Welcome to Hackers Protocol Official Website

Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Sunday, July 1, 2012

Know The Creation Date Of A Gmail Account

Sometime when u lost ur gmail account password then u need to use the recovery options given by google such as sms,voice message,alternate email etc....bt many user has not filled up these option and due to this laziness that have to lose there valueable account

Thinking of this fact google has provided u with an additional feature of google contact form but there also the basic problem is that it also ask for the account creation date otherwise you are not allowed to reset your password. So here is a tutorial by Hackers Protocol to know the creation date of ur gmail account

Sunday, March 11, 2012

How to make Trojan, Keylogger Undetectable from Antivirus

In my previous post I wrote about trojan and how to crate a trojan server to hack but all famous trojan servers are detected by antivirus and thus useless. Here i am going to write the method to make your trojan, keylogger and RAT FUD (fully undetectable) by antivirus softwares.

1- Download PC Guard For Windows 

Thursday, January 26, 2012

How to detect a keylogger in a system

Keylogger is the software program or a hardware which reads and store all the key stroke by a user in the system it is installed.

Having a keylogger in the system means you are going to loose some thing big. If your system is infected by a keylogger, your email id, facebook account, bank account and all other secure data is on the risk. Now a days hackers are active enough and many website offering free software download with keyloggers attached in it. So you need to know how to protect your system from keyloggers. If you want to know how to detect a keyloggers in a system, you can follow these points:

Monday, September 26, 2011

How To Identify the Fake E-mail ID ?

Hello friends, Daily we got almost 100's of fake emails ,Like in spam folder. A php script can mail you from any email address...Even from your own email address..So How To Identify the Fake E-mail ID.Here a small guide i am going to share with my all Hackers Protocol Visitors. If you like the article,then please do a comment..,At present it is difficult to identify the fake ID. With time more and more people are using the fake IDs which creates a bunch of trouble to thousands of people. So here detection of those fake IDs has become almost a necessity. It is also important because hackers are always looking to use the fake email IDs to get the personal information of victims.

Sunday, September 25, 2011

Lock your PC Temporarily when someone Enters Wrong Password

May be sometime You are out of your desk and someone Tries to log in in your PC by Guessing and he got Success after some tries but what if there is a limit of tries let see how to lock a PC in Windows 7 After some tries.
  • First Go to Local security Policy

Tuesday, September 20, 2011

Hack Facebook using Bypassing Security Question Method

Hii Friends....I hope you all are fine. Previously I posted an article on  How to Hack E-mails using Fake mails. Well, this trick does not requires any kind of software. All you need is a Small brain and little time. In Phishing,Keyloggers,etc, you always need to get the victim fall in a scam. But many people are smarter and cannot be hacked easily. So, I found a security loophole in Facebook.

Well, this is a major and very big security loophole in Facebook ever. In this hacking procedure, we are going to change the victim's E-mail. We will use the method of bypassing Security Question. Here you can hack anyone's ID. You should have a Primary E-mail Like on Gmail, Yahoo,etc. that should not be associated with any other Facebook Accounts. And the victim to whom you are going to hack should have at least three-four mutual friends. I mean you can create some fake accounts and then be the friend of the victim or you can unite your other friends against victim to hack victim's Facebook Account. Well, I am also going to tell you that how can you be secure from such attack?????

Friday, September 16, 2011

Decode Keyloggers and Stealers - Get Passwords of Hackers !

Hello, Here method to Hack the Hackers..If you have a Keylogger on your Computer, and you know the file, this process will easily give you the FTP website they are using so you can get the logs for the files, and if they use the same keyloggers on other computers, you’ll get the logs for that to.
What is Reverting ?
Reverting generally means reversing an action or undoing the changes. Here in our case, reverting would be more of reversing the action. For this we will need a key logger server using ftp. It can be found on warez sites, you tube etc.

Saturday, September 10, 2011

Steps to Write Protect your USB Pen Drive

It was yesterday when I got some data transferred in my pen drive at my College that made me think that I need to Write Protect my pen drive. I just put the drive in a system for about 10 seconds and there were about 7 different types of viruses in my Pen Drive (really college systems sucks). It is so irritating to always scan the drive to remove the viruses that also consumes our important time. So I got something to share with you guys “How you can Write Protect your Pen Drive” or “How you can prevent your pen drive from getting infected”.

Saturday, September 3, 2011

Detect Hidden Trojans/Viruses/Keyloggers on your PC

Are you Beware that there is a Hidden Trojan, Virus or Keylogger working on your PC and Sending your Logins to Hackers?

If you are in that situations you don't need to worry anymore. In this post i will show you a security software called Process Revealer that can detect and kill hidden processes.

Sunday, August 21, 2011

How to Protect your Computer from Keyloggers?


Keyloggers have been a major problem today as once they get installed in your computer the hacker can get almost any information,
I have written couple of posts on keylogging and reviewed some of the best keyloggers available now a days
The program which are specially used to detect and protect your computers from keyloggers are Antiloggers, I have tested lots of Antiloggers and found Zemana Antilogger only which is capable of detecting almost every keylogger.
Normally a keylogger is detected by a good antivirus or Antispyware program, but hackers use some methods such as crypting, hexing, binding etc through which the keylogger can easily Antivirus as well as Antispyware program.
Related Posts Plugin for WordPress, Blogger...
free web site traffic and promotion