Hide EXE File Into JPG

This is a good trick to hide your exe files into a jpg file..!
How about sending a trojan or a keylogger into your victim using this trick..?
1) Firstly, create a new folder and make sure that the options 'show hidden files and
folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on
your pc.
2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe'
(that's why you need the extension of files showing, cause you need to see it to change it)
3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for
example 'picture.jpeg'
4) Windows is going to warn you if you really want to change this extension from exe to
jpeg, click YES.
5) Now create a shortcut of this 'picture.jpeg' in the same folder.
6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.
7) Go to properties (on file me.jpeg) and now you need to do some changes there.
8) First of all delete all the text on field 'Start In' and leave it empty.
9) Then on field 'Target' you need to write the path to open the other file (the server
renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'
10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first
file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.
11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other
file 'picture.jpeg' and the server will run.
12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the
icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.
13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better
to get a connection from someone.
14) But don’t forget one thing, these 2 files must always be together in the same folder
and to get connected to someone they must click on the shortcut created not on the first
file. So rename the files to whatever you want considering the person and the knowledge
they have on this matter.
15) For me for example I always want the shortcut showing first so can be the first file to
be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server
'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the
hidden file will always show up inside of a Zip or a Rar file.
16) So the best way to send these files together to someone is compress them into Zip or
Rar.
17) Inside the Rar or Zip file you can see the files properties and even after all this work
you can see that the shortcut is recognized like a shortcut but hopefully the person you
sent this too doesn’t know that and is going to open it.
Enjoy This!!!





UltraISO Premium 9.3.6.2750







UltraISO Premium 9.3.6.2750 | 5.6 MB
UltraISO is an ISO CD/DVD image file creating/editing/converting tool and a bootable CD/DVD maker , it can directly edit the CD/DVD image file and extract files and folders from it, as well as directly make ISO files from your CD/DVD-ROM or hard disk. At the same time, you can maintain the ISO bootable information, thus creating your own bootable CD/DVDs. You now have the power to make and edit your own ISO files, and then burn them to CD/DVD for your own needs. UltraISO is in sole possession of the intellectualized ISO document format analyzer, it can process at the present time almost all types of image files, including ISO and BIN, it may even support new image files which are yet to be created. UltraISO can open these image files, directly extract files and folders, edit it and convert other image files to the standard ISO format. UltraISO uses the double window unification user contact interface, you have the choice to only use the quick buttons and/or the mouse Drag & Drops, you can handle any CD/DVD image file easily.

Main Features:
Can directly edit the ISO image file.
Can directly extract files and folders from ISO image file
Can add / delete /create new directory /rename ISO file image content.
Can make ISO file from hard disk document.
Can create CD/DVD image from CD/DVD-ROM, maintain bootable information.
Can process the compact disc boot information, you can directly add/remove/extract boot image of the ISO image.
Supports nearly all known CD/DVD image file formats (.ISO, .BIN, .IMG, .CIF, .NRG, .MDS, .CCD, .BWI, .ISZ, .DMG, .DAA, .UIF, .HFS and so on) , and can convert them to the industry standard and widely supported ISO image format.
May directly set the file/folder to hidden attribute
Supports ISO 9660 Level1/2/3 and Joliet extension
Automatically optimizes the ISO image file structure, saves the disc space.
Supports the shell document type integration, Open Image files through double clicking them or the Right Click menu of the mouse with the open dialog.
The double window user interface is extremely convenient to use.
There are rich add-on tools, you can create ALL in 1 bootable compact discs, CD/DVD image file management, even the virtual CD/DVD drive , those functions are really powerful.
Installation
Unpack, install, Use Keygen to Register
Enjoy
Download:
Hotfile
Filesonic

How to Hack Cyberoam 100% working hack

Friends I am back with another hacking tutorial . This time I will explain you all " How to Hack or Unblock cyberoam to access all blocked sites in college or company" . Tutorial will be  friendly as everything is explained with the help of snapshots...So to know How to hack cyberoam Read On....


First of all Guys You Must Know What is Cyberoam and What Idea it uses to block the user.


What is Cyberoam :
 Cyberoam is Identity-based unified threat management appliances, offer comprehensive threat protection with firewall-VPN, anti-virus, anti-spam, intrusion prevention system, content filtering in addition to bandwidth management and multiple link load balancing and gateway failover.
Identity-based controls and visibility are critical components of network security. With identity and network data combined, enterprises are able to identify patterns of behavior by specific users or groups that can signify misuse, unauthorized intrusions, or malicious attacks from inside or outside the enterprise. Activities and security policy rules can be enforced on network segments based on identity.

THINGS THAT WE NEED TO HACK CYBEROAM??
1.FootPrint IP . (Our Ip that is being footprinted or traced by any website that we visit. In short NAT outside local IP).

2. An Open PORT generally its 3128. (3128 port is active port which is always open If your computer has Network assessiblity.)

3. Proxifer and Its Settings. (any Version after 2.17).

Now that's the only things that we need If we want to hack or bypass the cyberoam Client. Now Detailed Hack Is below...


HACKING CYBEROAM (DETAILED HACK)
Stepwise Description:
1. First of all We need to get the FootPrint IP . Simple Method to Get FootPrint IP.
2. Open Your Mozilla Firefox Web Browser And type the Following Site.
      https://your-freedom.de
3. When you Open the Site you will see something like this:

Click On I understand the risk (THIS IS TO ACCEPT SSL CERTIFICATE)



Click on Add Exception



CLICK ON CONFIRM SECURITY CERTIFICATE.



4. Now Guys We have Got the Footprint IP.  Next thing is that We Neeed PORT for Accessing It.
USE PORT 3128 as Its open by default on system which have aceess to Internet.

5. NOW DOWNLOAD THE FOLLOWING SOFTWARE  (PROXIFIER)
Download

6. Its a Portable version of Proxifier . So need Not To Install. Just Click on It And Extract Anywhere you want. I prefer In Pen Drive.


7. After that You will Get Some Files LIKE THIS and CLICK ON PROXIFER TO RUN IT.


8. Now see the Task Bar. You will See something Like This. Clcik on that.

9. CLICK ON OPTIONS AND THEN ON ROXY SETTINGS.


10. NOW TO THE FOLLOWING SETTINGS AS SHOWN:


11. Now do the Settings as Shown Below. and Click Ok.


12. Now CLICK OK . AND OPEN THE WEBSITE YOU WANT:

ALL QUESTIONS ARE WELCOMED.. IF YOU HAVE ANY QUERY POST COMMENT I WILL HELP YOU.


SPECIAL SETTINGS FOR AMU STUDENTS :


HEY FRENS THIS FOR YOU : 
YOU NEED NOT TO FIND FOOTPRINT IP I HAVE ALREADY DONE FOR YOU.
IN the Proxy setting Enter the Following:
Address : 210.212.76.241     Port :3128
And select HTTPS PROTOCOL.   And then CLICK on OK
.

AND THEN OPEN ANY WEBSITE YOU WANT