ComRȁde PyRate

Wednesday 26 November 2014

All Sim Database 2013,2014 Free Download Warid , Jazz , Ufone , Zong , Telenor On Mediafire With Small Size, All Link Work Fine....


Warid , Ufone , Zong , Telenor , Jazz Kisi Be Number Ki Detail Nikalo 
All Sims Data Base All Parts Download On Mediafre With Small Size Part Each Part Is Just 190 MB  Free Download Here All Parts With PasswordHow To Use:
 Download All Parts And Extract Him Then Install  VMware To Open It And Enjoy...

If any problem contact on facebook  

Click The Part Number And Download It


                                                    Part 1


                                                    Part 2


                                                    Part 3


                                                    Part 4


                                                    Part 5


                                                    Part 6


                                                    Part 7


                                                    Part 8


                                                    Part 9


                                                    Part 10


                                                    Part 11


                                                    Part 12


                                                    Part 13


                                                    Part 14


                                                    Part 15


                                                    part 16


                                                    Part 17


                                                    part 18


                                                    Part 19


                                                    Part 20


                                                    Part 21


                                                    Part 22


                                                    Part 23


                                                    Part 24


                                                    Part 25


                                                    Part 26


                                                    Part 27


                                                    Part 28


                                                    Part 29


                                                     Part 30


                                                     Part 31


                                                     Part 32


                                                     Part 33


                                                     Part 34


                                                     Part 35


                                                     Part 36


                                                     Part 37


                                                     Part 38


                                                     Part 39


                                                     Part 40


                                                     Part 41


                                                     Part 42


                                                     Part 43


                              
Click Here To Password Download


                                           Download Password

Tuesday 25 November 2014

How to unlock your Samsung Galaxy after Too many pattern Attempts or Forgotten Password

So you finally did it, you locked yourself out of your Samsung Galaxy. You knew you should have used a simple pattern or a password you could remember easily. So what do you do now?, nothing works and you need to use your phone again. The worst thing is you did not associate a
Google account at the first sign in and that option of regaining access to your device has failed.
Well you have come to the right place we have the solution you need.



What will this Fix DO?


Note this method will allow you full access to your Samsung Galaxy after too many pattern attempts or aforgotten password, however this hard reset will wipe the phone clean, so all data on the phones internal memory will be wiped. The contents of your SD card and  SIM card will however remain intact. This will not damage or hinder the functionality of the device in any way.





Which Devices will this work on?

Now this fix will work on all Samsung Galaxy smart phones including the: Samsung Galaxy S3 and theGalaxy Y and many other variants of the galaxy line.

We will be using the Samsung Galaxy Y to demonstrate the procedure,but remember this works with other Galaxy devices as well.

How to Unlock the Samsung Galaxy After too many pattern attempts or forgotten password.

1. Power down the device.

2. Hold down the: up volume key,the home button and the power button all at the same time.
The device should power on into the Recovery  mode shown below:
Recovery Mode


3.Using the home button to select and the volume up and down to navigate either up or down select the third option as shown above which says : Wipe Data/Factory Reset.


4. You should now see the following recovery screen:


Select Yes-Delete all user to wipe all data on the device. Allow the device to do its thing and finally when it gives the options again-  Reboot.





5. That's it the device will boot up similar to the first time you bought it, simply configure it and the device should boot up and not ask for the password.
Be sure to leave a comment if this was helpful and solved your problem.
Enjoy Guys! and don't forget to post your comments. © Comrade Pyrate

Ghost keyboard Typing – Notepad Tricks

 
Hey guys , Today I am going to share with you a Short but Cool Notepad Trick. People Use notepad to type  and save some important or regular  information, But very less people know that there is much more that we can do  with Notepad.

What if i say that we can make Notepad to type automatically what ever we wish to…. Unreal ? Yes it is possible and you will be doing it by yourself in just a few moments.You can show it to your friends and surprise them. Basically it is a prank that you can do with anyone just for fun.
This Process is Also known as ” Ghost Keyboard Typing ” Because you dont even touch your keyboard and words starts displaying in your notepad automatically, When you show this to your friend or anyone else, they will be excited to learn this from you as well.

Notepad trick to Type Automatically


Step 1: Right click on your desktop and select create new text document or simply open notepad.
Step 2: Exactly Copy the code given below and Paste it in notepad document that you have just created.

set wshshell = wscript.CreateObject(“wScript.Shell”)
wshshell.run “Notepad”
wscript.sleep 400
wshshell.sendkeys “S”
wscript.sleep 100
wshshell.sendkeys “M”
wscript.sleep 120
wshshell.sendkeys “A”
wscript.sleep 200
wshshell.sendkeys “R”
wscript.sleep 100
wshshell.sendkeys “T”
wscript.sleep 140
wshshell.sendkeys “T”
wscript.sleep 100
wshshell.sendkeys “R”
wscript.sleep 50
wshshell.sendkeys “I”
wscript.sleep 120
wshshell.sendkeys “C”
wscript.sleep 170
wshshell.sendkeys “K”
wscript.sleep 100
wshshell.sendkeys “S”
wscript.sleep 50
wshshell.sendkeys “.”
wscript.sleep 120
wshshell.sendkeys “N”
wscript.sleep 160
wshshell.sendkeys “E”
wscript.sleep 200
wshshell.sendkeys “T”
wscript.sleep 100
Step 3: Save the above code in Notepad file As ” smarttricks.vbs ” (Without Quotes ) but make sure  While saving this file select Save as type  “All files” and extension must be .vbs
Step 4: Now double click on The saved File, You will see “SMARTTRICKS.NET ” will be typed  Automatically, This is one of the Most awesome Notepad Trick that You learned today. Moreover  you can edit the Words In the above given Code with any desired words you want Notepad to type for you. e.g. : MY FRIEND READING THIS IS FOOL..vb

IMPORTANT !!!
While Double Clicking on the saved file if you see an error box like ” line 1 ” and “Char 37” Then dont worry, Right click on smarttricks.vbs and click on edit,
Now delete all Double quotations ie : ”  and Type them all manullay from your keyboard, save it and now you will have no errors.

Enjoy Guys! and don't forget to post your comments. © Comrade Pyrate

Shellshock attacks against SMTP servers

Shellshock attacks against SMTP servers


Reports are emerging from various sources that many of the SMTP servers has been attacked by the Shellshock bug. Cyber hackers are taking advantage of the Shellshock bug and exploiting the vulnerabilities against certain SMTP servers.The campaign seeks to create an IRC botnet for DDOS attacks and other purposes.

Its going to be a month that Shellshock vulnerability was public and it is also being says that Shellshock is the worst then the Heartbleed vulnerability.  After the public release of the Shellshock bug many of the firms and organisation have patch the vulnerabilities but there are still tonnes of the servers which are vulnerable to the Shellshock bug.

Shellshock bug was located in the Bash shell of the Linux operating system which was resides for 20 years. It was deployed on the configuration which makes the bug severity critical and was also easy to exploit.

Hackers are targetting SMTP server because the mail server are often left untouched (outdated or little concerns) for a long time.

Monday 24 November 2014

6 Most Common Password Cracking Methods And Their Countermeasures

  There are number of methods out their used by hackers to hack your account  or get your personal information. Today in this post i will share with you guys 6 Most commonly used method to crack  password and their countermeasures. You must check out this article to be safe and to prevent your online accounts  from hacking.

1. BruteForce Attack

Any password can be cracked  using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.
C Solution: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iambest" or "password" can be cracked easily whereas computer will take years to crack passwords  like "a+94lL0!0"


2. Social Engineering

Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.
C Solution: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.


3. Rats And Keyloggers

In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.
C Solution: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. Check out below article to know more about Rats and Keyloggers.

4. Phishing


Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.
C Solution: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct. Check out below article to know more about phishing.

5. Rainbow Table


A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords. 
Example: ‘hello’ in md5 is 5d41402abc4b2a76b9719d911017c592 and zero length string ("") is d41d8cd98f00b204e9800998ecf8427e
 
C Solution: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources


6. Guessing

This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password.
  C Solution: Don't use your name, surname. phone number or birth date as your password. Try to avoid creating password that relates to you. Create complex and long password with combination of letters and numbers.

Update

Get updates tips & tricks about hacking.