Sign Up To Recive Latest Blog Updates

subscribe to Hacks N Cracks

Enter your email address:

Delivered by FeedBurner

Cyber Crime’s Most (In)Famous



Some did it for kicks, some craved the fame, some thought they were making a
political statement while others obviously went for the money. Here’s a look at
some of cyber crime’s most infamous criminals and their hacking exploits.


There is a very thin line that divides cyber-pranksters from cyber-criminals. Some of the most notorious cyber crimes of the last few years have been attributed to youngsters, who perhaps innocuously thought they were playing a prank when they hacked into networks or created malicious code for viruses, malware, worms or Trojans. Maybe they didn’t have the intention of making a financial gain from their activities, nor did they aspire for celebrity status or they did it, purely for the heck of it and as a prank.

Magic Number Trick in Facebook

Magic Number Trick in Facebook
These days magic number trick is becoming a rage on facebook.Anything related to facebook (however small it may be) is sure to create a buzz among people.These magic numbers are nothing but the unique ID numbers of the UsersPages or Groups. When you will paste these numbers  in your satus they automatically will get converted into your profile,group or page link.

Get Free Domain Name & Web Hosting from Google & HostGator


If you own a business (SME/Small Medium Enterprises) here in India and want to take your business online, then here’s a great NEWS for you!
google hostgator india
Google India, in partnership with HostGator IndiaFISME (Federation of Indian Micro and Small & Medium Enterprises) and ICICI Bank, is offering completely FREE 1 Year Web Hosting and .in Domain Name to all those people who owns any type of SME/Small Medium Enterprises in India.

Become a Celebrity: Put Your Face on Magazine Covers and CNN


CNN-TV-Screenshot
Want to see yourself on CNN news, BoingBoing or the front cover of all top magazines like TIME, Wired, Cosmopolitan, National Geographic, Sports Illustrated, etc.
Try these fake magazine cover creation tools:

Edit Any Web Page in your Browser Just Like a Wiki


Well that's quite possible through Edit Current Website - a bookmarklet that helps you change content of any web page live inside the browser - no need to install extensions like Firebug or learning HTML.
Edit current website - Drag this link to your bookmarks toolbar
The moment you press the Edit Website button from the bookmarks toolbar, the web page you are currently reading turns into an editable document - you can then edit text, move around images on the page or even remove them completely.

Fake Screenshot of your Google AdSense Earnings


It's tough to make any money with Google AdSense, but there's no reason why you shouldn't claim otherwise. With Google AdSense Generator, you now even have a fake screenshot to back that up.
fake
You just need to enter your fake earnings, and Google AdSense Generator generates a fake screenshot complete with the blurred out publisher ID, CTR, CPM and other data you don't want revealed.

How to Verify an Email Address?


How do you verify if a given email address is real or fake? Well an obvious solution is that you send a test mail to that email address and if your message doesn’t bounce, it is safe to assume* that the address is real.
[*] Some web domains may have configured a catch-all email address meaning that messages addressed to a non-existent mailbox will not be returned to the sender but in most cases, such email messages will bounce.

Ping an Email Address to Validate it!

When you send an email to someone, the message goes to an SMTP server which then looks for the MX (Mail Exchange) records of the email recipient’s domain.
For instance, when you send an email to hello@gmail.com, the mail server will try to find the MX records for the gmail.com domain. If the records exist, the next step would be to determine whether that email username (hello in our example) is present or not.
Using a similar logic, we can verify an email address from the computer without actually sending a test message. Here’s how:
Let say that we want to verify if the address billgates@gmail.com exists or not?
Step 1. Enable telnet in Windows.  Or if you already have the PuTTY utility, skip this step.
Step 2. Open the command prompt and type the following command:
nslookup –type=mx gmail.com
This command will extract and list the MX records of a domain as shown below. Replace gmail.com with the domain of the email address that you are trying to verify.
gmail.com MX preference=30, exchanger = alt3.gmail-smtp-in.l.google.com
gmail.com MX preference=20, exchanger = alt2.gmail-smtp-in.l.google.com
gmail.com MX preference=5,  exchanger = gmail-smtp-in.l.google.com
gmail.com MX preference=10, exchanger = alt1.gmail-smtp-in.l.google.com
gmail.com MX preference=40, exchanger = alt4.gmail-smtp-in.l.google.com
Step 3. As you may have noticed, it is not uncommon to have multiple MX records for a domain. Pick any one of the servers mentioned in the MX records, may be the one with the lowest preference level number (in our example, gmail-smtp-in.l.google.com), and “pretend” to send a test message to that server from you computer.
For that, go to command prompt window and type the following commands in the listed sequence:
3a: Connect to the mail server:
telnet gmail-smtp-in.l.google.com 25
3b: Say hello to the other server
HELO
3c: Identify yourself with some fictitious email address
mail from:<labnol@labnol.org>
3d: Type the recipient’s email address that you are trying to verify:
rcpt to:<billgates@gmail.com>
The server response for ‘rcpt to’ command will give you an idea whether an email address is valid or not. You’ll get an “OK” if the address exists else a 550 error like:
  • abc@gmail.com - The email account that you tried to reach does not exist.
  • support@gmail.com - The email account that you tried to reach is disabled.
That’s it! If the address is valid, you may perform reverse email search to find the person behind the address. And if you get stuck somewhere, this step-by-step video should help:

The Internet of Fake Screenshots


Don’t believe everything you see on the Internet because screenshots can be easily faked. Sometimes these fake images are for pure fun – like you putting your picture on the cover of TIME magazine, sometimes they may be deceptive.
facebook wall
My favorite is Wall Machine – a service that lets you you create fake screenshots of Facebook walls and other Facebook related activity - like X is now a friend of Y or Z changed their relation status on Facebook. Every part of that screenshot can be customized including the conversation text, the profile images and you can have as many comments on a Facebook post as you like.
Another service – iFakeText - lets you make screenshot images of text messages exchanged on an iPhone. Just enter the text of the SMS conversation in a proper format and generate the screenshot – see example.
I also like Fake Tweet Builder for creating screenshot images of Twitter conversations that may or may not have happened. The screenshots of individual tweets look extremely real -see example – and you may also use customize the profile pictures, the name of the Twitter client and how many times a particular tweet has been retweeted.
Ticket-o-Matic lets you print boarding passes of any popular airline, Fodey generates newspaper clippings while Expense Steak creates PDF receipts of restaurant bills and office supplies for a given amount. When you print these receipts on paper, they’ll look realbut there’s little potential for misuse as they carry old dates.
Finally, if a web form makes it mandatory to fill the street address or the phone number, use this website to generate random data for putting into that form.

Use your Browser Address Bar as a Calculator


Free & secure application & desktop delivery to any operating system.
google calculator
You know this, right? If you have set Google as your default search provider, you can use the browser’s address bar as an instant calculator.

Create your own Facebook Book



Create free animated slideshows from your travel photos in minutes!
facebook book

How to Setup a Whitelist in Gmail



Have you ever come across a situation where you were expecting an important email from a known sender but the mail never made it to your Inbox? Instead, Gmail had incorrectly classified that mail as spam and thus moved it to the junk mail folder.
Gmail filters are pretty awesome at detecting spam but they do sometimes make mistakes. So how can you prevent Gmail from marking mails from certain legitimate senders as spam?

How to Whitelist an Email Sender in Gmail

gmail logoThere are two ways to whitelist email addresses, or even web domains, in Gmail.

Keep your Online Accounts Safe and Secure


Free & secure application & desktop delivery to any operating system.
online accounts
You probably use strong and unique passwords to prevent hackers from taking over your online accounts but is that enough? Maybe yes but I can’t say that with enough confidence because my Google and Facebook accounts have been compromised in the past despite using very complex passwords that can’t be easily guessed.
Like most other people, I have a few dozen online accounts now and have spent the last few days evaluating the security and recovery options for each one of them. In response, I have taken a few extra steps, listed below, that I think may help improve the overall security of these accounts. If you find anything useful in the list, do try implementing it in your own workflow for better piece of mind.

A Security Checklist for Online Accounts

#1. I have enabled the “Always use HTTPS” setting for Facebook, Twitter, Gmail, Google and all the other online services that support secure HTTP. This is especially important when accessing Internet over a Wi-Fi network because without HTTPS, anyone (and not just skilled hackers) can capture your login details using Firesheep, a simple Firefox extension.
#2. I have a few Google Accounts and they all use 2-step verification now. That means if someone tries to log into my Google account from a different computer, they’ll have to type an additional code that is sent directly to my mobile phone as an SMS text message or over a voice call.
#3. The 2-step verification can also alert you to potential hacking activity. If I ever get an SMS (or a voice call) from Google with the verification code but without requesting one, it is an immediate hint that someone knows my password though they won’t be able to get in without entering the verification code.
#4. I have connected my mobile number with my Facebook account. This is extremely important because I get an instant SMS and an email alert whenever my Facebook account is accessed from a different computer or another mobile phone.
#5. I carefully reviewed third-party sites that have access to my online accounts and revoked access to all the unwanted apps that I no longer use. In case you wish to do the same for your accounts, here are the direct links for FacebookGoogle and Twitter.
#6. I maintain two email addresses – one is public that is displayed on the blog while the other email address is known to a select few. Why?
6a. The public email address is associated with services like Twitter, YouTube, Facebook, Foursquare, LinkedIn, Flickr, Tumblr, Posterous, Skype and a couple of other social sites where I want people to find me if they have my email address in their address book.
6b. I use the other “secret” email address with services like Dropbox, Amazon, Google Apps, my bank, my hosting service, Apple iTunes, PayPal and few other places where account security is even more critical and where I am not looking to get social.
#7. If I am testing a new online service, I almost always use a disposable email address to create a test account with that service. Some online services reject disposable addresses to prevent fake registrations but the one I use goes through as it is only analias (or nickname) of my main email address.
#8. I prefer using a virtual credit card with shopping sites that I am either using for the first time or where the fine print is too long and there’s a risk that I could be billed again if I don’t cancel the account. This also helps keep my credit card safe from relatively unknown sites.
#9. Once in a while, I do mock drill with my most important online accounts to test the various recovery options I would have in case I forget my password or if I lose access to my secondary email address or misplace my mobile phone.
#10. The last point - how do I remember and manage so many different passwords?
Some people prefer to use password managers which are very convenient but at this time, all I use is a simple 1-page document (see sample) to store information of all my online accounts and the corresponding passwords. This file is password-protected and I put it on Dropbox so the information is available on all my computers.
This may surprise some but I also have a hard copy of this file that family members can refer to in case I am travelling and they need urgent access to any of my online accounts. Also, since they would need my mobile phone to access my Gmail or Google account, I have included backup verification codes in the printed document itself – thus the Google account can be used without requiring the phone.
One more thing. If you have two email accounts, never ever set one emails as the secondary (or recovery) email address of the other. That’s because if one of your email accounts gets compromised, the hacker can easily take over the other account as well.

Create Better Diagrams for your PowerPoint Slides



Turn Your Pictures Into Stunning Travel Slideshows. Easy to Create!
If you ever need to create diagrams or flowcharts to include in your PowerPoint slides, follow these simple design tips from Enrique GarcĂ­a to make your diagrams look even better.

Twitter Delicious Facebook Digg Stumbleupon Favorites More