Welcome back ! Feel free to look around. If you like what you read, mention us in your post or link to this site. Hope to see you again

Thursday 24 November 2011

HACK/SPY WITH WINSPY..

Follow Hackers Spot

Winspy Keylogger
WinSpy Software is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. It includes Remote Install and Real-time Remote PC Viewer. Win Spy Software will capture anything the user sees or types on the keyboard.

How To Use Winspy

Step 1 - First of all you need to Download winspy keylogger


Step 2 - After downloading winspy keylogger run the application. On running, a dialog box will be prompted. Now, create a user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.


Step 3 - Now, another box will come, explaining you the hot keys(Ctrl + Shift +F12) to start the Winspy keylogger software.



Step 4 - Now pressing on the hot keys will take you a login box asking you to enter the username and password. Enter the username and password and click ok.

Step 5 - On entering the username and password you will be taken to winspy main screen. Now select Remote at top and click on Remote install.

Step 6 - On doing this you will be taken to the Remote install file creator. Enter the following things there:

User – Type in the victim’s name.
File Name – Here you need to enter the name of file needs to be sent. Like I have kept the name “Funny joke” which the victim will love to accept.
File icon – You really don’t need to change this.
Picture – Select the picture you want to insert to the remote file.
Email log to – In this field enter your email address which you will use to receive the
Keystrokes - As hotmail account do not accept remote logs so it’s necessary to use a Gmail account instead.


Step 7 - After you have done all the above steps, click on “Create remote file”. Now the remote file will be created, it will look something like this

Now all you have to do is just send the remote file to the victim via email attachment or by uploading it to a web-hosting site and then sending victim the download link. Once the remote file gets installed into victim’s computer, you will receive keystrokes on your Gmail ID you entered in step 6.