Sunday, August 15, 2010

How to increase your internet speed

The following post is on How to increase your internet speed,I will show you some ways to increase your net and browser speed

Go to Start>>Run and then type in “gpedit.msc” without the quotes (“)

Computer Configuration -> Administrative Templates -> Network -> QoS Packet Scheduler.
after that, you should see something like “Limit Reservable Bandwidth”. Modify that and set it to “Disabled”, or you can put it to “Enabled” and change the value to 0.

Hack administrators password through guest login

Learn to hack administrators password through guest login
Ever wanted to hack your college pc with guest account/student account so that you can download with full speed Hack Administrator !!!!there ? or just wanted to hack your friend’s PC to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator account from a guest account by which you can reset the administrator password and getting all the privilages an administrator enjoys on windows..Interested ? read on...

Shutdown some ones pc while chatting on msn or yahoo

Hi friends today my post will be regarding hacking msn.The tutorial actually helps you shutdown friends computer while chatting on msn or yahoo.The tutorial actually uses a windows trick to shutdown someones computer

Method:
 

Recover deleted files from hard drive


Have you accidentally deleted an important file?.Then you need not to worry even if you have deleted the file from recycle bin.If you realize that you have accidentally deleted a file from hard drive then you must act immediately to recover it.In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.




How to hack a PDF password for free

                                       
Are you curios to hack pdf passwords?Want to unlock a Pdf Password protected file.Here is a simple and easy way to unlock Pdf files and view them,I have found two great sites which will make the job done for you.

Mafia war Cheats - Best kept secrets Revealed!

Are you sick of having so little energy points to complete jobs? Is this causing you to lose valuable time and you find leveling up a nightmare? Are you constantly getting beaten and bullied by other Mafia Wars players? Tired of losing battles and needing to beg people to join your Mafia?
As you know that Mafia wars is one of Top rated Facebook games.While surfing on Internet i came across a wonderful book thats is a complete guide for those who want to take their mafia war experience to the next Level.The book is named as Mafia war Blue print.

Protect your Computer from ARP poisoning

For those of you who do not know what an ARP Poisoning Attack is I suggest you reading my article on How to Implement an ARP Poisoning Attack?.
So I tested different software to see which one works the best to protect your computer from an ARP Poisoning attack I came across some excellent softwares but they were not free, so I thought not to share it and searched for a Free Alternative finally I came across a Free Firewall Which helps you successfully block ARP Poisoning attacks, but you have this Feature because it is disabled by default.

How to implement an ARP poisoning attack

The concept behind this is simple. ARP is the protocol that maintains network devices tables up-to-date by associating an IP address with a MAC address. The problem with ARP is that it doesn’t really care about who answered, it will gladly update the tables from whoever says so. Most of the time, it won’t even ask. So the idea behind the attack, is to send the client an ARP answer saying “hey, I’m the gateway, send stuff to me” and a second ARP answer to the real gateway saying “hey there, I’m this guy, send me his stuff”. Then you just have to relay the packets between the victim and the gateway.Those schemas are more simply to understand
In Linux, the rerouting can be done using the following iptables commands:

A Beginners Guide to Ethical Hacking launched

 I am very happy to tell you that my book "A Beginners guide to Ethical Hackinghas just launched.I have been working on this book for past few months.I have dedicated this book completely to beginners who want to become hackers.

Saturday, August 14, 2010

Windows 8 Plans Leaked: Numerous Details Revealed

A big thanks to @floo1989 for the heads-up! Over the weekend, the Italian Windows site “Windowsette” got a hold of some super secret squirrel Microsoft presentations apparently laying around on the internet somewhere. I took a look through every single one of these, slide-by-slide, so I’m quite confident these are the real deal. I just feel bad for the poor sap who either leaked these or inadvertently shared these with the world. Long story short, these slide decks are chock full of internal thinking on Windows 8 — everything from customer target audiences to the Windows 8 developer market to the Windows 8 product cycle and much, much more. As a preface, I’ve taken many screen shots of relevant slides for inclusion with this article, so click on them to see their full-sized versions. I’ll elaborate on some and allow the others to explain themselves. Lastly, I’ll be updating this post as I find more contained within the slide decks. Now, without further adieu, let’s get started!

Windows Phone 7: The Story I Almost Missed


Apparently, Verizon’s employees aren’t very educated with Windows Phone 7 yet. I recently purchased anHTC Incredible (I’ll get a WP7 device one day, but desperately needed something more modern than my LG Dare what with social media being the way it is these days and all), but just prior to making that purchasing decision, I decided to see what the response would be from the guy trying to make the sale when asking him about Windows Phone devices that are supposed to hit the market at the end of the year. His response? “No. No, no, no… you don’t want a Windows Mobile device. They’re horrible.”

The Microsoft evangelist in me wanted to educate him a bit on Windows Phone 7 , but I decided to inquire more. He basically noted all the pitfalls we’ve seen with previous iterations of Windows Mobile and assumed the next revision would be exactly the same. I told him it’s supposed to be a lot better and started to go into why, but I could tell he didn’t really care. His thoughts looked to be something to the effect of, “yeah, that’s what they say about every version that’s about to be released.” Ergo, I decided the battle would be best fought another day. With a different opponent. On a completely different battlefield.

With that in mind, the story I almost missed was the chance to write about the stigma that’s already carrying over from Windows Mobile to Windows Phone 7. Instead of excitement and intrigue, this guy made Windows Phone 7 sound like it was going to be worth its weight in pyrite (aka, “fool’s gold”). Had I been any other clueless buyer, I might have taken his recommendations (or lack thereof) and passed them on to friends and family — ensuring a no-sale from all I spread the word to.

The question it brings to mind is how Microsoft will choose to market Windows Phone 7. I know it’s not really a big deal at the moment and the only people inquiring about WP7 are those who are either already informed (like me) or have formed an opinion either way, regardless of how informed said opinion may or may not be. I did notice the Kin setup in Verizon a couple of weeks ago — a kiosk-type of setup with bannerslcd displays running promotional videos, phones set up that you can play with, etc. — so I’m going to take a wild guess that Microsoft will hit the marketing pretty hard once devices are ready to roll out. Hopefully, they’ll get with the right company, because Google is killing it right now with Android (and I’ve got to say, I’m a full-on believer now from owning my HTC Incredible since its release — I LOVE this phone) and I’m sure Apple’s got something up their sleeves for the upcoming iteration of the iPhone.

Perhaps a WP7 representative in a bunch of stores like they did with Windows 7 and Best Buy?

How to hack almost any hotmail, easily without keylogging, in 24 hours.

This method is called Reverting, and you will be sending a form in to microsoft customer support to reset the password for your (or somebody elses) hotmail account.




NOTE: If you are interested in protecting yourself against this hacking method, please refer to this thread.

For this method, it helps to know the person, even a little, but i'll still give you a step-by-step tut on how to find the information and fill out each part of the form.

NOTE: THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY, I AM NOT RESPONSIBLE IN ANY WAY FOR HOW THIS INFORMATION IS USED, YOU USE IT AT YOUR OWN RISK. YOU MAY LEARN ALSO HOW TO GET YOUR OWN ACCOUNT BACK FROM THIS.

Step 1: go here:

https://support.live.com/eform.aspx?prod...mcs&scrx=1

Step 2: Give them your victims full name.

Now, if you do not know their first name, try the following things to find it.

First, try using these two sites, simply enter their email and hit return.

http://www.pipl.com/email
http://com.lullar.com

if you want more, google their hotmail account(s), for example, type into google:

"victimshotmail@hotmail.com"
Include the quotes, cause this searches for only the hotmail account.
If you gain any results, it will most likely be forums or if you're lucky, social networking sites, that they have filled out their info on.
Go through these searches, and look at every one, even make a .txt file in notepad pasting down all the info you can on them.
Once you're done, if you havnt got their last name, keep reading..if you have, goto step 3.

Presuming you dont yet have their last name, try going to social networking sites, like:
http://www.myspace.com
http://www.facebook.com
http://www.bebo.com
http://www.friendster.com

Or any others you can think of, and search for their hotmail account using the websites search feature.
if you get any results, you're in luck, most of the time people include alot of information on themselves in there. Follow any leads you can find on the info, and even ask them or their friends (look up a tutorial on social engineering info out of people first, it will help).

Now another thing you can do is use http://www.whois.com IF your victim has their own website.

If you dont have it by now, maybe you should find an easier target, or if you're desperate, use this technique to hack one of their rl best friends, and alot of the time they have their full name assigned to your victims hotmail address, in their addressbook.

Or, I sometimes just say "I'm pretty sure I only put in my first name at registration, I'm paranoid like that" or something along those lines... It's worked for me.

BTW: This is called d0xing, or "documenting", basically harvesting info on people, it's completely legal as long as you get all your info from the public domain (forums, social networking sites etc).

Step 3: The e-mail address for us to send a response:
Simple, give them your email address... could use a fake one if you're paranoid (one you got access too), but I don't see any risk.

Step 4: Primary e-mail address/member ID associated with the account you are inquiring about:
Here you put in your victims email address (the one you're trying to hack). Then click Continue.

Step 5: Date of birth.
You can simply give them the year, if you dont know any further then that..but if you want to be on the safe side, read step 2, and use those techniques to find their date of birth.

Step 6: Country
If you dont know their country, which you probably should, use their IP address which you will have in one of the next steps to find it, by using
http://www.ip-adress.com/ip_tracer/

Step 7: State
same deal, use their IP addy if you dont know it already

Step 8: ZIP or postal code
Same deal again, it's usually correct if you use the IP addy...just use http://www.ip-adress.com/ip_tracer/
and find their town/suburb or whatever, and google the ZIP code for it.

Step 9: The secret answer to your question
simply put "i dont remember"

Step 10: Your alternate email address
for this, you just put in the email address you're trying to hack, you dont need their alternate email address.

Step 11: Your IP Address
Okay so here's probably the toughest one, but it's still easy. (NOTE: It's very hard to revert an account unless you successfully complete this step)
There's alot of ways to get their IP, i'll give you the easy ones.

Email: Get them to send you an email somehow, it doesnt matter how, you can just send an email saying:
"hey, how are you?" and they'll probably reply. Once you have their email (dont use old emails, please, everybody uses dynamic IP's these days)
right click on it, and click "view source", you will see something like this:

...now you want to find "X-Originating-IP: [XX.XXX.XX.XX]" That is their IP address.

Website: Go here http://www.syntaxmaster.info and register an account for free, it's real easy.

Now once you're registered, go to Software/Tools > IP Stealer; and then you can type in the URL you want your IP stealer to redirect to.. so just google or myspace or something will do. Now you'll see above that they give you your URL, you just send them there and it'll grab their IP, redirect them to google (or whatever site you choose), and then show their IP down at the bottom of the page.

I suggest using spam or http://www.doiop.com/ to shorten your URL and make it custom, you could make it something like:

http://www.doiop.com/profile-329479

And viola it'll look like a social networking site "Hey, I'm katie. :) I'm looking to meet new people and was wondering if you wanted to be friends? ^_^ This is my profile btw: "

Something like thaat. :P

MSN: if you can talk to them on msn, then you can get their IP that way too..there's two ways, either download a easy-to-use script, or do it manually with cmd,
i'll show you how to do it manually first.

Manually: Send them a file, or get them to send you a file.
"hey, i love that song, can you send me it?" or "omg, this is the funniest picture ever".
Before you start the transfer though, goto start > run (if you're using vista, just press the windows key) and type in cmd, and hit enter.

type in the following: netstat -n

and hit enter, it will show you a list of active connections to different IP's.

Remember or take a screenshot of those IP's, because once you start the transfer, type in netstat again while it's transferring and check for any new IP's, that is your victims IP.

With a script:
IF you have windows live messenger plus (probably the best WLM IMO), download this script:
http://rapidshare.com/files/133356881/IPGet_1.50.rar
It's called IP-Get, and will show you your current msn contacts IP addresses IF you're currently connected to them with a fileshare. It will also allow you to save the IP addresses, and look up their locations.

Here is a screenie of IP-get:


by now...if not, look up a tut on it, using the search feature.

Step 12: Your internet service provider
very easy to find, use their IP, either using the IP get script if you have it, or http://www.ip-adress.com/ip_tracer/

Step 13: The last date and time that you successfully signed in
Unless you know this as a fact, either take your best guess, say you dont remember, or yesterday.

Step 14: The names of any folders that you created in addition to the default folders
leave this blank, or say you dont know (unless you know this for a fact).

Step 15: Names of contacts in your hotmail address book
give them all the contacts you know are definately or most likely in there, including yourself, and even their other accounts (they might add themselves, everybody seems to). Also give them wilma@live.com and smarterchild@hotmail.com, as most people have them added.

Step 16: Subjects of any old mail that is in your inbox
okay just use common sense for this one, things to include are:
hey, how are you, RE:, FW:, admin, windows live, hotmail staff, recovery, registration, support, lol, password, comfirmation, noreply, delivery status notification (failure).

Also, if they are subscribed to any forums (like hackforums(but please dont hack other HF members :P)), social networking sites (like myspace, bebo) or online games (like RuneScape, WoW), then be sure to include them too.

Step 17: Names of contacts on your messenger contact list
If you happen to know any of their friends, this is where you put their display name...if you dont have them added, put their first names, and if you dont know them at all, just leave it blank, or say you dont remember.

Step 18: Your Messenger nickname
If you know it, put it in..if you dont, say "i cant remember it exactly" or leave it blank.

Step 19:
The rest you dont really need to worry about, except for in additional info, can put anything else that might make you sound more convincing..like:

"please do your best to recover my account, i dont want to go and have to add all my friends again, it'd be a great help if you got it back for me, thank you in advance."

obviously dont put exactly that, but you get the gist of it :)

Okay, i believe that is it, within 24 hours you will recieve an email from customer support, they will either give you a link to reset your (victims) password, or ask for you to send it again with more info, as an email reply..and in that case, you dont have much luck, cause they can just get your IP address from the email and know you're lying :) so try again, and hope you get a more gullible staff member. If you have firefox, click the spoiler.

This add on for firefox will be very useful if you need to do it again (and a lot of other things!), it saves all typed/submitted text, so you just need to go back to that page, right click then click "recover form", click the most recent one, and recover it then resend.

How to Protect or Hack your account!

Hello everyone. Today, I'm going to show you some tricks to stay safe on internet and avoid getting hacked! or vice versa.Well, these are some common tricks that most of you probably know.. but for beginners it's good. Okay, let's start.


+KeyLoggers, and how to protect yourself from them+
The Key Loggers are today, usually free and can be found everywhere. You will probably ask yourself "How to protect myself from Keyloggers?". Well, it's really easy to remove or even bypass key logger. All you need is a little bit knowledge about Key Loggers. The Key Loggers aren't illegal tool, but can be used for Black Hat purposes too.


Whats Keylogger?

Keystroke logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

Operations
• Log every single keystroke you type in your keyboard

• Some keylogers can take screenshot of your dekstop

• Invisible for human eye

• Sometimes, keyloggers got names like legitmate process

• Low CPU usage and almost invisible



- Original resource from Wikipedia.com (Click Link)



Who are the "Black Hats"?

Black Hat Hackers, are hackers who specialize in unauthorized penetration. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or erasing of data, and is done without authorization and hence they should not be confused with Ethical Hackers.



An ethical hacker is usually employed by an organization who trusts him to attempt to penetrate networks and/or computer systems, using the same methods as a hacker



- Original resource from Wikipedia.com (Click Link)



How to protect myself?

To protect yourself from Key Loggers, I highly suggest you to use an Addon called Keyscrambler. KeyScrambler encrypts your keystrokes in the kernel, giving keyloggers only "scrambled" logs. But unfortunately, the Keyscrambler isn't open source so yo u will have to pay for it. But there is one trick. There is a free version addon for Mozzila Firefox Web Browser. To download KeyScrambler for Mozzila Firefox scroll down for download link. Thumbsup



Download Keyscrambler;

https://addons.mozilla.org/en-US/firefox/addon/3383



+Trojans and Backdoors+

The Trojans AKA. Backdoors is an type of malware that remotely control your PC from hacker's computer. Once installed, attacker have access to all your files, private data etc on your computer. Most of them are detected by Anti-Viruses and other Anti-Malware scanners.



How to protect myself?

Well, there are many ways to remove Trojan Virus from your PC. Also, I highly suggest you to ask for help from HF HJT supporters in HJT section (Click Link). Also, before you post please read this thread Crack Down in Analysis Section! Must Read Before Posting Logs or Answering To Logs!, it contain everything what you need to remove detected malwares. To remove, "detected" malware download following Anti-Malware security tool:
The other tool that you will need is called WireShark. The WireShark, track all connections on your PC, so please before you start using this tool close all visible connections (Messengers, Browsers, Online Games
 etc.
                                   





Also, you will need to download good Fire Wall. Why? Well, because good fire wall will block every single illegal incoming connection to your PC. I highly suggest Zone Alarm:





+Other Ways to protect your account+



Well, there many other ways to protect your account and I only wrote the easiest ways and the one that are constantly used.



Other:

[+] Password Stealers

[+] Using same passwords for all accounts

[+] Downloading from unsecured websites



Password Stealer, whats that?

The Password stealers are used to steal your saved passwords and then send to hacker. To protect from them, I suggest you to *not* save/remember password. Why? Because stealers will just steal and then send, even if you find them and remove you wont do a lot because they do it once and after that they are useless. Also use SandBoxie. The sandboxie will run your file in *virtual* box on your PC, so hacker can't do anything. This is how it looks like:

USEFUL TIPS:


+ Never save your password, because it can be decrypted easily!

+ Scan your files Virustotal.com or Jotti.org (They maybe disturb the sample, but that's good because you get 41 different scan results)

+ Always run your files in SandBoxie (Click Link to Download)




Using same passwords for all accounts

Well, some people are using same password for everything. Example: MSN, Facebook, Forums etc. And that's how they get hacked. Also, I suggest ya to add some symbols, numbers and letters for your password.



Maybe, you will ask "Why should I use different passwords?", well because *hacker* can hack some of your accounts and then when he find a username of your other accounts, then he can easily hack your other accounts. So, be smart and make few passwords that are uncrackable.
 
EXAMPLE:




namePassword - Bad

60u1P@6sw0rD - Good

- If you want to generate an unique and good secured password I suggest you to download my Password Generator.
search on google if u want any password generators..



USEFUL TIPS:

+ Always use different passwords

+ Use letters, symbols and numbers (combination)

+ NEVER share your password with anyone



Downloading from unsecured websites

Probably, many of you heard about unsecured websites and know what they are. From them, you can easily get infected in many cases.
 
Java Drive-By

 Whats this, you may ask. Well, when you click Run/Accept the virus will automatically download and execute on your computer without your knowledge. Once installed, virus will be installed on your PC without your knowledge and can easily hack your HackForums account. So, STAY AWAY FROM THESE WEBSITES! Thumbsup




How to protect myself?

Well some pages are detected by Anti-Virus so they can't harm you. But keep this in mind, just because Anti-Virus didn't warned you about page or download doesn't mean it's clean. Then, the other solution is to scan on Online Multi Anti-Virus Websites (Try Virustotal.com or Jotti.org) but even if other Anti-Viruses doesn't detected it, maybe it's Crypted? The crypters are usually "illegal" tools that hacker/attacker use to FUD their virus.

About Yahoo Messenger Viruses

The first time I encountered this problem was two weeks ago. I was using my PC when an instant message from my niece suddenly popped up. To my surprise, the message with some clickable link in it was written in Thai! Right there, I knew it didn't come from my niece. Ignoring the message, I closed the YM window. After a few minutes, another message popped up. Then followed by another, and another, and another... Annoyed, I removed my niece from my YM's contact list.

After a week, I received a similar instant message from my sister-in-law. This time, the message was an invitation to view some photos in some website by clicking the provided link. Since there was no other note included, I suspected that the message was not from her. My suspicion was confirmed when after a few seconds, another message was sent. Hmm, another compromised messenger account, I thought. I sent a message back and advised her to change her messenger password ASAP.

I initially thought that this was some kind of an instant messaging spam. After running a search in Google, I realized that it is even worse. There seems to be two forms of attack, one is an actual virus/worm that spreads via instant messaging and the other is a phishing attack launched against YM users. For the latter, the attack usually starts with an instant message from the user's contact list. The message usually includes a link to a Yahoo-looking site requiring visitors to login and thus revealing their yahoo id and password. The phisher then uses this information to trick other YM users in the contact list of the compromised account. Worse, the phisher also gains access to all personal information in the user's other Yahoo accounts such as emails, photos, groups, etc.

The virus/worm version is reported to take control of your messenger, and send messages with website links to your contact list without your knowledge. When the link is clicked, the virus downloads a copy of itself to the user's PC, disables the registry editor and task manager, hijacks Internet Explorer homepage, and leads users to sites that automatically install malicious softwares on their PCs. Moreover, there seems to be several variants of this virus/worm out there: Yh032.explr, w32.KMeth, Worm_Sohanad.B, etc.

Y! Messenger viruses take advantage of the program's vulnerabilities that come with Java script and VBS. You can be infected simply by clicking a link to a picture (.JPG). When the page presenting that picture loads, java scripting run's a VBS (visual basic script - works on any Windows machine) that rewrites data on your harddisk. After you get infected, the virus starts sending mass messages to all contacts in your list asking them to follow a link, like in the example bellow. The messages vary, being generated randomly from different keywords from the virus's database.

If you are already infected, the easiest way to remove the virus/worm is to use system restore if you are using Windows XP. See Microsoft Help for details. Be sure to choose a restore point before you got the virus/worm and then scan your system for any signs of the virus/worm after the restore.  Update your PC regularly and use an up-to-date antivirus program. If this doesn't work, you can try to do the next steps:


1: Close the IE browser. Log out messenger / Remove Internet Cable.

2: To enable Regedit

Click Start, Run and type this command exactly as given below: (better - Copy and paste)

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f

3: To enable task manager : (To kill the process we need to enable task manager)

Click Start, Run and type this command exactly as given below: (better - Copy and paste)

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f

4: Now we need to change the default page of IE though regedit.

Start>Run>Regedit

From the below locations in Regedit chage your default home page to google.com or other.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main

HKEY_ LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main

HKEY_USERS\Default\Software\Microsoft\Internet Explorer\Main

Just replace the attacker site with google.com or set it to blank page.

5: Now we need to kill the process from back end. Press Ctrl + Alt + Del

Kill the process svhost32.exe . ( may be more than one process is running.. check properly)

6: Delete svhost32.exe , svhost.exe files from Windows/ & temp/ directories. Or just search for svhost in your comp.. delete those files.

7: Go to regedit search for svhost and delete all the results you get.

Start menu > Run > Regedit >

8: Restart the computer. That’s it now you are virus free.

I don’t know whether any removal patch that works for such Trojans/viruses. But we can easily delete them manually.

Matrix Mode Chat Feature in Yahoo Messenger for Vista

Usually you can mange multiple conversation using tabbed arrangement of chat windows. However, you still have to toggle to check latest in each chat window – NOT anymore with cool Matrix Mode Feature. With this feature you can arrange and manage Multiple chat windows as shown above.


 
To enable this feature, press Ctrl + Alt + Shift + b on your keyboard. This will turn your tabbed conversation window into one single window with a matrix of boxes, each showing an IM conversation.

Once you are in Matrix Mode, just click on the conversation you want to jump into and start typing. A white box around the conversation indicates which one you are in. As more conversations open, the layout will adjust to accommodate them.
Very handy feature if you want to chat actively with lot of friends simultaneously. This feature is only available in Yahoo Messenger for Vista, probably they can introduce this in XP version as well.

How to Record & Save Yahoo Messenger Webcam Video

Do you want to record web cam video of video chat done through Yahoo Messenger? EatCam Webcam recorder software makes this process real easy and allows you to record video chat webcam videos also from MSN, ICQ, and AIM. You can save the output in AVI, FLV, WMV video format and play recorded videos anytime you like.

Besides the video, it also records audio stream giving complete video experience. Audio can be recorded from any source including: microphone, line-in or speakers. Free edition has few limitation but works well recording video from any one messenger client among Yahoo, AIM, ICQ, MSN.
For example, if you use Yahoo Messenger, you can download free EatCam webcam recorder software for Yahoo messenger to record videos in AVI format. Download EatCame Webcam recorder to record webcam videos on the fly in few simple clicks.

10 Tips to Make your Yahoo Messenger Hack Proof

Yahoo messenger has been one of the most popular and feature-full online chat clients the world has seen. With plenty of options and buddies around, you can not just leave Yahoo Messenger once you have grown used to it. But where there is crowd, there are risk factors too. Alarmingly people have lost their accounts to hackers and have got millions of spyware and junk mails thanks to Yahoo messenger and its spam friendly technology. How do you get the best out of your chat buddy without risking your account? Well, here is a complete guide that will help you to prevent the hackers.

1. Avoid P2P file Sharing Through Yahoo Messenger

Be it known or unknown, prefer not to receive any file from your friend unless you know what he is sharing and why. Avoid downloading .exe or .zip files from them as they are more likely to attack your computer or install trozans without you being aware of it. Never trust a stranger when he asks you to click on any site you haven't heard of.

2. Avoid Clicking on Spammy Links

If you were chatting with someone else and suddenly a PM box flashes on the screen with a lucrative offer/interesting site which has a spammy look, don't click on it. These websites have a lot of spyware who get silently installed if you go and surf them. Never download a toolbar unless its as authenticated as Yahoo's or Google's.

3. Use Ignore Option Effectively

Yahoo has an ignore option that lets you ban a person or mark as spam so that he can't disturb you once again. Use that option effective. Go to Yahoo Messenger main box -> Preferences -> Ignore List. If you want to avoid talking to strangers (which I always recommend)i.e. wanna talk to your buddies only, Check Ignore anyone.. option. That helps you be safe and block on the unwanted and potential hackers from reaching you. See the screen-shot below.

4. Use other Chat Clients

Yahoo Messenger has too many loopholes. It doesn't have a strong security to block contents either. So, if you want to get rid of spams and porn contents all under one go, then you should go for some popular and secure yahoo chat clients like Yazak. You can also go for Yah-Elite and Yam They may not have the same sophisticated GUI or entertainment features but they will increase the security of the chat sessions by many folds.
Here is a link that can help you with some more chat clients. I don't recommend any except these.

5. Always Use Newer Versions of Yahoo Messenger

Remember, the more you stay with the older versions and feel lazy to get upgraded, the more you are helping the hackers. Yahoo or any software, brings out these updates not only to extend features but also due to security reasons. A newer version of yahoo messenger 9 is hardly bootable by DoS attack whereas Yahoo Messenger 7 can be booted out or hacked by a script kiddie.

6. Don't download Yahoo Plug-ins from Unauthorized source

Do not ever download a plug-in of Yahoo messenger from any other site however lucrative it be. Plug-ins like these exploit the vulnerability once installed and send your account details to a third party revealing and cracking down your id. So, better be safe than sorry. No?

7. Use Proxy if you have a Better Firewall

Yahoo also gives you option to change your proxy. Go to Preferences and hunt down Proxy servers. You will see that you can set your own proxy server so that Yahoo gets redirected through yours giving you a better chance to protect yourself and secure by your network. But if only you have that faith on your network security. You can change it by going to Yahoo Messenger main box -> Preferences -> Connection

8. Use Word Filter

You can also use your word Filter in Yahoo messenger. It just discards all the obscene or threatening words by intelligent filtering system if you choose Strong option. But be aware, there may be some times when your own friend can get banned while cursing your jokingly. Word filter is another good option to be within your network and not let some specifically targeted spammers to arrive. It increases security too. You can change it by going to Yahoo Messenger main box -> Preferences -> Chat.

9.  Be sure to Delete Your Profile after Chatting from a Public computer

Most of the users don't know about it. Whenever you sign in to yahoo messenger, yahoo makes a profile of yours in the directory Yahoo -> Messenger -> Profiles by the name of your yahoo id. There is an option by default at Yahoo messenger that messages will be saved as long as you are signed in to your account for that session. A good hacker can have access to that file and decrypt it to learn your private conversations.

What you must do if you are sharing a public computer to chat from, is, you can change it by going to Yahoo Messenger main box -> Preferences -> Archive. Change it to No, do not save any of my messages and you are done. Oh don't forget to delete your profile from Profiles inside Yahoo folder after you sign out.

10. Apply Your Common sense and Use a good Antivirus and anti spyware software

Applying your common sense is the least you can do to prevent your account from being hacked. A good anti-virus and anti-spywaregues until you personally hand over your information to the person willing to crack your computer down.
Yahoo messenger is a very nice and useful place to meet new buddies and get connected with the old ones. Just be safe and secure and follow the above steps. You will be fine. Do you have something to tip all of us? Why don't you share. We are waiting.

Yahoo Messenger and alternate chat solutions

Did you ever been in a situation when you really have to chat with your friends and you are reaching at a computer with internet but which didn't have the Yahoo Messenger installed? Well I was in such situation and I was really mad, but luckily I discovered alternative solutions: the web based (browser) Messenger services.Just Open Internet Explorer/FF, type in the username/password for the IM services you want to stay connected and start having fun… I mean chatting. Here is list of such wonderful services:


1. Meebo - It tops the list beacause personally I love it. Nice clean interface and one service that never lets you down. No registeration is required and can be used to connect to Gtalk, Yahoo, AIM, Msn. Also you can Meebo widget to embed chat service on your website/blog.

2. Mabber - Besides the web based chat interface you can also embed its widget on a website/blog. You can also use this service on your mobile phone and stay upto date with instant alerts.

3. Easy Messenger - A free instant messenger service that runs entirely from your web browser. Combine your MSN, ICQ, AIM, Yahoo! and Jabber contacts into one solution. With the build-in RSS reader you can also stay up-to-date with your favorite RSS feeds.

4. Kool IM - Another Web based messenger comes with cool interface. It provides Firefox add on to use this service in browser sidebar and supports AIM, ICQ, MSN, Yahoo, Google Talk.

5. All New Chikka - Besides web based IM access for AIM, ICQ, MSN, Google Talk and Yahoo, it also offer Free two way PC-to-mobile messaging.. yes it is free.

Out of above, Meebo is my sure shot favorites. Besides these, there are so many other website that offer similar service like: IMunitive, imo.im, Snimer, ebuddy.  Enjoy and happy chatting!