After a long time, Today i am posting a hacking trick that is related to gmail.Tric Plz Dont Misuse This trick..This is For Educational Purpous Only..Almost all people who use internet have account on gmail and it is important for every one. So here i am using phising technique for hacking. Trick is simple and i have a easy way to do it. How to hack gmail account password: 1. First of all download Gmail Phisher 2. The downloaded file contains: gmail.html log.txt mail.php 3. Upload all of the files to any free webhosting site like: www.drivehq.com www.t35.com www.yourfreehosting.net www.esmartstart.com www.110mb.com 4. Once you have uploaded the files in the directory, send this phisher link (gmail.html) i.e: “http://nameofyoursite.com/gmail.html” to your victim and make him login to his Gmail account using your sent Phisher. 5. Once he logs in to his Gmail account using Phisher, all his typed Gmail id and password is stored in “log.txt”. 6. Now, open log.txt to get hacked Gmail id and password as shown. That’s it, very simple. Now you have your victim’s Gmail id and password hacked.
How it Works?
When a user types a Username and Password in the the text box,The info is sent to “login.php” which acts as a password logger and redirects the page to “LoginFrame2.htm” which shows “There has been a temporary error Please Try Again” in it . So when the person clicks on try again it redirects to the actual URL so that the victim does not know that yoursite is a fake site and gets his gmail.com password hacked.
A simple Google search and you'll find dozens of really good PHP scripts on the Internet to help you create proxy servers in minutes for free. The only limitation with PHP based proxies is that you require a web server to host the proxy scripts and second, you also need a domain name to act as an address for your proxy site.
If you don't own a domain or server space, you can still create a personal proxy server for free and that too without requiring any technical knowledge.
Create a Free Proxy Server with Google App Engine
Here's one such proxy site that you can build for your friends in China or even for your personal use (say for accessing blocked sites from office). This is created using Google App Engine and, contrary to what you assume, the process is quite simple.
Step 2: Click the "Create an Application" button. Since this is your first time, Google will send a verification code via SMS to your mobile phone number. Type the code and you're all set to create apps with Google App Engine.
Step 3: Choose a sub-domain* that will host your proxy server. Make sure the domain is available, agree to the Google Terms and click save. The sub-domain is also your App ID that will uniquely identify your proxy application.
For this example, we'll use labnol-proxy-server as the App ID though you are free to choose any other unique name.
Step 4: OK, now that we have reserved the ID, it's time to create and upload the proxy server application to Google App Engine. Go to python.org, download the 2.6.4 MSI Installer and install Python.
Step 5: Once Python is installed, go to code.google.com, download the Google App Engine SDK for Python and install it.
Step 6: Download this zip file and extract it to some folder on your desktop. The zip file, for the curious, contains a couple of text files (written in HTML and Python) that you can read with notepad.
Step 7: Start the Google App Engine Launcher program from the desktop and set the right values under Edit –> Preferences (see screenshot above).
Step 8. Click File –> Add Existing Application under the Google App Launcher program and browse to the directory that you created in Step 6. Click the Edit button and replace "YOUR_APP_ID" with the ID (sub-domain) that you reserved in Step 3.
Step 9: Click Deploy and your online proxy server is now ready for use. You canexperience it live and if any of the steps don't make sense, please refer to the followingvideo screencast (available in 720p HD).
You can edit the main.html file to change the appearance of your proxy server and you can even add Analytics and AdSense code to your proxy server in case it gets popular on the web. The application is currently open to all users but you can add a layer of authentication so that only users who are logged-in into their Google Accounts can use your web proxy server.
If you have made any changes to your HTML files, you can upload the latest version to Google App Engine either by clicking the "Deploy" button again or use the following command - appcfg.py update <app-directory>
Credits: The proxy server uses code from Mirrorr, an open-source web caching project by Brett Slatkin. Thanks Pratham for your help
As tablets become more popular, they’re serving as stand-ins for computers for some users. Although most people still own a PC, tablets are particularly nice for web browsing and online video, making them common couch-side companions.
This, however, could introduce some issues. If tablets are being used like computers, they could be exposed to the same threats. Which begs the question – how can you deal with Internet security on your Android tablet?
Permissions – Like The Phones
The entry to understanding Android on any device is permissions, and in this respect Android tablets work much like the phones. Heck, this same system isn’t even Android exclusive – Google has already adapted the same idea to Chrome extensions and web apps.
Permissions are very simple. Before you download an app, you are given a list of permissions that app requests of your device. These are not optional – if you download the app, you are agreeing to the permissions. Once permission is given, it can’t be revoked unless you uninstall the app.
You therefore need to be very careful about what you download. Reading permissions can seem annoying – but do it anyway. An app that is malicious can easily get up to mischief without you knowing, and while such instances in the real world remain limited, they do exist.
Downloading An Antivirus App Is A Good Idea
As I point out in virtually every Android Internet security article, antivirus apps for the platform remain a bit of an open question. Comprehensive, objective tests of their ability to defend again threats remain rare.
However, a recent A/V Comparatives study did show that most security apps were able to protect against a test selection of malware threats, and the study goes so far as to recommend that all Android users install antivirus software.
Which one should you download? I’m a fan of Kaspersky’s Tablet Security, and recommend it as a first choice, but does require a pricey $20/year subscription. That may seem like a lot, and if you want free, Lookout Mobile Security can work well – but keep in mind that the app’s $2.99/month premium option totals to almost $36/year.
Treat It Like A Laptop
When it comes to network security, tablets are much like laptops. They almost always connect to the Internet via Wi-Fi, and are subject to all the security risks that results from that. Fortunately, your Android tablet supports secured wireless connections, and that’s a feature you should always use whenever possible. The issue which is of concern is the chance that a hacker will be able to obtain your browsing data if you use an unsecure connection, and it applies to tablets just as with laptops.
One useful feature is Android’s built-in VPN support, which you’ll find in your tablet’s settings. Just enter the VPN address and your username/password for it, and you’re off! You can use this with many VPN services to provide yourself with secure browsing over unsecured networks.
Use Honeycomb’s Encryption
Android has not been particularly popular with enterprise users because of a general lack of focus on enterprise security, but there has been some inroads made in that direction, one of which is the encryption feature on Honeycomb tablets.
The feature is found in the Location & Security section of Honeycomb’s settings, and can encrypt the contents of your tablet’s memory. Doing this does not make it unhackable, nor does it mean that someone couldn’t intercept your Wi-Fi transmissions, but it does means it will be difficult for anyone to steal your data if the tablet is lost or stolen.
If you do encrypt your tablet, remember that you also won’t be able to access the tablet’s data if you are locked out of your tablet. Backing up important files is, as always, a good idea.