Blog is under Construction!

Hacking 4 fun is back this time ,Coming soon with the new ,ultimate and great hacking style!This time we gonna enjoy and love this much more than before.until then like this page on facebook

Info-Tech

Thanks 4 your co-operation.

You are the back-bone of Hacking 4 fun.

your's sincerly

Asad Raza


Like Us

U there


Sunday, October 18, 2009

How to view hidden passwords without using any software.

First of all open up the webpage on which you wanna show the hidden passwords and then Just copy and paste the following JavaScript into the address bar of the browser and you are done.


Just Put This Script IN Address Bar...


javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;

%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)

%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)

%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)

%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if

%20(s)%20alert(%22Passwords%20in%20forms%20on%20this

%20page:\n\n%22%20+%20s);%20else%20alert(%22There%20are

%20no%20passwords%20in%20forms%20on%20this

%20page.%22);})();


After copying and pasting the JavaScript given above press the enter key and hidden passwords will be shown to you.

Following is the screenshot of hidden password that is shown the JavaScript given above.


Note:-I have tested this javascript in IE,Firefox and Opera and it is working perfectly.

Asad Raza

Friday, September 25, 2009

How to quickly open the ClipBook Viewer

When you use the Cut or Copy command on the Edit menu, the material you cut or copy is automatically copied to the Clipboard. The Clipboard is a temporary holding area for the items you've cut or copied. You can use the ClipBook Viewer to see the information that you've copied to the Clipboard.

You can also store information permanently in your local ClipBook and share it with other users. The local ClipBook opens when you start ClipBook Viewer.

The ClipBook Viewer isn't listed in the Start menu in Microsoft Windows XP, so if you want quick access to it, just create a shortcut on your desktop.

To open the ClipBook View
1.

Right-click your desktop, point to New, and then click Shortcut.

2.
In the location field, type %windir%\system32\clipbrd.exe

3.
Click Next.

4.
Click Finish.

5.
Now you can double-click the clipbrd shortcut on your desktop to launch the ClipBook Viewer.

Creating a Shutdown Shortcut

Right click on the Desktop.

Left click on New > Shortcut.


 In the Type the location of the item: textbox enter
%windir%\System32\shutdown.exe -s

The -s parameter is used to shut down the computer.

The following two parameters can be used with -s:
-f Forces running applications to close without warning.
-t xx Set timeout for shutdown to xx seconds.

The following command would shut down instantly.
%windir%\System32\shutdown.exe -s -f -t 00

Click the Next > button.

 In the Type a name for this shortcut: textbox enter
Shutdown My Computer (or some other name of your choice)

Click the Finish button.
 


For more information on shutdown.exe's options launch a command prompt and type shutdown




Wednesday, August 26, 2009

CursorFX


Create and use mouse cursors that look and feel far superior to anything you've ever seen before!

Saturday, August 15, 2009

Hacking Level

Hacking 4 fun™ followers(Hacking Level):-


Other's followers (Hacking Level):-




Sunday, August 9, 2009

Hacker's Types

Hackers can be divided into three groups: white hats, black hats, and grey hats. Ethical hackers
usually fall into the white-hat category, but sometimes they’re former grey hats who have become
security professionals and who use their skills in an ethical manner.

White Hat:-


White Hats are the good guys, the ethical hackers who use their hacking skills for
defensive purposes. White-hat hackers ar
e usually security professionals with knowledge of
hacking and the hacker toolset and who use this knowledge to locate weaknesses and implement
countermeasures.

Black Hat:-


Black hats are the bad guys: the malicious hackers or
crackers
who use their skills
for illegal or malicious purposes. They break into or otherwise violate the system integrity of
remote machines, with malicious intent. Having gained unauthorized access, black-hat hackers
destroy vital data, deny legitimate users service, and basically cause problems for their targets.
Black-hat hackers and crackers can easily be differentiated from white-hat hackers because their
actions are malicious.

Grey Hat:-


Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.



Wednesday, July 29, 2009

Making a real virus



By:- Asad Raza


Hidden password can be finded through this software. SandBoy's Reveleation.
By :- Asad Raza

Hacking @ VVebsite vvith SQL INJECTION



By:-Asad Raza

Hacking @ Website



By :- Asad Raza

Tuesday, July 21, 2009

Resource Hacker



Resource Hacker™ is a freeware utility to view, modify, add, delete and extract resources in 32bit Windows executables. It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, and Win2000 operating systems. Cursor, Icon, Bitmap, GIF, AVI, and JPG resource images can be viewed. WAV and MIDI audio resources can be played. Menus, Dialogs, MessageTables, StringTables, Accelerators, Delphi Forms, and VersionInfo resources can be viewed as decompiled resource scripts. Menus and Dialogs can also be viewed as they would appear in a running application. Resources can be saved as image files (*.ico, *.bmp etc), as script files (*.rc), as binary resource files (*.res), or as untyped binary files (*.bin). The program is also capable of modifying, adding and deleting resources. Intended for advanced users.

Cheat Engine


Cheat Engine is an open source tool designed to help you with modifying games so you can make them harder or easier depending on your preference(e.g: Find that 100hp is too easy, try playing a game with a max of 1 HP), but also contains other usefull tools to help debugging games and even normal applications.

It comes with a memory scanner to quickly scan for variables used within a game and allow you to change them, but it also comes with a debugger, disassembler, assembler, speedhack, trainer maker, direct 3D manipulation tools, system inspection tools and more.

For new users it is recommended to go through the tutorial(The one that comes with Cheat Engine, you can find it in your programs list after installing) and at least reach step 5 for basic understanding of the usage of Cheat Engine

Download:-

Angry IP Scanner



Angry IP scanner is a very fast and small IP scanner. It pings each IP address to check if it`s alive, then optionally it is resolving hostname and tries to connect at specified in Options dialog box TCP port. The program uses separate threads for each scanned address to reduce scanning speed. It can also display NetBIOS information: computer name, workgroup, currently logged user and MAC address.

Download:-

Monday, July 13, 2009

DISABLE LOW DISK SPACE WARNINGS IN WINDOWS XP



 
Annoyed of the little pop-ups which remind you of the ever decreasing disk space. Even though, sometimes this is quite useful, at times, this becomes a nuisance when you are busily doing something important and this little popup grabs your attention.

Most of the times you would be pretty much aware of the low space on one or all of your drives. But, you might be waiting for the right time to get yourself a new HDD.
Here is a simple step to disable these popups being displayed. This trick is pretty simple, but Team NIrvana strictly urges you to take a backup of your registry. So, here we go.
1. Go to StartRun and type ‘regedit’ without quotes.
2. In the registry, navigate to ‘HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer’
3. Now create a ‘new binary value’, like this.

And set its value to ‘00 00 00 01′ and hit F5 once and exit the registry.
Its done. Now, XP does not display the pop-up no matter whether you are running out of disk space or whatever.



UNIVERSAL MATH SOLVER



THIS IS A MATH SOLVING SOFTWARE
THEN WAHT IS THE IMPLORTANCE YAH..BECAUSE IT CAN SOLOVE ANY PROBLEM



DIRECT DOWNLOAD


http://www.umsolver.com/cgi-bin/club.pl?download=setup_ums_demo.exe&language=us

EXE ICON CHANGER



VERY USEFUL TOOL

*.Select First Ur Exe

*Icon Also

*See That Icon Change Successfully ...!

Download:ð

http://www.ziddu.com/download/5571954/IconChanger.rar.html

Friday, July 10, 2009

U CAN EASY HACK SOMEONE

GENERALLY BECAUSE OF OUR HUMAN MINDSET MOSTOF THEM THYE CHOOSE THIS COMMON PASSWORDS MAY BE IT WILL HELP U SO MUCH
ABC123
PASSWORD
password
123456
123456789
1234567890
qwerty
pass1234
tajmahal
secret
123456
abc123
mustang
apache
466cZ']-PH%st
34149:F
8719179:,pr<\f
6r*xU
24tr$Up}s
86348-F
453213
rt;&>@OO!ou#v[
651488o
79517
PARENTS NAMES
LOVERS NAMES

Friday, July 3, 2009

Yahoo! password sender


A software which send Victim's Yahoo passwords to u.

U can send this in all types.

eg.

Software.

Hacking tool

Your server 

etc...

Download:-

http://rapidshare.com/files/251437151/Yahoo_password_sender.rar



Password:-
asadhackingtricks.blogspot.com

Hacker Cracker


From the streets of the ghetto to the razor edge of corporate high technology -- prodigy, super-hacker, top security consultant, and champion kickboxer Ejovi Nuwere tells of his intriguing journey on both sides of the law....

One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Cracker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's most notorious ghettos to a virtual world where identities shift and paranoia rules, where black-hat hackers and white-hat sleuths confront each other by day and witch roles at night in the ongoing war to control America's most sensitive computer systems. It is a story of an African American boy coming of age in the new millennium, a story that vibrates with the themes of American life, those we know and those we are just beginning to glimpse.

Like other neighborhood kids in the Bedford-Stuyvesant neighborhood of Brooklyn, Ejovi Nuwere grew up among thugs and drug dealers. When he was eleven, he helped form a gang; when he was twelve, oppressed by the violence around him, he attempted suicide. In his large, extended family, one uncle was a career criminal, one a graduate student with his own computer. By the time Ejovi was fourteen, he was spending as much time on the computer as his uncle in college was. Within a year he was well on his way to a hacking career that would lead him to one of the most audacious and potentially dangerous computer break-ins of all time, secret until now.
Along the way, Ejovi found time to become a kickboxing champion and an aspiring actor. Before he finished high school he was combining these pursuits with his hidden life in the hacker underground and an increasingly prominent career as a computer security consultant. At the age of twenty-two he was a top security specialist for one of the world's largest financial houses when his life was forever altered in the cataclysm of September 11, 2001.

Hacker Cracker is at once the most candid revelation to date of the dark secrets of cyberspace and the simple, unaffected story of an inner-city child's triumph over shattering odds to achieve unparalleled success. This riveting autobiography is a Horatio Alger tale for our times: a thrilling, frightening, and ultimately uplifting story of survival and accomplishment.

Download: 14.2 MB
http://rapidshare.com/files/53551259/783HC.rar

Mirror:
http://www.megaupload.com/?d=SDWKSFPT

Pass: www.dl4all.com

Network Security JumpStart


                                                            | 352 Pages | PDF | 1.6 MB   


Whether you're setting out to earn a security certification or just want to know more about the security issues faced by all network administrators, Network Security JumpStart is the place to begin. Inside, a networking expert demystifies every aspect of the growing security imperative, giving you a firm footing from which you can realize your goals and develop a better understanding of computer and network security. Coverage Includes:

* Understanding security principles
* Understanding hacking
* Using encryption and authentication
* Managing security
* Securing Internet connections
* Using Virtual Private Networks
* Securing remote and home users
* Implementing virus protection
* Creating fault tolerance
* Securing Windows servers
* Securing UNIX servers
* Securing public web servers
* Securing public e-mail servers
* Detecting intrusion

Download: 1.4 MB
http://rapidshare.com/files/94753822/Network.Security.JumpStart.rar

Password: www.dl4all.com



Wednesday, July 1, 2009

Hacking Secrets Revealed


A manual for beginner, This book won’t make you a hacker but will gave you idea abt what the hacking process can be for the beginners only

THE internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t T know can’t hurt you. When it comes to the Internet believe quite the opposite.On the Internet there a millions and millions of computer users logging on and off on a daily basis. Information is transferred from one point to another in a heartbeat.Amongst those millions upon millions of users, there’s you.

Download:
http://rapidshare.com/files/131095141/HackerSecrets_www.dl4all.com.rar

Password: www.dl4all.com

Google Hacks


Google Hacks

Download:
http://rapidshare.com/files/166508284/Google_Hacks_www.dl4all.com.rar

Yahoo! Hacks


Yahoo! took the world by storm in the 1990s as a one-of-a-kind, searchable list of interesting web sites. But ten years later, it has expanded into a department store overflowing with useful and innovative tools and services-from email, blogging, social networking, and instant messaging, to news, financial markets, shopping, movie and TV listings, and much more. Today's Yahoo! keeps you connected with every aspect of your life and every corner of the Web. Yahoo! Hacks shows you how to use, expand, personalize, and tweak Yahoo! in ways you never dreamed possible.

Download: 7 MB
http://www.thatsprime.com/link/fb015eb8/15468

Password: www.dl4all.com

Hacking Firefox


430 pages | 2005 | PDF | ENGLISH | 10.3 MB

They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control.

Step-by-step instructions for these hacks and dozens more
* Settings, content, and extension hacks
* Hacking the interface and themes
* Performance boosters
* Anti-phishing and security hacks
* Toolbar and status bar tweaks
* Navigation, download, and search hacks
* Hacks for common plugins
* Extension and theme creation

Download:
http://www.ziddu.com/download/1868481/HackingFirefox.rar.html

Pass : www.dl4all.com

The Hacking Solution


Securing & Optimizing Linux: The Hacking Solution

Open Network Architecture | ISBN: 0968879314 | 1208 pages | PDF | 5 Mb

This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system administrators, managers, or Linux users who wish to protect their Linux systems from unauthorized intrusions and other external attacks. This new edition contains many tips and useful information related to security and optimization to help you get complete control of what could happen on your Linux server and network.

The book provides through its 47 chapters, a comprehensive collection of Linux security products and explains in the most simple and structured manner how to safely and easily configure and run many popular Linux-based applications and services, including Exim, Qmail, Apache 2, DHCP, Anti-Virus, Anti-Spam, Anti-Relaying, ProFTPD, and many others. The author of the book relentlessy searches and document new hacking solutions to bring you in this manual the most up-to-date security developments.

Download:
http://rapidshare.com/files/215005815/securing-optimizing-linux-the-hacking-solution_www.dl4all.com.rar

Best Selling Hacking Ebooks (NEW)


Best Selling Hacking Ebooks | PDF | 495/15/26/190 pages | 19.8MB

4 Ebooks:

* Hack Proofing - Your Network - Internet Tradecraft (495 pages)
* Hack the Net (15 pages)
* Hacking Exposed Network Security Secrets & Solutions (16 pages)
* Steal This Computer Book 3 - What They Won't Tell You About the Internet (190 pages)

Size : 19.8MB

Download :
http://rapidshare.com/files/247374018/Best_Selling_Hacking_Ebooks__NEW__www.dl4all.com.rar

Secret file maker


Secret file maker is a must have tool for everyone who needs to keep their files secret...
In this version, as in the previous one, you can hide ANY of you files and/or folders into ANY one file you want.
This is very useful at school or at work if you bring your USB Stick with you. you can just bring a Notepad.exe in your USB Stick and it will run normally.
But when you open it as .zip or .rar file it will reveal it's hidden contents.
So you can hide your games and hacking tools in one file, AND that one file will run normally! e.g. if you open notepad.exe containing hidden files it will run just like a notepad.

Well, in this version modified the code so you can now read the inbuilt manual of Secret File Maker in the program, so now I hope no one will have any troubles.

Download:
http://rapidshare.com/files/173471803/Secret_file_Maker_www.dl4all.com.zip

Friday, June 26, 2009

Iron Locker v2.0


Iron Locker v2.0

Download:-

http://rapidshare.com/files/199194564/Iron_Locker_v2.0.rar

EVIL ROOM DESTROY 4.0


EVIL ROOM DESTROY 4.0

Download:-

http://www.mediafire.com/?sharekey=3de35f539c2cef5190a82c7bb0fad7ade04e75f6e8ebb871

SUPER BOOT


SUPER BOOT

Download:-

http://rapidshare.com/files/199217919/Super_Boot.rar

OS - KEY FINDER


JUST OPEN THIS TOOL THEN ITS TELL UR OS - SERIAL KEY

Download:-

http://www.4shared.com/file/80571438/fab1c02b/Key_Finder.html

Local Ip Finder


This Tool Find Local Host Name & Local Ip


Download:-

http://www.4shared.com/file/80908027/ccf617c6/Local_ip.html

Softkey Revealer


SoftKey Revealer, retrieves the CD-Key and Serial for installed softwares on computer. It also saves your money and time, free and easy to use.

If you lost your CD-Key or Serials of purchased softwares, you can do these:1: You can buy a license again.2: You can buy a product key finder program.3: Or you can use free SoftKey Revealer.

Download:-

http://rapidshare.com/files/179232832/SoftKeyRevealer.zip

Game Key Revealer


Game Key Revealer, retrieves the CD-Key and Serial for installed games on computer. If you lost legal CD-Keys or Serials of your purchased games, you can find them with Game Key Revealer.

Features:-

Displays over 600 games



Download:-

http://rapidshare.com/files/179232106/GameKeyRevealer.zip

Speed Test 3.0


Its A Simple Tool



Test Ur Inter net Speed & At The Same Time Downloaing Speed

Speed Connect


Download:-

http://1.bp.blogspot.com/_-8xwyLV-DQA/SV_JMBN70aI/AAAAAAAAAPA/s9vA2u_rqbI/s400/th_6.gif

Google Web Accelerator


By Using This Tool U Can Load Ur WebPages Very Fast...!


Download:-

http://rapidshare.com/files/179445546/GoogleWebAccelerator.rar

VNC Trick