Arcane Network | |
| |
| |
Navigation | |
| |
| |
Login | |
| |
| |
Search | |
| |
| |
Your IP | |
| |
| |
Entries archive | |
| |
| |
Keep Visiting | |
| |
| |
|
Friday, 2024-05-10, 1:37 PM
|
ARCANE |
Welcome Guest |
|
|
|
Arcane Blog & Videos |
|
|
Main » 2009 » September » 24
We at Arcane are always intended to provide you with best services. So we have just started our E-mail Spoofing Service. You can use the service by clicking the Arcane E-Mail Spoofing Service link in the navigation panel. If you do not know what spoofing is then here it is>> E-mail spoofing is a term used to describe (usually
fraudulent) e-mail activity in which the sender address and other parts
of the e-mail header are altered to appear as though the e-mail
originated from a different source. E-mail spoofing is a technique
commonly used for spam e-mail and phishing to hide the origin of an e-mail message. By changing certain properties of the e-mail, such as the From, Return-Path and Reply-To
fields (which can be found in the message header), ill-intentioned
users can make the e-mail appear to be from someone other than the
actual sender. The result is that, although the e-mail appears to come
from the address indicated in the From field (found in the e-mail headers) it ac
...
Read more »
|
We have Just set up a new IRC Chat Server in our site. Now you can chat with us and other arcane users by just clicking the IRC Chat Server Link in the navigation panel or visit this link http://www.arcane.ucoz.com/index/arcane_irc_chat_server/0-5 >>You need to have Java Runtime environment installed in your Computer in order to chatt. So now, you can ask us questions directly or just chat with others. So Enjoy!!!!!!!!!
|
Here are a few Hacker Quotations I pulled off the web:- Are hackers a threat? The degree of threat presented
by any conduct, whether legal or illegal, depends on the actions and
intent of the individual and the harm they cause.
Kevin Mitnick
Berkeley hackers liked to see themselves as rebels against soulless corporate empires.
Eric S. Raymond
For the first time, individual hackers could afford
to have home machines comparable in power and storage capacity to the
minicomputers of ten years earlier - Unix engines capable of supporting
a full development environment and talking to the Internet.
Eric S. Raymond
I seem to be getting a lot of things pushed my way
that are strong women. It's like people see Hackers and they send me
offers to play tough women with guns, the kind who wear no bra and a
little tank top. I'd like to play strong women who are also very
feminine.
<
...
Read more »
|
As
we all know, Windows stores most of the passwords which are used on a
daily basis, including instant messenger passwords such as MSN,
Yahoo, AOL, Windows messenger etc. Along with these, Windows also
stores passwords of Outlook Express, SMTP, POP, FTP accounts and
auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passswords from their
stored places. Using these tools and an USB pendrive you can
create your own rootkit to sniff passwords from any computer. We
need the following tools to create our rootkit.
MessenPass: Recovers
the passwords of most popular Instant Messenger programs: MSN
Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL
Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers
the passwords of the following email programs: Outlook Express,
Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook
2002/2003 (POP3, IMAP, HTTP
...
Read more »
|
DOS Mode rendition of STAR WARS
You can acess it by linking to the blinkenights server.You just have to access it by typing this code!!
Just click START and go to run and then type "telnet towel.blinkenlights.nl"in the dialog box and run it.You will get a DOS Mode rendition of the popular 1977 science fiction movie STAR WARS!!!
|
DESIGNING A FUNKY VIRUS!!
Whenever the word computer virus comes to find our mind we usually fear it and the thoughts of those PC crashes, those Blue Screen of Deaths comes to our mind but have you ever wondered that you could develop a virus or a rather virus appearing file to fool your friends or colleagues to see their tense faces as they restart their PCs only to know everything is okay. I am back with a funky trick to do so & promise there is no rocket science involved.Let’s begin, please follow the steps to successfully design your funky virus. Make sure you do this on your friends PC and he is not behind your back or you may get a kick in your a**.
...
Read more »
|
Indeed the best things in life are free.I am recently come across this open source software called Extension Changer.It is a small and simple program that can change the extension of multiple files in one go. Just drag and drop the file into the form or choose the new right-click option in the Windows Explorer context menu.This is a very useful program which can easily edit the extensions of many files.This can be used to repair files with unknown extensions and also hide files with confidential data.Suppose you want to prevent someone from accessing a .txt document.You can change the extension .txt to .jpeg ie. rendering the file inaccessible and corrupt unless the extension is corrected.The best thing about this program is that its completely open source and very lightweight.Here's the download link:-- http://www.topshareware.com/Extension-Changer-download-17380.htm
|
>VLC media player-useful for playing almost any video and audio format >CCleaner-a lightweight tool for registry repair and system cleanup >utorrent-arguably the most lightweight and useful bit torrent client out there! >Riva Tuner-a useful overclocking tool for pc gamers and animation enthusiasts alike >Firefox or Opera-better,faster,cleaner, and less of a memory hog than internet explorer! >Winamp-a great music player with a lot of customisations >Real Player 11-offers one-click downloads for videos on the web,but only works with FF2 and IE. >Open Office-If u hate microsoft,or if u dun wanna spend on buying msOffice ,then this is the choice! >Total video convertor-A very useful convertor which produces very high quality results >Adobe Flash Player-a vital tool required to play almost any online videos >Daemon Tools-required for mounting disc image files by creating virtual drives >Nero-arguably one of the most popular burning software. >Winrar-requir
...
Read more »
|
Guys I won't be available from 24th September to 4th October as I am going on a vacation. Till then my moderator CGB will maintain the site!!
|
This is the very first video of full xposure,a show dedicated to bring all the latest techniques of hacking.Brought to you by www.devilzdenbiz.co.nr
|
As you guys know we had a previous site named devilzdenbiz, it was our first establishment, but now we do not update it anymore although it exists at http://sites.google.com/site/devilzdenbiz/. We did make a few videos when we were at devilzdenbiz. So i am just posting the videos. Plzz check it out!!!
|
|
|
|
|
|
|
|