Posts from the ‘Account hacking’ Category

Visual Studio 2010 Express Registration Keys

 VC# 2010 Express: PQT8W-68YB2-MPY6C-9JV9X-42WJV

VC++ 2010 Express: 6VPJ7-H3CXH-HBTPT-X4T74-3YVY7
VWD 2010 Express: CY8XP-83P66-WCF9D-G3P42-K2VG3
VB.NET 2010 Express: 2KQT8-HV27P-GTTV9-2WBVV-M7X96


Credit Card Fraud

For most of you out there, money is hard to come by. Until now:

With the recent advent of plastic money (credit cards), it is easy to use someone else’s credit card to order the items you have always desired in life.The stakes are high, but the payoff is worth it.

Step One:  Getting the credit card information

First off, you must obtain the crucial item:  someone’s credit
card number.  The best way to get credit card numbers is to take
the blue carbons used in a credit card transaction at your local
department store.  These can usually be found in the garbage can
next to the register, or for the more daring, in the garbage
dumpster behind the store.  But, due to the large amount of credit
card fraud, many stores have opted to use a carbonless transaction
sheet, making things much more difficult.  This is where your
phone comes in handy.

First, look up someone in the phone book, and obtain as much
information as possible about them.  Then, during business hours,
call in a very convincing voice – “Hello, this is John Doe from
the Visa Credit Card Fraud Investigations Department.  We have
been informed that your credit card may have been used for
fraudulent purposes, so will you please read off the numbers
appearing on your Visa card for verification.”  Of course, use
your imagination!  Believe it or not, many people will fall for
this ploy and give out their credit information.

Now, assuming that you have your victim’s credit card number, you
should be able to decipher the information given.

Step Two:  Recognizing information from carbon copies

Card examples:

[American Express]

[American Express]

   MM/Y1 is the date the card was issued, and MM/Y2 is the
   expiration date.  The American Express Gold Card has numbers
   XXXXXX XXXXXXXX XXXXXXXX, and is covered for up to $5000.00,
   even if the card holder is broke.

   XXXX in the second row may be asked for during the ordering
   process.  The first date is when the card was new, and the
   second is when the card expires.  The most frequent number
   combination used is 5424 1800 XXXX XXXX.  There are many of
   these cards in circulation, but many of these are on wanted
   lists, so check these first.


   Visa is the most abundant card, and is accepted almost
   everywhere.  The “*VISA” is sometimes replaced with “BWG”, or
   followed with a special code.  These codes are as follows:

   [1]  MM/YY*VISA V – Preferred Card
   [2]  MM/YY*VISA CV – Classic Card
   [3]  MM/YY*VISA PV – Premier Card
   Preferred Cards are backed with money, and are much safer to
   use.  Classic Cards are newer, harder to reproduce cards with
   decent backing.  Premier Cards are Classic Cards with Preferred
   coverage.  Common numbers are 4448 020 XXX XXX, 4254 5123 6000
   XXXX, and 4254 5123 8500 XXXX.  Any 4712 1250 XXXX XXXX cards
   are IBM Credit Union cards, and are risky to use, although
   they are usually covered for large purchases.

Step Three:  Testing credit

You should now have a Visa, Mastercard, or American Express
credit card number, with the victim’s address, zip code, and phone
number.  By the way, if you have problems getting the address,
most phone companies offer the Address Tracking Service, which is
a special number you call that will give you an address from a
phone number, at a nominal charge.  Now you need to check the
balance of credit on the credit card (to make sure you don’t run
out of money), and you must also make sure that the card isn’t
stolen.  To do this you must obtain a phone number that
businesses use to check out credit cards during purchases.  If you
go to a department store, watch the cashier when someone makes a
credit card purchase.  He/she will usually call a phone number,
give the credit information, and then give what is called a
“Merchant Number”.  These numbers are usually written down on or
around the register.  It is easy to either find these numbers and
copy them, or to wait until they call one in.  Watch what they
dial and wait for the 8 digit (usually) merchant number.  Once you
call the number, in a calm voice, read off the account number,
merchant number, amount, and expiration date.  The credit bureau
will tell you if it is ok, and will give you an authorization
number.  Pretend you are writing this number down, and repeat it
back to them to check it.  Ignore this number completely, for it
serves no real purpose.  However, once you do this, the bank
removes dollars equal to what you told them, because the card was
supposedly used to make a purchase.  Sometimes you can trick the
operator by telling her the customer changed his mind and decided
not to charge it.  Of course, some will not allow this.  Remember
at all times that you are supposed to be a store clerk calling to
check out the card for a purchase.  Act like you are talking with
a customer when he/she “cancels”.

Step Four:  The drop

Once the cards are cleared, you must find a place to have the
package sent.  NEVER use a drop more than once.  The following are
typical drop sites:

   [1]  An empty house
An empty house makes an excellent place to send things.  Send the
package UPS, and leave a note on the door saying, “UPS.  I work
days, 8 to 6.  Could you please leave the package on the back door
step?”  You can find dozens of houses from a real estate agent by
telling them you want to look around for a house.  Ask for a list
of twenty houses for sale, and tell them you will check out the
area.  Do so, until you find one that suits your needs.

   [2]  Rent A Spot

U-Haul sometimes rents spaces where you can have packages sent and
signed for.  End your space when the package arrives.

   [3]  People’s houses

Find someone you do not know, and have the package sent there. 
Call ahead saying that “I called the store and they sent the
package to the wrong address.  It was already sent, but can you
keep it there for me?”  This is a very reliable way if you keep
calm when talking to the people.

Do NOT try post office boxes.  Most of the time, UPS will not
deliver to a post office box, and many people have been caught in
the past attempting to use a post office box.  Also, when you have
determined a drop site, keep an eye on it for suspicious
characters and cars that have not been there before.

Step Five:  Making the transaction

You should now have a reliable credit card number with all the
necessary billing information, and a good drop site.

The best place to order from is catalogues, and mail order houses. 
It is in your best interest to place the phone call from a pay
phone, especially if it is a 1-800 number.  Now, when you call,
don’t try to disguise your voice, thinking you will trick the
salesperson into believing you are an adult.  These folks are
trained to detect this, so your best bet is to order in your own
voice.  They will ask for the following:  name, name as it appears
on card, phone number, billing address, expiration date, method of
shipping, and product.  Ask if they offer UPS Red shipping (next
day arrival), because it gives them less time to research an
order.  If you are using American Express, you might have a bit of
a problem shipping to an address other than the billing address. 
Also, if the salesperson starts to ask questions, do NOT hang up. 
Simply talk your way out of the situation, so you won’t encourage
investigation on the order.

If everything goes right, you should have the product, free of
charge.  Insurance picks up the tab, and no one is any wiser.  Be
careful, and try not to order anything over $500.  In some states,
UPS requires a signature for anything over $200, not to mention
that anything over $200 is defined as grand theft, as well as
credit fraud.  Get caught doing this, and you will bite it for a
couple of years.  Good luck!
Info for knowledge purpose only, don’t ever try this or you will find yourself in jail.

Learn How To Hack Paypal account To Get Money $$$

&This is how to hack the paypal accounts hurry before it’s to late and paypal chanes the bots again.
This is the new bot and everything you need to know to get into paypal. My buddy who works for paypal told me about the new bots and all so yah
This is my home adress and my name so if it doosen’t work you can come kick my ass all around the world if you want but remember that it might not work the first time so try it a few times and hopfully it will work.
Charles elrik
5300 old highway rd
Honolulu,HI 96818
our just want to send me fan mail yah.
HOW TO HACK INTO PAYPAL ACCOUNT!!! (Hotmail accounts for paypal accounts This is from october 22, 2007)1) The following complete hacking tutorial contains materials that may not be suitable for irresponsible internet users, reader discretion is advised!
we have to put that so we don’t get i trouble.
2) The hacking method is based on a secretly discovered security flaw in the PayPal ( mailing address confirmation system. It will only work BEFORE PayPal discovers this serious security flaw and fixes it. Take your action FAST!
3) This method works for any body with PayPal accounts with CONFIRMED MAILING ADDRESSES. It will never work for PayPal user without a confirmed mailing address.
4) By strictly following instructions in the following tutorial, you’ll gain unlimited access to various PayPal accounts with confirmed mailing addresses. Use those accounts AT YOUR OWN RISK. You?re responsible for your action!
5) When you use PayPal, NEVER log on to sites that do not start EXACTLY with even if it contains the term ?paypal? in it.PayPal is the latest victim of internet hackers. Despite the company?s seemingly perfect security system, a serious security flaw in the ADDRESS CONFIRMATION PROCESS of PayPal?s members? accounts has been discovered by a few experienced hackers from Russia. The hacking process has been simplified a while ago and it was revealed on a Russian language hacking website.
PayPal was immediately alerted of this security flaw after the Russian language hacking tutorial was published on the website, but in order to prevent its customers from losing trust in internet banking, PayPal chose NOT to alert its customers of this security flaw and has then secretly BANNED numerous online articles that contained information of this security flaw.
However, it has been confirmed that due to technical difficulty, PayPal has NOT yet fixed the problem and at this moment right now, anyone can STILL hack into a great number of PayPal accounts with confirmed addresses.
To inform users worldwide of this problem, I?ve attached an English version of the hacking process. Remember, to get the whole thing to work, you MUST
STRICTLY follow the instructions and have a PayPal account with a confirmed mailing address!HACKING PROCESS:
Every PayPal member is identified by his/her Email and the majority of the PayPal members use Hotmail. After completion of the mailing address confirmation process, usually by adding a CREDIT CARD, PayPal automatically sends the user?s address confirmation info to a mailerbot associated with the user?s Email, in most cases, it?s Hotmail mailerbot.
The security flaw occurs RIGHT HERE! Both Yahoo and Hotmail mailerbots can be confused by a random user and sends out information saved on its server to that user.
To get PayPal account information of numerous random PayPal users from a Hotmail mailerbot, you have to do the following:1) Log into your homepage, and click on ?Profile?, and then click on
?Street Address? under ?Account Information?.2) Find the Address whose status is ?Home?, and if it says ?confirmed?, then please read on.Basically, A Confirmed Address is any address at which you receive your credit card statement. If you receive a credit card bill at this address, you can confirm it by entering your credit card information. This information will only be used to confirm your address. Your card will not be charged by PayPal.So, if your Home address is NOT confirmed, then FOLLOW THE INSTRUCTIONS ON PAYPAL AND ADD A CREDIT CARD TO CONFIRM YOUR MAILING ADDRESS.3) Okay, There are two bots which this will work for.
I. If you want an account with hotmail email, then:
Log in to your paypal email account and send an Email to: (This is the hotmail mailerbot described above) (NEW) (Other mailer bots are not active now)In the subject line, write:
789bot4*5%8verif-0e24 (To confuse the hotmail mailerbot)In the email body, please write exactly 11 lines, which MUST BE as follows:
In line 1:Subject-Type: ?text/plain=”+1″?In line 2: charset=us-english
(To make the reply readable in your language so put you own language here otherwise it might come in a laguage you don’t understand)In line 3: botbody*78#9
(To confuse the mailerbot)In line 4: p38ylec00rm::s%%(a href=
(To make the mailerbot start retrieving information acquired from PayPal.)In line 5: Your primary email at paypal
(To retrieve information from PayPal, The mailerbot now needs an Email which is the primary Email of a PayPal account with a confirmed mailing address, you have to use your own Email as a bait Email and you?ll need to receive info of other accounts from this Email too, so be sure this is your primary Email at PayPal.)In line 6: start (retrieve > 07)
(To activate the mailerbot’s retrieval function at the highest speed)In line 7: verify#8% (*value= = float)
(This will trick him to send it to your email adress instead of the administrators)In line 8: Your PayPal password
(Now you have to enter your paypal password to confuse the bot so it thinks your the administrator of paypal and it can send you the emails and passwords of people.)In line 9: #searchppagend72hrlog
(to get info from PayPal members who had their addresses confirmed in the last 72 hours)In line 10 send#%*idR20334-tsa-0583
(This will make the mailerbot send all the info to your email)In line 11 (#%7*tmbot*=”+098″)
(this covers you trail so they cant find you. Last step!)If you specifically follow the instructions above, you’ll have email, passwords and all sorts of information of PayPal users who had their mailing addresses confirmed over the last 72 hours.

Password cracking techniques

We get daily tons of requests regarding password cracking,
hereby we present a well researched comprehensive article adressing the same
It may bounce many of ur heads but we are sure a must mug up for Geeks nour regular visitors!!
so Gear Up! Dont give up before having a look on the entire article!

Many hacking attempts start with attempting to crack passwords. Passwords are the key piece
of information needed to access a system. Users, when creating passwords, often select passwords
that are prone to being cracked. Many reuse passwords or choose one that’s simple—such
as a pet’s name—to help them remember it. Because of this human factor, most password cracking
is successful; it can be the launching point for escalating privileges, executing applications,
hiding files, and covering tracks. Passwords may be cracked manually or with automated tools
such as a dictionary or brute-force method, each of which are covered later in this chapter.
Manual password cracking involves attempting to log on with different passwords. The
hacker follows these steps:
Find a valid user account (such as Administrator or Guest).
Create a list of possible passwords.
Rank the passwords from high to low probability.
Key in each password.
Try again until a successful password is found.
A hacker can also create a script file that tries each password in a list. This is still considered
manual cracking, but it’s time consuming and not usually effective.

Boring!! isnt it!! A more efficient way of cracking a password is to gain access to the password file on a system.
Most systems

(one-way encrypt) a password for storage on a system. During the
logon process, the password entered by the user is hashed using the same algorithm and then
compared to the hashed passwords stored in the file. A hacker can attempt to gain access to
the hashing algorithm stored on the server instead of trying to guess or otherwise identify the
password. If the hacker is successful, they can decrypt the passwords stored on the server.
Passwords are stored in the Security Accounts Manager (SAM) file on a
Windows system and in a password shadow file on a Linux system.

Understanding the LanManager Hash
Windows 2000 uses NT Lan Manager (NTLM) hashing to secure passwords in transit on the
network. Depending on the password, NTLM hashing can be weak and easy to break. For
example, let’s say that the password is
. When this password is encrypted with
the NTLM algorithm, it’s first converted to all uppercase:
. The password is
padded with null (blank) characters to make it 14 characters long:
. Before
the password is encrypted, the 14-character string is split in half:
123456A and BCDEF__.
Each string is individually encrypted, and the results are concatenated:
123456A = 6BF11E04AFAB197F
BCDEF__ = F1E9FFDCC75575B15
The hash is

Hacking Tools
Legion automates the password guessing in NetBIOS sessions. Legion scans multiple
IP address ranges for Windows shares and also offers a manual dictionary attack tool.
NTInfoScan is a security scanner for NT 4.0. This vulnerability scanner produces an HTMLbased
report of security issues found on the target system and other information.
L0phtCrack is a password auditing and recovery package distributed by @stake software,
which is now owned by Symantec. It performs Server Message Block (SMB) packet captures
on the local network segment and captures individual login sessions. L0phtCrack contains
dictionary, brute-force, and hybrid attack capabilities.
John the Ripper is a command-line tool designed to crack both Unix and NT passwords. The
cracked passwords are case insensitive and may not represent the real mixed-case password.
KerbCrack consists of two programs: kerbsniff and kerbcrack. The sniffer listens on the network
and captures Windows 2000/XP Kerberos logins. The cracker can be used to find the
passwords from the capture file using a brute force attack or a dictionary attack.

Cracking Windows 2000 Passwords
The SAM file in Windows contains the usernames and hashed passwords. It’s located in the
directory. The file is locked when the operating system is running
so a hacker can’t attempt to copy the file while the machine is booted to Windows.
One option for copying the SAM file is to boot to an alternate operating system such as
DOS or Linux with a boot CD. Alternately, the file can be copied from the
If a systems administrator uses the RDISK feature of Windows to back up the system, then a
compressed copy of the SAM file called
is created in
. To expand
this file, use the following command at the command prompt:
C:\>expand sam._ sam
After the file is uncompressed, a dictionary, hybrid, or brute-force attack can be run against
the SAM file using a tool like L0phtCrack.

Redirecting the SMB Logon to the Attacker
Another way to discover passwords on a network is to redirect the Server Message Block
(SMB) logon to an attacker’s computer so that the passwords are sent to the hacker. In order
to do this, the hacker must sniff the NTLM responses from the authentication server and trick
the victim into attempting Windows authentication with the attacker’s computer. A common
technique is to send the victim an e-mail message with an embedded hyperlink to a fraudulent
Hacking Tools
Win32CreateLocalAdminUser is a program that creates a new user with the username and
and adds the user to the local administrator’s group. This action is part of the
Metasploit Project and can be launched with the Metasploit framework on Windows.
Offline NT Password Resetter is a method of resetting the password to the administrator’s
account when the system isn’t booted to Windows. The most common method is to boot to
a Linux boot CD and then access the NTFS partition, which is no longer protected, and change
the password.
SMB server. When the hyperlink is clicked, the user unwittingly sends their credentials over
the network.

SMB Redirection
Several automated hacking tools can implement SMB redirection:

SMB Relay MITM Attacks and Countermeasures
An SMB relay MITM attack is when the attacker sets up a fraudulent server with a relay
address. When a victim client connects to the fraudulent server, the MITM server intercepts
the call, hashes the password, and passes the connection to the victim server.
Figure 4.1 illustrates an example of such an attack.

Hacking Tools
SMBRelay is an SMB server that captures usernames and password hashes from incoming
SMB traffic. SMBRelay can also perform man-in-the-middle attacks.
SMBRelay2 is similar to SMBRelay but uses NetBIOS names instead of IP addresses to
capture usernames and passwords.
pwdump2 is a program that extracts the password hashes from a SAM file on a Windows system.
The extracted password hashes can then be run through L0phtCrack to break the passwords.
Samdump is another program to extract NTLM hashed passwords from a SAM file.
C2MYAZZ is a spyware program that makes Windows clients send their passwords as clear
text. It displays usernames and their passwords as users attach to server resources.

SMB relay countermeasures include configuring Windows 2000 to use SMB signing, which
causes it to cryptographically sign each block of SMB communications. These settings are
found under Security Policies/Security Options.

NetBIOS DoS Attacks
A NetBIOS Denial of Service (DoS) attack sends a NetBIOS Name Release message to the NetBIOS
Name Service on a target Windows systems and forces the system to place its name in conflict
so that the name can no longer be used. This essentially blocks the client from participating in the
NetBIOS network and creates a network DoS for that system.

Password-Cracking Countermeasures
The strongest passwords possible should be implemented to protect against password cracking.
Systems should enforce 8–12 character alphanumeric passwords. The length of time the same
password should be used is discussed in the next section.
To protect against cracking of the hashing algorithm for passwords stored on the server,
you must take care to physically isolate and protect the server. The systems administrator can
use the SYSKEY utility in Windows to further protect hashes stored on the server hard disk.
The server logs should also be monitored for brute-force attacks on user accounts.
A systems administrator can implement the following security precautions to decrease the
effectiveness of a brute-force password-cracking attempt:
Never leave a default password.
Never use a password that can be found in a dictionary.

Hacking Tools
SMBGrind increases the speed of L0phtCrack sessions on sniffer dumps by removing duplication
and providing a way to target specific users without having to edit the dump files manually.
The SMBDie tool crashes computers running Windows 2000/XP/NT by sending specially
crafted SMB requests.
NBTdeputy can register a NetBIOS computer name on a network and respond to NetBIOS
over TCP/IP (NetBT) name-query requests. It simplifies the use of SMBRelay. The relay can be
referred to by computer name instead of IP address.

Hacking Tools

NBName can disable entire LANs and prevent machines from rejoining them. Nodes on a Net-
BIOS network infected by the tool think that their names are already in use by other machines.
Never use a password related to the host name, domain name, or anything else that can
be found with whois.
Never use a password related to your hobbies, pets, relatives, or date of birth.
Use a word that has more than 21 characters from a dictionary as a password.
This subject is discussed further in the section “Monitoring Event Viewer Logs.”
In the following sections, we’ll look at two measures you can take to strengthen passwords
and prevent password-cracking.

Password Change Interval
Passwords should expire after a certain amount of time so that users are forced to change
their passwords. If the password interval is set too low, then users will forget their current
passwords; as a result, a systems administrator will have to reset users’ passwords frequently.
On the other hand, if passwords are allowed to be used for too long, then security
may be compromised. The recommended password-change interval is every 30 days. In
addition, it’s recommended that users not be allowed to reuse the last three passwords.
You cannot completely block brute-force password attacks if the hacker
switches the proxy server where the source packet is generated. A systems
administrator can only add security features to decrease the likelihood that
brute-force password attacks will be useful.

Monitoring Event Viewer Logs
Administrators should monitor Event Viewer logs to recognize any intrusion attempts either
before they take place or while they’re occurring. Generally, several failed attempts are logged
in the system logs before a successful intrusion or password attack. The security logs are only
as good as the systems administrators who monitor them.
Tools such as VisualLast aid a network administrator in deciphering and analyzing the
security log files. VisualLast provides greater insight into the NT event logs so the administrator
can assess the activity of the network more accurately and efficiently. The program is
designed to allow network administrators to view and report individual users’ logon and
logoff times; these events may be searched according to time frame, which is invaluable to
security analysts who are looking for intrusion details.
The event log located at
contains the
trace of an attacker’s brute-force attempts.

Cracking Unix passwords

Contrary to popular belief, UNIX passwords cannot be decrypted. UNIX
passwords are encrypted with a one way function. The login program encrypts
the text you enter at the “Password:” prompt and compares that encrypted
string against the encrypted form of your password.
Password cracking software uses wordlists. Each word in the wordlist is
encrypted and the results are compared to the encrypted form of the target
The best cracking program for UNIX passwords is currently Crack by Alec
Muffett. For PC-DOS, the best package to use is currently CrackerJack.
Password Shadowing:
Password shadowing is a security system where the encrypted password field
of /etc/passwd is replaced with a special token and the encrypted password
is stored in a separate file which is not readable by normal system users.
To defeat password shadowing on many (but not all) systems, write a program
that uses successive calls to getpwent() to obtain the password file.
Finding the shadowed password:
UNIX Path Token
AIX 3 /etc/security/passwd !
/tcb/auth/files/[first letter #
of username]/[username]
A/UX 3.0s /tcb/files/auth/?/*
BSD4.3-Reno /etc/master.passwd *
ConvexOS 10 /etc/shadpw *
ConvexOS 11 /etc/shadow *
DG/UX /etc/tcb/aa/user/ *
EP/IX /etc/shadow x
HP-UX /.secure/etc/passwd *
IRIX 5 /etc/shadow x
Linux 1.1 /etc/shadow *
OSF/1 /etc/passwd[.dir|.pag] *
SCO UNIX #.2.x /tcb/auth/files/[first letter *
of username]/[username]
SunOS4.1+c2 /etc/security/passwd.adjunct ##username
SunOS 5.0 /etc/shadow
[optional NIS+ private secure maps/tables/whatever]
System V Release 4.0 /etc/shadow x
System V Release 4.2 /etc/security/* database
Ultrix 4 /etc/auth[.dir|.pag] *
UNICOS /etc/udb *

Password Hacking Tools


The following tools m gonna list now are some of the dangerous tools available on www, which may be used on u by an unethical hacker. I want you to be well aware of all the possibilities.

They are Free to download and it takes seconds to crush up personal computer if wired online, m not disclosing the links to these tools .

Lord PS
Lord PS is an editor that will create a password stealer/virus that emails you the passwords with tons of options, options may include taking over ur entire pc and disallowing u to access any of the files

Hosein PS v1.6
Does the same job with above with less options/features, another yahoo pass stealer

Fucker PS
This is a strong multi-password stealer that will grab passwords from all the most commonly used programs/services, msn, yahoo etc

JPS v1.8
Another password grabber/stealer – e mailer that is more focuced on Yahoo messenger

Demon PS v2.3
Yahoo messenger password stealer/mailer with anti virus kill options
and other system features

Tro messenger

The big Boss , used with Yahoo messenger lets u take over victims Pc

Many more exists,will be disclosing all of them
Even u can contribute

How to get your own Rapidshare Premium Account

Hello Friends,
Everybody wants a personal Rapidshare Premium account but not all can afford it. If you are one of those people who can’t afford it or don’t want to ask your parent to buy you one then there are only 2 ways of getting a Rapidshare premium account. First one is to hack a Rapidshare premium account of some other user. Hacking a Rapidshare premium account isn’t that difficult. But Rapidshare guys are very smart. They provide users with a feature of security lock due to which you will need access to the unlock code for that account to change the password of that Rapidshare account. Thus you can only use that hacked account till the owner of that account changes the password. This one seems to be a temporary solution. Second way is to earn some easy bucks online and buy your own Rapidshare account. The second way may seem difficult at first but to tell you the truth its very easy.
Rapidshare Premium
Today I will show how you can earn money online and that too without much difficulty. Just follow the steps given below:
1. Create a Paypal Premium Account( Don’t Worry its free) . When asked for credit card details simply say cancel. You do not need to fill it.
2. Then Go to the following link:
3. On joining this website, you will get 27 USD just for writing 7 simple surveys which will take not more than 30 minutes.
4. Now the only problem is that the minimum payout limit for this website is 75 USD. But you can earn 1.25 USD on referring this website to your friend.
5. So you just take the referral link from this website and paste it on your facebook status. Don’t forget to mention about it benefits so that your friends register through that link.
6. Suppose you have 500 friends on facebook and out of them only 10% register through your link then also you earn 62.5 USD which gets added to 27 USD that you had earned from surveys. Thus the total 89.5 USD crosses the Payout limit.
7. Now you can get that money into your Paypal Account use it not only to buy your own Rapidshare premium account but also for buying other stuff online.
8. That’s it. So Simple and I swear it works.
Update: Some people have a compliant that Awsurveys doesn’t pay them what they have earned and that it is a SPAM. I would like to tell you that I have already used this website earlier and I had received the payment every time. I am not saying that these guys are lying about their experience with Awsurveys but there are few reasons why they may not have received the payment. The only problem with this website is that it doesn’t communicate with the user if he is violating any terms and conditions instead of that it just cancels their payments. When you request some payout from this website, they have a policy to verify if the accounts that were referred by the user are not fraudulent and they remove the amount gained from these fraudulent accounts from the total amount in your account. Sometimes the reduced amount is less than the amount redeemed by the user and their harsh policy is to cancel the whole payment without even reimbursing the remaining amount. Now you might be thinking how to avoid this? One advice i would give you is to keep atleast 20-25 USD in excess when you are redeeming the amount. In this way you are making sure that even if there were 15 accounts which the website found to be fraudulent still the total wont get below the amount requested by you. Another condition is  of the maximum amount that one can redeem in a year. A user can redeem at max 550 USD in one year if you request for payout more than that then hey will just cancel that payment without reimbursing the money in your account. I already faced the latter one which indicates that I have atleast earned upto 550 USD.