I think my gfriend is cheating on me, but i dont have any proof.. how can i get her yahoo password. We dont live together so keylogger wont work, i need to get remotely into her computer or is there an easier way. thx
Printable View
I think my gfriend is cheating on me, but i dont have any proof.. how can i get her yahoo password. We dont live together so keylogger wont work, i need to get remotely into her computer or is there an easier way. thx
I would like to know the same. Can anyone help?
yes, how can i get your girlfriend's yahoo mail pasword, too?
**7-2*2-4*57 They can HELP!
Who are "they"? And, are "they" expensive?
Dude there are 2 many women out there to give a crap about your lady
cheating on you... What will you do if she is cheating? Kill her or beat the shit out of her.. It is not worth getting mad about If you doubt you are man enough to keep her satisfied then come out of the closet and get yourself a
man cuz it sounds like you are to uncertain with yourself..
***MONITORING ANYONE'S COMPUTER ***
Are you worried about your lover/spouse cheating on you? Are you worried about your kids surfing inappropriate websites in secret? Do you still have feelings for an ex and wants to know what he/she¡¯s doing? Do you want to know what your business competitors are doing online everyday? Do you have a court case to go to but need a lot more evidence from someone in order to win it? Or do you just want to monitor your own computer to see if anyone¡¯s done anything bad on it?
YOU HAVE A SOLUTION!!!!!
Who Are We:
We're CRACKSPIDER GROUP, a group of experienced professional hackers with the most advanced technology! We now are providing an online monitoring service for a low fee of only $*00 USD/Month, which is as low as ONLY *0 DOLLARS PER DAY!
What Do We Do:
We can hack into and monitor anyone¡¯s computer invisibly as you request, using the most advanced technology that¡¯s currently being used by the NSA and CIA.
We will forward to you the following info of the hacked computer:
Records of Instant Messages and Chatroom Conversations
- MSN Messenger
- Yahoo Messenger
- ***
- AOL Instant Messenger
- Plus various chat rooms!
Records of Emails Sent and Received
- All Emails sent from the targeted computer
- All Emails received on the targeted computer
- All Emails read on the targeted computer
Records of Web Sites Visited
- URL visited
- Total Time spent on each web site.
- Date and Time the web page was first viewed
Records of Files Run
- All files that have been run on the targeted computer
And MUCH MORE¡*
We record activities on the target computer 24 HOURS A DAY, 7 DAYS A WEEK!
How Do You Pay Us:
We¡¯ll hack into the targeted computer upon request. Upon success in gaining access to the targeted computer, we will send to you above info FOR FREE for the first 2 to * days as a trial period. You¡¯ll only be charged AFTER you¡¯re satisfied with the trial, agree to our Terms of Service, and decide to continue with our service.
Currently, we only accept ***** transfer through ******* *****. Please refer to [url]www.************.com[/url] for detailed info.
As stated above, our service¡¯s monthly fee is as low as $*00 US, which is equivalent to ONLY *0 dollars a day. Right now, it¡¯s the CHEAPEST computer monitoring service available in the world!
We reserve the right to acquire more information if necessary and refuse service if the info you give to us is incorrect.
What are you waiting for? Contact us ASAP!!!
::: CRACKSPIDER GROUP:::
WEBSITES:::
[url]http://crackspider.tk[/url]
[url]http://crack-spider.da.ru/[/url]
[url]http://crackspider.active.ws/[/url]
[url]http://active.ws/crackspider/[/url]
[url]http://www.crackspider.active.ws/[/url]
[url]http://www.active.ws/crackspider/[/url]
[url]http://cs.true.ws/[/url]
[url]http://true.ws/cs/[/url]
[url]http://www.cs.true.ws/[/url]
[url]http://www.true.ws/cs/[/url]
EMAIL :::
[email]crackspidergroup@ToughGuy.net[/email]
PS::We reserve the right to acquire more information if necessary and refuse service if the info you give to us is incorrect.
Requests made via OUR WEBSITE are only entertained.
Please note that we do NOT have any other email addresses except crackspidergroup (AT) ********** and crackspidergroup (AT) **********. We have come across few mailboxes named after our group. We are NOT responsible if you answer and deal with them
[QUOTE=::: CRACKSPIDER]***MONITORING ANYONE'S COMPUTER ***
Who Are We:
[/QUOTE]
You are bunch of teen-age loosers trying desperately to find a way to make *****.
[QUOTE=::: CRACKSPIDER]***MONITORING ANYONE'S COMPUTER ***
What Do We Do:
[/QUOTE]
You spend your time bullshiting others to convince them to believe you.
[QUOTE=::: CRACKSPIDER]***MONITORING ANYONE'S COMPUTER ***
How Do You Pay Us:
[/QUOTE]
You must be either nuts or trisomic to simply consider that somebody will ever pay you!
[QUOTE=::: CRACKSPIDER]***MONITORING ANYONE'S COMPUTER ***
What are you waiting for? Contact us ASAP!!!
[/QUOTE]
Right now i'm peeing, I'll contact you as soon as I finish.
[QUOTE=::: CRACKSPIDER]***MONITORING ANYONE'S COMPUTER ***
We reserve the right to acquire more information if necessary and refuse service if the info you give to us is incorrect.
[/QUOTE]
Why don't you simply reserve the right to SHUT UP for good.
Your site will look like the "X-Spamming" site [url]http://www.nowratez.com/[/url] if you keep posting things like that around here. ;)
well i can teach you how to remotely access your own computer.Which is the same as connecting to others just that its not illegal lol.
Email me at [email]Two0*boy@**********[/email]
i can help
FREE
dont pay shit
u can package keyloggers on a pic or some file and u can log everythign she types... for instance her YAHOO MESSENGER PASSWORD.......
[QUOTE=Unregistered]u can package keyloggers on a pic or some file and u can log everythign she types... for instance her YAHOO MESSENGER PASSWORD.......[/QUOTE]
IN RESPONSE TO THE ABOVE POST. COULD YOU PLEASE ADVISE ME ON HOW I WOULD DO THIS. YOU SAY "PACKAGE KEYLOGGERS ON A PICTURE". I WOULD BE SO GRATEFUL FOR ANY ASSISTANCE.
Dude...so you check her email, find she's cheating...and then what? dump her, talk to her and try to resolve, have a huge fight, cry your ass off??
look buddy, i've been there. there are enough women out there who aren't gonna cheat on you. So if you think she's cheating, be the man and tell her you guys are through.
Look, the fact that you think she's cheating on you would mean that you don't trust her. if there ain't trust and you have to go check her email to find out...then there's really no point. just go tell her, if not kick her butt...
Hey man here is helpful information:
*)I had same situation like you - but i was just a friend to that girl
2)Yes i really was at her email and read her emails
*)After i understood that ALL OUR FRIENDSHIP WAS NOTHING MORE (FOR 2 YEARS) THAN BIG LIE - I DELETED ALL HER EMAILS,THAN SEND TO ALL SHIT FROM HER NAME,ALL HER ADRESS BOOK,AOL AIM ADRESS BOOK,WRITE SHIT IN HER AOL PROFILE,AND CHANGED PASSWORD OF HER EMAIL.
Yes if you are with your girlfriend more than 2 years - YOU CAN CHECK SHE.
IF EVERYTHING IS OK AND SHE REALLY LOVES YOU AND DON'T LIE TO YOU - YOU EVEN CAN DON'T TALK THAT YOU CHECK HER EMAIL ACCOUNT.
-------------------------------------------------------------------------
NOW IS WHAT YOU CAN SEE IN HER EMAIL AND MESSENGERS:
FEW CONTACTS WILL BE ABOUT HER LIFE ACTIVITY - STUDYING,PROFFESION.
MANY CONTACTS INCLUDING YOUR NICKNAME WILL BE IN COLUMN WITH ANOTHER SUCH "boyfriends" like you - ITS IS POSSIBLE MAN.
FEW CONTACTS WILL BE REALLY FOR A FRIENDS - SHE WILL HAVE FEW FRIENDS IN INTERNET EVEN ABOUT WHICH YOU DIDN'T HEAR FROM SHE.
NOTHING BAD SEEMS,BUT AS SOON AS YOU WILL READ ANY EMAILS ABOUT WHAT SHE IS SAYING TO OTHER ABOUT YOU - YOU WILL SEE A BIG LIE,HATE TO YOU,COUNTING YOU FOR NOTHING - SURE IF YOU WILL FIND SOMETHING LIKE THIS IN TEXT OF EMAILS.
--------------------------------------------------------------------------
MY STORY IS BAD BECAUSE FOR 2 YEARS I COULDN'T SEE MY FRIEND IN REAL LIFE - AND ALL THIS YEARS I THOUGHT THAT HER LIFE WAS LIKE SHE TELLS ME,BUT A LIE WAS DISCOVERED.
MY FIRST LOVE STORY ENDED VERY BRUTAL - MY FRIEND DIDN'T WANT TO TALK WITH ME SUDDENLY IN AUGUST,I CONTINUED SEND TO SHE HAPPY BIRTHDAY EMAIL,DAYLI EMAILS ALL WAS TO NOTHING - I DIDN'T RECEIVE ANY ANSWER,BUT SAW WITH AOL "EMAIL RECEIPT" THAT MY EMAIL WAS READED BY THIS FRIEND.
AFTER HACKING HER ACCOUNT IN DECEMBER I BECAME ANGRY,I KNEW HER BOTH MOBILE+HOME NUMBERS(EVEN IF SHE TOLD ME THAT SHE LIVES IN ANOTHER CITY AND DON'T HAVE PHONE).
AFTER I DECIDED TO WRITE TO SHE AND HER FEW FRIENDS (MOST ACTIVE WITH WHICH SHE DID TALK MUCH SHIT ABOUT ME) - THAT I WILL KILL THEM IN NEXT SUMMER.RESPONSE WAS AS FAST AS IT COULD BE.
AFTER READING THAT EMAIL RESPOND I DECIDED TO TALK TO SHE BY PHONE - SHE FINALLY HANG-UP PHONE AND WE START TALKING - SEEMS THAT I WAS TALKING WITH SOME ANIMAL WHICH DON'T UNDERSTAND WHAT SHE WAS DOING ALL THAT YEARS - WE TALKED ABOUT 2 HOURS.
AND FINALLY DECIDE TO DON'T TOUCH HER - AND FIND ANOTHER GOOD GIRL.
THIS IS THE END OF MY STORY.
P.S NEVER USE YOUR EMAIL FOR THREATS,HACKERS MISSIONS TO GET SOMEONE PASS AND SEND HIM SOMETHING,USE ANONYMOUS EMAIL ISPS ([url]www.fepg.net[/url]) - i reccomend [url]www.hushmail.com[/url] 2 megs of free email + your email will be deactivated after * weeks of not using it.
Use anonymous IP-adress USE TOOLS LIKE SOCKS-PROXY.
You can get list of a good working proxies here: [url]www.stayinvisible.com[/url] - HERE YOU CAN SORT RESULTS OF SEARCHING PROXIES BY COUNTRY,PORT,ETC
OH YES - HOW I CAN MY FRIEND'S PASS - HER PASS WAS "stefanie" AS IS HER NAME.
YOU CAN TRY TO TYPE DATE OF BIRTHDAY OF HER GF,OR HER FAVORITE WORDS,MOVIES,ETC.
SEARCH IN YAHOO OR GOOGLE FOR HACKERS WEBSITE WHICH WILL OFFER "MANUALLY HACKING OF USER PASSWORDS",SUCH PEOPLES HACK ALMOST ANY EMAIL ISP - AND IF YOU WON'T GET RESULT YOU WILL NOT PAY TOP THEM - AND COST THEIR SERVICES ABOUT *00 DOLLARS PER HACKED EMAIL.
THIS IS MY ADVACES AS A HACKER,CRACKER,GURU AND IT PROFESSIONAL.
I AM REALLY HAVE HACKER ACTIVITY - I HAVE A LOT OF WEBSITES,I HAVE EXPIERENCE OF 5 YEARS WORKING IN INTERNET,MAKING *****S FROM IT,I HAVE A TONS OF HIDDEN RESOURSES WHICH YOU CAN FIND SEARCHING AT LEAST * HOURS.
I KNOW WHAT IS SCAM - MY TOTAL LINK COLLECTION IS MORE THAN 50000 websites.I have *000 of programs from Audio recording of online music to Professional software for designers - for anybody,i can teach anybody work with PC,using Internet,how to start own business.
IF YOU ARE INTRESTED IN CONTACT WITH ME [email]trankay@lycos.co.uk[/email]
Best Regards
Nick
P.S don't use Ureach.com ISP as your email - THIS ISP IS CONTROLLED BY FBI.
Hey man here is copy of text on website how you can get WHAT YOU REALLY NEED.FURTHEMORE YOU CAN SEARCH FOR SUCH TEXTS ON ANY WEBSITE USING [url]www.google.com[/url] or [url]www.google.co.uk[/url]
You can try to search your girlfriends name in google : type such stuff
"Mandi Samara from Paris" - if your girlfriend is listed on some website as any kind of professional - you will find something about she.
"Your full girlfriend's name,than word "from" than name of city where she lives"
Don't know but when i was searching for my friend it found some websites about which i never heard - i found it just type "fullname of my girlfriend".
If you will need help - email me [email]trankay@lycos.co.uk[/email]
Best Regards
Nick
WISHING YOU GOOD LUCK - ALSO I WISH YOU TO KNOW THE TRUTH,TRUTH HAVE NO VALUE IN THIS WORLD - ITS MOST EXPENSIVE EVER INFORMATION.
THIS IS SAMPLE TEXT WHICH YOU CAN FIND ABOUT WHERE TO FIND SUCH RESOURSES AND SUCH HACKERS AND DESCRIPTION OF THEIR JOB.
<========================================================>
Hello,
My name is Spencer Cornell. I have been dealing with computers and the internet for years, specifically hacking/cracking. If you are interested in receiving a password to a certain account, I can gain access to almost any Email account. My prices are cheap and reasonable and I'm fast. Don't despair if you live outside the U.S.; I service users from all countries. If in fact you are interested, I have a new Email you can reach me at: [email]spence4ever@mindless.com[/email]
Thanks.
Spencer
[email]spence4ever@mindless.com[/email]
WHAT HE CAN
hacking Alltel
hacking Amigo.net
hacking AnimeNation
cracking AOL
cracking AT&T's Worldnet Email
cracking Alta Vista
cracking Angelfire
cracking Email
cracking Emails
cracking Email Accounts
cracking Email Account
cracking BellSouth
cracking Email.com
cracking Eudora WebMail
cracking Excite
cracking Go/Infoseek
cracking Hotmail
cracking Juno
cracking Lycos
cracking Mail.com
cracking Net@ddress
cracking Netscape
cracking Rocketmail
cracking Snap's Email.com
cracking USA.net
cracking Yahoo Mail
cracking ZDNet
cracking * For All Email
cracking *2* Free Email
cracking *on* Mail
cracking *Dmail
cracking @MyPlace.com
cracking AAeMail.com
cracking Acoolemail.com
cracking Achichu
cracking Address.com
cracking AFreeInternet
cracking AltaVista Email
cracking ****Mail
cracking Angelfire Email
cracking AnyWhere Mail
cracking AOL Mail
cracking America Online
cracking ApexMail
cracking ArrowMail.net
cracking AseanMAIL
cracking Atgratis
cracking Bachelor Girl Mail
cracking Browso.com
cracking Byke.com
cracking Caramail
cracking Computermail.net
cracking Daily Web Planner
cracking Doghouse Mail
cracking Doramail
cracking E-MailAnywhere.com
cracking E-OmniNet
cracking POP* email
cracking EarthLink WebMail
cracking EarthLink
cracking MindSpring
cracking Mindspring.com
cracking OneMain accounts
cracking easy.com
cracking Email Accounts 4 Free
cracking Email2me
cracking EmailAccount.com
cracking EmailChoice
cracking EmailSupport.com
cracking epenguin Mail
cracking Eudora Web Mail
cracking Every Mail
cracking Excite Mail
cracking Expat Mail
cracking forum
cracking forums
cracking forum account
cracking forum accounts
cracking FastMail
cracking Fcuk-me.co.uk
cracking Fiberia Free Email
cracking FirstName.com
cracking FlashMail
cracking Free Speech Email
cracking GibWeb
cracking God Mail
cracking GrlMail.com
cracking gURLmAIL
cracking HoofMail.com
cracking Hotmail
cracking MSN
cracking HowlerMonkey
cracking HushMail
cracking iName
cracking iWon mail
cracking Jershie Mail
cracking JoinMe
cracking Juno WebMail
cracking Katchup
cracking KsWildcat.com
cracking KukaMail.com
cracking Linuxfreemail
cracking Lovemail
cracking Lovetrain Records Email
cracking Lycos Mail
cracking Madd Hatt Entertainment
cracking Mail.com
cracking Mail2Web
cracking SBCGlobal.com
cracking Stoolmail
cracking Synacor Email
cracking T-Mail
cracking T-Mobile
cracking ThatWeb
cracking USAnetMail.com
cracking Vanity Email
cracking Walkerware Popmail
cracking Wau Mail
cracking WeekOnline
cracking WitchesBrew Mail
cracking Wong Faye Free Email
cracking Wowmail Wyn.net
cracking Yahoo! Mail
cracking Zappo! Mail
cracking ZapZone Network (ZZN)
ActiveX
ActiveX controls
software modules
software applications
ActiveX-compliant
full system access
Algorithm
encrypt data files
decrypt data files
Anti-antivirus Virus
Retrovirus
Anti-virus Software
Anti-virus Scanner
Antivirus Virus
Applet
sandbox
Armored Virus
reverse engineering
ASCII
coding system
ASCII Files
Visual Basic Script
Batch Files, VBS
Attack
Active attacks
Passive attacks
Brute Force Attack
Denial of Service
Hijacking
Password Attacks
Password Sniffing
Attributes
Back Door
Trapdoor
Back Orifice
Background Scanning
Background Task
Backup
Batch files
AUTOEXEC.BAT
Bimodal virus
Bipar#####e
Boot Sector Infector
File Virus
Multipar#####e
BIOS
Boot
cold boot
warm boot
Boot Record
Boot Sector
****** Boot Record
Boot Sector Infector
BSI
Brute Force Attack
Bug
Cavity Virus
Checksum
Clean
Disinfection
Cluster Virus
File System Virus
Cold Boot
rescue disk
COM File
extension COM
Companion Virus
PROGRAM.COM
PROGRAM.EXE
Compromise
Cookie
Default Password
Denial Of Service (DoS)
Direct Action Virus
Disinfection
DOC File
DOS
Disk Operating System
Dropper
EICAR
EICAR.COM
Encrypted Virus
Encryption
EXE file
Program File
False Negative
False Positive
Fast Infector
Slow Infector
FAT
File Allocation Table
FDISK /MBR
File Viruses
Parasitic Virus
Fire Infector
File Infecting Virus
Firewall
Good Times
Virus Hoaxes
Heuristic Analysis
Behavior-based analysis
Heuristic Scan
Hijacking
Remote hijacking
Hole
Host
In The Wild
ITW
Zoo Virus
Infection
Injector
Dropper
JavaScript
Joke Programs
Key
Windows Registry
Library File
DLL
Logic Bomb
trojan horse
Time Bomb
Macro
Macro Virus
Macro Virus
malicious macro
Mailbomb
Malicious Code
Malware
Mapped Drives
****** Boot Record
MBR
Par#####ion Table
****** Boot Sector
****** Boot Sector Virus
Memory-resident Virus
MP* File
Moving Picture Experts Group Audio Layer * File
MS-DOS
The Microsoft Disk Operating System
Multipar#####e Virus
write-protected Rescue Disk
Mutant
Variant
Mutating Virus
Polymorphic Virus
Newsgroup
Not In The Wild
NTFS:
NT File System
On-access Scanner
On-demand Scanner
Overwriting Virus
Password Attacks
Password Sniffers
Password Sniffing
Payload
PGP
Pretty Good Privacy
Piggyback
Polymorphic Virus
Mutating Virus
Program Infector
Real-time Scanner
On-Access Scanner
Redirect
Rename
Replication
Reset
Resident Virus
resident viruses
Resident virus
Resident Extension
Rogue Program
logic bombs
RTF File
Rich Text Format File
Scanner
Anti-virus Software
On-demand Scanner
On-Access Scanner
UNC
Shareware
Signature
Virus Signatures
Slow Infector
SMTP
Sniffer
Hackers
Crackers
Hacker
Cracker
Phreakers
Phreaker
Phreaking
Sparse Infector
Sparse Virus
Stealth Virus
Template
Time Bomb
Logic Bomb
Timestamp
TOM
Top of Memory
Triggered Event
Vaccination
Variant
VBS
Virus
File Viruses
Macro virus
Companion Virus
Worm
Virus Hoaxes
Warm Boot
ZIP File
Zoo
Zoo Virus
bit bucket
deep magic
foo
kluge
munge
netiquette
wedged
wetware
wizard
zipperhead
Ankle-Biter
AIS
Ping of Death
Port Scan
Web Bug
Sector Viruses
Self-encrypting Virus
Self-garbling Virus
Self-extracting Files
Self-garbling Viruses
Shared Drive
Mapped Drives
Universal Naming Convention
Simple Mail Transport Protocol
Interrupt Interceptors
"The Mad Hatter"
System Boot Record
Trojan Horse Program
Terminate and Stay Resident
Memory-resident Program
Universal Naming Convention
Visual Basic Script
Windows Scripting
Windows Scripting Host (WSH)
parasitic computer programs
IRC (Internet Relay Chat)
security through obscurity
voodoo programming
Vulcan nerve pinch
"three-finger salute"
Automated Information System
Biometric Access Control
Cryptanalysis
Data Driven Attack
Mockingbird
Phracker
Phrackers
Phracking
Smurfing
Snarf
Samurai
Grey Hat
Tunneling
UNC
sneaker
spaghetti code
vaporware
Personal Firewall
Stealth Mode
Worm
TSR
Signature
String
Nak Attack
Ethernet Sniffing
Flooding programs
IP Splicing / Hijacking
Leapfrog Attack
One-Time Password
Negative Acknowledgment
Packet Sniffer
Passive Attack
Perimeter Based Security
Steganography
Cloning Programming
The Underground
Distributed Denial-of-Service (DDoS) Attack
Microsoft's Component Object Model (COM)
Certain cryptographic algorithms
American Standard Code for Information Interchange
EICAR Standard Anti-virus Test File
Windows batch (BAT) files
Read Only, Archive, Hidden or System.
The Cult of the Dead Cow (cDc)
Basic Input/Output System
ROM (Read Only Memory)
European Ins#####ute of Computer Anti-Virus Research
EICAR Standard Anti-Virus Test File
SYS DRV BIN OVL OVY
TSR (terminate-and-stay-resident
circumvention of security measures
Windows Scripting Host
An Active Server Page (ASP)
Windows Scripting Host (WSH)
Practical Joke Programs
Dynamic Link Library
<========================================================>