Skip to main content

Posts

Featured

Stealing password and other information using Keylogger or Trojans

Keylogger or Keystroke logging programs record every keystroke typed in via the keyboard, they can capture a wide variety of confidential information, including passwords, credit card numbers, private Email correspondence, names, addresses, and phone numbers. Keylogger saves all information in a file and it can send this file to specified mail id. Some Famous Keyloggers: 1. Actual Spy 2. Perfect Keylogger 3. Family Keylogger 4. Home Keylogger 5. Soft Central Keylogger 6. Adramax Keylogger Run any of the above keylogger software and set all information and you will get all information from that operating system where you installed it. You can use Trojans to see all information and all files and folders. You can do anything means you will become administrator of that system where you installed Trojans. You can delete/create/modify any Files or you can do all of the things whatever you do with your system. Some Famous Trojans: 1. Beast 2. Back Attack 3. Back Orifice 4

Latest posts

How to Approve Google AdSense Within 1 Hour

Hacking v/s Cracking | Fake mail | Fake call

How to make invisible Folder in Windows OS

Google Hacking: Specific search on Google

SQL injection: Login without knowing Name and Password of the authorized person

Steganography: hiding text or message behind image

Applying Restrictions on the Files and Folders in Windows OS

How to make static Home page on Blog or Website

Promote your blog or website using social buttons

Submit your blog to all search engines