Jump to content

K4rMa

Legendary Member
  • Posts

    4,279
  • Credits

  • Joined

  • Last visited

  • Feedback

    0%

Everything posted by K4rMa

  1. :o NOS pos kai apo edw ? xD Oraio to programa :) Btw ean 8elete kai alla programata na ta kanete silogi gia download youtube videos.. deite kai edw xD: http://www.youtube.com/results?search_query=youtube+download&search=Search http://www.google.gr/search?hl=el&q=download+youtube+videos&btnG=%CE%91%CE%BD%CE%B1%CE%B6%CE%AE%CF%84%CE%B7%CF%83%CE%B7+Google&meta=
  2. http://www.maxcheaters.com/forum/index.php?topic=6039.0
  3. Article about keyloggers (key loggers): Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about. Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party. About keyloggers A keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits. A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory. There are other approaches to capturing info about what you are doing. * Some keyloggers capture screens, rather than keystrokes. * Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection. A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features: * Stealth: invisible in process list * Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP) * ProBot program files and registry entries are hidden (Windows 2000 / XP) * Includes Remote Deployment wizard * Active window titles and process names logging * Keystroke / password logging * Regional keyboard support * Keylogging in NT console windows * Launched applications list * Text snapshots of active applications. * Visited Internet URL logger * Capture HTTP POST data (including logins/passwords) * File and Folder creation/removal logging * Mouse activities * Workstation user and timestamp recording * Log file archiving, separate log files for each user * Log file secure encryption * Password authentication * Invisible operation * Native GUI session log presentation * Easy log file reports with Instant Viewer 2 Web interface * HTML and Text log file export * Automatic E-mail log file delivery * Easy setup & uninstall wizards * Support for Windows ® 95/98/ME and Windows ® NT/2000/XP Because a keylogger can involve dozens of files, and has as a primary goal complete stealth from the user, removing one manually can be a terrifying challenge to any computer user. Incorrect removal efforts can result in damage to the operating system, instability, inability to use the mouse or keyboard, or worse. Further, some key loggers will survive manual efforts to remove them, re-installing themselves before the user even reboots. An den se kalipsa psile dn kserw ti allo na vrw... afto to vrika apo ton filo mou ton googli se 2 min EDIT :::::: Pare kai allo ena pou vrika molis tora... _________ WAYS OF INFECTION Keyloggers differ from regular computer viruses. They do not spread by themselves and usually must be installed as any other software with or without user content. There are two major ways unsolicited keystroke logging program can get into the system. 1. A legitimate keylogger can be manually installed by system administrator or any other user who has sufficient privileges for the software installation. A hacker can break into the system and setup own keylogger. In both cases a privacy threat gets installed without the monitored user’s knowledge and consent. 2. Malicious keyloggers often are installed by other parasites like viruses, trojans, backdoors or even spyware. They get into the system without user knowledge and affect everybody who uses a compromised computer. Such keyloggers do not have any uninstall functions and can be controlled only by their authors or attackers. Keyloggers affect mostly computers running Microsoft Windows operating system. However, some less prevalent parasites can be also found on other popular platforms. WHAT A KEYLOGGER DOES? - Logs each keystroke a user types on a computer’s keyboard. - Takes screenshots of user activity at predetermined time intervals or when a user types a character or clicks a mouse button. - Tracks user activity by logging window titles, names of launched applications, exact time of certain event occurrence and other specific information. - Monitors online activity by recording addresses of visited web sites, taken actions, entered keywords and other similar data. - Records login names, details of various accounts, credit card numbers and passwords including those hidden by asterisks or blank space. - Captures online chat conversations made in popular chat programs or instant messengers. - Makes unauthorized copies of outgoing and incoming e-mail messages. - Saves all collected information into a file on a hard disk, then silently sends this file to a configurable e-mail address, uploads it to a predefined FTP server or transfers it through a background Internet connection to a remote host. Gathered data can be encrypted. - Complicates its detection and removal by hiding active processes and concealing installed files. The uninstaller, if it exists, usually refuses to work if a user cannot specify a password. EXAMPLES OF KEYLOGGERS There are lots of different keystroke logging applications, both commercial and parasitical. The following examples illustrate typical keylogger behavior. Family Key Logger is a relatively simple commercial keylogger targeted to parents who need to know what kids are doing online while they are not at home and to users who want to spy on their spouses. Family Key Logger is designed to record all user keystrokes. It doesn’t have additional functionality and must be manually installed. Most legitimate keyloggers are quite similar to Family Key Logger and therefore are not extremely dangerous. Delf is the entire family of harmful trojans with keystroke logging functions. These parasites not only record every user keystroke, but also give the remote attacker full unauthorized access to a compromised computer, download and execute arbitrary code, steal user’s vital information such as passwords, e-mail messages or bank account details. Delf threats send all gathered data to the attacker through a background Internet connection. Moreover, they can cause general system instability and even corrupt files or installed applications. Perfect Keylogger is a complex computer surveillance tool with rich functionality. It records all user keystrokes and passwords, takes screenshots, tracks user activity in the Internet, captures chat conversations and e-mail messages. Perfect Keylogger can be remotely controlled. It can send gathered data to a configurable e-mail address or upload it on a predefined FTP server. Although it is a commercial product, it’s even more dangerous than most parasitical keyloggers. CONSEQUENCES OF A KEYLOGGER INFECTION Practically all keyloggers are very difficult to detect. They can violate user privacy for months and even years until the user will notice them. During all this time a regular keylogger is able to find out everything about the user. Someone who controls a keylogger gets priceless information including the monitored user’s passwords, login names, credit card numbers, exact bank account details, contacts, interests, web browsing habits and much more. All this information can be used to steal victim's valuable personal documents, money, use his name, address and other identity data for criminal offences. HOW TO REMOVE A KEYLOGGER? Most keyloggers work in the same manner as the computer viruses and therefore can be found and removed with the help of effective antivirus products like Symantec Norton AntiVirus, Kaspersky Anti-Virus, McAfee VirusScan, eTrust EZ Antivirus, Panda Titanium Antivirus, AVG Anti-Virus. Some advanced spyware removers, which are able to scan the system in a similar way antivirus software does and have extensive parasite signature databases can also detect and remove keyloggers and related components. Powerful anti-spyware solutions such as Microsoft AntiSpyware Beta, Spyware Doctor, Ad-Aware SE, SpyHunter, eTrust PestPatrol or Spybot - Search & Destroy are well-known for perfect keylogger detection and removal capabilities. In some cases even an antivirus or spyware remover can fail to get rid of a particular keylogger. That is why there are Internet resources such as 2-Spyware.com, which provide manual malware removal instructions. These instructions allow the user to manually delete all the files, directories, registry entries and other objects that belong to a parasite. However, manual removal requires fair system knowledge and therefore can be a quite difficult and tedious task for novices. Not all keyloggers (even if they track your personal information) are illegitimate and needed to remove immediately.
  4. Dont worry K4rMa is here :) http://i231.photobucket.com/albums/ee66/K4rMa2007/2-6.jpg Kane apla apo8ikeysi arxeiou tainias kai oxi apo8ikeysi ergou os... :)
  5. http://www.revfad.com/flip ;) GR: Oti na nai egrapsa pano :P To eida se ena forum kai to ekanan san game psospa8ouse o enas na katalavei ti leei o allos ! :P Ante bbZ pao gia kafedia... Savatiatika dn leei na katso MxC :D
  6. p: ¡ ɹǝʞɔɐɥ lɐǝɹ ɐ ǝɹɐ noʎ ʍou ¡ ǝuop 22981 ɐɹɐ 16 = 61+ << 51 + 4389 ¡¡¡ ʇıoldxǝ ǝsnoɥǝɹɐʍ 436656+ 8234983 +++ 84923˙˙˙noʎ llǝʇ llıʍ ı ʞo (: ʎɹɹos os ɯɐ ı ¿ ou ¿ ƃuıʇʇıɹʍ ɯɐ ı ʇɐɥʍ pɐǝɹ n uɐɔ % 001 ƃuıʞɹoʍ ǝɟɐs ʇuɐɥɔuǝ :P
  7. Run Commands: compmgmt.msc - Computer management devmgmt.msc - Device manager diskmgmt.msc - Disk management dfrg.msc - Disk defrag eventvwr.msc - Event viewer fsmgmt.msc - Shared folders gpedit.msc - Group policies lusrmgr.msc - Local users and groups perfmon.msc - Performance monitor rsop.msc - Resultant set of policies secpol.msc - Local security settings services.msc - Various Services msconfig - System Configuration Utility regedit - Registry Editor msinfo32 _ System Information sysedit _ System Edit win.ini _ windows loading information(also system.ini) winver _ Shows current version of windows mailto: _ Opens default email client command _ Opens command prompt Run Commands to access the control panel: Add/Remove Programs control appwiz.cpl Date/Time Properties control timedate.cpl Display Properties control desk.cpl FindFast control findfast.cpl Fonts Folder control fonts Internet Properties control inetcpl.cpl Keyboard Properties control main.cpl keyboard Mouse Properties control main.cpl Multimedia Properties control mmsys.cpl Network Properties control netcpl.cpl Password Properties control password.cpl Printers Folder control printers Sound Properties control mmsys.cpl sounds System Properties control sysdm.cpl Command Prompt: ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys. APPEND Causes MS-DOS to look in other directories when editing a file or running a command. ARP Displays, adds, and removes arp information from network devices. ASSIGN Assign a drive letter to an alternate letter. ASSOC View the file associations. AT Schedule a time to execute commands or programs. ATMADM Lists connections and addresses seen by Windows ATM call manager. ATTRIB Display and change file attributes. BATCH Recovery console command that executes a series of commands in a file. BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini BREAK Enable / disable CTRL + C feature. CACLS View and modify file ACL\'s. CALL Calls a batch file from another batch file. CD Changes directories. CHCP Supplement the International keyboard and character set information. CHDIR Changes directories. CHKDSK Check the hard disk drive running FAT for errors. CHKNTFS Check the hard disk drive running NTFS for errors. CHOICE Specify a listing of multiple options within a batch file. CLS Clears the screen. CMD Opens the command interpreter. COLOR Easily change the foreground and background color of the MS-DOS window. COMP Compares files. COMPACT Compresses and uncompress files. CONTROL Open control panel icons from the MS-DOS prompt. CONVERT Convert FAT to NTFS. COPY Copy one or more files to an alternate location. CTTY Change the computers input/output devices. DATE View or change the systems date. DEBUG Debug utility to create assembly programs to modify hardware settings. DEFRAG Re-arrange the hard disk drive to help with loading programs. DEL Deletes one or more files. DELETE Recovery console command that deletes a file. DELTREE Deletes one or more files and/or directories. DIR List the contents of one or more directory. DISABLE Recovery console command that disables Windows system services or drivers. DISKCOMP Compare a disk with another disk. DISKCOPY Copy the contents of one disk and place them on another disk. DOSKEY Command to view and execute commands that have been run in the past. DOSSHELL A GUI to help with early MS-DOS users. DRIVPARM Enables overwrite of original device drivers. ECHO Displays messages and enables and disables echo. EDIT View and edit files. EDLIN View and edit files. EMM386 Load extended Memory Manager. ENABLE Recovery console command to enable a disable service or driver. ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command. ERASE Erase files from computer. EXIT Exit from the command interpreter. EXPAND Expand a M*cros*ft Windows file back to it\'s original format. EXTRACT Extract files from the M*cros*ft Windows cabinets. FASTHELP Displays a listing of MS-DOS commands and information about them. FC Compare files. FDISK Utility used to create partitions on the hard disk drive. FIND Search for text within a file. FINDSTR Searches for a string of text within a file. FIXBOOT Writes a new boot sector. FIXMBR Writes a new boot record to a disk drive. FOR Boolean used in batch files. FORMAT Command to erase and prepare a disk drive. FTP Command to connect and operate on a FTP server. FTYPE Displays or modifies file types used in file extension associations. GOTO Moves a batch file to a specific label or location. GRAFTABL Show extended characters in graphics mode. HELP Display a listing of commands and brief explanation. IF Allows for batch files to perform conditional processing. IFSHLP.SYS 32-bit file manager. IPCONFIG Network command to view network adapter settings and assigned values. KEYB Change layout of keyboard. LABEL Change the label of a disk drive. LH Load a device driver in to high memory. LISTSVC Recovery console command that displays the services and drivers. LOADFIX Load a program above the first 64k. LOADHIGH Load a device driver in to high memory. LOCK Lock the hard disk drive. LOGON Recovery console command to list installations and enable administrator login. MAP Displays the device name of a drive. MD Command to create a new directory. MEM Display memory on system. MKDIR Command to create a new directory. MODE Modify the port or display settings. MORE Display one page at a time. MOVE Move one or more files from one directory to another directory. MSAV Early M*cros*ft Virus scanner. MSD Diagnostics utility. MSCDEX Utility used to load and provide access to the CD-ROM. NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT NET Update, fix, or view the network or network settings NETSH Configure dynamic and static network information from MS-DOS. NETSTAT Display the TCP/IP network protocol statistics and information. NLSFUNC Load country specific information. NSLOOKUP Look up an IP address of a domain or host on a network. PATH View and modify the computers path location. PATHPING View and locate locations of network latency. PAUSE Command used in batch files to stop the processing of a command. PING Test / send information to another network computer or network device. POPD Changes to the directory or network path stored by the pushd command. POWER Conserve power with computer portables. PRINT Prints data to a printer port. PROMPT View and change the MS-DOS prompt. PUSHD Stores a directory or network path in memory so it can be returned to at any time. QBASIC Open the QBasic. RD Removes an empty directory. REN Renames a file or directory. RENAME Renames a file or directory. RMDIR Removes an empty directory. ROUTE View and configure windows network route tables. RUNAS Enables a user to execute a program on another computer. SCANDISK Run the scandisk utility. SCANREG Scan registry and recover registry from errors. SET Change one variable or string to another. SETLOCAL Enables local environments to be changed without affecting anything else. SETVER Change MS-DOS version to trick older MS-DOS programs. SHARE Installs support for file sharing and locking capabilities. SHIFT Changes the position of replaceable parameters in a batch program. SHUTDOWN Shutdown the computer from the MS-DOS prompt. SMARTDRV Create a disk cache in conventional memory or extended memory. SORT Sorts the input and displays the output to the screen. START Start a separate window in Windows from the MS-DOS prompt. SUBST Substitute a folder on your computer for another drive letter. SWITCHES Remove add functions from MS-DOS. SYS Transfer system files to disk drive. TELNET Telnet to another computer / device from the prompt. TIME View or modify the system time. TITLE Change the title of their MS-DOS window. TRACERT Visually view a network packets route across a network. TREE View a visual tree of the hard disk drive. TYPE Display the contents of a file. UNDELETE Undelete a file that has been deleted. UNFORMAT Unformat a hard disk drive. UNLOCK Unlock a disk drive. VER Display the version information. VERIFY Enables or disables the feature to determine if files have been written properly. VOL Displays the volume information about the designated drive. XCOPY Copy multiple files, directories, and/or drives from one location to another. TRUENAME When placed before a file, will display the whole directory in which it exists TASKKILL It allows you to kill those unneeded or locked up applications Windows XP Shortcuts: ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window\'s System menu ALT+ENTER View properties for the selected item ALT+ESC Cycle through items in the order they were opened ALT+F4 Close the active item, or quit the active program ALT+SPACEBAR Display the System menu for the active window ALT+TAB Switch between open items ALT+Underlined letter Display the corresponding menu BACKSPACE View the folder one level up in My Computer or Windows Explorer CTRL+A Select all CTRL+B Bold CTRL+C Copy CTRL+I Italics CTRL+O Open an item CTRL+U Underline CTRL+V Paste CTRL+X Cut CTRL+Z Undo CTRL+F4 Close the active document CTRL while dragging Copy selected item CTRL+SHIFT while dragging Create shortcut to selected iteM CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin ESC Cancel the current task F1 Displays Help F2 Rename selected item F3 Search for a file or folder F4 Display the Address bar list in My Computer or Windows Explorer F5 Refresh the active window F6 Cycle through screen elements in a window or on the desktop F10 Activate the menu bar in the active program SHIFT+F10 Display the shortcut menu for the selected item CTRL+ESC Display the Start menu SHIFT+CTRL+ESC Launches Task Manager SHIFT when you insert a CD Prevent the CD from automatically playing WIN Display or hide the Start menu WIN+BREAK Display the System Properties dialog box WIN+D Minimizes all Windows and shows the Desktop WIN+E Open Windows Explorer WIN+F Search for a file or folder WIN+F+CTRL Search for computers WIN+L Locks the desktop WIN+M Minimize or restore all windows WIN+R Open the Run dialog box WIN+TAB Switch between open items Windows Explorer Shortcuts: ALT+SPACEBAR - Display the current window’s system menu SHIFT+F10 - Display the item\'s context menu CTRL+ESC - Display the Start menu ALT+TAB - Switch to the window you last used ALT+F4 - Close the current window or quit CTRL+A - Select all items CTRL+X - Cut selected item(s) CTRL+C - Copy selected item(s) CTRL+V - Paste item(s) CTRL+Z - Undo last action CTRL+(+) - Automatically resize the columns in the right hand pane TAB - Move forward through options ALT+RIGHT ARROW - Move forward to a previous view ALT+LEFT ARROW - Move backward to a previous view SHIFT+DELETE - Delete an item immediately BACKSPACE - View the folder one level up ALT+ENTER - View an item’s properties F10 - Activate the menu bar in programs F6 - Switch between left and right panes F5 - Refresh window contents F3 - Display Find application F2 - Rename selected item Internet Explorer Shortcuts: CTRL+A - Select all items on the current page CTRL+D - Add the current page to your Favorites CTRL+E - Open the Search bar CTRL+F - Find on this page CTRL+H - Open the History bar CTRL+I - Open the Favorites bar CTRL+N - Open a new window CTRL+O - Go to a new location CTRL+P - Print the current page or active frame CTRL+S - Save the current page CTRL+W - Close current browser window CTRL+ENTER - Adds the http://www. (url) .com SHIFT+CLICK - Open link in new window BACKSPACE - Go to the previous page ALT+HOME - Go to your Home page HOME - Move to the beginning of a document TAB - Move forward through items on a page END - Move to the end of a document ESC - Stop downloading a page F11 - Toggle full-screen view F5 - Refresh the current page F4 - Display list of typed addresses F6 - Change Address bar and page focus ALT+RIGHT ARROW - Go to the next page SHIFT+CTRL+TAB - Move back between frames SHIFT+F10 - Display a shortcut menu for a link SHIFT+TAB - Move back through the items on a page CTRL+TAB - Move forward between frames CTRL+C - Copy selected items to the clipboard CTRL+V - Insert contents of the clipboard ENTER - Activate a selected link ;)
  8. new kamael server : http://www.worldofkillers.com/wok_kamael.php Video's : 7aTnWOdG9Zw CkQTGyRXxdw Add this to your list :)
  9. Total time logged in: 15 days, 2 hours and 3 minutes. :)
  10. I dont understand why 1rst link is dead and also i cant understand when i press open what to press next ?? with hex.exe.... Open what ???
  11. Well first link is dead ! Btw i download the program from the second link but i cant understand you... Try to explain better as demonic soul said plz ! :-\
  12. NIce vid..! ;D !! Btw why you didnt post here ? :) http://www.maxcheaters.com/forum/index.php?topic=13767.0
  13. Vasika kapoios move sto spam topic... Oso gia to provlima s file... Den eisai o monos pou to exeis :/ 1.Ftaei to internet pou exeis spiti sou 2.Ftaei to l2 3.Ftaei pou dn exeis gkomena xD 4.Ftaei pou dn exeis tpt allo na kaneis.. 5.Ftaei... 6.Ftaei... 7.Ftaei... As simplirosi kapoios :D *Egw ksekolisa apo to gamidi to l2 kai apo 12wra tora pezw ... 2ora 3ora :P :P dn pezw l2 alla kano alles malakies :P oti vrw arkei na eimai Internet xD Pernaei h ora mou to mesimeri pezo pio poli kai to vradi ! ::)
  14. No one thought for a red hammer ... But they thought about a green and blue ! :P :P :P
  15. 5P6UU6m3cqk Nice idea maxtor... btw second worlds funniest laugh!!! :P
  16. WoW !! Good job !!!!!!!!!! ;p :)
  17. http://www.maxcheaters.com/forum/index.php?topic=12758.msg95024;topicseen#msg95024 No comments...
  18. To idio kai se emena... To paidi itan afk ... kai eixe afisei to msn anoixto.... Ksanfinka vlepw apo to msn mia apostoli mias foto h opoia itan ziparismeni... Kai tou lew ti einai auto re ??? Tpt dn milaei... Patao accept tin perno.... To kano unzip kai MPAM! petagetai to nod32 kai mou leei Irc bot kai kati alles mlkies.. to travaw delete meta apo kanena 10lepto ton perno tilefono kai me leei oti einai stin proponisi :P :S :S
  19. i think it has 80 % succes rate with normal enchant weapon s scroll :P and 75 % with crystal and 99 % with blessed :P
  20. Ti na po ... den leo tpt... To video ta leei ola xDDDDDDDDD :P btw rap = raptopoulos ! :D
×
×
  • Create New...