ShareThis

8/12/2011 AOE Multiplayer Game Ranger Hack v4

Hey friends, I come with new version of AOE 1.0c conquerors Multiplayer hack v4 that works on Game Ranger, i have modified my old version of multiplayer hack for you and now it will work perfectly (as previous version hangs and displays error messages) , 
 
It consists of all the combo packs of Age of Empires including combo pack 1, combo pack 2 and combo pack 3 features. I have improved lots of cheats in this Age of empire hacks and make it further undetectable during the game. It works 100% on Game ranger and i am still editing it so that it will also work on voobly. I am sure you will have this hack working on voobly very soon. This trainer is awesome...just enjoy game hacks and have an extra edge over experts.
 
http://img651.imageshack.us/img651/5145/bigageofempiresiithecon.jpg

What's new in this version?
 
1. Update Check is Removed.
2. Hanging of Software is fixed.
3. Warning messages has been removed.
4. Customized food hacks and speed hacks has been added.
5. Customized Kills and Converts and Razes Hacks added.
6. Faster Resource collecting hacks added.

http://www.kiwilan.co.nz/wp-content/uploads/2010/10/Age-of-Conqeurors.jpg
 
1. Start the Game ranger. Now Join any AOE II conquerors room.
 
2. While you are in room Go to the hack folder and start the Hack (Destructive v3) by double clicking on it.
 
3. Now when the Game starts (means when you in Game and selecting civilizations teams etc). Go back to Hack and click on Enable Hacks and return to game.
 
4. After game starts, the first thing to do is to select your player number. If you’re green for example, you’re player 3 (if you didn’t change color yourself). So press `(key above the TAB button) to bring up the chat dialog and press and hold Q while pressing 3, after which press `(key above the TAB button) again to activate the hack. Don’t press ENTER – you’d only be letting others know you’re doing something stupid and the hack command won’t work anyway.

http://best4hackingnews.blogspot.com/

Note:  Blah.txt contains all the hacking commands that you will enter into cheat box.
Readme.txt contains the quick Guide to use the cheat commands during the game.


I hope you all like it.... Enjoy and have fun... If you like it please comment. 
 
Digg it StumbleUpon del.icio.us

How to find keylogger or any spyware in PC

Hello friends, today i will explain share with a great method to find or detect a keylogger or any other spyware in your PC or system. As we all know nowadays keyloggers and spywares are big concern as hackers are trying their best to infect the victims to hack their accounts
 
 
Today i will teach you how to find a keylogger or Trojan or spyware in your PC or Laptop. 
 
There are several ways to find them but using this method you will know the exact path of the keylogger and where its saving the log file. Also once you have the keylogger server now you can reverse engineer the server and hack the hackers account password which he used in keylogger server. Lets first start with keyloggers introduction..
 
 

 
Keylogger as the name suggests somethings that logs keystrokes. Yup its right, keylogger is a password hacking tool which is used to steal victims passwords, logging the keystrokes pressed by victim and also some advanced keyloggers are even used to retrieve stored confidential data. Based on internet scope keyloggers are of two types:
 
1. Physical Keylogger: These keyloggers are installed if hacker has physical access to your system. User has to install this type of keylogger manually on your PC or system. These types of keyloggers are hard to find but i will show you today how to find that also.
 
2. Remote Keylogger: Remote keyloggers are new generation keyboard hook hacking software's which does not require a physical access to the system that means they can be installed remotely. These usually comes into your PC through torrents, porn websites, hacking tools(software's like Facebook hack tool, Gmail hack tool, Hotmail hacker) and cracks, keygens and patches. As most users usually ignore these files as antivirus usually shows virus in these files. So hackers exploit this loophole and attach their keyloggers and keyboard hook programs with such things like keygens, patches, cracks and torrents etc.
Remote keyloggers logs the data into a file and send these logs to hackers FTP or his email. So friends, always try to avoid above mentioned things as far as possible.

 
1. Download the Forensic investigation tool OPENFILESVIEW and Install it.
 
2. Now open openfilesview and you will see a complete list of all processes and temporary files currently being used by your system or PC along with their full path from which they have been running. Here is the snapshot:
 
3. Now in above snapshot you can clearly identify the keylogger and system files. Check the Program name and then check its corresponding location in full path. Also you can verify with time at which keylogger file has  been created.
 
4. Now we have find the location of Keylogger or spyware. Go to that location and open the File with bintext or any binary debugger and search for @ or ftp in that. This will help you to get the email ID or FTP address at which keylogger is sending logs. 


Digg it StumbleUpon del.icio.us

8/10/2011 Phone hacking: News International mass-deleted emails, tech firm says

wwNews International

Phone-hacking scandal: Police outside the gates of News International's headquarters. Photograph: Andy Rain/EPA

The technology firm HCL has told the home affairs select committee it was aware of the deletion of hundreds of thousands of emails at the request of News International between April 2010 and July 2011, but said it did not know of anything untoward behind the requests to delete them.

HCL has sent the letter to the home affairs select committee chairman, Keith Vaz , revealing it had been involved in nine separate episodes of email deletion.

HCL says it is not the company responsible for emails on the News International system that are older than a couple of weeks. It says another unnamed vendor is responsible, but confirms it has co-operated with this vendor in deleting material.

Through a letter from HCL's solicitors Stuart Benson, the firm says: "My client is aware of nothing which appeared abnormal, untoward or inconsistent with its contractual role." It adds: "It is entirely for News International, the police and your committee as to whether there was any other agenda or subtext when issues of deletion arose and that is a matter on which my client cannot comment and something you will no doubt wish to explore direct with News International."

It stressed that since it was not the company that stored News International's data "any suggestion or allegation that it has deleted material held on behalf of News International is without foundation".
HCL identified three sets of email deletions in April 2010, including a deletion of a public folder of a live email system that "was owned by a user who no longer needed the emails".

A further 200,000 emails stuck in an outbox were deleted in May 2010 to restore email functionality. In September 2010 a further pruning of historic emails occurred to help stabilise the email archival system, which had been having "frequent outages" since November 2009.

In January 2011 HCL was asked about its ability to truncate a particular database in the email archival systems. HCL "answered in the negative and suggested assistance from the third party vendor". HCL stated no reason as to why it was unable to assist.

In February 2011, emails were deleted in an older version of email software. Finally, in July 2011 HCL helped delete emails from the live system as relocation errors had occurred during migration from one system to the other.

HCL said it did not have the resources to review every set of deletions.
Separately, a firm of solicitors drawn into the News International phone-hacking scandal is expected to reply shortly to the home affairs select committee as to how it came to write a key letter to the newspaper group that was then used by the company to contend that phone hacking had not been widespread.
The firm, Harbottle and Lewis, is consulting the Metropolitan police before deciding how to reply to requests from the select committee to spell out how it came to write a letter taken to mean that only one reporter was aware of phone hacking at the paper.

The New York Times reported at the weekend that the letter sent by Harbottle and Lewis to the culture, media and sport select committee was redrafted more than once. The firm had been hired to review the email of the tabloid's royal reporter, Clive Goodman, who had pleaded guilty to hacking the mobile phone messages of royal household staff members. The letter said "no reasonable evidence" had been found that senior editors knew about the reporter's "illegal actions".

The home affairs select committee asked:

• "What was the exact remit given to Harbottle and Lewis when it was instructed by News International in 2007?"

• "The contents of emails and information held in the file you mentioned in your letter."

• "What advice was provided from Harbottle and Lewis to News International in 2007 following examination of the emails and information?"

• "Why the evidence you had in 2007 that was later examined by Lord McDonald in 2011 was not acted upon sooner?"


@Atulplayer
Digg it StumbleUpon del.icio.us
Related Posts Plugin for WordPress, Blogger...

Recent Posts


Popular Posts

Facebook Comment

Trade traffic with me using 2leep.com system