Thursday, May 27, 2010

Smallest result of Sayanyan in 1st biggest Exam

Thursday, May 27, 2010
OOOOOOH! nooooooo..........
In bengali 'B+'..That was my 1st word after seeing my result in internet of madhyamik 2010 whch published Yesterday.I go for school..Most noted number is 98 in math and 82 in physical science...Others are tooo bad.Over-all result is 70%.But 80% in Science group.I think this result may can giv advantage to join in scince-stream.But I take form from other schools,Wall up on 3rd June.But I choose for RKM mission.I dont know what would happened in there in Admission Test and so called Aptitude test.I missed chanced to getting admit others famous school due to bad result in over-all subject.They need minimum 75%.Wht I do? If I dont get chance in my previous school.I need to choose leave study and go for personal business.My LUCK is very very bad

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy

Friday, May 21, 2010

MADHYAMIK 2010 RESULT IN 26TH,monday

Friday, May 21, 2010
Maybe I'm the first to writing this blog about madhyamik 2010 exam.Some news chennel saying that dis 26-5-2010 result willbe published in monday.But 26th is not monday that is wednesday.I don't know the date it's monday ya wednesday.
But my heartbit is increased to hearing thats! caused I give this exam this year.This is the 1st biggest exam in my lyfe.So please bless me.I hope for star marks.Ma expectation is not huge but I think it is huge as on my brain.By the way let's wait for the 10.00 pm

The List of sites who's are release the results

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy

Monday, May 17, 2010

Sayantan's mail ID hacked??????

Monday, May 17, 2010
After publishing unknownsayantan!
I got many replies,mails,scraps. I got many bad/good reputation for it.
But oneday I opened my mail id and see that a mail which send from my mail id and the message like "You yourself call a hacker? This called hacking.to learn hacking contact me at .........."

I'm suprised to see the mail.I change password and contact to the hacker they offered me to learning hacking mail from him by cost 500/-.But incidently the amount was high to me then.So I can't learn but I wanna from him what is the name of the method?
They told me there have a PHP scripts by it he can send mails from any id to any Id.
Ha ha ha ha
I knew the scripts!!Now I uploaded the scripts to krazynetrulers also!

Oh what I thinking abt the hacker,He is not tooo bigger than me.One day he flood my inbox with SMS.He think I dont know the method to flooding inbox.Ha ha ha.I also flooded his inbox.
Ha ha ha....Maza jam geya!
He don't know anything greater than me!

But I teach him about web design.......I told him to configure a site,configuring database...

That's very fun to have a revench to a so called hacker

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy

Tuesday, May 11, 2010

KRAZYNETRULERS

Tuesday, May 11, 2010
After getting some experiences about work with subdomain,adsense,adbrite..I'm looking for knowing about domains.How much tariff will I get,If I have a domain name.Then I contact with Bengalstudents team they are tell me about domain registration,dns controll,web hosing packages.But I got a prople about credit card,I need pay with creditcard,So I'm looking for any good indian registration site which allow me to buy via debit card.Yes! I got a website called Indialinks.They allow us to buy domain name with credit card.I'm going to buy domain of unknownsayantan then one of my friend Tarik said me to have a deal and make a website both.So we need to have a new name new design and obviousely new thoughts.Tarik tell me about the name netrulers I added the word Krazy.And finaly Krazynetrulers name choosen.I went Tarik's house to put money in bank account but unfortunately bad luck he is sleeping.I just sat under a tree outsite of his home and waiting for wakeup.Finally he wakeup on 3.00pm and bank will be closed approximately in about 3.30 pm.So we rushed towards the bank and put the money in account.Then back to his house we buy domain name,set up it and finally designed.I take the part of forum admistrating,site designing and promotion.Tarik take his part for have financial work,writing blogs and managing adsense's.
But still now in krazynetrulers adsense account no balance.Page impressions and visitors are too low.Pagerank about 54lakh.We need to get in thousands.Then I hope we will hav a gr8 tariff.
I'm designing new luks reach contains will be added in dis sunday,12th may.Some filmies funda will be added in special issues.

Thanking You,

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy

Saturday, May 8, 2010

My Diary

Saturday, May 8, 2010
I read many articles in internet and many professional web designer and many experienced person told me that if I broke the terms and condition of google then may be I'm blocked when payments.So I'm not want to block my account So I decide that after today I will post evry personal and exclusive contains.After all I got many reputaion,mails,scraps and vote for have a my biography.So I will try to write contains me.So please approciate with me.Oh! one thing I'm forgot to say Unknownsayantan have better tariff and better page rank than my another domain site krazynetrulers.I hope the both rank will incresed.But I dont know why the page rank of unknownsayantan which on a sub-domain is better.May be it's effect of unique personal posts and obviousely the promotions style.Unknownsayantan's promotion started from the many days before of realising.Scince one year my aim was to make unknownsayantan but now I'm not satishfied,I wanna more tariff.
Now I'm little busy to making tariff of krazynetrulers,cause I spend money for It.And I need it back

Thanking you

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy

Monday, May 3, 2010

Your Website In Every Search Engine

Monday, May 3, 2010
WHAT IS ROBOTS.TXT

you probably know that when a search engine spider visits your site,one of the first things it does is look for a file called robots.txt
which tells it which files and folders it can go and look at. by default,WORDPRESS lets every robot go everywhere.You may restrict some file not to
show in search engine.


it is the file which says search engine what should be crawled.


There are many plugins in wordpress to make robots.txt but you may create it your own

You May Download Robots.txt From
Here
Then Upload It To Your Website Cool
After Uploading
Go Here [For Google]

you can also register in yahoo search engine and many other by going to this address

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy

Photoshop CS5 Extended

DOWNLOAD FROM ADOBE SERVERS:
Please use this link: http://www.adobe.com/cfusion/tdrc/index....=photoshop
http://trials2.adobe.com/AdobeProducts/P..._12_LS1.7z
http://trials2.adobe.com/AdobeProducts/P...12_LS1.exe


After you downloaded use the KeyGen
DOWNLOAD:
http://www.multiupload.com/I08CWK13D9 (100% CLEAN)
[Image: 76832900.jpg]
Generate a key and insert the key

now you must disable the online activation by one of the two methods:
First Method :
Use Keygen to Patch

Second Method :
Add
"127.0.0.1 activate.adobe.com" to
Windows\system32\drivers\etc\hosts

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy

Selling products on internet


Well anyways, in this guide I will show you how to save yourself TONS of time, as well as make money while you're away from the computer, make yourself / your site seem more legit and MUCH more.

I will be teaching you amazing methods to make:
  • Automated Payments
  • Good Grammar

While selling an e Book or another downloadable products, you will need to be able to present yourself as a legitemate trader.

Wait The Elite, this sounds like it'll need some Social Engineering?
Well, yes, it surely does. Maybe not direct, IM Social Engineering, it still requires some sort of manipulation. Although, harmless manipulation.

Wow, this sounds amazing. So you'll be teaching us how to increase our sales as well as our legitemacy?

Yep, I sure will be. You can take my word for it, I've made over 100 sales of my e Books profitting over $250 USD without any work.

Holy crap, that's alot for no work!
Sure is, and you'll be getting my methods all for free.

Ok, enough questions.

We will first begin with our Automated payments.

I'm sure many of you have heard of the amazing website:
e-Junkie

Well, this website truly does help you market on the internet. It offers a free 1 week trial for you to merchant your products, and a $5 payment just for the next month. Extreme prices, with this method you'll make quadriple of the 1 month payment in one day.

Sounds good, ey?

Mhm, ok.

Requirements:
  • PayPal
  • Western Union (If you don't have a PayPal)
  • Something to sell

Method:
First, go to e-Junkie << Click "e-Junkie"
Click The Register Button:
[Image: 243kkg8.png]

[Image: 24z9etz.png]
Once registered, please Log in.

Once you're logged in, click Seller Admin:
[Image: b6zpyx.png]

When you're in Seller Admin, click "Add Product":
[Image: 2d0me0g.png]

Once you're adding a product:
[Image: 358rxxj.png]

[Image: 21o7ui0.png]

Once all that's done, click 'Next' till you reach:
[Image: s47vr9.png]

Click "Buy Now Buttons".
You would have reached here:
[Image: 258rmyo.png]

Grab the code shown. -- Save it in Notepad / .txt

Now you have automated payment link, we'll need to give people the actual download when they've paid, click:
[Image: jj32tt.png]
Now, if you can't see it. Just click Submit, then edit the file by going "Edit" at "Seller Admin" by using the drop box, then click "Submit", the file will be there.
If you do see it, upload the file.
Once that's done, you will have an Automated payment set up.

Ok, we need a good image, go to Google
Search Google images for "Buy Now" buttons.
Once you've gotten one, click "Save Picture as" or "Copy image" or which one works for your browser.
Once it is saved, go to TinyPic

Upload the Image and grab the [IMG][IMG] codes.
[Image: 259d0kw.png]

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy

500 Tutorials On HACKING!!

DataVault, Irc Warez (Ty 4 Moving X).txt
-[ How to rip Dynamic Flash Template ]-.txt
10 reasons why PCs crash U must Know.txt
10 Security Enhancements.txt
16x Dvd+-rw Dl Dvd Writer Comparison Guide.txt
20 Great Google Secrets.txt
23 Ways To Speed WinXP, Not only Defrag.txt
250+ Tech books online.txt
2600 Hertz Single Tone Generator Schematic.txt
36 Graphics & Design Ebooks.txt
8 People Can Use The Same Msn Dial Up Account.txt
A Basic Guide to the Internet.txt
A Basic UNIX Overview.rtf
A BEGINNERS GUIDE TO Hacking Unix.txt
A Cracking Tutorial
A Guide to Internet Security- Becoming an Uebercracker.txt
A Guide to the Easiest Hacking there is.txt
A List of every TeleNet code that there is.txt
A List Of Government BBS Numbers.txt
A List Of Some OF The Most Useful UNIX Hacking Commands.htm
A Novice's Guide to Hacking 2004.txt
A Novice's Guide To Hacking.txt
A Short HACKER SPEAK Glossary.txt
A simple TCP spoofing attack.txt
A Small Guide to Hacking HOTMAIL.txt
A UNIX Hacking Tutorial.txt
A very small tut for RealMedia.txt
A Web Standards Checklist, How to make a proper website.txt
Accessing the bindery files directly.txt
Accessing The Entire Internet On Your 3 Phone, U8110, E616 etc..txt
Advanced Shellcoding Techniques.txt
All about ftp must read.txt
All About Movie Tags (what Is A Dvdrip, Cam Etc.).txt
ALL About Spyware.txt
All mIRC Commands.txt
Almost Everything You Ever Wanted To Know About Security (but.txt
An Architectural Overview of UNIX Network Security.htm
An Extensive Guide to Bell System Man Holes.txt
An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt
An Introduction into TeleScan.txt
An Introduction to Denial of Service.txt
An Introduction to the Computer Underground.txt
An Introductory Guide To TeleNet Commands.txt
Anarchist Cookbook 2004
Anonymity complete GUIDE.rtf
Anonymity of Proxy, Anonymity Of Proxy learn it insideout.txt
Anonymity.txt
ANONYMOUS emails.txt
Anonymous FTP FAQ.htm
ANSIBombs II Tips And Techniques.txt
anti leech hacking tutorial.txt
Area Codes and Time Zones.txt
attacks on networks how to stop.htm
Auto End Tasks to Enable a Proper Shutdown, Win XP Tweak.txt
Automatic Windows Installation, No keypress required!.txt
B.A. regedit.txt
Backdoor.txt
Backdoors.txt
Backtracking EMAIL Messages.txt
Bandwidth Explained!.txt
Basic Networking.txt
BBS CRASHING TECHNIQUES.txt
Becoming A Phreaker - The Quick n' Easy Way.txt
Beep Code Manual.txt
Beep Codes Error Codes.txt
Bell Hell Volume #1.txt
Bell Hell Volume #2.txt
Best Keyboard Shortcuts.txt
Big Brother And Ndisuio.sys, A new Internet phenomenon.txt
Bin & Cue Simple Tut.txt
BIOS Update Procedure.txt
Bit Torrent Tutorials.txt
Block Adservers.txt
Boot Block Recovery For Free.txt
Boot Winxp Fast.txt
Border And Text Effects In Psp8, For use with PSP8.txt
Breaker B0X.txt
Broken Ie, How to fix it.txt
BRUTE- A brute force approach to hacking Unix passwords.txt
Bulk Editing Of .xxx to .zip or .mp3.txt
BulletProof FTP Server Tutorial.txt
Burn .bin file Without A .cue file.txt
Burn a BIN without a CUE using NERO.txt
Burning Bin & Cue Using Nero.txt
Bust Avoidance For Dipshits.txt
busybox.txt
Bypass Internet Censorship.txt
Calculating Offsets.txt
cannot use my password to get back into Windows XP.txt
Cant See Secure Sites.txt
Caught A Virus.txt
Cellular Listening with a TV .txt
Cellular Telephone Phreaking Phile Series VOL 1.txt
Change Music In The Malibu And The Pole Position, GTA Vice Modders.txt
Change Text on XP Start Button.rtf
Change Text on XP Start Button.txt
Change The Default Location For Installing Apps.txt
Change The Storage Location Of 'my Documents', a bit safer for when your PC crashes....txt
Change Your Ip In Less Then 1 Minute.txt
Changing Default Location For Installing Apps.txt
Check For Dos, Check to see if you are infected..txt
Choosing A Good Domain Name, ya..good name is important!.txt
Choosing An Internet Merchant Account, nice info on Internet Merchant Account...txt
Clear Unwanted Items From Add And Remove.txt
Closing Open Holes, System Security How to close open holes.txt
Closing the Net.txt
CMD Prompt here, add to folder context menu windows xp.txt
COMMON FTP ERROR CODES.txt
Compression and Cracks for Dummies.txt
Computer Acronyms.txt
Computer Bulliten Boards and the Law.txt
Computer Chrime - Current Practices, Problems and Proposed So.txt
Computer eMail and Privacy.txt
Computer Hackers News Articles.txt
Computer Matinence.txt
Computer Rights vs First and Forth Amentment Right.txt
Computer Security.txt
Computer Security_2.txt
Computer Viruii.txt
Computerized Governmental Database Systems Containing Persona.txt
Configuring ZoneAlarm Pro Security Settings, A ZoneAlarm Pro Tutorial.txt
connect A Psx Pad To Pc, Warning soldering is involved...txt
Convert Stubborn Webpage To pdf.txt
Convert To Basic And Dynamic Disks In Windows Xp.txt
Converting Movies To Psp Format.txt
Converting to NTFS.txt
COPS and Robbers-Unix System Security.txt
COPY X BOX GAMES!.txt
Copyright Guides for Photographers.txt
Cracking Bios, use the followin' code.txt
Cracking Zip Password Files.txt
Crap Software Config Settings, How to set-up the firewall.txt
Crash Course in X Windows Security.txt
Create A Huge File.txt
Create A Personal Screen Saver In Win Xp!.txt
Create An Ftp Server On Your Pc With Serv-u.txt
Create Bootable Win XP SP1 CD(nero).txt
Create Bootable XP SP integrated CD.txt
Create One-click Shutdown And Reboot Shortcuts.txt
Creating a Board aka Forum on your own PC !.rtf
Creating Universal Ghost Usb Boot Disk And Cd.txt
Crime and Puzzlement.txt
Cultural Formations in Text-Based Virtual Realties.txt
Cyberspace and the Legal Matrix- Laws or Confusion.txt
Dark Angel's Phunky Virus Writing Guide .txt
Data Capacity of CDs [Tutorial].txt
Debug, Learn how crack windows.txt
Defamation Liability of Computerized Bulliten Board Operators.txt
Delete An undeletable File.txt
Delete Files From The Recent File List In Windows.txt
Dept of Treasury Letter.txt
Digital Camera Guide.txt
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt
Digital Photo Id Cards, Greate Info.txt
Direct Link To Any Page You Want To In Hotmail.txt
Directx Explained.txt
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt
Disable The Send Error Report, to Microsoft.txt
Disable Windows Logo Key.txt
Discover New Music You'll Probably Love.txt
Do You Want To Learn Maya 6, look, some tutorials.txt
Doom 3 Speed Up, Guaranteed 40% better.txt
Doom3 Simple Tweeks, how to run doom with tweeks.txt
Dos User - No Boot Dos Disk, No Edit.com,How to create Imp Files.txt
Download Free Music legally,, legally.txt
Download from a paypal site without paying a penny!.txt
Download From Ftpz, Using Ftp Search Sitez.txt
Download Mp3's Without Using Filesharing.txt
Download Music And Video With ,edia Player9, quick and easy!.txt
Download Timeframes.txt
Downloading Files, Using Archives And Images.txt
Downloading Windows Media Streams.txt
Drake's Phreaking Tutorial.txt
Dreamweaver Tut That Teaches U, to search a database with phpmysql.txt
Driverguide.com.txt
Dual Boot After The Fact.txt
Dvd Copying-ripping Definitions.txt
DVD Regions Information.txt
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt
Easily Disconnect-reconnect From Broadband.txt
Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt
Ebay Hackcracktip.txt
Electronic Bulliten Boards and 'Public Goods' Explainations o.txt
Electropolos - Communication and Comunity on IRC.txt
Eliminate Ie's Autocomplete Reminder.txt
Email Forge, sends email from anyone.txt
Enable Folder and Icon Refresh, Win XP Tweak.txt
Erasing_Your_Presence_From_System_Logs.txt
Ethload User's Guide.txt
Evolution Of Computer Viruses History Of Viruses.txt
Excellent tricks and techniques of Google Hacks.txt
Exploseek, a simple tool to find music on the net.txt
Find Stuff.txt
Finding Missing Files From A Release.txt
Firefox Speed Tweaks.txt
Firefox Tweaks.txt
Firewall Protection how to.rtf
FlashFXP FAQ.txt
Flashget Broadband Tweak.txt
FLASHGET INTEGRATION IN OPERA,MOZILLA,NETSCAPE.txt
FlashGet v1.4 - More Download Simultaneously.txt
Flashing A Video Card Bios [advanced Guide], Step-by-Step Guide for Novice and Expert.txt
Formatting An Hdd, when fdisk won't.txt
Formulating A Company Policy on Access to and Use and Disclos.txt
Free Access To Websites Without Registering.txt
FREE Hosting For WAREZ.txt
FREE Hosting List php, mysql and more.txt
Free Speech in Cyberspace.txt
Free World Dialup.txt
Free X-box Live !.txt
Freebsd Install Guide.txt
Gender Issues in Online Communications.txt
General Keyboard Shortcuts, General Keyboard Shortcuts.txt
Get In Windows 2000 As Administrator.txt
Get the Most Out of Your DVD Recorder.txt
Get The Music You Want To Hear.txt
Get unlimited bandwidth from your host for free.txt
Getting A 1gb Yahoo China Account.txt
Getting Counter-strike Source To Work.txt
getting movies, mp3,games using google.txt
Getting older programs to run on Windows XP.txt
Getting started with Linux for nOObs!.txt
Go to Windows updates anonymously.txt
Google Crack Search.txt
Google secrets.txt
Google Tips & Tricks, (utilizing search engine).txt
Government Computer Security Techniques.txt
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt
Guide For Getting Free Stuff.txt
Guide to Hacking with sub7.doc
Guide to IIS Exploitation.txt
Guide to Slipstreaming Service Pack 2.txt
HACKDICT.TXT
Hacker Test.txt
Hackers A-Z.TXT
Hackers Who Break into Computer Systems.txt
hacking and phreaking.doc
Hacking Bank Of America's Home Banking System.txt
Hacking Compuserve Infomation Service.txt
Hacking Faq.txt
Hacking for Dummies Volume 2.doc
Hacking For Newbies.doc
Hacking GTE Telemail.txt
hacking in telnet http://ftp.rtf
Hacking IRC - The Definitive Guide.txt
hacking on Telnet explained.doc
hacking on XP part 1.doc
hacking on XP part 2.doc
hacking on XP part 3.doc
hacking on XP part 4.doc
hacking on XP part 5.doc
hacking password protected site.doc
Hacking Password Protected Website's.doc
hacking passwords.doc
Hacking PC-Pursuit Codes.txt
Hacking Techniques.txt
Hacking TRW.txt
Hacking TYMNET.txt
Hacking Unix System V's.txt
Hacking VoiceMail Systems.txt
Hacking Wal-Mart Computers.txt
Hacking Webpages.txt
Hard drive Gone Bad.txt
Hardware Firewall.txt
Have Notepad In Send To.txt
have satallite tv for almost free IF not free!!!.txt
Hex, How to turn binary or decimal to hex.txt
Hide Drives and Partitions.txt
How 2 Find EVERYTHING uploaded on Rapidshare.txt
How BT phone cards works.txt
How do I overburn a CD with Nero.txt
How do I remove an extra operating system from by.txt
How do I Test My VirusScan Installation.txt
How Do U See Hidden Files, Using DOS...txt
How Download MP3s from Fanscape.com or other Streaming Audio-Video.txt
How Linux boots.txt
How Long Has Your XP System Been Running.txt
How Phone Phreaks are Caught.txt
How the Traditional Media Clasifications Fail to Protect in t.txt
How To Access Your Folders From Your Taskbar.txt
How To Add A Url Address Bar To The Taskbar.txt
How To Add An Option To Print, the Contents of a Folder!.txt
How To Add Your Own Windows Tips.txt
How to Back Up the Registry.txt
How To Backup Ps2 Games.txt
How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt
How To Block Websties Without Software, block websites.txt
How To Boot Xp Faster (updated).txt
How to build a black box.txt
how to burn quicker in windows xp.txt
How to Bypass BIOS Passwords.txt
How To Bypass Web Filters, tutorial.txt
HOW TO CAPTURE STREAMING MEDIA.txt



And Much more! But it was Too long to post all of the txt files for the tuts!

If you liked it say Thanks!

http://rapidshare.com/files/91023876/500...orials.rar

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy

The Ultimate Guide to PC Security

Being a hacker, you're coming face to face with some of the most malicious programs on the internet every day. You want to be secure. Most of the programs you'll be downloading will be malicious, so how can you tell if the program will be working against you or for you?
This guide will be looking at the scanning of malicious files, as well as a guide to anti-viruses & firewalls and a brief introduction to sandboxing and anonymity. So yep, you're in for quite a bit of reading. Grab a drink, maybe a cigarette.

Being secure is important. Just because you call yourself a hacker, it doesn't mean you're immune to attacks towards your computer. Without my anti-virus, I doubt I'd actually be typing this now - I'd probably be searching through my registries and screaming like a chicken on speed. I'm like that.
Not all anti-viruses work the same way. Some anti-virus programs are bad; some are good, and some are just plain useless. We'll be looking at which ones are the best of the best, and which ones are just plain fail.
Being infected with something can also put your friends and family at risk, other users of your computer could be having their login & credit card details stolen without any knowledge of it. Worms can also spread to your email contacts and friends on popular websites such as Facebook.


Downloads & Scanning
For example, you download a program and the poster is claiming that it is a clean botnet controller. If we can this, it will come up with results such as "Win32/RBot" etc.. This means that the file should be what we wanted.
Now, if the botnet-controller scan came up as something like "Win32/trojan.agent.a", we can tell that this is a malicious program that will work against us. This is an example of a download you do not want to use.
All in all, the scan should show results similar to what you were downloading.
You should always be careful what you download. You may often be downloading malicious software without even realizing sometimes. Trust me, this happens to a lot more people than you think.
If you're expecting a file to be much bigger than the download you find, don't touch it. An example of this would be "Windows XP Theme - 350kb!" when it should be a lot higher, such as 30-50mb.
Remember to always check the names of the files you download.. If you're downloading a cracked program, it would be unusual for it to have no credits or advertisements in it. I would trust " 'x' cracked by 'y' " more than I'd trust " 'x' crack". Credits, names or advertisements should nearly always be in .rar or .zip files, this is one good way of recognizing a trusted download.
Here is a quote from Wikipedia which you may find helpful: "Example: ZTreeWin_1.5.zip contains a crack to register ZtreeWin 1.51 included files are: keygen.exe, one.nfo, file_id.diz and 'RUN.EXE'. It is the 'RUN.EXE' that contains the rogue program"
Downloading really isn't necessary and is often risky, but we have some clean content in the HF-L33t section if you want to upgrade for that. ;)

Online File Scanners
Web-scanners such as "VirusTotal" and "NoVirusThanks" are becoming increasingly popular with the amount of anonymous downloads posted all over the internet.
If you want to scan a file you find suspicious, you can go to either http://virustotal.com or http://novirusthanks.org to do so.
VirusTotal will send samples of the file to the antivirus companies, so this is not recommended if you want to keep your file undetectable.
NoVirusThanks has an "Advanced options" area where you can choose to not distribute your file to the antivirus companies, this is handy for keeping things fully undetectable, but if it's a file you don't trust and don't want yourself or others to be infected by it in the future, I suggest you allow them to distribute it to the antivirus companies. I respect what these websites and the malware fighting websites do, and so should you.

Visiting Websites & Reading Emails.
Be cautious of the websites you visit. I wouldn't recommend visiting any websites that seem cheap, uncommon, or freely hosted. Malicious websites are often misleading or can just inject things into your system without your consent. If you use the "Chrome" browser from Google, you may have noticed that it automatically downloads files without prompting you. Chrome is a browser I would not recommend just because it is so new, all new things have vulnerabilities, and if a vulnerability can be exploited, it will be exploited.
I'm behind a firewall and anti-virus anyway, but the only websites I visit are popular ones. The untrustworthy and uncommon websites usually don't appeal to me, for obvious reasons..
When opening emails, you should also be cautious. Just because it's an email from your friend - it doesn't mean you can trust it! You may see some emails asking you to update your bank details -- your banks should never ask you to do that via email. The details you enter will be sent out to someone who is going to exploit your details, so steer away from these emails.
Worms can be spread via email. For example, you open an email from Bob containing a worm, this worm is then sent to all of your contacts. This is how most worms will work, and it is suggested that you change your emailing service if it could be vulnerable. You can use Microsoft's live hotmail service which is excellent, it will also disable any harmful content from downloading onto your computer. You can find this service at http://mail.live.com

Sandboxing
By using a sandbox, everything that is downloaded onto your computer will remain in the sandbox. It will not escape, meaning that malicious downloads cannot harm your computer. Sandboxing is a great way to test whether or not a website can be trusted. I rarely do this, but it's so useful sometimes.
Sandboxing will also protect your cookies, history and cached temporary files from being leaked. Downloads are isolated, meaning that they are trapped and your computer is protected.
Here is a download I posted for Sandboxie v3.30: http://www.hackforums.net/showthread.php?tid=30371

Firewalls
The good antiviruses will have a built-in Firewall, but if not, then it may be worth downloading one. Firewalls aren't essential, but can help a lot.
Some firewalls have IP masking options, but these can usually slow down your computer and are not worth using unless you're doing something illegal.
The main use of a firewall is to prevent incoming traffic, which will stop things like 'telnet' from reaching your connection, and can also stop worms etc. from accessing your network. Firewalls will also block the backdoors that trojans create, so if you find yourself unlucky enough to have a RAT (Remote Access Trojan) on your computer, the backdoor should be blocked by your firewall, but it is possible for a trojan to bypass this. Having a firewall does not mean you are secure, many firewalls can be easily disabled or bypassed by malware. Some firewalls will also block legit connections, such as downloads for software. Do not think you're secure just because you have a firewall, this is a common misconception with firewalls. Too many people think that by installing a highly popular firewall, they'll instantly be secure against the latest intrusions, but this is not at all true.
Firewalls may also make an effect on your connection speed. If you have a very fast download speed, you may notice a difference when you get a firewall, but the download speed may remain normal on users with slower speeds. This effect can vary between users, and depends on the connection. It's best to try several firewalls to find out which one suits you best - reviews are personal and will not always be the same for everyone.
One of the favourite firewalls is "ZoneAlarm" which is very popular and has a free version. The paid version is obviously better, but it isn't necessary at all.
If you're using Windows Vista, I'd recommend choosing ZoneAlarm as your firewall. The same goes for XP, but you might want to get your hands on a "BlackIce" crack instead, if possible.
Another great Firewall is "Comodo" which is also free can be found here...
Comodo: http://www.personalfirewall.comodo.com/
Zone Alarm: http://www.zonealarm.com/store/content/c...wall_b.jsp
Ghost: http://www.ghostsecurity.com/ghostwall/

Antiviruses
An anti-virus program is essential. You honestly shouldn't go without one. If you don't have one, there is a list of downloads and recommendations in the next post. Don't be worried about the anti-virus slowing down your computer, if you get the right one then your computer will remain at maximum performance.
You want an antivirus that will scan your RAM and system folders constantly, because then you will be alerted if something harmful has been found in them. The average antivirus will only scan and remove when told to, but the best ones will scan constantly, update daily, and give plenty of tweaking options to fit to your preferences.
If there are malicious programs that you want to download such as Metasploit, it is best if you have an antivirus that will allow you to do so. Some antivirus programs will give you no option and will quarantine the file straight away, but others such as Kaspersky will give you the option to clean, remove or ignore.
Viruses can sometimes fully disable your protection, but the stronger programs such as Nod32 can withstand this and will be unclosable. You want something tough if you're going to be downloading riskware.
A good anti-virus will also constantly scan your downloads and running processes. Hopefully you are able to understand now why these are essential.
If you want to run more than one antivirus, you must find a combination that works. If you have a good antivirus, you won't need to. Infact, you shouldn't ever need to run more than one. I remember having Kaspersky running while I installed Nod32, my PC growled. :3 The only antivirus-related programs I have installed at the moment are HijackThis, ComboFix and NOD32. I like to use HijackThis to see what's running on my computer, and I always keep ComboFix just incase, you never know what's round the corner...
I remember having no antivirus software installed whatsoever, and then I received a rootkit that wouldn't let me download any software.. I got rid of them eventually, but it wasn't easy, the rootkit wasn't detected by most AV's because of it being so new/rare - you still can't find it on a few of the AV databases! But I do wish I had it again, so I could send it out as a sample.
I will be listing my favourite anti-viruses in my next post. I strongly recommend you stick to these, as there are many fake ones that you can be easily lead to. Remember to look things up before downloading them. Pick wisely! :3



The Top 5 Anti-virus Programs.
Here's the list of my top five favourite anti-virus programs in order.
You can pick which you want from each picture, but I'd recommend Kaspersky.

Kaspersky:
Downloads & keys - http://www.hackforums.net/showthread.php?tid=26117
[Image: 2vvrzx2.jpg]

Nod32:
Crack (Doesn't get updated) - http://rapidshare.com/files/157586621/NO...k.rar.html
Logins for legit version - http://www.hackforums.net/showthread.php?tid=31238
(Legit version available at http://eset.com)
[Image: 5zekbl.png]

Avast:
Avast also has skins available, which is great!
Free download: http://www.avast.com/eng/download-avast-home.html
[Image: 142rocp.png]

Bitdefender:
Free downloads: http://www.bitdefender.com/site/Downloads/
[Image: jl77z9.png]

AVG:
Credits to Goodkidz for the download.
Download: http://rapidshare.com/files/147004395/AV....0.164.rar
[Image: 35jdpau.png]


Essential Additions.
There's a few more tools which I'm sure you'll definetely want to get.
HijackThis is a tool used to scan the areas of your computer which viruses are often located in. It will also scan the registry areas which hold the legitimate programs and, quite often, the infections. It is best not to delete ('fix checked') any entries on HijackThis unless you know what you're doing, as you may be removing something which is a required part of your system.
Another good thing about HijackThis is the fact that it's so lightweight, it uses barely any memory, it's easy to use, and you don't need to keep it running!
This is a great area to check if a process is harmful or not: http://www.bleepingcomputer.com/startups/
HijackThis can be found here: http://www.trendsecure.com/portal/en-US/...hijackthis

Browser Protection
There are several great addons for browsers which you can get to protect you from malicious websites.
If you use FireFox, look for "WOT" and "NoScript", WOT will give warnings before you visit a website, and NoScript will disable malicious scripts from running when you visit a website.
If you use Internet Explorer, look for "IE-Spyad", IE-Spyad will redirect you away from malicious webpages and guard you from over 5,000 different URL's.
I'm also working on my own plugin, which you can expect to see in a few months. This will be for IE only, until I fully figure out how FireFox operates.




Okay, now that you're protected (well, I hope you are), it's time to be invisible...

IP Hiders
You can get some great IP hiders to keep you anonymous.
A personal favourite is "Hide-The-IP", which allows you to select the proxy and choose the speed of the one you want.
Hide-The-IP can be found here: http://www.hide-the-ip.com/ - Though you may need to find a crack for it!
There are many fabulous IP hiders out there which can be found, and these are a must if you're going to be involved in any illegal activity.

Tor: Anonymity Online
You may want to download "Tor" and TorButton for FireFox. This is a program which will select a proxy for you and allow you to spoof your connection by using that.
TorButton is a FireFox addon which allows you to change your proxy quickly by clicking the button. This is a great tool, and another good reason to download FireFox!
The whole Tor website with information & downloads can be found here: http://www.torproject.org/


Alright, grab another cup o' coffee, 'cause we've still got more to do..

Personal Details
Okay, you may want to give out your name and things on your Facebook or MySpace, but if you do, it's wise to use an alternate alias. If someone searched your hacking alias in Google, they'd probably be able to pick up a lot of information on you from that. Think about the name you choose before you choose it, and make sure you don't over-use it - only use it where you think you should. Don't complain about not being anonymous if you're going to splurt out your details everywhere, you can't expect to stay hidden if you're going to give yourself away without realising. Remember that.

Keeping Software Updated
Software should always be kept updated. This is vital. Most security experts will tell you that updating your software is more important than having an antivirus, because malware finds flaws and vulnerabilities in software that it can exploit.
This is what should always be kept fully up to date:
Your operating system (e.g. updating from Windows XP SP1 to SP2).
Java.
Browser.
Antivirus.
Firewall.
Instant messaging or email applications.
Any other software which could be exploited.
Zer0man showed me this lovely website with scanners you can use to check for out-of-date software...
Here's the online version: http://secunia.com/vulnerability_scanning/online/
And the downloadable version: http://secunia.com/vulnerability_scanning/personal/
Quite obviously, the downloadable version scans for more vulnerabilities than the online version, and it includes more features. This is a great tool to use every few weeks, since you never know what's around the corner ;-)

Active Thinking
Many scams and computer infections require your consent, so you should always be wary. If something doesn't quite look right, make sure to research it. Many people are fooled into giving away their details by fake emails from companies such as banks, social networking websites, etc. You shouldn't believe everything you read. Many scams will lead you on, so you just have to watch out. Keep everything you've learned from this guide in mind, and you'll be safe.
A good quote from The Real Hustle: "If it looks too good to be true, then it probably is".

Passwords
Though it is also important to have a password you will remember, you should also be sure that it can't be guessed. If it's a site containing personal information, I suggest you change your password once a month. A good password would contain letters, numbers and symbols - maybe even words in a foreign language if it helps! An example of a good password would be "A$fao4iz3£p" not"John1982" or "ilovefootball". Passwords should be different for each website you use, because if someone hacked into a forum, for example, and took your details - potentially, they could have access to your PayPal account, Facebook, etc.

Well, you should know just about everything you need to know by now. If there's anything else you're wondering, don't hesitate to ask! I will be here for any questions, feedback or suggestions. This guide should keep you well-hidden and protected from now on, just remember to keep everything in mind!

0 comments
Digg Technorati del.icio.us Stumbleupon Reddit Blinklist Furl Spurl Yahoo Simpy