Download Link


List of Movies for Download



======================================================================

Microsoft Office 2013 (Direct FTP Link)








Microsoft Office Professional Plus 2013 x86 Volume License
Microsoft Office Professional Plus 2013 x64 Volume License
 




Office Pro Plus 2013 VL [All Product] Activation Keys

YC7DK-G2NP3-2QQC3-J6H88-GVGXT [Office15_ProPlusVL_KMS_Client]
9XBP3-NQW29-CYQ9J-TPK9F-WFCKJ [Office15_Alpha_ProPlusVL_MAK] [Renaming activation 847]
[Not Tested]

MS Visio 2013 VOL: C2FG9-N6J68-H8BTJ-BW3QX-RM3B3
AccessVL: NG2JY-H4JBT-HQXYP-78QH9-4JM2D
ExcelVL: VGPNG-Y7HQW-9RHP7-TKPV3-BG7GB
InfoPathVL: DKT8B-N7VXH-D963P-Q4PHY-F8894
LyncVL: 2MG3G-3BNTT-3MFW9-KDQW3-TCK7R
MondoVL: 42QTK-RN8M7-J3C4G-BBGYM-88CYV
OneNoteVL: TGN6P-8MMBC-37P2F-XHXXK-P34VW
OutlookVL: QPN8Q-BJBTJ-334K3-93TGY-2PMBT
PowerPointVL: 4NT99-8RJFH-Q2VDH-KYG2C-4RD4F
ProjectProVL: FN8TT-7WMH6-2D4X9-M337T-2342K
ProjectStdVL: 6NTH3-CW976-3G3Y2-JK3TX-8QHTT
ProPlusVL: YC7DK-G2NP3-2QQC3-J6H88-GVGXT
PublisherVL: PN2WF-29XG2-T9HJ7-JQPJR-FCXK4
StandardVL: KBKQT-2NMXY-JJWGP-M62JB-92CD4
VisioProVL: C2FG9-N6J68-H8BTJ-BW3QX-RM3B3
VisioStdVL: J484Y-4NKBF-W2HMG-DBMJC-PGWR7
WordVL: 6Q7VD-NX8JD-WJ2VH-88V73-4GBJ7




Download Link: http://www.mediafire.com/view/?v6x546ra9aawpp3



======================================================================

Cracking Adobe Products


Adobe is one of the leading software companies in the multimedia fields. Most of their products are at the top in their category. So lets see how you can crack this software by restricting them from connecting to their server. Some may think why go through all this trouble, just download the software and use any key. But it is not that easy. After using the key the product connects to its server and checks whether the given key was used earlier, if yes then it discards it and asks the user for a new one. The solution to this is to restrict the product from connecting to the server. So here is how do it.


Step 1) Download the extended trial of the Adobe product from their site.

Step 2) Download this file DOWNLOAD

Step 3) In the above folder you will find a file called "hosts" just copy it and paste it in C --> WINDOWS --> System32 --> drivers --> etc.

Step 4) When you start the product it will ask for key. Find any working key for the product and use it. Thats it. ENJOY !!!

****************************************************************************************************************************

Downloading websites to view offline using HTTrack

If you live where you regularly face Internet connection problems it is always a good idea to download the website which you refer to regularly. You can save the pages using the browsers default save page options but it can get tiresome to save all the pages of the website one-by-one and there is no definite structure to it which can make it very confusing. But using a free utility program called HTTrack you can do all the above tasks very easily.

HTTrack Website Copier

HTTrack is a free utility program which helps the user to download webpages or entire websites including all the the linked webpages for offline browsing. You can browse the downloaded pages link to link giving you the experience of browsing the website online. Actually its just like creating a mirror of the website on your local drive. It also allows you to create filters if you don't want to download some specific type of files.

DOWNLOAD
___________________________________________________________

REPAIR BROKEN OR CORRUPT VIDEO FILES

The frustration and anger is unbearable when you find that, the video you downloaded after wasting so much time is broken or a old video you wanted to play is corrupt. you probably would delete it in frustration without thinking but there is one more option, you can try to fix them using video repair software. Many people dont know know that broken videos can be easily fixed using appropriate software so here i bring you a software which can repair broken or corrupt video files

DIVFIX++
this freeware can repair broken AVI files by rebuilding and fixing the index part of the file. it can be also used to see a preview of a video before downloading the full video.

it works wonderfully, tried it my self sure try


DOWNLOAD

_______________________________________________________________________________________

MAGIC ISO ( alternative to ALCOHOL 120)

In today's cyberworld, with all this huge pile of cd/dvd scattered all around, virtual cd/dvd drive softwares are really a boon. You can make images of this cd/dvd and store in your hard drive with worrying about the wear and tear of the cd/dvd.

MAGIC ISO MAKER

magic iso maker has all the features of a good virtual rom software like
  • you can create image of any cd/dvd very fast
  • supports 16 types of image formats with most popular ones like .iso .bin etc
  • works 200x faster than a conventional cd.dvdrom.


DOWNLOAD
DOWNLOAD (Torrent link) 
__________________________________________________________________

FOLDER LOCK (data encryption software)

In today's world nothing is safe not even your files on your own PC. To protect the files data encryption is the most preferred way. Here is a easy to use software to encrypt and protect your data.


FOLDER LOCK

It is one of the best software to encrypt and password protect your files and folders. It does not only encrypt or password protect your files but has 20 different privacy features like shredding, hack attempt monitoring, plug and play support, stealth mode etc.


DOWNLOAD 


NOTE :- If you have any problem using it please ask for a tutorial. i will surely write one.
_____________________________________________________________________________________



RECOVER PERMENANTLY DELETED FILES WITH RECUVA

Deleted some of your important files permanently? or lost important data when the system crashed?, don't worry here is a software which can recover permanently deleted files from your local machines. Actually when you delete your files permanently the files are not erased from the  hard-drive. The files are left where they are and the space is provided as free space. When you want to use the space, the new file is just overwritten on the deleted file. Due to this you can recover the permanently deleted files before other data is overwritten on them.

RECUVA
RECUVA is a Windows utility program which recovers permanently deleted files from windows
computer, pendrives, ipods, memory cards and many more. Some of its important features are
  • Undelete permanently deleted file on the computer.
  • Recover data from a formatted or corrupt drive.
  • Recover emails from the email clients like outlook and thunderbird.
  • Recover unsaved word documents.
  • Portable version available.
To know more about the software and to download it CLICK HERE
_____________________________________________________________

STEGANOGRAPHY TUTORIAL

*TO HIDE FILES* 
STEP 1) Download software "STEGANOGRAPHY"  DOWNLOAD.
STEP 2) Install and open it.
STEP 3) Select the file which you want to use to hide any file.
STEP 4) Press the add tab and select the file or message you want to hide.
STEP 5) Put a password if you want to password protect it AND CLICK "HIDE"


*TO UNHIDE FILES* 

STEP 1) Select the carrier file
STEP 2) Enter the password if the file is password protected.
STEP 3) Click "UNHIDE"


______________________________________________________


TERACOPY

Are you fed up of the slow copying rate of your PC. Then here is a cool software to solve this problem.

TERACOPY
Teracopy is a great windows utility software to speed up the file copying process. It not only helps in copying faster but also provide some additional features like ability to copy multiple files simultaneously and to pause a file copying process.

DOWNLOAD
_________________________________________________________________


**********************************************************************************************************************************

PHISHING TUTORIAL FOR BEGINNERS




PHISHING is a hacking method in which the attacker sends a email or link. clicking on which will take you to a site which looks exactly the same as the site you use like facebook, orkut, gmail etc. where you will be told to provide your information and bingo! you are hacked and the best part is after that you will be redirected to the original website and some common reason like network or server problem will be shown, so you wont even come to know that you were hacked.


here is a tutorial about how you can try phishing and have some fun.

STEP 1) First you must sign for a free webhosting service like www.byethost.com
And register your subdomain. After registration you will have a subdomain like www.yourname.byethost.com (Please select the name of the website wisely and please don't add the name of the website whose phishing page you are making eg. if you are making phishing page of Facebook then pls don't add the word Facebook in the name of the phishing as this website are easily detected and block.)

STEP 2) Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs".

STEP 3) Now DOWNLOAD THIS FILE to your computer and extract the files inside it, you will see folders named facebook, orkut etc. choose which account you want to hack and open the folder, inside the folder you will find two files index.htm and write.php.

STEP 4) Now login to to your Byethost's cpanel (all the details of the byethost account will be there in the confirmation email send by byethost) choose "online file manager" in the cpanel.

STEP 5) (There were many suggestions to make this point more clear so i have divided this 5th step itself into some substeps. hope this will help the readers to understand this step more easily).

  • There are two files in the phisher file downloaded by you, "index.htm" and "write.php. Now right click on "index.htm" and select "edit", the file will open in notepad, press "ctrl + a" to select the whole text and copy it.
  • Now in the cpanel of your byethost account click on "online file manager". In it there is a folder "htdocs" click on it. In it there is a file also called "index.htm", there is a option to edit it, choose the edit option. Now a new window will open, delete all the text in it and paste what you had copied earlier from the "index.htm" in your phisher file. Click on the on the save icon and you are done!.




STEP 6) Now your homepage www.yourname.byethost.com has become a phisher. open it, you will see that your page www.yourname.byethost.com has become the login page of the site you want to hack.now all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file passes.txt in your "htdocs" folder of your byethost account which contains the username and password of your victim.

ENJOY!

Note:- Please use this phishing only on some close friends or relative who will take this sportingly and get aware of the online threats. Using this on somebody whom you don't know will qualify as a crime.
*********************************************************************************************************************************


Cracking PDF User Passwords Or Editing Encrypted PDF ( Tutorial )

PDF has become one of the most popular and widely used file format. Today mostly all the ebooks are available in PDF format. But many times the PDF files are password protected by the creator or the owner. There are two types of password protection for the PDF files. A user password and owner password. The user password doesn't allow the user to open the file without entering the password and the owner password doesn't allow the user to print or edit the PDF file. There are many situation where you may find it necessary  to crack this passwords like when you forget the user password to your personal PDF file or you may want to edit the file for what so ever reason or you may just want to crack the password because you can. There is no greater delight in computers then cracking of passwords. Here are methods to crack the both user and owner passwords using a software.

Advanced PDF Password Recovery

First you have to download the Advanced PDF Password Recovery software. Here are the links.

DOWNLOAD 
DOWNLOAD ( Torrent Link )


CRACKING OWNER PASSWORD
This password is very easy to crack, the above software cracks it instantly and then you are free to edit or print the PDF documentHere is the method.

STEP 1) Start the software and open the document to be cracked in it.

STEP 2) A window will instantly pop out like in the image below  

Click on "Decrypt now" button.

STEP 3) The PDF file will be instantly decrypted and it will provide you with the option to save the decrypted document in another location.


CRACKING USER PASSWORD 
This password is very hard to crack and it can be done only using methods like Brute force and dictionary attack. But before you start lets have a look at the hurdles in this method. Now everyone knows that brute force is the method where the software tries every combination of letters to guess the correct password and so it can take very long time to guess lengthy passwords. Now PDF files are mostly encrypted using 128 and 256 bit AES encryption i have provided the benchmark results for brute forcing this passwords.
( This benchmarks results were taken on a PC with Celeron 2.2 processor, 1 Gb RAM, with no graphics card. Sorry, my other PC has been sent for repair and i had no choice but to take the results on this lower end PC, if you have a core processor or a  graphics card it will surely increase your speed, as the software supports CPU acceleration.) 

as you can see the time to crack the password increases exponentially as the length of the password increases.The 256 bit takes less time then 128 and the maximum length of password you may think of cracking is 6. After seeing the above results if you still want to try to crack the password, here is the method

STEP 1) Start the software. The default setting are brute force attack for 4 letters. If you want you can change the setting and select dictionary attack or increase the length of the password to be cracked.

STEP 2) Now open the PDF file. A window will pop out, select "recover now" option. 

STEP 3) The process will start and when it finds the password, it will notify you.

Note :- The above software is genuine and there is no legal problems in using it so happy cracking.
****************************************************************************************************************************

SECURITY REDEFINED (Make your drive unhackable)







Make your drive virtually unhackable by enabling TPM on your machine.


We all know how easy it is for snoopers to get their hands on private and confidential data. That’s the main reason we need to constantly refine our security policies to keep confidential data safe. While there are many software applications that will do the job they could be easy to crack; at least for a seasoned hacker. That’s not the only reason to be worried. Imagine losing your laptop or even your portable drive which contains important data.



What we are referring to is hardware based encryption rather than the more common software based methods. To begin with you will need a PC with a motherboard that has an embedded TPM (Trusted Platform Module) chip. So before we even get into the intricacies of setting up the encryption system, let’s go a little further and understand the basic functionality of a TPM based motherboard.



In very simple terms, a TPM chip basically generates random encryption keys where half of the key is stored within the chip and is encrypted/decrypted using an incredibly strong 2048-bit RSA algorithm. This essentially makes it impossible to recover data from the encrypted drive, making it unique to the machine that was used for encryption. In other words, the contents of a protected drive are unreadable when connected to another machine or read by any unauthorized person.

Start your machine and press the [Delete] key to get access to the BIOS. For laptops it should either be the [F12] or the [F8] key. Search for the term “Security Chip Configuration” or a similar title and press [Enter]. Now select “Enabled” for the Security Chip and move to “Clear Security Chip”. Once the user information has been cleared save changes to the BIOS by pressing [F10], and restart.

Once you have logged into Windows install the TPM driver (check your motherboard CD/DVD) and restart again. This workshop uses a Gigabyte board that had an Infineon TPM chip. If you have a different chip note that the steps will be a little different, so excercise caution and check all options first.


Activating the TPM chip

Step 1: Bring up the “Infineon Platform Security wizard” by double clicking on the TPM icon. Click “Next” and select “Security Platform Initialization”. On proceeding you will need to feed in a password to initialize the process. Consider this to be your master password as you will need it whenever you want to make global changes.

Step 2: The Features menu allows you to choose three basic options such as “Automatic Backups”, “Password reset” and “BitLocker Drive Encryption”. We suggest you use the “Automatic backup” and “Password reset” features. Click on “Next” and choose your backup location. You can also reschedule your backup if the default time is not convenient. Clicking on Next will take you to the “Password Reset” menu. Make sure “Create a new Token” is selected and choose a file location. Here it is advisable to save the token to a portable drive rather than the hard drive. Enter the password and click on “Next”. The wizard should now be ready to start initializing the TPM chip. Run an automatic backup once the wizard has initialized the chip.

User Initialization Wizard

Step 3: Double clicking the TPM icon will now bring up the User Initialization Wizard; choose “Next”. You will be asked to feed in your “Basic User Key”. This allows you to make user specific changes. On proceeding you will again be asked to create a Basic User Password reset key. We again recommend saving it to a pen drive. Confirm the setting and click on Next to initialize the setting for the user.


Step 4: The next couple of steps will allow you to enable and disable features such as “Encrypting File System” and “Personal Secure Drive”. On the Security Platform Features menu uncheck the “Secure e-mail” while keeping EFS and PSD checked before proceeding.


Step 5: To create an encryption certificate click on “Select” and choose “Create”. Select the created certificate and hit “Select”. You should now be able to view the certificate that was chosen. The next step allows you to create your own secure hidden drive.


Step 6: Map your drive to any one of the alphabets in the dropdown menu and give your new hidden drive a name. Leave the “Load my Personal Secure Drive at logon” option unchecked and click on “Next”. Decide on the amount of storage space that you want to assign to the secure drive. Now choose an existing drive where this virtual drive will actually reside. Make sure that the drive that’s chosen has enough free space to allocate. Click on Next and enter your basic user password following which the wizard starts configuring the features selected. Click Finish and you are all set to secure your files and folders.


You can load and unload your protected drive by simply right clicking on the TPM icon and navigating to “Personal Secure Drive | Load/Unload”. You can choose to either copy or send files and folders to your secure drive by simply right clicking and selecting the appropriate option.


Bitlocker Drive Encryption

For people who don’t own a TPM based motherboard or laptop there is yet another way of securing your valuable data. Windows itself comes with a utility known as BitLocker Drive Encryption. This feature can only be found in the Ultimate and Enterprise versions of Windows Vista, Windows 7 and Windows Server 2008 (Windows 7 comes with Bitlocker To Go for portable drives as well). This feature was designed to make use of a Trusted Platform Module (TPM) chip, but there is a way to work around this if you don't have one.


Follow the instructions carefully and back up your system before proceeding. Keep in mind that the Bitlocker Drive Encryption is designed to encrypt an entire partition or volume. Also the time taken to encrypt the entire drive depends on the overall size.


Step 1: Open the start menu and type “Group Policy” in the search box. Now in the Local Computer Policy window navigate to “Computer Configuration | Administrative Templates | Windows Components | BitLocker Drive Encryption | Operating System Drives”. Right click on “Require additional authentication at startup” and click “Edit”.

Step 2: On the opened page select “Enabled” under “Require additional authentication at startup” and under options check “Allow BitLocker without a compatible TPM”. Once checked other options will automatically change; ignore the automated changes. After you have enabled it to start without a compatible TPM chip, click on Apply and exit the Group Policy editor. The above process basically enables BitLocker but without its full range of effectiveness.

Step 3: To enable BitLocker you will need to search for a file named “BitLocker”. Open the Windows Vista or Windows 7 start menu and type “BitLocker” in the search bar. Run the program “BitLocker Drive Encryption”. You should now be able to view all drives currently connected to your system. Select the drive that you want to encrypt and click “Turn on BitLocker”.

Step 4: Now select “Use a password to unlock the device” and type in your password. Further on you will be asked to “Save the recovery key to a file”. Save the file either to the hard disk or a portable pen drive to proceed. The recovery key is now your only option to able to access your device in case you forget the password. Once you are done click “Start Encrypting”.

Note: Do not save your recovery key on the same drive that is being encrypted else you will not be able to unlock the device in case you forget the password!

No comments: