Thursday, October 20, 2011

Making a Bootable Windows 2000 CD with Service Pack Integrated

Service Packs in Windows 2000 have a new feature to integrate the service pack in the original installation folder (i386)
So when you install a Computer with a fresh copy of Windows 2000 it will be directly at the Service Pack level.
This feature is called slipstream. The Recovery Console isn't updated after installing a SP,  when installing the Recovery Console
from the slipstreamed i386 folder it will be updated.

Wow, that's great if you have an installation folder shared on the network, but what if you don't have a network?
Then you use a CD-R you made with the integrated i386 on it. One problem, it won't boot
Booting is a comfortable feature of the original Win2k CD, so you don't have to use the much slower multiple floppy boot process.
On this page are the instructions of making a bootable Win2k CD (Professional or server editions) with the integrated Service Pack and while your at it, you can add extra files, like drivers or Internet Explorer 6 setup files. With unattended scripts (winnt.sif) you could auto install this software.
see MS website

Microsoft Windows 2000 Professional These instructions should work on every version of Windows 2000 and every language.Microsoft Windows 2000 Server and Advanced Server
Microsoft Windows 2000 Datacenter ServerDatacenter was released after sp1 and so already has sp1 in it!
For SP2? Officially your are not able to use the update.exe to install or sliptream Datacenter to SP2 level.
MS restricted this cause applying a SP to a high end system like datacenter requires skills and can only be done by the engineers of the hardware vendor. So when you try you get the following error:
But Bink.nu is the first to publish a patched version of update.exe, which ignores the win2k datacenter check.!
Get sp2 here ,sp3 here and sp4 here (this is obviously completely unsupported by Microsoft or Bink.nu)
For sp3 hotfixes you need an patch version of hotfix.exe get that here

SP4 can be downloaded here (English version 129 MB)
For other languages go here
for the list of sp5 hotfixes see: Windows 2000 SP5

See MS KB about adding hotfixes using unattended scripts, which is not slipstreaming. New better article:

http://support.microsoft.com/default.aspx?scid=kb;EN-GB;q296723
Tecnet

 

Here is a document with an example unatended bootCD !!!

Windows XP is out, some get it on CD, some download it from MSDN (subscribers only) and some get it in another way. When you get it not on a CD you also have a boot problem, you can interpret the instructions below and make your Whistler bootable!
For booting to work you need Identifier files (see win2k instructions below)
So use the right files.
Go direct to How to make XP bootable
Microsoft Windows NT Workstation HomeResources for Deploying NT4 section at the bottom of the page!!

The Instructions
  • Though I've tested these instructions thoroughly, If you have a rewriter use rewriteable CD's to test this first! It can save you of wasting CD-r's
  • Because NERO os the most popular CD writing tool these instructions are now mad e for NERO.
    Get the latest NERO version from www.nero.com
  • The NERO reg file is not neccesairy anymore in latest version
  • Download the boot files here
    Scroll down to see how to extract the boot image yourself using a util
  • Create a folder "CD" on a drive with enough space (680 MB)    D:\CD-root
  • Note that screenshots are about sp3 but interpret them as sp4, will re-screenshot later :-)

  • Copy the the entire original Win2k CD to this folder, or at least the i386 folder, depending how much else you want to add to the CD.
  • Make sure you downloaded the correct language SP for your Windows 2000!!!
  • Extract the downloaded service pack to a folder (D:\sp4) using the command "w2ksp4.exe -x",
    or you can use the SP4 CD if you have that. The SP4 CD contains updated deployment tools, supporttools and documentation,
    In sp1 Advanced Terminal Server Client was added, this can be downloaded here

  • Now slipstream SP3 in to the original i386 folder by using the command "D:\win2kSP4\i386\UPDATE\UPDATE.EXE -S:D:\CD-root"
    You need to do this procedure on a Win2k computer, otherwise slipstreaming will generate errors.
    Note: I heard you can do these last 2 steps in 1 command! "d:\win2ksp4.exe -s:d:\cd-root"
    Note that you don't point it to D:\CD-root\i386!
    Note2: You can only execute this command on a win2k/xp/.net system!
    Note3: The install files need to be in a folder called i386


slipstream is in progress, wait till:
 
Slipstreaming sp5 hotfixes?
Now it is possible:
See details here from MS on how to do that.

Another source on slipsteraming anything

  • Bootfiles:
    Extract the downloaded bootfiles.zip to a temporary folder:
    w2kboot.bin CD bootsector
    CDROM_NT.5 NT5 CD Identifier file
    CDROM_IP.5 Professional CD Identifier file
    CDROM_IS.5 Server CD Identifier file
    CDROM_IA.5 Advanced Server CD Identifier File
    CDROM_ID.5 Datacenter CD Identifier File
    CDROM_SP.TST Service Pack1 CD Identifier File
    CDROMSP2.TST Service Pack2 CD Identifier File
    CDROMSP3.TST Service Pack3 CD Identifier File
    CDROMSP4.TST * Service Pack4 CD Identifier File *
       
       
    Depending of which edition af Win2k edition you want to burn you choose the CDROM-Ix.5 Identifier file
    Where x is the edition of Windows 2000 (See above table)
    On every CD you need the CDROM_NT.5 file and because the Service Pack is integrated in the i386 folder
    you also add a CDROMSP?.TST file. depending on your sp level

     (CDROM_SP.TST if you are making a SP1 CD!!!)
    This file may already be there after the slipstream process.
    All the identifier files need to be in the root of your CD, so copy it to D:\CD-root
     

    * The cdromsp4.tst is not in the zipfile, but don't panic! The file is placed in the root of your CD patch by the slipstream process, it is also in the extracted SP4 location in the folder root!
    Note! Be sure only one "CDROM_Ix.5" file is in the root, otherwise booting will fail!!
    Check this step! I get a lot of people mailing me because about the CD asking "put the SPx CD into drive A:"
    This is because they forgot to put a CDROMSPx.TST file in the root.


  • Now it's the time to add extra files like drivers and setupfiles of IE6sp1, Media Payer9. This way you fill up your CD with the software you want!
    I put in in a folder named Extra, but you can name it anything you want.
    To add more to the CD you can remove some folders which were copied from original CD, just make sure the i386 folder stays intact, though you can delete the contents of the "LANG" folder in the i386 if you don't use Chinese, Korean or Arabic languages, saves 65 MB ! Leave the folder there, just empty it!

    The extra software won't install by it self you need to use unattended scripts (winnt.sif) to auto install this software.
    This is rather complicated but links will follow later
    see MS website for more info.

  • I even copied the content of the service pack3 files to the i386 folder
    so that I can use this CD to update existing win2k machines to Service Pack 4, just like an original sp4 CD that you can get from MS.
    Caution! don't overwrite files and folders in i386 folder.


  • You can install SP2/sp3/sp4 using windows Installer or distribute it using Group Policies! In SP2/sp3/sp4 the MSI file is standard in the update folder, for SP1 you can download it here and extract the MSI file and place it in the folder D:\CD\i386\update.
  • Get rid of the annoying product key prompt! Go to the your created i386 folder and find the setupp.ini file, remove the read-only attribute and open the file in notepad. Only use this if you have a licensed copy of Windows 2000.
    Mine looks like this:
[Pid]
ExtraData=646E77637A6F6D79626A1D94089595
Pid=51873000

Change the last 3 digits of the Pid number to 270
Now it looks like this:

[Pid]
ExtraData=646E77637A6F6D79626A1D94089595
Pid=51873270

Note: This works on my MSDN version of Win2k If you get an error during windows setup about the product ID try using the exactly the same setupp.ini as mine and use my Volume label (later on this page).
Some visitors mailed me that this trick didn't work for them, so no guarantee!


Now start NERO in full version (not express) and click new then select CD-rom (Boot)



Choose image file and browse to the w2kboot.bin file where you extracted it from the bootfiles.zip (in browse window set filter to all file (*.*)

Check "Enable expert settings
Set to "No Emulation"
Leave Boot message
Leave "load segment
SET "Number of loaded sectors" to 4 !!!
 

don't forget this last setting otherwise booting will fail!!!

Now go to TAB ISO:

 Set everything as in the picture. except the Caracter set, experience shows that choosing DOS is better.
ISO 9660 may cause problems with longfilenames and copying from CD in DOS and win9x

Important to set the "Do not add the ';1' ISO file version extension" !!!!
Otherwise booting will fail







Now goto TAB "Label"
Set Volume Label as you wish.
You also may  leave it the same as your original CD.
My MSDN win2k CD's have these labels:

Professional           W2PFPP_EN
Server                     W2SFPP_EN
Advanced Server    W2AFPP_EN
DataCenter              
W2DFPP_EN
The rest may be ignored


        
        
   

   


Now press the "New" button
Go with the file browser to d:\cd-root and select all the folders and files in it. Now drag them to the other window "ISO1"

When done press the Burn button


Set theses settings

click write!







Burn baby burn !!!


You're done !  Now try it out !
If booting fails make sure your BIOS is set to boot from CD first, if the booting gives an error, try booting at lower speed.

How to extract the win2k boot-image (new Tool!)

There is a new util that can get the any bootsector from bootable CD's!
Get it here, free! http://www.nu2.nu/bbie/
 ISObuster, WinISO are GUI tools that also can do this

Microsoft Windows NT Server HomeResources for DeployingMicrosoft Windows NT Workstation HomeResources for DeployingMicrosoft Windows NT Server Terminal Server Edition Home
NT4: To Boot or not to Boot
Want to make custom NT4 boot CD, get the NT4 bootsector-file, get identifier files from original NT4 CD-rom.
Or better use the win2kboot file and when you boot your NT4 CD you get the choice to boot or not!

You need a extra Win2k file in your NT4 i386 folder to get this trick to work! Get the bootfix.bin from the i386 folder on the Win2k CD.
 

This is cool cause everyone has experiences rebooting an NT4 box with the NT4 CD still in the drive, few minutes later you'll find you NT4 box in setup. This is more inconvenient if you remotely rebooted your NT4 box!
Extra TIP! after installing your servers change the BIOS settings of the server only to boot from the hard drive and not floppy or CD-rom. Then you won't have the surprise of remotely rebooting a machine from your home to solve a problem  and discover it won't come up, after driving to the office on your free Sunday you find a floppy in the drive.....
Windows NT 4.0 Service Pack 6
NT 4 Enterprise Edition is a double CD, but you can make it one by creating your custom boot enterprise CD:
Remove the install files of the CPU type you'll never use, in most cases just leave the install files of i386.
Now you have space to fill with the second CD and an unpacked Service Pack6!

Microsoft Windows Embedded HomeCan't help you on this one, but now I have all the Logo's ;-)

Soon:Microsoft Windows 95 HomeMicrosoft Windows 98 HomeMicrosoft Windows ME Home

Wednesday, October 12, 2011

How to Reinstall Microsoft Forefront Threat Management Gateway on Windows Essential Business Server Security Server


INTRODUCTION

This article describes how to reinstall Microsoft® Forefront™ Threat Management Gateway, Medium Business Edition on Windows® Essential Business Server Security Server.  This may be necessary as a last-effort troubleshooting step or to repair a damaged installation of Forefront TMG.  The steps in this article will, of course, cause loss of network connectivity until Forefront TMG is reinstalled and reconfigured.
Important: Before using these steps, it is recommended that you make a complete backup of the Security Server.
There are four steps to uninstalling and reinstalling TMG on EBS:
    1. Backup the existing firewall settings 2. Uninstall Forefront TMG from Security Server 3. Install Forefront TMG on Security Server 4. Restore the Forefront TMG firewall configuration

Backup the existing firewall settings

To save network firewall settings to an XML file
  1. Click Start, click All Programs, click Windows Essential Business Server, and then clickWindows Essential Business Server Administration Console.
  2. Click the Security tab, and in the results pane, click Network firewall. In the tasks pane, clickSave firewall settings.
    clip_image002[19]
  3. In the Save as dialog box, choose a name and a location for the XML file that will contain the current configuration settings for the network firewall. Click Save to begin.
  4. Click Close on the “the settings were successfully saved” dialog when it appears.

Uninstall Forefront TMG from Security Server

To uninstall Forefront TMG from the server, follow these steps:
  1. From Control Panel open Programs and Features on the Security Server
  2. Highlight “Microsoft Forefront Threat Management Gateway” and click on Uninstall/Change
    clip_image002[5]  
  3. The next screen gives the option to either remove or repair Forefront TMG from the server. Select the option to Remove and select next.  
    clip_image002[7]  
  4. Select whether you would like to retain the existing log files and cache files on the server. If you want to remove the files, do not check anything. If you wish to retain them, check both the options and select next.
     clip_image002[9]  
  5. The installation wizard will proceed with the removal of TMG from the server. Uninstalling TMG from Programs and Features also removes its LDS instance (ISASTGCTRL).
     clip_image002  
  6. Reboot the server when prompted.
Reinstall Forefront TMG on Security Server
Forefront TMG can be reinstalled using the following steps:
  1. Navigate to the following location on the Security Server
    •           %ProgramFiles%\Windows Essential Business Server\Bin\ISA
  2. Double-click on ISAAutorun.exe to start TMG setup. 
    clip_image002[11]  
  3. On the “Microsoft Forefront TMG Setup” screen, click on “Install Forefront TMG”. 
    clip_image002[13]  
  4. Select “Install Forefront Threat Management Gateway” and click on next.
  5. Accept the defaults on the Component Selection screen and click next. 
    clip_image002[15]  
  6. On the Internal Network screen use these steps to configure your network settings:
    1. Click on Add
    2. In the “Addresses” window that comes up next, click on “Add Adapter”.
    3. Select the network adapter for your internal network and click OK, then OK again.     
      clip_image002[17]  
    4. Once you are back to the “Internal Network” screen, click next.
  7. Click Next to acknowledge the “Setup will restart these services on the server: SNMP Service, IIS Admin Service, World Wide Web Publishing Service and Microsoft Operations Manager Service” message.
  8. Click “Install” to begin the setup of Forefront TMG on the server.
After installation has completed and Forefront TMG console is launched for the first time, the TMG console will launch the Getting Started Wizard.
Before proceeding to restore the settings, click on “Close” at the “Getting started wizard” screen. This brings up a confirmation window, asking “Are you sure you want to close the Getting Started Wizard?” Uncheck the box against “Automatically launch the wizard the next time the Forefront TMG Management console is launched” and click Yes.

Restore the Forefront TMG Settings

To restore the settings previously backed up before uninstalling Forefront TMG, use the following steps:
1. Launch the Essential Business Server Administration Console.
2. Click the Security tab, and then click on Network firewall. In the tasks pane, click Apply Saved Settings.
3. In the Open dialog box, choose the name and the location of the XML file saved in the “Backup the existing firewall settings” section of this article. Click Open to apply the settings.
4. Once the settings have been committed, a “the network firewall settings were applied successfully” dialog will appear. Click Close to dismiss the dialog.
If you were unable to back up your most recent settings before uninstalling Forefront TMG, you can restore TMG to the settings configured during the EBS installation using these steps:
%ProgramFiles%\Windows Essential Business Server\Data
1. Launch the Windows® Essential Business Server Administration Console on the Management server
2. Click on the Security tab
3. Highlight Network Firewall and click on Restore Default Network Firewall Settings under Network Firewall Tasks. 
clip_image002[21]

4. In the resulting dialog, click Yes to restore the default settings.
5. Click close to dismiss the “Default network firewall settings were successfully restored” dialog.

Exchange Certificate Expiration in EBS 2008


This post has been re-written on 8/25/2011 to cover a wider range of scenarios that have been generating an increasing amount of traffic recently.
The EBS 2008 Messaging Server is installed with two Exchange certificates; both are used for securing communication with the Security server. Specifically, one certificate is used by the Hub Transport role to secure EdgeSync communication with the Edge Transport Role and the other is for securing web communication between Forefront TMG and the Exchange virtual directories (this same certificate is also used for any application that uses port 443, such as OWA, Outlook Anywhere, TSGateway, and Remote Web Workplace).

Certificate Expiration Issues

The certificate used for Web traffic expires two years after its creation date. When it does, you will not be able to access resources such as OWA, ActiveSync, and RWW from the internet.
The certificate used for EdgeSync is valid for only one year from its creation date and you will start receiving warnings in Event Viewer once it expires:
Application
MSExchangeTransport
Error
12014
Microsoft Exchange couldn't find a certificate that contains the domain name Domain_Name in the personal store on the local computer. Therefore, it is unable to support the STARTTLS SMTP verb for the connector Default Server with a FQDN parameter of FQDN. If the connector's FQDN is not specified, the computer's FQDN is used. Verify the connector configuration and the installed certificates to make sure that there is a certificate with a domain name for that FQDN. If this certificate exists, run Enable-ExchangeCertificate -Services SMTP to make sure that the Microsoft Exchange Transport service has access to the certificate key.
Application
MSExchangeTransport
Warning
12015
An internal transport certificate expired.
NOTE: The certificate simply expiring will not cause EdgeSync or SMTP mail flow to stop working. You will just receive the above events and STARTTLS will be unavailable.

Recreating the Certificate

The following method should be used when either certificate has expired or has been accidentally deleted. This will fix both loss of web access and loss of mail flow between the Security and Messaging servers. Essentially we are replacing both certificates with single new one that will be valid for another 2 years. It will be issued by the trusted internal Certificate Authority while maintaining both original names to preserve certificate trust between the two servers.
Create the new certificate 
  1. On the Messaging Server, launch Exchange PowerShell as admin. 
  2. Run the following command to create a temporary directory for this process:
    md c:\EBSBlog 
  3. Run the following commands to collect the $ComputerName, $FQDN, $Date, and $FriendlyName values you will need:
    $ComputerName = gc env:computername
    $DnsDomain = gc env:userdnsdomain
    $FQDN = $ComputerName + “.” + $DnsDomain
    $Date = Get-Date –Format d 
    $FriendlyName = $Date + “ EBSBlogCert” 
  4. Run the following command to generate the new certificate request:
    New-ExchangeCertificate –GenerateRequest –Path c:\EBSBlog\NewEBSCert.req –DomainName $ComputerName, $FQDN –FriendlyName $FriendlyName 
  5. Run the following command to submit the request:
    CertReq –attrib “CertificateTemplate:WebServer” c:\EBSBlog\NewEBSCert.req 
  6. When prompted, select your internal Certificate Authority and save the resulting certificate with the name NewEBSCert.cer back to the c:\EBSBlog folder. 
  7. Run the following commands to import the certificate into Exchange and assign the necessary services:
    Import-ExchangeCertificate c:\EBSBlog\NewEBSCert.cer
    Get-ExchangeCertificate | Where {$_.FriendlyName –match $FriendlyName} | Enable-ExchangeCertificate –Services IIS,SMTP,POP,IMAP 
  8. Select Y to overwrite the existing default SMTP certificate.
If the original transport certificate had been deleted previously, it is expected that you will receive the following informational/warning message:

New-ExchangeCertificate : The internal transport certificate for the local server was corrupted or missing in Active Directory. The problem has been fixed. If you have existing Edge Subscriptions, you must subscribe all Edge Transport servers again by using the New-EdgeSubscription cmdlet in the Exchange Management Shell. 
Whether or not you receive this message, follow the steps below to recreate the Edge Subscription between the Hub role on Messaging and the Edge role on Security.
Recreate the Edge Subscription
From Security Server:
  1. Open Exchange PowerShell as administrator and run the following commands:
    md c:\EBSBlog
    New-EdgeSubscription –FileName c:\EBSBlog\new.xml 
  2. Choose Yes to confirm.

    From Messaging Server: 
  3. Copy the xml file from the Security server to the c:\EBSBlog folder on the Messaging server and run the following command:
    New-EdgeSubscription –FileName c:\EBSBlog\new.xml –Site Default-First-Site-Name 
  4. Wait between 5 and 15 minutes, then test EdgeSync by running the following command to ensure that it’s working properly:
    Test-EdgeSynchronization
    clip_image001[1]
Once all entries say Synchronized, mail flow should be restored. If you are still having issues, you may want to contact Microsoft Product Support Services for assistance.

More Information

Missing Certificate
We often find that customers discover the expiration on their web certificate before they realize that their EdgeSync certificate has expired, since only the web certificate expiration will cause major functionality loss. We also find that many times customers are unintentionally removing the old certificates improperly during the course of troubleshooting, which can then break both inbound and outbound mailflow as well. In this circumstance, you may receive errors such as the following:
Application
MSExchangeTransport
Warning
12023
Microsoft Exchange could not load the certificate with thumbprint of from the personal store on the local computer. This certificate was configured for authentication with other Exchange servers. Mailflow to other Exchange Servers could be affected by this error…
Application
MSExchangeTransport
Error
2018
Outbound direct trust authentication failed for certificate . The target IP address of the Exchange server that Microsoft Exchange tried to authenticate to is . Make sure EdgeSync is running properly.
Application
MSExchange EdgeSync
Error
1032
No credential was found for
451 4.4.0 Primary target IP address responded with: “454 4.7.0 Temporary authentication failure.” Attempted failover to alternate host, but that did not succeed. Either there are no alternate hosts, or delivery failed to all alternate hosts

Wednesday, October 5, 2011

What is coral player? Why it ask to download it to play movies downloaded from Internet?


Have you ever encountered to a situation when a movie you have just downloaded from Internet; asks you to download a specific player called Coral Player? Recently; this is very common on many torrent sites as almost 70% of movies downloaded just give this message as
Can not be played back in this movie player It only works in Coral player. Fell free to download from blah blah
Now have you ever considered this very simple question… Is the file format .avi can be so application savvy that can be only played back in a specific player… no it shouldn’t be as so…. so what is this coral player?
Though I don’t know whether any such player exists or not; it looks more like a spam site when I visited to their site… it first asks to pay $.95 for a three day trial… surprising… pay for try out and after the three day trial it will charge $19.95 every month just to play only media files… and the player itself also not very eye catching as in the demo shown. Apparently our ordinary player can play the part that says we need CoralPlayer to play the video. What this means is that the makers of CoralPlayer have invented a market for their software. A small portion of the file will play with any player. The rest of the file is presumably in a proprietary format which they created for the sole purpose of distributing videos which you then have to pay them monthly to view. Complete scam, total waste of money. However you can also it like that the actual scam is movie itself showing you to go to such site.
So be aware friends any player that requires you to buy is a fake or making money off you so they get richer or were they can infect your player.
Now the question arises what this movie is showing the actual size of  700 mbs or more and taken almost 6 to 7 hours to download… now can you tell me ‘Is it so difficult to create a movie which would last last in only one minute… I don;t tink so… this is what the movie file you have just downloaded.’
So there would be only suggestion that before you go for a download from a torrent site first of all check for the comments; there may be something you should know and make a habit of your own to comment on such spam torrent links; which might help others from wasting their time.
Though; the best think would be go for a download from the trusted network like Demonoid… who are very strict about such spams and continuously check for the torrent files.

Trick to Generate fake Facebook Comments or set your Fake Facebook Status


Facebook is one of the most loved Social Networking Site and there are so many ways have already in the process to have fun with friends via facebook.
Now today in this post you will learn another way on how to make fun fooling your friends with fake facebook comments or status.  To do such a fun Fake Convos is a Web service which is infact an interesting webware which generates Fake conversation on Facebookwith same design and interface as real as Facebook.
To begin with you only need enter the name on the left side of the screen, thereafter you can set the image which you can direct call from your facebook account if allowed to do so or using the image URL. And Finally enter with the message which you want to share. That’s all. In this way, any number of comments can be added with different profile names and Photos.
There are other similar services like FacebookQuotes which claim to does same thing but the results doesn’t look no real with Blurred Display Picture and unreal background design.

14. Myspace Hack: How to Hack Myspace Account Passwords


Have you ever seen your friend post a bulletin on MySpace about how they made a $1,000 on the weekend? It’s the first sign your friend’s MySpace account has been hacked. Maybe you’ve had your MySpace account hacked and would like to know what you can do to prevent it from happening again in the future. Then this post is for you.
Phishing: Most people have their account hacked by clicking on a stranger’s profile only to be taken to what looks like the MySpace login screen. Turns out it’s not a MySpace login screen and the username and password you just entered is saved for future use by the bad guys(hackers). The biggest thing is if you find yourself suddenly sent to the login page when you haven’t signed out, look at the url and make sure it says myspace.com in the address bar. If it has happened to you, you should be able to remedy the problem by simply changing your password watching for the proper web address in the future.
For more on Phishing and the method used for hacking Myspace account by Phishing refer:
Hack email accounts by Phishing.
Viruses: Another way people have their account hacked is from malware installed on their system that records their keystrokes. This is an uncommon problem for MySpace accounts because people looking to watch your keystrokes wouldn’t risk the legal trouble for MySpace accounts. They’d much rather take your bank account or something more valuable. If you change your password repeated times and you keep getting hacked, then you may have a virus and you’ll need to reinstall your operating system and start over.
Spy Software: Keylogging is the best and most guaranteed way to obtain a myspace password because not only can their myspace password, but you can get the passwords to everything they have and see every piece of information entered on the computer. Keylogging refers to the monitoring of key’s pressed on a keyboard, but most spy software contain many more usefull features. Some software does not even require you to touch the person’s computer, which many people find extremely usefull. I have tried many many different software solutions, and here is what I recommend.
If you have physical access to their computer, this should be relatively easy. For this situation, we recommend a keylogging software such as Ardamax keylogger . You can simply install it on the computer that they use and it will log all activity on the computer, including capturing the MySpace password. I recommend Ardamax keylogger because it has a unique MySpace capture feature that saves a screenshot of every page visited on the site and also has a great interface.
If there’s no way you can physically access their computer, it can be a little trickier to pull off. The program i’ve found that works the best (and gets so close to this ethical line) is a service called SniperSpy. SniperSpy gives you a module that you can send to your target that will allow you to spy on their computer’s every action. No physical access to the target’s computer is needed. You can view their computer screen LIVE from anywhere at anytime via your web browser, which means you don’t need to install anything on your computer either. You will be able to look at chat conversations, web sites visited, and gain access to all the online accounts they log into while being SniperSpyed. It even takes image screenshots of every internet webpage they look at, so that if they are perhaps deleting messages from their email/myspace inbox, you can look at the stored screenshots and read the deleted messages when normally you never could! This is the tool I used to catch my girlfriend and it worked absolutely great. I really believe it’s the ultimate spying tool (and i’ve tryed a lot of things). Their Testimonials page shows that they’ve been on the news and featured in several magazines, so you should feel pretty good that you’ll accomplish what you’re after when you buy it.
I’ve gotten word of a secret coupon code for 25% off SniperSpy and/or Acespy! That’s at least $20 off! Too bad I didn’t know about it when I bought SniperSpy, haha. At the second purchase page, enter the following code: RXS-SPY25
Ask them for it
Yeah, that wasn’t what you wanted to hear. Well, the truth is, an honest partner will let you have it if there is absolutely nothing going on. The reason you should ask is they might be forthcoming. If your partner refuses, it does not necessarily mean they are cheating, but it is a red flag and can indicate they are hiding something
Other
People can also think their account was hacked if they neglect to log out and someone uses the computer after them. So be sure to logout and not just close the window, especially if you’re at a library, internet cafe, or the like.
So guys, i have provided you with almost all methods used for hacking Myspace accounts passwords. If you have any query about hacking myspace account passwords, please let me know.
Enjoy HaCkInG….