Skip to main content

Posts

Showing posts with the label Mail

RECOVER YOUR HACKED YAHOO ID

GO TO FOLLOWING LINK:- ( http://help.yahoo.com/l/us/yahoo/mail/original/help_f.html?from_url= ) NOTE- YOU MIGHT NEED A TEMPORARY YAHOO ID. OR ( http://help.yahoo.com/fast/help/us/mobilf/cgi_mixed/ ) OR CONTACT YAHOO ON PHONE 1-866-562-7219 or 1-408-349-1572 or 408-349-1572.

Google - Peep into other's email Boxes

The idea is, one Google advanced search string is filetype: . It is used to find out any file only. Now I'm using this string as a tool, I am searching for filetype:eml eml intext:"Content-Type: image/jpeg". Look at the keyword. It is finding a file with extension eml and that eml should have a Line Content-Type: image/jpeg. Now remember the old days, MIME encoding of a email. When ever we are attaching a .jpg file, that line should come in .eml file. So, the full keyword is searching for filename any with extension .eml which is email file extension, and it should contain a .jpg file, may be some photo or other picture from the web. You can't belive if you are not checking it yourself. Keyword : filetype:eml eml intext:"Content-Type: image/jpeg" Here is ur example lollxxx http://www.google.com.pk/search?hl=en&q=filetype%3Aeml+eml+intext%3A%22Content-Type%

HOW TO HACK YAHOO IDS

Here are five ways:- 1.) This is the most efficient method of all. And you need is to download Keyloggers(These are the softwares that copy the login information of the user on which they are installed). So you might have guessed that you need to install that on his computer & wait for him to login to his id. The advantage of using keyloggers is that they are hidden to the user. Even from Add?Remove Programs in Control Panel don't show them. Another advantage is that they can be used for spying. Some keyloggers can copy the urls of websites they visit. So a indespencible tool for parents for spying their childred. Last but not the least Some keyloggers like Ghost Keyloger can even email you the password. But it is a paid software you can download the demo version just google it & then google it for cracks. 2.) This method is used when you don't have physical access to his computer which most of you won't have. You need RAT(Remote Access Tool). With R...

SOME MORE ON MAIL HACKING

Note:-This information is for educational purposes only.Condition1:-If u have physical access to that users computer then you can installa keylogger to his computer.A keylogger records all keystrokes & saves them to a encrypted txt file. 1. Perfect Keylogger ( www.blazingtools.com/bpk.html ) 2. Ghost Keylogger ( www.zeropaid.com ) out of both later one has the option of sending email to your email box.Condition 2If you dont have physical access RAT (REMOTE ACCESS TOOL) is the option for youGet it from ( www.ianaphex.net/modules.php?op=modload&name=Downloads&file=index&req=getit&lid=1 ) or ( www.astalavista.com/index.php?section=dir&id=79 ) just send them as attachments with a name like "a small game" & waitfor him to install