Ads 468x60px

Sunday, 30 December 2012


Arithmetic Operators
Relational Operators
Logical Operators
Assignment Operators
Conditional Operators
Comma Operators

Arithmetic Operators
There are five types of operators
Addition ( + )
Subtraction ( - )
Multiplication ( * )
Division ( / )
Modulo Division ( % )

We are very familiar with the first four operators, they are simple mathematics and work same so explaining them is really not necessary, we need to know only about modulo division because this is what you may not familiar with.

Modulo Division
It will return the remainder.
e.g. 4%2 = 0
we can not use decimal value in it. Using decimal value will give an error.

Relational Operator
The operators which compares two values. There are six relational operators
Less Than ( < )
Greater Than ( > )
Less Than Equal to ( <=)
Greater Than Equal to ( >= )
Equal to Equal to ( = = )
Not Equal to ( !=)

The definitions are already clear from the names.

Logical Operators
Three type of logical operators:
AND (&&)
OR ( || )
NOT ( ! )

If you are using this then every statement must be true for the execution of the next statement.
if(a==10 && b == 10)

For this operator any single statement must be true.
if(a==10 || a==5)

In this statement any of the statements must not true.

Assignment Operators
Their 6 types of assignment operators used to assign values.
Equal to ( = )
e.g. a = 10

Plus Equal to ( + = )
e.g. a + = 10 (a = a+10)

Minus Equal to ( - = )
e.g. a - = 10 (a = a-10)

Multiply Equal to ( * = )
e.g. a * = 10 (a = a*10)

Divide Equal to ( / = )
e.g. a / = 10 (a = a /10)

Modulo Equal to ( % = )
e.g. a % = 10 (a = a%10)

Conditional Operators
The conditional expression can be used as shorthand for some if-else statements. It is a ternary operator. This operator consist of two symbols: the question mark (?) and the colon (:).

The general syntax of the conditional operator is:
Identifier = (test expression)? Expression1: Expression2 ;


Instead of writing
if (x < y) 
min = x;
min = y;

You just say...
min = (x < y) ? x : y;

Comma Operator
A set of expression is separated by this operator ( , ). 
e.g. int i,j,k;

Data Types

The four fundamental data types are:

char is a data type used for storing a single character. If we store an integer on this data type it will correspond to ASCII character (65 for letter A).
char variable_name = value;
char takes one byte from memory.
Type Bytes Range
char 1 -127 to 127
unsigned char 1 0 to 255
signed char 1 -127 to 127
Integer is a datatype which stores a whole number (no fractional part), the number can be positive or negative.


int variable_name = value;
Type Bytes Range
int 2 -32,767 to 32,767
unsigned int 2 0 to 65,535
signed int 2 -32,767 to 32,767
short int 2 -32,767 to 32,767
unsigned short int 2 0 to 65,535
signed short int 2 -32,767 to 32,767
long int 4 -2,147,483,647 to 2,147,483,647
signed long int 4 -2,147,483,647 to 2,147,483,647
unsigned long int 4 0 to 4,294,967,295
Float stores number with decimal values. It takes 4 bytes of memory.


float variable_name = value;

Double can hold larger number with a high degree of precision. It takes 8 bytes of memory.

Saturday, 29 December 2012

Identifier, Keywords & Variables

2. Keywords
3. Variables

The name given to program elements often to variables. The rules of giving name are:

  1. Characters (a-z, A-Z) and numbers (0-9) and underscore( _ ) can only be used. 
  2. An identifier must start from a character or underscore we can not start the name with numbers. 
  3. As we know that C++ is a case sensitive language so case is distinguishable i.e. ID and id can be used as separate identifiers. 
  4. We can not use a keyword as an identifier. 
Legal Identifiers

Illegal Identifiers
this is your identifier

These are standard identifier that are predefined in C++.
Rules of Keywords:

  1. Keywords can be only used for their defined purpose. 
  2. Keywords can't be used as an identifier. 
  3. Keywords can't be used as a variable name. 

Some common keywords are: void, long, else, do, goto, char, int etc.
Variable is the name given to a specific memory location to store some values, the size is depends on the type of the variable which is declared by the programmer.

The syntax of declaring a variable is
data_type variable_name = value

Rules of declaring variable

  1. All variable must be declared before its use in the program. 
  2. All declaration of the same data type can be separated by comma (,) and the declaration is terminated by semi colon (;) 
int a,b,c;  
float x;
char z;

Your First Program

Now you installed the compiler on your computer. Open the compiler and type the following code.

void main()
    cout<<"Welcome to C++\n";
After typing the above code press F9 to make your executable file of your program. 
Source Code 
After pressing F9 a dialogue box will open giving you the path of your executable fill with the message that your file is up to date. 

Now press Ctrl + F9 to run your program. You will see your output. You can press any key to exit from the output screen.
Now you from the above code you can see that it is started with '#' (hash). In Programming Language we do not pronounce it as hash, it is called as a preprocessor directive after that include that simply means something is going to be included and then the angle bracket (<>) starts, in the angle bracket we have to write the name of the header file which we need to include in the program.

iostream stands for input output stream, conio stands for console input output and  .h is the extension of the header file.

void main()
This is the main function of your program. The syntax of writing a function is
<return type> <function name> <simple parenthesis>
void is the return type of function main, void means the function will return nothing.
Every program will have a main function. The program starts from main function and in an individual program only one main can possible.
Simple Parenthesis, it is the syntax of writing a function as said above.

Now, curly bracket starts means the body of the program starts. The whole program is written under the bracket.
Stands for clear screen. It clears the screen from all previous output and make fresh blank screen.
Stands for console out, it is the output function which will give the output of the input and will print the messages on screen.
Bitwise left shift operator it is the syntax of the command cout.
" "
In double quotes we have to write the message called string.
Escape sequence used for inserting new line it will not appear in the output but it will give a new line to our output.
; (semi colon)
Statement terminator,  works as full stop in programming, every statement terminates with semi colon.
A function under the header file conio.h. It reads a character from the keyboard without displaying it. It is not  really necessary in the above program but we need to put this function to see the output screen. It will hold the output screen until we don't press a key from the keyboard.

C++ Compiler

What is a Compiler?
You are learning a Programming Language but the computer don't understand this language. You need a translator who will translate your program so that the computer can understand. We can say that the compiler is a translator. The compiler converts your source code to another computer language. Now we can define the compiler as:
A compiler is a computer program that transforms our source code written in programming language to the target language often as binary code or object code. 

There are a lots of compiler available in internet you can google it to download, but i personally recommend you to use Turbo C++. From the link given below you can download it for free. 

If you are having trouble with this compiler then you can choose from a lots of alternatives some is given below:

Friday, 21 December 2012

Lat Lag Gayee Race 2 Mp3 and Lyrics

Lat Lag Gayee Download Mp3 with Lyrics
Singer: Benny Dayal & Shalmali Kholgade
Music: Pritam
Lyrics: Mayur Puri
Movie: Race 2

(Right Click and Save Link As)

Lyrics of Song Lat Lag Gayee

beimaan... dil bada beimaan...

hota nahi asaan... ise hai samjhanaa...
beimaan... dil bada beimaan...
tere liye shaitaan... meri na ek maana...

dil jeete aa main jeetu...
dekhungi dekhega tu...
lo dil se sharat lag gayi...

mujhay to teri lat lag gayi lag gayi...
zamanaa kahe lat ye galat lag gayi...
mujhay to teri lat lag gayi lag gayi...
zamanaa kahe lat ye galat lag gayi...

mujhay to teri la a a a ye...
la a a a ye...
la a a a ye...
la a a a lat lag gayi...

mujhay to teri la a a a ye...
la a a a ye...
la a a a ye...
la a a a lat lag gayi...

roku jitna... utni bagawat ho...
lagta hai aisa haal dil ki... tum zaroorat ho...
roku jitna... utni bagawat ho...
lagta hai aisa haal dil ki... tum zaroorat ho...

mujhko bhi tu zaroori...
doobi nashe mein poori...
to kaisi ye talab lag gayi...

mujhay to teri lat lag gayi lag gayi...
zamanaa kahe lat ye galat lag gayi...
mujhay to teri lat lag gayi lag gayi...
zamanaa kahe lat ye galat lag gayi...

mujhay to teri la a a a ye...
la a a a ye...
la a a a ye...
la a a a lat lag gayi...

mujhay to teri la a a a ye...
la a a a ye...
la a a a ye...
la a a a lat lag gayi...

mujhay to teri...

ek tu ek main...
ek baat hui apni...
hairaan hai kyu saraa zahaan jo...
raat hui apni...

ek tu ek main...
ek baat hui apni...
hairaan hai kyu saraa zahaan jo...
raat hui apni...

mujhse tu aake mila...
to ye hua hai sila...
ke zada ho pat lag gayi...

mujhay to teri lat lag gayi lag gayi...
zamanaa kahe lat ye galat lag gayi...
mujhay to teri lat lag gayi lag gayi...
zamanaa kahe lat ye galat lag gayi...

mujhay to teri la a a a ye...
la a a a ye...
la a a a ye...
la a a a lat lag gayi...

mujhay to teri la a a a ye...
la a a a ye...
la a a a ye...
la a a a lat lag gayi...

mujhay to teri...

Thursday, 13 December 2012

Be Intehaan HD Music Video Featuring Atif Aslam

Download exclusive brand new and latest music of Atif Aslam from the movie Race 2. 
Download from the direct link given below.

Song Name: Be Intehaan
Artist: Atif Aslam and Sunidhi Chouhan
Composer: Pritam
Runtime: 2:15 min
Resolution: 1080p HD
Movie: Race 2
Featuring: Saif Ali Khan, Deepika Padukon and Atif Aslam

(Right click and save link as)


Friday, 7 December 2012

Be Intehaan: Atif Aslam Race 2 Mp3 and Lyrics

Download exclusive brand new and latest song of Atif Aslam from the movie Race 2. Download from the direct link given below.

Song Name: Be Intehaan
Artist: Atif Aslam and Sunidhi Chouhan
Composer: Pritam
Movie: Race 2

(Right click and Save link as)

Be Intehaan Lyrics

suno na...
kahein kya... suno na...
dil mera... suno na...
suno... zaraa...
teri baahon mein....mujhe rehna hai raat bhar...
teri baahon mein....hogi subah.....

Be Intehaan... Be Intehaan... Be Intehaan
Yoon Pyar Kar...
Be Intehaan...
Dekha karoon... Saari Umar... 
Tere Nishaan...
Be Intehaan...

Koi kasar naa rahe...
Meri khabar naa rahe...
Choo le mujhe is kadar...
Be Intehaan...

Jab saanso mein teri... saanse ghuli to...
fir sulagne lagein... 
ehsaas mere... mujhse kahne lage...

Haan baahon mein teri...
Aake jahaan do...
Yoon simatne lage...
Sailab jaise koi behne lage...

Khoya hoon main...
Aagosh mein....
Tu bhi kahaan...
Ab hosh mein...
Makhmali... Raat Ki...
Ho na subah....

Be Intehaan... Be Intehaan... Be Intehaan
Yoon Pyar Kar...
Be Intehaan...
Dekha karoon... Saari Umar... 
Tere Nishaan...
Be Intehaan...

Kuchh tum karo...
Kuchh hum kare is tarah....

Sharmaa ke do....
Saaye hain jo...
Mu fer le humse yahaan...

Choo to liya hai ye jism tunay...
Rooh bhi choom le...
Alfaaz bheege... bheege kyun hai mere...

Haan yoon choor hoke....
Mazboor hoke...
Qatra qatra kare....
Ehsaas bheege... bheege kyun hai mere...

Do bekhabar...
Bheege badan...
Ho besabar bheege badan...
Le rahe... Raat bhar... Angadaiyaan...

Be Intehaan... Be Intehaan... Be Intehaan
Yoon Pyar Kar...
Be Intehaan...
Dekha karoon... Saari Umar... 
Tere Nishaan...
Be Intehaan...

Koi kasar naa rahe...
Meri khabar naa rahe...
Choo le mujhe is kadar...
Be Intehaan...

Sunday, 2 December 2012

Download Six Famous Trojans







Download all the six Trojans from the above given single link

Knowing The Trojans

Have you watched the movie Troy? The movie is about Trojan War, in that movie the Greeks constructed a Huge Wooden horse and pretended to sail away. The Trojans pulled the horse to their city as a trophy of victory. In that horse the Greek Army was hidden and at night the army opened the gates for the rest Greek Army and they destroyed the city of Troy and finished the war.

The same concept is applied in computer science
A Trojan is a malicious program  misguided as some very important  application. Trojans comes on the
backs of other programs and are installed on a system without the User’s knowledge. Trojans are 
malicious pieces of code used to install hacking software on a target system and aid the Hacker in gaining and retaining access to that system. Trojans and their counterparts are important pieces of the Hacker’s toolkit.

Trojans is a program that appears to perform a desirable and necessary function but that, because of hidden
and unauthorized code, performs functions unknown and unwanted by the user. These downloads are fake
programs which seems to be a legitimate application, it may be a software like monitoring program, system virus scanners, registry cleaners, computer system optimizers, or they may be applications like songs, pictures, screen savers, videos, etc.

You just need to execute that software or application, you will find the application running or you might
get an error, but once executed the Trojan will install itself in the system automatically. 

Once installed on a system, the program then has system-level access on the target system, where it can be
destructive and insidious. They can cause data theft and loss, and system crashes or slowdowns; they can also be used as launching points for other attacks

Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands, intercept keystrokes, watch screen images, and restart or shut down infected hosts.

Different Types of Trojans

1. Remote Administration Trojans: There are Remote Access Trojans which are used to control the Victim’s computer remotely.

2. Data Stealing Trojans: Then there are Data Sending Trojans which compromised the data in the Victim’s computer, then find the data on the computer and send it to the attacker automatically.

3. Security Disabler Trojan: There are Security software disablers Trojans which are used to stop antivirus software running in the Victim’s computer.

In most of the cases the Trojan comes as a Remote Administration Tools which turns the Victim’s computer into a server which can controlled remotely. Once the Remote Access Trojan is installed in the system, the attacker can connect to that computer and can control it.

Saturday, 24 November 2012

Trace any Person on Internet

You can know what is your IP Address, but if you want to know other's IP then? Not to worry more its quite simple. Just open the following link.

Now provide your correct email address and click on Get Link.

After clicking on Get Link you'll be redirected to an other page saying Congratulations and you'll get some link. Just send that link to your friends and when they will click on the link their IP address will be mailed you to your email. 

Aamir Khan will direct again

Taare Zameen Par', Aamir Khan has received huge applause excited to direct a film again.
2007 release 'Taare Zameen Par' was well received by the audience and Smikshkane. The 47-year-old actor in his uncle Nasir Hussain's film 'with floor floor "(1984) and' Rock '(1985) worked as an assistant director.
Aamir said,'' I have chosen a story and hopefully I'll direct it.But now I am an actor and a TV show with 'Satyameva Jayate Season 2' am.
He said,'' a story no one will write the script. I have told to the author's direction the film will take some time yet. Muङo not know when it will be directed. Sym in my hands' PK ',' Dhoom '-3' and 'Satyameva Jayate 2' will work. Although I am willing to be the creator of it.'' Aamir said that he is impressed with the Mahabharata and the big screen in a Hisse fixated.
He said,'' It's a wish. This major project is like a dream for me. Suppose that today, so I decided to make it Muङo take 20 years to complete. I am so afraid of it. If I said that I decided to make it, so it will take five years to the research. Then you will be able to work ... The subject matter is very important to me. Aamir'' his upcoming film 'Wanted' rumors of differences with director Reema Kgti talked about openly.
He said,'' As far as is concerned, already the rumors are not true. Such reports are often wrong, such as 'Lagaan' was about.
Often when the release kicks are reports of this type that I am not happy with the film. If I have to explain all sorts of rumors Muङo approaching, which will have to stop working. So I decided that the film will tell about myself.''

Who is Nirmal Baba

Medininagar Kankari located in the brick kiln began Chainpur. Run the business 
- the business of textile in Garhwa. It also failed on
- contract mining area has Bhragodha
Ranchi: Baba Ji, please give me a car .. Baba Ji Wish I sought, please also complete .. Baba Ji to bless my work meeting targets .. Baba Ji my test is running, to get good marks .. Please give me a good home .. To get a good job .. Ritu to marry me off .. 36 channels of the country a person is being asked to fulfill this wish. And all this is being said by the person, he is serene sage.
Nirmal Singh alias Baba Nirmaljit Narula links on the internet more than three million, but he is no description available. Good news about the information achieved Nirmal Baba, how Baba became clear from the Nirmaljit, it is a mystery.
Learn Baba
Nirmal Baba two brothers. Big brother Manjit Singh still live in Ludhiana. Nirmal Baba are small. The inhabitants of the village of Patiala face. Partition in 1947, the family returned to India when Baba was serene. Baba wedded to. They have a son and a daughter.
Medininagar (Jharkhand), the third daughter married to Dilip Singh Bagga. Chatra MP and former Jharkhand Assembly Speaker Inder Singh Namdhari these younger brother. Says Mr. namesake in 1964, when she was married, so serene 13-14 years.
In 1970-71 he Medininagar (DaltonGanj then) came and stayed with it until 81-82. Had his house in Ranchi. After the assassination of Indira Gandhi in 1984 anti-Sikh riots erupted after he sold the house and moved to Ranchi. Piska turning his house in Ranchi was the petrol pump.
Jharkhand relationship
Nirmal Baba's longstanding relationship with the state. Especially from Palamau division. In 1981-82 he Medininagar (then DaltonGanj) were able to stay in business. Chainpur police station area Kankari their brick - kiln also be used, which is reflected in the name of pure brick.
Knowing he says: Nirmal show business was not good. Then he lived in Medininagar laws. However, no member of his in-laws lived in Medininagar. His (Nirmal Baba's) brother Gurmeet Singh Arora alias Babloo was the Lime Stone and transport business.
Babloo and G Suman says: Since Babloo friendship, so serene-law had the chance to learn. They were doing business. Business for a few days, he was living in Garhwa. The fabric of the business.But it also failed. Bhragodha contract mining in the area, took a few days. Baba says .. in Bhragodha found enlightenment.
Since then she turned to spirituality. Well after going Medininagar few people have already met.When people go about them, then it is being discussed. They say that knowing how this miracle happened, they do not know anything.
- Yes, my brother Nirmal Baba: The titular
* Nirmal Baba Are you a relative?
That's right, a lot of people ask about it. I should clarify that he is my brother.
Tell us something about them.
In 1964 when I got married, 13-14 years old at the time were clear. Father had already been murdered. So his mother (my mother) said that it was brought there to try to provide some business.In 1970-71 he Medininagar (DaltonGanj then) came. Until 1981-82, then until 1984 in Ranchi. Delhi to Ranchi returned the same year to sell a house.
The contractor had Bhragodha Mines in 1998-99. Happened to them in order to achieve enlightenment. He then turned towards spirituality. That's all I know about them. What is Idea, Nirmal Baba about
Look to his millions of devotees. People have faith in them. Well my conflict with them on many issues.



I won’t be asking for anything more father ,as much I’m in this lonely world. His thoughts have taken a special place in my heart  now.
I have given my heart away to him . Oh!  father, Let not the distance separate us. I beg you for him….. I pled you for him….Hear my pray oh holy father … When you say ask & you”ll get.
Then make me a promise to bring us together  again and reunite us…. Nothing more I ask of u O lord.. Its just him I ask you for…
He is my new wish , my new dream , he is like my new shinning star,
He is appe of my eye…
Like a new moon he encountered  but why in a twilight we got lost…
I don’t want agai to get lost in some mist….. I swear he will be the only person I will love… The eagerness to see him is growing but nearly inside one…
It’s difficult to handle now father make it sooner,Im loosing the self control… He is waiting for me.
Don’t want to keep him await for much longer .. I know its keep him await for much longer …
I know its getting uneasy for him to survive without me…
I know you can see him struggling because without me he is like an broken Angel.

Wednesday, 21 November 2012

Message Virus

We created shut down virus. Have you ever faced a virus which always gives you a message and when you click on OK then the message reappears. If you have faced then you know how typical is this for an person who don't have any knowledge about this. Now if you don't know then it will be quite shocking for you that it is only one line MS Dos command. Lets see how can we create this type of Virus.

Step 1: You have to create a bat file of this command so we need to do as always. Open notepad type the following command and save that file with any name and bat extension.

msg * You are stupid!!
goto start

Now you can change the line You are stupid!! with any message according to you.

Step 2: Now you need to convert this bat file to exe. For this you can download the bat to exe converter from the link given below.

Step 3: Now if you have converted the file you have to repeat the same process which I posted in the previous article SHUTDOWN VIRUS. Go through this link and do as given from Step 2. 

If you did everything then you have your Virus. Send this virus to your victim and when the victim will run that file nothing will happen the virus will take effect from the next start of the system. Your victim will get this message: 
When your victim will click on OK. The message will reappear and continuously reappear. 

Shutdown Virus

We created the Shutdown prank. There was nothing just a simple MS Dos command. Now if you think for a while then we can modify that prank and can make an effective Computer Virus who will repeatedly shutdown the computer.

The thing you need for this is WinRar. The simplest and easily available thing. If you don't have Win Rar in your system then download it from the link given below and install it on your system.

Now you need to follow these simple steps
Step 1: Open notepad and type this simple command
shutdown -r -t 2
Save the file in your desktop with .bat extension. I am saving it here with the name shut.bat. 

Step 2: Now right click on your desktop and from new select WinRAR Archive and create an archive with any name. Here I am giving the name Virus1.  
Now you have your RAR archive on your desktop just drag the bat file to the archive, now your bat file is in the archive Virus1. We need to make it an executable file which will execute silently in background. It can be easily done with WinRAR. 

Step 3: Open the archive Virus1 and click on the last option from the top menu which is SFX. SFX stands for Self Extracting Archive. 

Step 4: Now a dialogue box will open you don't need to change anything just click on Advance SFX option. 

Step 7: Now you are in Advance SFX options click on the General tab and at the path copy paste the following. 
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
This is the location of startup folder. 

Step 6:  Click on the modes tab and then from silent mode select hide all. You can match the options from the picture given below. 
Step 6: This is the final step click on OK and create your SFX. You'll find your SFX at the same location where you created your archive. 

Now send this to your victim or friend and because this is just a simple one line DOS command it is not detectable by any antivirus and it is also not harmful for system but it is very effective. 

When your friend will execute this file nothing will happen but when the next time he/she will restart his computer then after startup computer will restart again and again.

Tuesday, 20 November 2012

Shutdown Prank

A funny prank you can do with your friends. We can call it a virus but it will not harm your friend's system it will just shutdown his system. Now Lets see how can we do this prank.

You just need to follow these simple steps: 
Step 1: Right click on desktop and from new click on shortcut. It will give you the option to create a shortcut and a new window for configuring shortcut will open.

Step 2: Now this is the main part, on the Create Shortcut window type the following or you can also copy and then paste.  
Now this is the actual command because of what system will shut down. Now you in the above command the 60 is the seconds after which the system will shut down you can change it with any value. And under the double quotes is the message which the user will get when system will shut down, you can either change the message also.
Now click on next. 

Step 3: Now it will ask you for the name of your shortcut, give a name on which people will click, I am writing Internet Explorer, very frequently used thing. 
Click on finish and you are done. 

When people will open that Internet Explorer the system will shut down automatically after the time which we  set before.

Now the things you should remember:
Change the icon of the shortcut so the user will not doubt. 
And if you are testing it in your own system then you should know how to abort this process for aborting this shutdown: 
go to run and type shutdown -a
The process will aborted. 

Monday, 19 November 2012


Ultrasurf is an anti-cersorship and anti-blocking proxy software on the Internet. It is free, fast and really effective. Ultrasurf was originally created by the Ultrareach Internet Corporation to help Internet users in China to bypass filtering and censorship by the government. However, now Ultrasurf is amongst the most popular unblocking tools available on the Internet.

Ultrasurf Proxy Server Software which can provide you:
  • Privacy
  • Protect Internet privacy with anonymous surfing and browsing -- hide IP addresses and locations, clean browsing history, cookies & more ...
  • Security
  • Completely transparent data transfer and high level encryption of the content allow you to surf the web with high security.
  • Freedom
  • UltraSurf allows you to overcome the censorship and blockage on the Internet. You can browse any website freely, so as to obtain true information from the free world.

Watch American TV Shows

Hulu or, from here you can watch all the episodes of American TV shows in HD Quality for free just after some days of the telecast of that episode. But there is a little demerit that this service is only available in United States they are not allowing to watch the episodes to people outside from United States. If outsiders will try to open this website it will give a message that "Sorry, currently our video library can only be watched from within the United States".
Then what to do?
We Indians or any other peoples can't watch?

Not to worry here is a tool for you all called Hot Spot Shield. Download it from the link given below, it is free. 
Now if you have downloaded it then just simply install it to your system as you install other applications. 
It will open automatically after installation and will verify secure connection. 
After a few second the yellow bar will become green and now it is connected. 
Now your IP has changed. Go to to trace your IP. 
Now this is my changed IP, it is saying that my IP is of California but in real I am from India. But the hulu server don't know it so now I can watch the videos.

Now if you are wondering that What is HotSpot Shield?
It is a free VPN service (supported by some basic light ads) that establishes an HTTPS encrypted VPN connection between your computer and their Internet gateway, hence giving you full unrestricted to access to everything on the Internet. 

Sunday, 18 November 2012

Send Your Remote Keylogger Using Java

There are a lots of ways through which you can send your Keylogger Server file to your victim. In this post we will learn to send it through Java. Like a normal phishing we will send a link to the victim and when the victim clicks on it the browser will ask him to install or update a Java Plugin and when the victims click on it your Remote Keylogger is installed in victim's system and ready to use. 

Follow these simple steps for this Attack

Step 1: First of all you need to create a Remote Keylogger Server. If you are in trouble for creating the Remote Keylogger then go through the following link and create your Remote Keylogger. 

Step 2: Now, once you've completed creating your Remote Keylogger. You need a webhosting account. There are a lots of website available which will give you webhosting for free you can google it but for this attack I would like to recommend you to use my3gb webhosting. Go to the link and create an account. Now after creating a webhosting account on my3gb or any other service which you liked, open file manager and upload  your Remote Keylogger. 

Step 3: Now you need some other things for this attack. The things you need for this attack are given below, go through the link and download it. 

Step 4: Now once you have downloaded the above given file, extract them to a folder and look for the file named index2.html, right click on the file and open it with notepad or any other text editor. 

Now simply press ctrl + f and search for KEYLOGGER and replace this word with the link of your Remote Keylogger which you have created and uploaded in Step 1 and 2. You can also find for and can replace the link according to your choice, the victim will redirect to this link after being trapped. 

Step 5: Upload all the files to the webhosting which you've downloaded in Step 3

Step 6: The final step just copy the link of the file index.html and send this link to your victim. I recommend you to before sending this URL to your victim shortened it through any URL shortening site. 

Now once you're victim click on the link you have given to him, your victim will see a webpage and the browser will notify him to Install or Update Java plugin.

When your victim will click to update the java plugin your Keylogger will be silently downloaded and installed.

Disclaimer: The information and tool we are providing is only for educational awareness. If you use it in any illegal activity then we are not responsible for it.