Top 10 Trojans of All Time

1. NetBus

It was created in Delphi by? Carl-Fredrik Neikter, in 1998. It is a software for remotely controlling a system which runs Microsoft Windows. Not only remote control, it can also be used as a backdoor. Like any other trojan, NetBus also has 2 components: the client and server. The server infects the host computer and the client is used to control it.

2. Back Orifice

Back Orifice’s main purpose is to remotely control a Microsoft Windows Powered system. It has the potential of being used as a RAT (Remote Administration Trojan). It is widely used by “Script Kiddies” due to its easy installation and GUI features. The name “Back Orifice” derives from “Microsoft BackOffice Server“. According to the group, its purpose was to demonstrate the lack of security in Microsoft’s operating system Windows 98. BO was created in Delphi.

3. Sub7

Sub7 or SubSeven is a popular backdoor program and RAT. It is mainly used for causing mischief, but it can also be used to steal credit card information and other such confidential data. Its name “Subseven” is derived by spelling “Netbus” backwards as “SubTen” and replacing “ten” with “seven“. Sub7 is less stable than Netbus, but has more features than it.

4.Beast

It is a Windows-based backdoor trojan program (RAT). It is capable of infecting all Windows OSs. Like most of the trojans, it is also written in Delphi, by Tataye, in 2002. Beast has many unique features, it was one of the first trojans to use the “Reverse Connection” and it used “Injection Method” for its DLL. Its unique features made it popular.

5. ProRat

It is a Turkish-made, Windows-based RAT, made by the PRO Group. It comes in two versions: free and paid version. The free version cannot perform operations on computers present on the WAN, but only on LAN. Its server is known for being almost impossible to remove without up-to-date antivirus. It has many features & it can perform many malicious operations on the victim’s computer. It also has a server creator which enables users to create servers which are undetectable and provides other advanced features.

6. Zlob Trojan

Also known as Trojan.Zlob is a trojan horse which masquerades as a needed video codec in the form of ActiveX. After a victim installs it, it displays popup-ads with a similiar appearance to that of the Microsoft Windows warning pop-ups, informing the user that their computer is infected with a spyware, clicking on these pop-ups starts the download of fake anti-spyware programs.

7. SpySheriff

As the name suggests, it claims to be an anti-spyware program, but it is actually a malware. It gives the infected computers, fake spyware and threat alerts and prompts the user of the infected PC to buy the program. SpySheriff is sometimes not even detected by actual spywares. It is very difficult to remove SpySheriff from the computer which it has infected. It causes many problems, including the Blue Screen of Death!

8.Vundo

Also known as Vundo Trojan, Virtumonde, Virtumondo or MS Juan, is a trojan horse that causes pop-ups & advertisements for Rogue Security softwares and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook. Vundu causes your browser to show pop-ups from time-to-time.

9.Turkojan

Turkojan is a RAT and spying tool for Microsoft Windows. It is not detectable by many AVs and only up-to-date antivirus programs can detect it. It is very much similar to ProRat in features, but has some plus and minus.

10. Trojan-Downloader.Win32.Kido.a

It is a Windows DLL file, it copies its executable file with random names to “Program Files“, “Temp“, “Special Folder” & “System“. It also registers its executable file to the registry to ensure that it is launched automatically at system start-up. It also modifies registry keys to make it impossible to boot into “Safe Mode“.
Its removal is not so easy if you don’t have an up-to-date Antivirus Software. The removal procedure includes some binary editing in registry.

Yahoo: Unlimited BUZZ (Exploit)

Has anyone noticed how many times can you BUZZ/DING someone continously? The answer is once in 5-7 seconds…you can’t press the BUZZ button more than once in 5-7 seconds. (Try it now)

This is for preventing users to flood others with BUZZs which would disturb them if they are busy. But there’s an exploit for this feature it allows a user to BUZZ another user without any limitation.

Very useful if someone dosen’t respond to your chats[:P]. I found this exploit when I was chatting with one of my friend, and I had entered a message which I later realized, was a code in Yahoo Messenger.
The Message was: <DING>

Like other codes which poped up smileys, this code(<DING>) was the code for giving BUZZs. And this code can be used to overcome the BUZZ limitation.

You cant send more than one BUZZ in 5-7 seconds using the BUZZ button, but can use this code to give unlimited BUZZs.

Using this exploit, you can fry up the brain of the one who dosen’t reply back to you. Just Copy the code, paste it and enter, then carry on the paste and enter again-and-agian till the user responds to your messages…!

Detect Invisibles on Yahoo

Hello guys, troubled of invisibles on Yahoo? Want to chat with persons who always signin as invisibles?

Thats the case with many of us, our friends are invisible and we aren’t able to chat with them. In this post, you’ll be learning to detect the invisibles!

There are two ways of doing it:

  1. Yahoo Invisibility Detection sites
  2. Using Yahoo’s Resources

1.Yahoo Invisibility Detection Sites:

I’ve found many sites which helps you to see which of your buddies are online Some of these sites are:

These site are very easy to use. Just enter the ID you want to trace and get the results.

2.Yahoo Resources

Here are some bunch of URLs that can be used to detect invisibles, just replace “[username]” with the username you want to detect :

  1. http://mail.opi.yahoo.com/online?u=[username]&m=g&t=0
    (Shows up a yellow smiley if the person is online and gray if the person is offline or invisible)
  2. http://mail.opi.yahoo.com/online?u=[username]&m=g&t=1
    (Shows up a button with ?Online Now? or ?Not Online?)
  3. http://mail.opi.yahoo.com/online?u=[username]&m=g&t=2
    (Shows an image with ?I am Online send me a message? or ?Not Online right now?)
  4. http://mail.opi.yahoo.com/online?u=[username]&m=a&t=0
    (Shows a text with ?[username] is ONLINE or NOT ONLINE?
  5. http://mail.opi.yahoo.com/online?u=[username]&m=a&t=1
    (Shows ?00? if person is offline and ?01? if he is online)

Don’t forget to replace the text in blue colour in the URL with the YahooID you want to trace!
Example: Take my YahooID “hack_minded” as an example, lets see the first URL:?http://mail.opi.yahoo.com/online?u=[username]&m=g&t=0
After the replacement it would appear as:?http://mail.opi.yahoo.com/online?u=hack_minded&m=g&t=0

Good Luck Detecting!

Multiple GTalk Simultaneously

Have Multiple Google Accounts?
And want to login with both of them on Gtalk on single PC?

This is what I wanted to do as I’ve got two Google IDs, so I found out the way to run multiple GTalks simultaneously…

How to do it:

  1. Create a shortcut to GTalk on your desktop (if you dont have currently).
  2. Go to the properties of the shortcut. There in the target, you’ll see something like: “C:\Program Files\Google\Google Talk\googletalk.exe”
  3. Add /mutex to that target line. Then the line would be : “C:\Program Files\Google\Google Talk\googletalk.exe” /nomutex
  4. “Apply” it and then click “Ok”.
  5. Check out if it works, Enjoy Multi-GTalks!

Don’t forget to leave comments here if this works…[:)]

How this Works:
The mutex is short for mutual exclusion object. A mutex is a program object that allows multiple program threads to share the same resource, but not simultaneously.

So, in the hack above, we used nomutex (no-mutex) so to use the same resources simultaneously…

Budding Bloggers | Get a free domain and top class hosting

A blogger? You’re very lucky today as you are reading this Post!

Budding Bloggers is a program started by W3Mixx in association with GeniusHackers.com.
It is a golden chance for the Bloggers to get a free domain, hosted on a top class hosting.

In my view, the lack of a domain name and hosting is the biggest problem faced by all the bloggers. After switching to custom domain, I realized that all time that I spent blogging on blogging sites (namely Blogspot and WordPress.com) was just a waste. Thanks to Budding Bloggers for providing me with this HackersLane.com (yes, this blog is sponsored by BuddingBloggers.com).

Many bloggers are late to realize the need of a custom domain, but at some point, they realize that. So, be early and apply for the “Budding Bloggers” program. (click here to apply)

What you get from this program:

  • A domain of your choice pre-installed with WordPress powered blog.
  • 200 MB Hosting Space.
  • 10 GB Bandwidth.
  • 1 MySQL Database (applicant can request a add on).
  • 1 FTP (applicant can request a add on).
  • 1 Mail Account (applicant can request a add on).
  • Custom reviews of your design.
  • Adsense optimization for maximum profits.
  • Search engine optimization services.

And…This all is provided to you for free. There’s no hidden fees.

TrueCrypt- For All Your Encryption Needs

TrueCrypt is a free, open-source, disk encryption software which protects your disks/files from unauthorized access. It is a software with bundles of features, simple and advanced. Its main features are:

  • Creation of virtual encrypted disks (&) mounting them as real disks.
  • Encrypting the entire HDD or a partition of HDD.
  • Encrypting a whole removable drive, such as USB Flash Disk.
  • Encrypted Disks can contain Hidden OS.
  • Encrypted disks can be made hidden, so that you’re not forced by anyone to reveal the password and view your files.
  • TrueCrypt Volumes cannot be identified, it will appear as an unknown file. (Unless you have the TrueCrypt Software directly installed on your PC, and the format of your volumes is shifted to .tc instead of anyfiles( .*).
  • TrueCrypt supports the following algorithms:
  1. AES-256
  2. Serpent
  3. Twofish

I myself have tried TrueCrypt on my USB and found it super!
You can get more information of TrueCrypt from its official site: http://www.truecrypt.org

Download TrueCrypt:

  1. From Easy Share: Click Here!
  2. From Easy Share: Portable Version– Click here!

WLAN Security

Wireless Security is very important for WLANs. Further, if your WLAN is insecured, then someone can easily destroy your PC, play with your Privacy and/or Get confidential info that is stored on your PC.

The first step in the process of securing of WLAN is password Protecting it. The main options for password protection are:

  • WEP
  • WPA
  • WPA2

I recommend you to use the WPA2 as it uses the latest encryption technology and is more secure than the others. WEP and WPA passwords can be cracked by using certain cracking tools such as Aircrack-ng, Airsnort, etc.

Then you need to choose a safe password. After doing that there are some other steps you need to follow to make your WLAN hackproof.

They are:

  1. Turn off? “File & Printer Sharing” if you don’t require it. If you require it then make sure to password-protect the shared drives/folders/files (Read my post for further info: ‘File & Printer Sharing ‘ Exploit-Protection or if you want to know the harms of ‘File & Printer Sharing’ Exploit then Click Here.)
  2. If your WLAN is not a hotspot & is used for Private Purposes then restrict users using MAC Addresses. You can specify which MAC Addresses can connect to the WLAN in your router settings.
  3. The best way to secure your network ( not WLAN) is by securing your IP. You can use softwares such as Anonymizer to hide your IP. This step will ensure that you are 75% protected from HacKeRs.
  4. You can further securify your WLAN by disabling the SSID (service set identifier) broadast.
  5. Download tools such as Airmagnet and spoofers to check you own network for vulnerabilities.

Download MP4 Videos directly from Youtube

Youtube is the best entertainment portal on the net. It has a vast collection of videos and more videos than any other video site on the net. Everyone who has ever visited Youtube would have wondered, “Can I download this videos?” and must have tried up many ways an would have got disappointed or would have been succeeded in getting .flv videos.

I was able to download videos in flv format but it was a disaster and time-waste for me to convert them to mp4 and moreover I was not satisfied with the video quality of the converts.

Now I’ve found a way with which I can download .mp4 videos directly from Youtube. I’ll be telling of it to you all in this post…

Requirements:

  1. Internet Download Manager (Click here to download) or Orbit Downloader (Click here to download).
  2. Internet Connection:)

Procedure:

  1. Install Internet Download Manager (IDM) or any other relevant.
  2. Go to Youtube.com and watch the video.
  3. Add &fmt=18 to the URL of the video (without any gap or space). Example:http://www.youtube.com/watch?v=AyTJ114IOSc
  4. After adding it would look like: http://www.youtube.com/watch?v=AyTJ114IOSc&fmt=18
  5. Then download the video with IDM or whatever software you had installed. You will see that it comes in MP4 format.

The secret of this is that recently Youtube was doing some tests with its videos. It started providing the videos in HQ by adding links saying “Watch this video in High Quality”. What this link does is that it adds &fmt=6 to the URL of the video.

Other codes which can be used are:

  • &fmt=6 (normal HQ)
  • &fmt=12 (better than before)
  • &fmt=16 (clode to MP4)
  • &fmt=18(outputs the MP4 file of the video instead of FLV, thus giving MP4 quality)
  • &fmt=22(highest quality, somewhat more HQ than MP4 and more advanced)