English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

I have heard it that its easy to get yahoo account or hotmail account`s password. But it seems to me its not easy. How do they get it? Do they use any special way to get it? Do they use any special cracking program or get it normally without using any program? Some people say they follow special method to get it but whats that? What is their special program to get yahoo or hotmail account`s password? Do they write this program by ownself or buy it? Its really unknown to me so I want to know true. I hope expert guys will give me answer to explain true to me & to explain how do they do it.

2006-08-06 00:52:07 · 12 answers · asked by Anonymous in Computers & Internet Internet

12 answers

Hptm,ail and Yahoo are SECURE.

The only way people get the password if they are foolish enough to give it away, for example a flaw was found ion hotmail, within 2 hours it was plugged.

why do you n00bs keep on trying? you must realise by now simple tricks wont work on these sites anymore?

And no, if you think i am going to sit here, explain encryption, the process of cracking, the process of using vulnerabilities of webservers (and the mere fact you think cracking yahoo will be similar to hotmail as evidence) suggests to me you know NOTHING about the process of breaking network security. If you think Im going to help you then you need a life, pretty bad.

2006-08-06 00:56:33 · answer #1 · answered by englishkeymaster 3 · 0 0

All of the previous answers are correct, it can be done and it shouldn't be done. It can be cracked by Phishing, Traffic capturing, and scanning your computer's files or registry.

Phishing programs rely on individuals to enter data into benign appearing sites or wait in the background monitoring your actions.
Traffic capturing uses programs that monitor network connections and can save all the data that passes and will be cracked using word dictionaries or bruteforce (trial and error approach.) Another capturing procedure is called Man in the Middle Attack (MITMA), in which the hacker has a computer that pretends it's the victim computer as well as the email server. Therefore all the data gets sent to the hacker and recieves all the private encryption keys making encryption useless.

Computer Sniffing: Your computer may store passwords in configuration files known as registry hives and other files known as cookies that store user preferences on websites.

Most of the hacking or cracking for that matter is done through already written programs that are freely available to download or evaluate. This is because most of the software is written for educational and network adminstration purposes, but can be used for malicous purposes.
this is where most of the "script kiddies" get there stuff, they don't write it, they just download it. If they were to write their own code for programs, it would take a lot more time, because they'd learn the structure and theory behind how a computer functions. This is where you learn to exploit the real weaknesses because the safest point of the computer is the weakest point in its design

2006-08-11 09:29:27 · answer #2 · answered by Elliot K 4 · 0 0

The passwords of Yahoo! and Hotmail are really secure but last week someone found my password. They made a copy of the Geocities page of yahoo and they send me a link on the messenger. The link came from a friend. When i clicked on the link it asked me my yahoo password and in 3 hours i had to recover it with the security question. So beware. There are many ways the hackers can take control of your mail accounts. Have a nice day!

2006-08-06 01:07:43 · answer #3 · answered by C3REAL 1 · 0 0

the main easy the thank you to acquire passwords used with the aid of hackers (exterior of in simple terms cracking it, which isn't what they decide to do) are keystroke recording classes, that are put in with the aid of way of trojans, and with the aid of actual procuring the password with the aid of actual potential (pretending to be an community admin and inquiring for passwords, and so on.). A keystroke recording software interior reason easy, it in simple terms runs interior the background and information each key that the person types and sends all of it decrease back to a distinctive pc. From this, a sturdy hacker can confirm what a password is, whether at present or over the years.

2016-09-28 23:15:04 · answer #4 · answered by ? 4 · 0 0

There are only two ways that others can get your passwords.

1.) Phishing of all kinds. People sometimes don't realize it when they're being fooled into giving such information.

2.) If others know the information required to be able to change the password. Such data would include your date of birth that you inserted, answer to the secret question, etc.

2006-08-06 01:53:01 · answer #5 · answered by womfalcs7 2 · 0 0

I have mates that do it, they can go by answering your trick questions, most places ask for mother's maiden name. Another friend does it with a software he created that presents the illusion that the explorer button ain't moving, his tool then pops a window asking U to re-enter Ur password. .....
THis information ain't for public. Bla bla

2006-08-13 22:54:34 · answer #6 · answered by Sky 3 · 0 0

yes your hotmail or yahoo can be stoolen it happened with one of my friends the one who did it sent a game inwhich you write your password at this time it appears on his computer and your mail is stolen.
that is all what i know :S

2006-08-06 01:05:41 · answer #7 · answered by Anonymous · 0 0

yes it is possible to get a password

2006-08-06 00:57:28 · answer #8 · answered by tiffanypurplecute 1 · 0 0

ya it is possible , if you know your usename , when you want to open your account there is ( did you forget you password ) then check on it and put your usename or email ..

2006-08-06 00:57:54 · answer #9 · answered by Anonymous · 0 0

you do no hacking is illegal and you can get reported for this question. im not going to report you nut someone else might so good luck

2006-08-06 00:57:13 · answer #10 · answered by Adam 3 · 0 0

fedest.com, questions and answers