Wednesday, December 15, 2010

Mein Kampf by Adolf Hitler


Volume One: A RECKONING

1. In the House of My Parents
2. Years of study and Suffering in Vienna
3. General Political Considerations based on My Vienna Period
4. Munich
5. The World War
6. War Propaganda
7. The Revolution
8. The Beginning of My political Activity
9. The "German Workers Party"
10. Causes of the collapse
11. Nation and Race
12. The first period of development of the National Socialist German Worker's Party


Volume Two: THE NATIONAL SOCIALIST MOVEMENT

1. Philosophy and Party
2. The State
3. Subjects and Citizens
4. Personality and the conception of the Folkish State
5. Philosophy and Organisation
6. The Struggle of the early Period - The Significance of the Spoken Word
7. The Struggle with the Red Front
8. The Strong Man is Mightiest alone
9. Basic ideas regarding the meaning and organization of the SA
10. Federalism as a Mask
11. Propaganda and Organization
12. The Trade - Union Question
13. German Alliance Policy after the War
14. Eastern Orientation or Eastern Policy
15. The right of Emergency defense conclusion

Tuesday, December 7, 2010

Simple Technique to get other's User Name and Password

One of the most simplest technique which I often use is key logger.

These are the following steps you need to do with key logger :-

1. Download it from
here. Want to download free key logger.

2. Install its setup to public libraries, cyber cafes, your friend computer or your office computer.

3. Hide it after mentioning your email id into this software.

4. Check your email, you start getting user name and password of everybody who use that computer. And their is very basic thing about user name and password. People often have same password for all the services they used.

Learn Hacking in 5 Easy Steps

First of all I wanna tell you that hacking is a art. I am teaching you this art so that you can make yourself more secure. I don't want you to use my techniques to harm others because hackers never harm others, crackers do. And we are Hackers not cracker.

There are 5 easy steps to learn Hacking :-

1. Take all safety Measures to hide yourself from target.

There are lots of techniques to hide yourself from target computer. I recommend you to use as much techniques as you can.

I am mentioning few important tricks below :-
• Use Hide Ip Software :- This software will help you to hide your IP address.
• Use Firewall :- Firewall secure your computer as well as restrict any personal information from going outside.
• Use Proxy servers :- Whenever you want to surf the computer of your target use proxy servers.
• Use others username and password :- Try to avoid using your own user name and password for internet connection. Learn the technique to get other's user name and password.


2. Find out the IP Address of Target Computer.

• What is Ip address :- It's full form is Internet Protocol Address. Protocol means the way computer talks to each other and Internet protocol means , way in which two computer talks to each on internet. So the complete meaning of Ip address is address of a computer who wants to talk to other computers on internet.
There are two important things about ip address :-
 It is unique for every computer.
 It is needed every time we connect to internet.
• Use of IP address in Hacking :- Ip address is one of the most important part of hacking. To learn its importance in hacking first of all we need to know what is hacking. All i can say here is that if we don't know the ip address of target computer we can't able to move single step forward in getting access to target computer.
• Ways to find out IP address :-
o Ping
o tracert
o dns query


3.Gather information about target computer such as its operating system ,time,date etc etc.
• What 's the need ?
o To be able to know weaknesses of target computer.
o To exploit those weakness.
o Learn more how we can exploit it.
• How to gather information?
o Telnet
o Dns Query
o Port Scan
o tracert


4.Use Search engine (according to information obtained from above steps) to get tools which will help us to hack target computer.

Search engines like google are very close friends of hackers. If we do all the things mentioned above we know exactly where vulnerability lies in target computer. To use that vulnerability we search for available tools on google.com. After downloading specific tools we need IP Address of target computer ( we already know) to get access on other computer.

Learn to use that vulnerability

5. Leave one or two files on the target computer so to get easy access in future.
To get access again and again hackers usually leave files on target computer. For eg Net cat which allow them to get access again and again. Download netcat