar). Beware! Never give away your password to anyone nor send it to any email address. If you do so, you will lose your password itself in attempt to hack somebody else’s password.


Due to a rapid increase in the number of porn websites across the Internet, finding porn is as simple as Googling the word ‘sex’. Exposure to pornography can have a serious impact on children since it has the ability to easily distort the tender minds. If you are a parent, then you are most likely reading this because you are in search of a Porn Blocker to block Internet Porn. In fact, it is the responsibility of every parent to take every necessary step to prevent your child from being exposed to porn. In this post, I will introduce you to an excellent porn blocker/porn filtering software using which you can block Internet porn and keep your computer Porn-Free. Here is the best Porn Blocker tool that I have ever used

My Porn Blocker – No1. Porn Filtering Software

My Porn Blocker main features

1. Block Porn Before it Appears – My Porn Blocker silently works in the background and stops harmful sites before they appear.

2. Integrates with all Search Engines – My Porn Blocker blocks links to porn sites from even appearing on search engines.

3. Works in Complete Stealth Mode – My Porn Blocker runs silently by hiding itself from the taskbar, process list, start menu and add/remove programs.

4. Blocks all Chat Softwares – Using My Porn Blocker it is possible to restrict your child from getting exposed to porn world via chatting.

5. Block/Limit Access to Social Networking sites – My Porn Blocker offers a feature by which you can block or limit access to inappropriate services like MySpace and Facebook.

6. Automatic Screenshot Capture – My Porn Blocker has the ability to take high quality screenshots which shows what your children do on the PC when you are away.

7. URL Logging- My Porn Blocker keeps neat and simple logs of every URL visited.

This is only a small list of it’s features. Visit My Porn Blocker Official Website for more information on this product.

Why My Porn Blocker is the Best?

The patented design of My Porn Blocker has a prominent advantage over the usual way most similar porn blocker software applications function. Most Porn Blockers fail to provide a complete solution to the problem caused by pornographic content. Hundreds to thousands of new porn websites are added to the Internet every minute and hence most porn blockers fail to filter the porn effectively. However, after testing a number of porn filter programs, I found out this excellent porn filter software called My Porn Blocker. It proves an easy but still a very effective tool to combat porn and keep your child away from pornographic content on the Web. It also contains many additional handy features which no other program on the Internet will offer. So we recommend this as the best porn filtering software on the Internet.

The Verdict – If you are really serious to keep your PC out of porn and are in search of the best porn filtering software, then My Porn Blocker is the tool you should go for. So go grab My Porn Blocker now…


Here are the step-by-step instructions to do this.

For Gmail

1. Login to your account

2. At the top-right corner, click on Settings

3. Under Settings, click on Filters

4. You’ll now see an option “Create a new filter“, click on it

5. Now in the From field enter the email address from which you do not want to receive the emails

For ex. you may enter john@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.

6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.

For Yahoo

1. Login to your account

2. At the top-right corner, click on Options

3. A drop down menu appears, now click on More options

4. In the left panel select the option Filters and click on create or edit filters

5. Now click on Add

6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.

Fox ex. john@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.

For Hotmail

1. Login to your account

2. At the top-right corner, click on Options

3. A drop down menu appears, now click on More options

4. Click on Safe and blocked senders link under Junk e-mail

5. Now click on Blocked senders

6. Type in the email address that you want to block under blocked e-mail address or domain field.

For ex. Enter john@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.

That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy. I hope this post helps. pass your comments!


Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read!

What is BCC?

BCC stands Blind Carbon Copy. It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in the To: filed. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. Unlike To:, the BCC: option allows you to hide the recipients in email messages. In other words, when emails are sent using BCC:, the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.

Why should you use BCC?

Here are the reasons for using BCC:

Privacy – BCC provides an easy and simple option for protecting the privacy of your recipients. Under many circumstances it is necessary for us send an email without letting the recipients know who else is receiving the same message. Also it is highly recommended that you use the BCC: while forwarding a joke or a funny email to a list of your friends. If you are sending email on behalf of a business or organization, it may be especially important to keep lists of clients, members, or associates confidential. So don’t forget to use BCC: in instances wherever privacy matters.

Respect for you recipients- While forwarding email messages, people often do not bother to remove the list of previous recipients. As a result, messages that are repeatedly sent to many recipients may contain long lists of email addresses. This makes it easy for the spammers to collect and target those emails for spamming.

In order to avoid the risk of spammers, it is necessary that you encourage people/friends to use BCC: while forwarding any message to you. This prevents your email address from appearing in other people’s inboxes thereby keeping yourself less exposed to spammers.

How to BCC an email message?

Most email clients provide the BCC: option under a few lines below the To: field. All you have to do is just enter the list of recipients in the BCC: field instead of entering in the To: field. You may enter only your own email address in the To: field. Once you do this just hit the Send button.

The moral is that you should use BCC: while sending bulk messages so as to protect the privacy of your recipients.


Most of the email forging tutorials on internet will teach us how to

send fake email connecting to SMTP server of the ISP or any other

domain. But this is not possible since these hacks will no longer work

today because SMTP of remote server will reject any attempts for

unauthorised access.

Also many of the websites offer you to send fake email from their sites

where none of them work. So we have to run our own SMTP server on our

computer to successfully send a fake email. SMTP server is a simple

software program which can be installed on your computer in few

seconds. SMTP server allows you to send fake email right from your

desktop easily and effectively.
Download QK SMTP server
This is the SMTP server i am using in my tutorial. Once you download

and install the server on your comp then you are all set to send fake

email successfully.

PART A: CONFIGURING SMTP SERVER

Once you have installed the QK SMTP server on your comp you must

perform the following configuration.

1. Click on “Settings” button on the main screen,the Settings window

pops up

2. On Settings window click on “Basic Parameter” tab

3. Set binding IP to “127.0.0.1″

4. Set port to “25″

PART B: SENDING FAKE EMAIL (EMAIL FORGING)

1. Click on SMTP server icon on your desktop to start your SMTP server

to run(The icon is shown on the notification area of the taskbar if it

is running). If it is already running then this step can be ignored

2. Goto command prompt(Start-Accessories-Command prompt)

3. Type exactly as follows

C:\>telnet 127.0.0.1 25

Here 127.0.0.1 is the default IP of every computer.25 is the port

number. SO you are connecting to the SMTP server running on your own

computer. This step is very importand to send fake email.

NOTE: The IP 127.0.0.1 should not be substituted by any other IP.

Heres the snapshot of what you see after step 3.

4. After typing the telnet command in the command prompt you get entry

to the server which displays the following message. The response of a

OK SMTP server is given below. Message within Green color is only

explanation.

220 Welcome to QK SMTP Server 3
helo hacker (Type helo & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email ID can be anything of your choice.

This is the ID from which fake email appears to have come from)
250 billg@microsoft.com Address Okay (Server gives a positive response)
rcpt to:admin@gmail.com (Type any valid recipient email address)
250 admin@gmail.com Address Okay (Server gives a positive response)
data (type this command to start input data)
354 Please start mail input
From:Gates
To:admin@gmail.com
Date:Sat Jan 5,2008 9:45 PM
Subject:Test to send fake email
You can create as many headers followed by the “:” symbol.

NOTE: HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS

BODY OF THE EMAIL. Press enter twice so that there is a line gap

between the header & body data

End the body of email by pressing [ENTER] .(dot)

[ENTER]

250 Mail queued for delivery (Sever indicates that the email is ready

for sending)
quit (Type this command to quit from server)
221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing “quit” command)
(Your fake email is sent to the recipient)
*****END OF EMAIL FORGING*****
Here’s the screenshot for your convenience

Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?

The answer is NO and YES!

NO because when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message “The specified device name is invalid”.

What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.

YES because it is still possible to create these folders using the command prompt. Here’s the instructions to create it.

1. Go to command prompt

2. Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE)

C:\>md \\.\e:\con

NOTE: “con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.

3. To delete the folder use the following command

C:\>rd \\.\e:\con

NOTE: The folder can only be deleted from the command prompt.You cannot remove it by right-click delete.

It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.

Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account
If you cannot find success from the Step-1 then proceed to Step-2.

Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like

1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…

You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back.

For Yahoo and Hotmail:

Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.

To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.

I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected!

In this post I’ll show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.

When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.

RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY

You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.

1. Note down the date and time, when you install the software for the first time.

2. Once the trial period expires, you must always run the software using RunAsDate.

3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.

4. It is better and safe to inject the date of the last day in the trial period.

For example, if the trial period expires on jan 26 2011, always inject the date as jan 25 2011 in the RunAsDate. I hope this helps! Please express your experience and opinions through comments.

Enabling or Disabling the “Hibernate” option in Windows 7 or Vista is not as simple as it used to be in Windows XP. For Windows 7 a different approach has to be followed to accomplish the same job. In this post you will find how to enable or disable the Hibernate option in Windows 7.

Hibernation is a power saving option which was designed primarily for laptops. Unlike “sleep mode” which puts the open documents and files into the memory, hibernation puts all the open files and documents on to the hard disk and shuts down the computer without drawing even a small amount of power. Thus hibernation becomes an excellent way to save power and resume Windows back to the state where it was left off. If you really want to use this feature on Windows 7 then you need to enable this option. This can be done as follows.

1. Open the Command Prompt with “Administrator rights”. To do so, type cmd in Start menu and then hit Ctrl+Shift+Enter.

2. Now type the following command in the command prompt and hit Enter.
powercfg /hibernate on

3. Type exit and hit Enter to close the Command Prompt. Now you should see the “Hibernate” option in the Start menu. If not then perform the following steps.

A. Type Power Options in the Start menu and hit Enter.

B. In the left pane, open the link labeled “Change when the computer sleeps” and then open the link “Change advanced power settings”.

Now a small window will pop-up as shown below:

C. Now expand the Sleep tree and turn off Allow Hybrid Sleep as shown in the above screenshot.

D. Now you should see the Hibernate option in the Start menu