How to Install Corel Draw X7

Corel Draw Graphics Suite ,with a fresh look, new must-have tools and major feature enhancements, Corel Draw Graphics Suite X7.5 opens up a world of new creative possibilities. We’ve designed several new workspaces that reflect your natural workflow, so that everything is right where you need it, when you need it. Whether you’re creating graphics and layouts, editing photos or designing websites, this complete suite of graphic design software helps you design your way.


How to Install?

  1. Download and extract files
  2. Install Corel Draw Graphics Suite X7.5 (Trial)
  3. Block your internet connection
  4. Start Corel Draw , In Help Menu Click on Sign In
    another window will open click on Already Purchased (bottom)
  5. Use XFORCE to generate your serial and choose offline activation
  6. Copy Your Installation Code into XF keygen and generate your Activation Code
    Copy it back into Corel Activation Window
Screenshots

Minimum System Requirements

  • Microsoft Windows 8/8.1 (64-bit editions), Windows 7 (64-bit editions), all with latest service packs installed
  • Intel Core 2 Duo or AMD Athlon 64
  • 2 GB RAM
  • 1 GB hard disk space (for installation without content)
  • Mouse, tablet or multi-touch screen
  • 1280 x 768 screen resolution
  • DVD drive (required for box installation)
  • Microsoft Internet Explorer 8 or higher
  • Download Corel Draw X7 - Click Here

  • Learn How to Install Corel Draw X7 - Click Here

  • Learn How to Download Anything from uTorrent - Click Here

Read More...

Key-logger and trick to get protect yourself

What is KEYLOGGER & How to get Protected 
In this tutorial we will talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. A keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard.so will tslk about different types of keylogger and how to be safe from keyloggers. So lets learn something about keyloggers.

1. What is Keylogger ?

You might have heard about keyloggers but really don't know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their children or company owner to spy on their employees.

2. How it can harm you ?

In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.

  • Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.
3. Types of  Keyloggers 

There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.

                              HARDWARE KEYLOGGER                                  hardware keyloggers

 SOFTWARE KEYLOGGER
 software keyloggers
                               
4. How to Protect yourself from Keyloggers ?

Keylogger can be used by your enemy  to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
  • Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
  • You can even use above method to protect your Facebook profile, Yahoo or Gmail id.
  • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.
Feel free to share it with us in the comment section below.

Read More...

Bypass Windows Login Password with Trinity Rescue Kit | Hacking Is Magic

Trinity Rescue Kit (Click Here to Download) is use for to bypass the Login of windows platform windows 7, XP 2, XP 3 and all. Most systems that use a password authentication mechanism need to store these passwords ( or their hashes ) locally on the machine. This is true for Operation system  (Windows ,Linux,Cisco IOS) Network hardware ( Router, Switches) etc. Windows Stores local usernames in the SAM database ( Security Accounts Manager ) , as well as in other places .   
     The SAM file can be found in %SYSTEMROOT%\system32\config and is inaccessible for reading,copying or writing while Windows is running .  A backup copy of the SAM can usually be found in %SYSTEMROOT%\repairs. This file is not locked by the OS and can be accessed given sufficient privileges.

Step 1 :- Check the Username of Target Machine

(Click on Image for Larger Preview)

Username is Testing

Step 2 :- Boot the Trinity Rescue Kit CD or Bootable Pen Drive

(Click on Image for Larger Preview)

Step 3 :- After Booting Press default option (Run Trinity Rescue Kit Default)

(Click on Image for Larger Preview)

Step 4 :- Wait for Shell

(Click on Image for Larger Preview)

Step 5 :- Use command : winpass -u Username then Enter

Here my Username is Testing

Command:  winpass -u Testing

(Click on Image for Larger Preview)

Step 6 :- After command it ask to make for Choice there are Two options [q] -quit and [1] -contin

(Click on Image for Larger Preview)

Step 7 :- Now after Press 1 it will show again 5 more Options 

1. Clear    2. Edit    3. Promote Use    4. Unlock    5. Quit

Press 1. for Clear the SAM File

(Click on Image for Larger Preview)

Step 8 :- SAM file is clear now, Reboot & it will Automatically Starts the Windows 

(Click on Image for Larger Preview)

Step 8 :- Finally you Bypass the Login Successfully

(Click on Image for Larger Preview)

This Post is Submitted by Rahul Singh ( www.rmar.in )  |  Join him on Facebook 
Read More...

Hack Email using Web Jacking Method | Hacking Is Magic

Social engineering attacks are one of the top techniques used against networks today. Why spend days, weeks or even months trying to penetrate layers of network security when you can just trick a user into running a file that allows you full access to their machine and bypasses anti-virus, firewalls and many intrusion detection systems.

This is most commonly used in phishing attacks today -craft an e-mail, or create a fake website that tricks users into running a malicious file that creates a backdoor into their system. But as a security expert, how could you test this against your network? Would such an attack work, and how could you defend against it.

The Backtrack Linux penetration testing platform includes one of the most popular social engineering attack Tool-kits available.Backtrack 5′s SET includes a whole slew of new features. We will use SET to create a fake website that offers a backdoor program to any system that connects. So here goes…

How to Hack Email using Web Jacking Method

The web jacking attack method will create a website clone and present the victim with a link stating that the website has moved. This is a new feature to version 0.7. When you hover over the link, the URL will be presented with the real URL, not the attacker’s machine. So for example if you’re cloning Gmail.com, the URL when hovered over it would be Gmail.com. When the user clicks the moved link, Gmail opens and then is quickly replaced with your malicious webserver .

Recommended OS

Linux OS ( Backtrack

Step 1 :-

First open your Backtrack terminal and type ifconfig to check your IP.

(Click on Image for Larger Preview)

Step 2 :-

Now Open Social Engineering Toolkit (SET) . then click to Set

(Click on Image for Larger Preview)

Step 3 :-

Now choose option 1, “Social – Engineering Attacks”

Step 4 :-

Now choose option 2, “Website Attack Vectors

Step 5 :-

In this option we will select option 6 “Web Jacking Attack Method” 

(Click on Image for Larger Preview)

Step 6 :-

In this option we will choose option 2 “Site Cloner

(Click on Image for Larger Preview)

Step 7 :-

Now give the Attacker IP

(Click on Image for Larger Preview)

Step 8 :-

Enter the URL of the site you want to clone. In this case http://www.gmail.com and hit enter. SET will clone up the web site. And press return to continue.

(Click on Image for Larger Preview)

Step 9 :-

Now convert your URL into Google URL using goo.gl and send this link address to your victim via Email or Chat .

(Click on Image for Larger Preview)

Step 10 :-

When the victim goes to the site he/she will notice the link below, notice the bottom left URL, its gmail.com.

(Click on Image for Larger Preview)

Step 11 :-

When the user clicks the moved link, Gmail opens. then When put the user name or password it direct comes to Attacker machine.

(Click on Image for Larger Preview)


This Post is Submitted by Rahul Singh ( www.rmar.in )  |  Join him on Facebook 
Read More...