Article archive
Botnet Detection Tool: Ourmon
01/09/2011 19:56
A botnet is a fusion of many exploits in a
Only client-server application. The server
called bot-server (usually IRC
server), where customers are known as
Botclients or zombies or drones. Most
Interestingly, the Botclients
botclients create a more coordinated
way for the establishment of a common goal
with little or no...
Penetration Testing With The Metasploit Framework
23/08/2011 10:13
Presentation
When you think "penetration testing tool"
first thing that comes to mind is the
Ruby world's largest project, with more than
700 000 lines of code "Metasploit". Not
wonder it has become the de-facto standard for
for penetration testing and vulnerability
development with more than one million
Unique downloads...
Send Free SMS Anonymously Unlimited
21/08/2011 11:17
free anonymous text messaging has become very hard and there are at least sites that offer this option, if they do so to pay heavy from their customers. Many people do not want to pay a cent for it. They just want their site, which gives them the ability to send free and anonymous messages to their friends, relatives and much more.
How to...
Some Ways To Choose A WPA Key
21/08/2011 11:15
Use numbers and letters is another great piece of base, but a series of truly random numbers is difficult to remember, but using something like a birthday that makes you vulnerable to anyone who knows your personal information. A balance sheet is double or triple the number. For example, if your birthday is on 25/08/1983 at 25,081,983 instead of...
Auto End Tasks To Enable Proper Shutdown
18/08/2011 21:52
Auto End tasks to enable proper shutdown
This log file will automatically end tasks and timeouts that prevent programs to stop and clean out the paging file.
1. Copy the following (all on the box) into notepad.
QUOTE
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager...
Anonymity
18/08/2011 21:42
I see you hiding in the shadows there, and then they can log all Web sites, FTP servers and other nooks and crannies you visit on the Internet. The type of information collected from these newspapers, which are available for webmasters of sites you visit include the address of the previous website you visited, your IP address, name of...
How To Make A Good Website
18/08/2011 21:37
A checklist for Web standards
The term web standards can mean different things to different people. For some, the "table-free sites," for others "with a valid code. However, web standards are much broader than that. A website built to the standards must adhere to standards (HTML, XHTML, XML, CSS, XSLT, DOM, MathML, SVG, etc) and implement...
Unlock Any Data Card Or 3G
18/08/2011 21:22
its a simple trick of registry hack.
you have change some windows registry value.
so lets start:
go to windows menu-click on run-write in the box"regedit"
hit the enter.
go to HKEY_LOCAL_MACHINE-software(HKEY_LOCAL_MACHINE\SOFTWARE\Linktop3G)
find out Linktop3G or your data card name.
now On the right-panel, change the Engineer key value...
Download Windows 7 Diamond 32 Bit Free
16/08/2011 10:01
Windows 7 Diamond - Violet X86 MULTI 7600.16385 | 3 GB
Software Version: 7600.16385 X86.5
Language: Russian, English Ukrainian.
Minimum system requirements:
Processor: 1 GHz 32-bit or 64-bit
Memory: 1 GB
Hard drive: 16 GB of free disk space
Video: Support for DirectX 9 graphics, 128 MB of memory (to enable the Aero...
Download The New Facebook Mobile App Free Airtel, Aircel, Idea, Relliance
16/08/2011 09:58
Facebook Mobile to get a quick and easy access to Facebook on your phone. Update your status, review your news feed and see the profiles of friends, from your phone.
You can use free for Airtel, Aircel, Idea & Relliance
DOWNLOAD IT FROM HERE-https://hotfile.com/dl/126937693/fd0e591/facebook.jar.html
How To Export Your Facebook Contacts with Facebook Friend Exporter
16/08/2011 09:55
Facebook Friend is a big exporter plugin extension chrome or export all contacts from Facebook every CSV file or directly from the listing of Google.
Now the process is very simple, which includes the installation of the extension and then simply following procedure will be continued.
Follow these steps to export your contacts...
Penetration Testing and Tools
15/08/2011 21:44
Penetration Testing and Tools
Using Metasploit
This chapter shows you how to use Metasploit, launched an operation and Development
platform.
• Metasploit: the big picture
• Get the Metasploit
• Using the console to launch Metasploit exploits
• Using Metasploit to exploit client-side vulnerabilities
• Using Metasploit...
TCP / IP Hijacking
15/08/2011 09:36
TCP / IP hijacking is a clever technique that uses spoofed packets to take
connection between a victim and a host machine. This technique is unusual
useful when the victim uses a password once to connect to the host
machine. A password only once can be used to authenticate once,
This means that sniff the approval is not necessary for...
Spot And Avoid Scams Of Facebook
15/08/2011 09:33
"There's a sucker born every minute." This quote,
mainly attributed to PT Barnum, originally called misleading
attractions of the carnival spectacle, but is equally relevant to
internet scams, scams, especially on Facebook today.
None of the common fraud on Facebook "Facebook does not like
Button ", the" Stalker Tracker "(which is...
Increase your RAM By Simple Trick
14/08/2011 09:30
1). Launch an application, such as Word. Open some important documents.
2). Press CTRL + SHIFT + ESC to open the Windows Task Manager and select the Processes tab and sort in descending order by memory usage. You will notice that WINWORD.EXE is somewhere at the top, using multiple MBs of memory.
3). Now switch to Word and simply minimize....
How To Speed Up Acrobat
14/08/2011 09:26
1. Go to the installation folder of Acrobat Reader
(C: \ Program Files \ Adobe \ Acrobat \ Reader \ .. whatever)
2nd Move all files and folders in the "plugins" to "optional" folder. (I repeat .. cut and paste files do not copy and paste).
Also, be sure Acrobat Reader is not open or close the files and lets you move files).
Now your...
COOL FACEBOOK HACK
13/08/2011 20:56
COOL FACEBOOK HACK
Invite all your friends at a time
1 - Copy the code below
2 - Now, click "Suggest to friends" in profile picture.
. 3-When your friend opens the list, insert this code in the address bar and press the Enter key, all your friends will be automatically selected, now click on "Send Invitation" below is the invitation code...
Increase Performance Of Windows 7
13/08/2011 20:53
This article discusses various methods to speed up your computer, making some changes in the configuration of Windows 7. You can also use these tips to computers running Windows XP, Vista, etc, but in most cases, you can not find the right methods. However, you can always look around for a career in their windows.
Remove Snap and Aero...
Free GPRS in idea August In 2G & 3G
13/08/2011 20:48
You can get 100% free GPRS on your idea of using the trick.
First Of All Download Opera Handler.
use https://z012.fma.fb.me.php.server4.operamini.com work and use the address of the server and use a second proxy socket: / / z012.fma.fb.me.php. Server4. operamini.com
Use the front of the request https://z012.fma.fb.me.php
Use cool idea that...
Free Reliance GPRS Trick August
13/08/2011 20:42
Reliance is a network to a CDMA network, and the type GSM.Here is hot Reliance CDMA and GSM customers who need to release free GPRS activation is significantly GPRS.Reliance way.Follow easy steps below and get a free GPRS.
Set the following values
APN-SMARTWAP
Port-8080
IP 97.253.29.199
Homepage-http: / / wap.rworld.co.in / GSM /...
Disabling The Guest Account In Windows XP
13/08/2011 08:55
Removing the guest account is recommended by security experts
The Guest account is created. As in previous versions of Windows, Guest
has had little effect on the real world and served as another form of
an attacker to access the system, especially because the Guest account is also
no default password.
In Windows XP, there is...
IP Addresses And DNS
13/08/2011 08:52
The term "host" can be confusing because it has several meanings in the computer
world. It is used to describe a computer or server that provides web pages. In this
context, it is said that the computer is "hosting agreement" website. Host is also used to
describe companies that allow people to share their Internet servers...
Run Windows Apps On Linux
13/08/2011 08:49
Each user of a non-Linux may be carried at all times.
Rather than admit defeat, you have two options:
The use of an emulator. Install the software that allows your Linux system to emulate
as if the Windows system. When you receive a proper emulator
installed, all you have to do is install a Windows emulator on Linux system.The then...
Virus Program to Block Websites
11/08/2011 23:06
Most of us are familiar with the virus that blocked sites Orkut and YouTube. If you're curious about creating a virus on your own, that's how you can do. As usual, I will use my favorite programming language "C" to create the site blocking virus. I will give a brief introduction to this virus before jumping to technical jargon.
This virus has...
Boost Your Wi-Fi Signal Without The Software
11/08/2011 23:03
There are a lot of things you can do a Wi-Fi router software to improve the signal strength. I think it's a pain in the ass. Let's do it less than a minute, and without touching the keyboard.
Investment
Radio waves and side fall. This means that the router as high as possible on a table or the floor as high as possible. If you are trying to...
homepage
Botnet Detection Tool: Ourmon
01/09/2011 19:56
A botnet is a fusion of many exploits in a
Only client-server application. The server
called bot-server (usually IRC
server), where customers are known as
Botclients or zombies or drones. Most
Interestingly, the Botclients
botclients create a more coordinated
way for the establishment of a common goal
with little or no...
Penetration Testing With The Metasploit Framework
23/08/2011 10:13
Presentation
When you think "penetration testing tool"
first thing that comes to mind is the
Ruby world's largest project, with more than
700 000 lines of code "Metasploit". Not
wonder it has become the de-facto standard for
for penetration testing and vulnerability
development with more than one million
Unique downloads...
Send Free SMS Anonymously Unlimited
21/08/2011 11:17
free anonymous text messaging has become very hard and there are at least sites that offer this option, if they do so to pay heavy from their customers. Many people do not want to pay a cent for it. They just want their site, which gives them the ability to send free and anonymous messages to their friends, relatives and much more.
How to...
Some Ways To Choose A WPA Key
21/08/2011 11:15
Use numbers and letters is another great piece of base, but a series of truly random numbers is difficult to remember, but using something like a birthday that makes you vulnerable to anyone who knows your personal information. A balance sheet is double or triple the number. For example, if your birthday is on 25/08/1983 at 25,081,983 instead of...
Auto End Tasks To Enable Proper Shutdown
18/08/2011 21:52
Auto End tasks to enable proper shutdown
This log file will automatically end tasks and timeouts that prevent programs to stop and clean out the paging file.
1. Copy the following (all on the box) into notepad.
QUOTE
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager...
Anonymity
18/08/2011 21:42
I see you hiding in the shadows there, and then they can log all Web sites, FTP servers and other nooks and crannies you visit on the Internet. The type of information collected from these newspapers, which are available for webmasters of sites you visit include the address of the previous website you visited, your IP address, name of...
How To Make A Good Website
18/08/2011 21:37
A checklist for Web standards
The term web standards can mean different things to different people. For some, the "table-free sites," for others "with a valid code. However, web standards are much broader than that. A website built to the standards must adhere to standards (HTML, XHTML, XML, CSS, XSLT, DOM, MathML, SVG, etc) and implement...
Unlock Any Data Card Or 3G
18/08/2011 21:22
its a simple trick of registry hack.
you have change some windows registry value.
so lets start:
go to windows menu-click on run-write in the box"regedit"
hit the enter.
go to HKEY_LOCAL_MACHINE-software(HKEY_LOCAL_MACHINE\SOFTWARE\Linktop3G)
find out Linktop3G or your data card name.
now On the right-panel, change the Engineer key value...
Download Windows 7 Diamond 32 Bit Free
16/08/2011 10:01
Windows 7 Diamond - Violet X86 MULTI 7600.16385 | 3 GB
Software Version: 7600.16385 X86.5
Language: Russian, English Ukrainian.
Minimum system requirements:
Processor: 1 GHz 32-bit or 64-bit
Memory: 1 GB
Hard drive: 16 GB of free disk space
Video: Support for DirectX 9 graphics, 128 MB of memory (to enable the Aero...
Download The New Facebook Mobile App Free Airtel, Aircel, Idea, Relliance
16/08/2011 09:58
Facebook Mobile to get a quick and easy access to Facebook on your phone. Update your status, review your news feed and see the profiles of friends, from your phone.
You can use free for Airtel, Aircel, Idea & Relliance
DOWNLOAD IT FROM HERE-https://hotfile.com/dl/126937693/fd0e591/facebook.jar.html
How To Export Your Facebook Contacts with Facebook Friend Exporter
16/08/2011 09:55
Facebook Friend is a big exporter plugin extension chrome or export all contacts from Facebook every CSV file or directly from the listing of Google.
Now the process is very simple, which includes the installation of the extension and then simply following procedure will be continued.
Follow these steps to export your contacts...
Penetration Testing and Tools
15/08/2011 21:44
Penetration Testing and Tools
Using Metasploit
This chapter shows you how to use Metasploit, launched an operation and Development
platform.
• Metasploit: the big picture
• Get the Metasploit
• Using the console to launch Metasploit exploits
• Using Metasploit to exploit client-side vulnerabilities
• Using Metasploit...
TCP / IP Hijacking
15/08/2011 09:36
TCP / IP hijacking is a clever technique that uses spoofed packets to take
connection between a victim and a host machine. This technique is unusual
useful when the victim uses a password once to connect to the host
machine. A password only once can be used to authenticate once,
This means that sniff the approval is not necessary for...
Spot And Avoid Scams Of Facebook
15/08/2011 09:33
"There's a sucker born every minute." This quote,
mainly attributed to PT Barnum, originally called misleading
attractions of the carnival spectacle, but is equally relevant to
internet scams, scams, especially on Facebook today.
None of the common fraud on Facebook "Facebook does not like
Button ", the" Stalker Tracker "(which is...
Increase your RAM By Simple Trick
14/08/2011 09:30
1). Launch an application, such as Word. Open some important documents.
2). Press CTRL + SHIFT + ESC to open the Windows Task Manager and select the Processes tab and sort in descending order by memory usage. You will notice that WINWORD.EXE is somewhere at the top, using multiple MBs of memory.
3). Now switch to Word and simply minimize....
How To Speed Up Acrobat
14/08/2011 09:26
1. Go to the installation folder of Acrobat Reader
(C: \ Program Files \ Adobe \ Acrobat \ Reader \ .. whatever)
2nd Move all files and folders in the "plugins" to "optional" folder. (I repeat .. cut and paste files do not copy and paste).
Also, be sure Acrobat Reader is not open or close the files and lets you move files).
Now your...
COOL FACEBOOK HACK
13/08/2011 20:56
COOL FACEBOOK HACK
Invite all your friends at a time
1 - Copy the code below
2 - Now, click "Suggest to friends" in profile picture.
. 3-When your friend opens the list, insert this code in the address bar and press the Enter key, all your friends will be automatically selected, now click on "Send Invitation" below is the invitation code...
Increase Performance Of Windows 7
13/08/2011 20:53
This article discusses various methods to speed up your computer, making some changes in the configuration of Windows 7. You can also use these tips to computers running Windows XP, Vista, etc, but in most cases, you can not find the right methods. However, you can always look around for a career in their windows.
Remove Snap and Aero...
Free GPRS in idea August In 2G & 3G
13/08/2011 20:48
You can get 100% free GPRS on your idea of using the trick.
First Of All Download Opera Handler.
use https://z012.fma.fb.me.php.server4.operamini.com work and use the address of the server and use a second proxy socket: / / z012.fma.fb.me.php. Server4. operamini.com
Use the front of the request https://z012.fma.fb.me.php
Use cool idea that...
Free Reliance GPRS Trick August
13/08/2011 20:42
Reliance is a network to a CDMA network, and the type GSM.Here is hot Reliance CDMA and GSM customers who need to release free GPRS activation is significantly GPRS.Reliance way.Follow easy steps below and get a free GPRS.
Set the following values
APN-SMARTWAP
Port-8080
IP 97.253.29.199
Homepage-http: / / wap.rworld.co.in / GSM /...
Disabling The Guest Account In Windows XP
13/08/2011 08:55
Removing the guest account is recommended by security experts
The Guest account is created. As in previous versions of Windows, Guest
has had little effect on the real world and served as another form of
an attacker to access the system, especially because the Guest account is also
no default password.
In Windows XP, there is...
IP Addresses And DNS
13/08/2011 08:52
The term "host" can be confusing because it has several meanings in the computer
world. It is used to describe a computer or server that provides web pages. In this
context, it is said that the computer is "hosting agreement" website. Host is also used to
describe companies that allow people to share their Internet servers...
Run Windows Apps On Linux
13/08/2011 08:49
Each user of a non-Linux may be carried at all times.
Rather than admit defeat, you have two options:
The use of an emulator. Install the software that allows your Linux system to emulate
as if the Windows system. When you receive a proper emulator
installed, all you have to do is install a Windows emulator on Linux system.The then...
Virus Program to Block Websites
11/08/2011 23:06
Most of us are familiar with the virus that blocked sites Orkut and YouTube. If you're curious about creating a virus on your own, that's how you can do. As usual, I will use my favorite programming language "C" to create the site blocking virus. I will give a brief introduction to this virus before jumping to technical jargon.
This virus has...
Boost Your Wi-Fi Signal Without The Software
11/08/2011 23:03
There are a lot of things you can do a Wi-Fi router software to improve the signal strength. I think it's a pain in the ass. Let's do it less than a minute, and without touching the keyboard.
Investment
Radio waves and side fall. This means that the router as high as possible on a table or the floor as high as possible. If you are trying to...
Remove Administrator Password Without Software
11/08/2011 22:57
DOS boot and delete the file and sam.log sam.exe Windows \ system32 \ config on the hard drive. Now, when you start the NT password for the built-in Administrator account, which is empty (ie no password). This trick works only if the hard drive is a FAT of its kind.
Hide any files and folders using Command Prompt
11/08/2011 22:55
Tips to hide files and folders using the command prompt
The most important thing is that you can access all search options, even if you click
"Show hidden files and folders" that can not be considered
Hide files and folders most popular work today is very important and it's really tedious to do finde also this tedious job easy
I'll give you...
How can secure wireless network
10/08/2011 22:50
First, the wireless network should be blocked. (A wireless network is as unlocked
to put your own personal filing cabinet O'Connell Street and then let everything from
have a "look in"). It also means that people can steal bandwidth, ie, they can
backpack on the back of your Internet connection, free internet access, at the same time
time to...
MAKE FASTER YOUR WINDOWS
09/08/2011 21:14
Is this your copy of
Windows XP
very slow to start
machine? Here's how
speed up boot time
with a quick registry tweak.
1. Open the Registry Editor
and go to HKEY_LOCAL_
MACHINE \ SYSTEM \ CurrentControlSet \
Control \
content index.
2nd In the right panel is a
value called "StartupDelay."
To access this option,...
Simple Registry Hacks In Windows7
09/08/2011 21:09
Modifying Windows Registry is not as scary as it sounds,
but do not forget to backup your registry before proceeding.
1. Accelerate Peek: Windows 7 Aero Peek, you can
summary on the desktop after a delay of 500 milliseconds. Unless
as expected, you can shorten this break.
Open the Registry Editor and go to HKEY_CURRENT_USER \
Software \...
How to hack websites and damage to a web application using Cross-Site Scripting (XSS) vulnerabilities
08/08/2011 23:34
Cross-Site Scripting (XSS) is a common flaw in web applications today. XSS flaws can cause serious damage to a web application. Detecting XSS vulnerabilities early in the development process will help protect a web application from unnecessary flaws. XSS-me is the Exploit-Me tool used to detect reflected XSS vulnerabilities.
XSS-Me is the...
Hack Exploit Site Using DNN
08/08/2011 23:31
DORK Use Google trying to find a vulnerable site.
inurl: "/ Portals / 0"
You can also modify the Google dork for your needs and requirements.
Two site is vulnerable to this attack:
https://www.wittur.se/
https://www.bsd405.org/
n00bs can try both sites for testing.
Open the home page, and check for any image, which is located in / Portals / 0...
Search Google Cache To Find Vulnerabilities Using V3.0 SITEDIGGER
08/08/2011 23:29
Site excavator 3.0 searches Google's cache to look for vulnerabilities, errors, configuration issues, confidentiality and security of interesting nuggets on web sites.
What's New in 3.0 SiteDigger
* Improved user interface, update and signature page of results.
* No longer requires a license key from Google API.
* Support for proxy and Tor.
*...
Boot Defragment
08/08/2011 09:55
A very important feature of MS Windows XP is the ability to start a defrag. This means that all boot files are located side by side in order on your hard drive. During boot XP can access these files quickly and gives a faster start. By default this option is enabled, but some users who upgraded from previous versions of Windows reported that it is...
How To Fix Missing DVD Drive In Windows 7
08/08/2011 09:53
Sometimes you can find fault with the DVD-ROM drive in Windows 7, even it not appears in the BIOS. The solution belongs to some settings in the registry. DVD shown in Windows Explorer as follows:
* Click the Start button, type regedit in the search box and press Enter. This will open the Registry Editor in Windows 7
* Search for...
Replay Auto YouTube
07/08/2011 09:42
AutoPlay / playback automatically play videos on YouTube feature allows you to play your favorite songs without having to press "Play" button every time, especially the video ends.
Some browsers with built-in ability to add extensions / applications makes the auto repeat feature is child's play compared to others. Since this particular function...
How To Login in Windows XP After Password Forgot
04/08/2011 23:09
Here is a simple way to access Windows XP with Administrator rights and privileges if you have password protected your User account on your Windows XP system and can't remember the password(s) to login. Let's start:
1. Start your PC and come to Login Screen
2. Press CTRL+ALT+DELETE twice or thrice. It will open a new type of "LOGIN" Screen
3....
How to enable registry disabled by administrator?
04/08/2011 23:07
1. Open Notepad.
2. Copy the code below and paste it into Notepad.
Windows Registry Version 5.00
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System]
"DisableRegistryTools" = dword: 00000000
3. Now save the Notepad file as "anything.reg" (without quotes) and make sure you select the file type and save all...
How To Boost Speed Reliance NETCONNECT Data Card
03/08/2011 09:55
We have a lot of 3G data cards available in India, with unlimited use of a slightly higher price, but the dependence NETCONNECT and BSNL 3G would be a good choice in terms of speed and coverage. Plans for broadband wired or wireless connection might be a disadvantage that the bandwidth available to pay the rate. May be due to the decision of the...
How To Remove Adobe Reader Auto Update
03/08/2011 09:53
Do you think it is right to launch an update of the program without asking a word from you. Adobe Acrobat PDF Reader does. Most versions of Adobe Reader has a feature very annoying to update the software without informing you. Update size is about 10 MB, so it will push the speed if you have a slow Internet connection for a while.
I tend to treat...
Anonymous Mailer Software
02/08/2011 10:07
Anonymous Mailer is an award-winning anonymous email, through which a user can send emails directly from your computer, regardless of the email id exists or not. No need to reveal your original e-mail address to anyone. Send email from any@any.com.
So, just follow the instructions below to send anonymous e-mail this software Anonymous...
Firefox Addon To Convert The Text Links To Clickable Links
02/08/2011 10:05
Sometimes we may need to goto links, that do not work, websites and e-mail. The only way to open the url to copy and paste the address into the address bar of your browser. But some people get irritated when there's a lot of links to go the same way.
There is a solution, a Firefox addon called Linkification is available to convert normal text...
Control Your Computer With Your Mobile Phone
29/07/2011 11:34
There's a program called CellPC that allows you to perform operations on work / home PC via your cell phone or wireless device easy and fast. Imagine being able to shutdown, restart or logout your computer remotely ... finding files on your computer and then send them to your phone ... View real-time screenshots of your computer at any time ......
Discovery Of Trojan Horses Hidden On Your Computer
29/07/2011 11:33
Do you care that is not a Trojan horse hidden works of virus or a keylogger on your computer and send the user names of hackers?
If you're in this situation, you do not have to worry anymore. In this post I'll show you a security software called Revealer process that can detect and kill hidden processes.
Process Revealer Free Edition is a free...
Android Mobile Secret Codes
25/07/2011 21:55
HERE IS SOME CODES OF ANDROID TRICKS
Here are some tips CODES Android
* Cell Battery, WiFi etc. Use Information - * # * # 4636 # * # *
Restore factory settings * - * # * # 7780 # * # *
Phone Format * - * 2767 * 3855 #
* Start the service mode - * # * # 197328640 # * # *
* Test WiFi - * # * # 232339 # * # * # * # or * 526 # or * # * # * # * #...
Tips To Look Megavideo Full Movie
25/07/2011 21:51
Follow a few steps and see the whole video.
megavideo plays normally only supports a maximum of 72 minutes, but the tips help to see the full video.
Step 1: Click the first player to play megavideo two minutes.
Step 2: stop and wait for the video and the full buffer.
Step 3: Now select the GOTO and offline browser.
Step 4: Now fully...
Lock Computer Using USB
24/07/2011 00:00
Portable Security is an evolving and new technologies such as fingerprint readers, eye scanners, facial recognition, etc. But what about video games?
Using this trick, you will be able to lock your computer with a computer USB.The only works when the USB is connected to USB keyboard in.Once is removed and the mouse automatically turns off and the...
How To Create Your Own Virus Dummy
23/07/2011 23:58
There is a trick to create a fake virus (which does not harm the computer). Using this program you can easily fool your friends. To open the notebook and enter the following content
lol = MsgBox ("Warning a virus has been detected on your PC. Click Yes to format the existing hard drive or reinstall your operating system," 20, "Warning")
Notepad...
How to Hack with Java Script
22/07/2011 08:42
STEP 1
You must first obtain a "source": Set the maximum security of Internet Explorer high, click on the link and level 1 is at the top of the menu bar, Internet Explorer, File, Edit, View, etc. Click on "View" "Source" . This takes the Notepad window. Search:
Password = prompt ("Enter the password Password !","") = prompt (" Enter the password...
Hack PC & System using Netcat
22/07/2011 08:41
Configure and connect to a "target" computer
First, make sure you have netcat installed, "attacking" the computer and the computer "target". No matter if your computer is running on UNIX or Windows.
To be able to connect to this "target" you must start netcat "target," the computer so that the "attack" the computer can connect.
Windows: Open a...
increase your internet speed
20/07/2011 23:05
The following message is on some of the ways to increase the speed of the Internet, I will show you some ways to increase the speed of the network and browser
Go to Start- Type- Run, and in "gpedit.msc"
Computer Configuration - Administrative Templates - Network - QoS Packet Scheduler.
After that, you should see something like "hut Limit the...
Shutdown some ones pc while chatting on msn,yahoo
20/07/2011 23:04
1) Right-click the desktop and go to New, then Shortcut.
2) Then the "object type" you want to write:
% Windir% \ system32 \ shutdown.exe-st 120-c "This is a virus" or something of your choice
The 120 you have written may also change at will, it is simply the amount of time they receive as the computer will shut down.
When the code has been...
How To Check SQL Injection
20/07/2011 23:03
SQLI attack is the most popular Web site in any of these days.There was a huge increase in SQL programmers and web pages, and the biggest problem with SQL is "Perhaps your perfect / pirates." Due to poor coding programmers often leave vulnerabilities in place and the pirates of his duty to report and can see patches up.So
how to check if the site...
install Linux KeyLogger in Ubuntu
19/07/2011 10:02
A keylogger is hardware / software based, running in the background and the card every keystroke to a log file without user awareness.
Linux x86, LKL Keylogger is a common, also known as key logger KeyLogger.Linux Linux is open source and free software.Once maps installed keylogger keyboard port 0 × 60, all keystrokes to be signed file.So Here's...
IP Address Changes Instantly While Browsing For Free
19/07/2011 10:01
You may have to change your IP address while surfing the Internet for the anonymity of the search engines to store your data or access a specific service location. Of course, you have many tools that provide these features, since, as the most popular tool anonymizer tor.But the problem with this is that it takes too long to start and must be...
VODAFONE FREE GPRS Trick
18/07/2011 20:44
Vodafone users can now freely use their own make-up Vodafone GPRS connection.This Free is available free on Vodafone's GPRS connection, 100% free.You can browse and download unlimited use of this trick.
Activation of a free Vodafone GPRS you must create a new regulation on mobile phones with the following settings.
APN-vlive
ip:...
BSNL 3G HACK FOR FREE GPRS
18/07/2011 20:43
It 's time to hack using BSNL 3G 2G sim.You need to get a 2G 3G SIM card for access.
When you're ready for the new SIM card can go to the access point settings and create a new access point with an access point as bsnlnet and leave all other options as blank.Now save point and return to the browser goto browser. In wap.google.com and minimize the...
RELIANCE FREE GPRS TRICK
18/07/2011 20:41
Get free GPRS on your mobile.Browse unlimited confidence Reliance free.Look for you below to activate free GPRS connection on your Reliance soon.
Procedure for free GPRS on Reliance
Create a new option on your mobile phone using the following parameters
APN: smartnet / rcomnet
Proxy: 64.255.180.253
Port: 80
Download any opera handler &...
ACCESS Control Another Computer Hard Drive
17/07/2011 20:50
Your guide will tell you about NETBIOS HACKING HACKING remote access and ES hard drive or printer. NETBIOS Hack is the best way to get into a remote computer.
STEP BY STEP PROCEDURE NETBIOS HACKING
1.Open Command Prompt
In the second command prompt using "net view" command
(Or use "NB Scanner" option "Tools" IP addresses by entering IP address...
Make a Cell Phone a Webcam
17/07/2011 20:48
Maybe you have an old mobile phone out there that you no longer use, or maybe just hate carrying a lot of gadgets with you when traveling. Anyway, the piece of software that can turn your phone into a webcam.
1-Choose a webcam / mobile phone software. These programs allow your cell phone via Bluetooth to communicate and work effectively as a...
Use The Android Phone As A Wireless Keyboard
17/07/2011 20:46
PRemoteDroid is a free handy for those of you who have HTPC (Home Theater PC) or presentations for the job. It basically allows your phone to use Android touchscreen touchpad as a mouse and keyboard to enter text - wirelessly! Not only that, it is a file browser and screen capture functionality. Very neat. Hit the jump for more information about...
Restore Previously Opened Files After Shutdown
17/07/2011 10:26
If you want to spend a lot of folders on your computer or network at regular intervals, you can set to re-open automatically when you log on, shutdown or restart the computer the next time. There is no need to open regularly used folders manually, configure the simple sitting, your computer will automatically download all the previously opened...
Format HDD With Notepad
17/07/2011 10:25
If you think that notepad is useless then you are wrong, because now you can do a lot of things you might never have a memo imagined.In this hack will show you how to format the hard drive using Notepad. This is really cool.
Step 1.
Copy the following reminders equally says01001011000111110010010101010101010000011111100000
Step 2
Save as an...
How Can Find A Vulnerable Web Site?
16/07/2011 23:29
Website security is a big problem today and should be a priority in any organization or webmaster, now concentrate hard for hackers to find holes in a web application, if you own a website and have a high page rank and high traffic, then there is a possibility that it might be a victim of hackers.
A few years of their existence without proper...
How To Steal Session Cookies And Hijack A Facebook Account
16/07/2011 23:27
An attacker can use several methods to steal authentication cookies from her facebook that the network is activated, if an attacker is in the center and base radios, just intercept the traffic with a packet sniffer and access to the accounts of victims .
If an attacker is on a switched network based, it would use an ARP request to capture...
MAKE MONEY WITH LEGIT & 100% LEGAL SITE
16/07/2011 10:28
PRELAUNCHING the best company to ensure a stable and BRNADED COMPANY PRODUCTS CO 35000 AVAILABE.
PRE LAUNCH best plan of blasting. INVEST 6000 / - Earn 1750 / R - per week and 7000 / - PM. INVEST 4000 / - RS money. 1000 / - per week. INVEST 2500 / - to earn a 500 / - per week. REF DIR 5%, 10% MATCHING binary, as well as attractive prizes. PRE...
To Convert A FAT Partition To NTFS
16/07/2011 10:27
To convert a FAT partition to NTFS, follow these steps.
Click Start, click Programs, then click Command Prompt.
In Windows XP, click Start, click Run.
At the command prompt, type CONVERT [drive letter]: / FS: NTFS.
Convert.exe attempts to convert the partition to NTFS
Although the risk of corruption or data loss when converting from FAT to...
free Internet Via Bluetooth With Nokia
16/07/2011 10:26
Enjoy the Internet for free on your Bluetooth mobile phone Nokia! Follow this simple trick to access the Internet for free on your mobile phone using Bluetooth. It's as simple as possible.
The access point of a mobile phone
Tools \ settings \ connection \ access points \ options from the point \ new access> default settings ... These are...
How Do You Send Large Files
16/07/2011 10:25
Normally, all mail is used to send datas and files around the world for free.
But everyone can not attach files over 25 MB in size.
Some people use Rapidshare or file serving and download sound files and share files, but it is very difficult to upload and download files from this site they said to wait 5 or 10 minutes to download.
Normally,...
Download From Hotfile as a Premium by Cookies
15/07/2011 21:49
Step 1: Registration of a new free account at Hotfile.com premium to use cookies.
Step 2: Install "Cookie Editor" addon (https://addons.mozilla.org/en-US/firefox/addon/13793/) and restart Firefox.
Step 3: Connect to your account signed.
Step 4: In the Firefox menu, click Tools, then select Cookie Editor.
Step 5: Double-click "Hotfile" site...
How to bypass any sms verification
15/07/2011 21:49
There are several websites such as Google, YouTube, etc., demanding an SMS verification before registration
here is a simple trick
Http: / / receive-sms-online.com / first visit
copy of one of the two numbers written below and put it in areas where applying for registration sms r
then easy to return https://receive-sms-online.com/ and click on...
How To Send SMS To Anyone Using Anyones Cell Phone Number
15/07/2011 21:47
Today I share a great ride with you all. Today I will tell you how to send anonymous sms how to send SMS from any mobile phone number to any mobile number which means how to send SMS from mobile phone your friend on your mobile phone or your friends to your cell phone or another number of friends. Basically, this technique is called identity theft...
For 'Hack A Coke Machine
15/07/2011 10:29
Note that is for educational purposes and not
Designed to allow you to actually use on a work machine
Sure there are.
Ok ... Lets Go, you can watch "soda" (r0fl) Free
1. Running machines?
There is a very strict list of vending machines that have the debug menu. First,
they are all Coca-Cola vending machines. This means that huge, not to be...
User Tracking
15/07/2011 10:27
Spyware and adware can track data on individual users, to build
profile for each user. User data can then be used to target advertising
particular user, for example. Perhaps the most important mechanism for monitoring users
is the use of cookies. This is the subject of the next section, which deals
as cookies and other data sources can be used...
Make Your Desktop Background Screensaver Unchanged
14/07/2011 23:29
Make your desktop wallpaper, screen saver to be modified by anyone.
This tip is for Windows 7 will work with Windows Vista and earlier versions as well.
Step 1: Open the Run window.
To open the Run dialog box by pressing the (+ WindowsKey R), or click on the Start Menu and type Run for it
Step 2: Enter gpedit.msc in the Run box and press...
Keep Your Gmail E-mail Without A Computer E-mail List Of Programs Gmail offline
14/07/2011 23:26
Offline Gmail has a feature where you can save messages, conversations, attachments, stickers on computers without using e-mail programs like Outlook.
Offline Gmail to synchronize the entire contents of your Gmail account on your PC when your internet connection and u can work with your mail while not connected.
Activate the Gmail
1. Login to...
Secret Shortcuts For Windows 7
14/07/2011 23:25
Two secrets of Windows 7 - cool computer tricks
1: Press windowskey + x
get Windows Mobility Center, where you can control things like
* Network Adapter WiFi on / off
* Brightness
* Volume Control
* Projector or external monitor
* Charge the battery and power options
* Synchronization
2: Click and shake through any window quickly.
This...
How To Take Pictures With Webcam Without Software
14/07/2011 08:27
after installing the drivers for the webcam, you may want to install a suite of applications Web cam to take pictures. But if you do not want to download or install such things, just to test your webcam you can take a snapshot of my Windows Explorer itself, which means you do not need to install any software is adapted to take a picture (except...
To Create A Bootable USB Drive
14/07/2011 08:16
To Create A Bootable USB Drive
You can install the Windows operating system from a USB stick.
How to make a bootable USB drive?
Bootable USB is very useful for laptop USB users.Bootable make installation a easy.You can create a Windows Vista and Windows 7 launch.
Follow the steps to make a bootable USB
1-Connect your USB key (Note: We will...
Beginners Ultimate Guide To Keylogging
13/07/2011 22:58
In this guide I'm going to go through all the common topics, you may need to know. After reading on this topic do you know everything you will ever need to start keylogging. I will cover all related keyloggers and cover the terminology and definitions. Let me explain how a keylogger is, and how to even start to make your own! So, to get...
How To Hack Someone By Knowing Their IP
13/07/2011 09:36
Presentation
1. Welcome to the document created by aCId_rAIn NETBIOS. This document will teach you a few things about NetBIOS, making it, how to use, how to cut with it, and some other simple DOS commands that will be useful for you in the future. This document is only NEWBIE! If you are a beginner then do not go beyond reading this, because if...
Password Hacking Using Google
12/07/2011 23:00
Google is your best friend when it comes to piracy. The search engine giant pulled a lot of data that was intended to be protected by webmasters, hackers password via Google butAdvanced - easy to learn, quick to deploy. Today I will discuss some practical dorks will help you obtain the passwords, databases and directories vulnerable. The basic...
PC Cheats
12/07/2011 09:38
Here are some tricks cool computer that will make your computing experience more convenient and faster. Check them and you will be more efficient with your computer from now on.
COMPUTER Computer Top 10 Tips, Cool Tips
1. Internet
If you are a person assess the Internet on a regular basis, then you have to clean the temporary files regularly....
Transfer Files From IPod To A Computer
12/07/2011 09:37
If so, then you may want to transfer your files from your old iPod to your computer so you can easily be transferred to the iPod without losing any data. To do this you need to know the method for transferring files, follow the steps below:
IPod nano How to transfer files from iPod to new computer
Steps:
1. First of all, make sure that the iPod...
Browse The Internet Using Windows XP Calculator
12/07/2011 09:36
Have you ever thought of surfing the Internet via the integrated Windows utilities, such as MS Paint, Calculator, Notepad, etc? Yes, you can do it, the utilities built into Windows XP allows you surf the Internet without Internet Explorer.
If you do not know how, so I'm here to share a trick to surf the Internet using the calculator of Windows XP...
Basics Of Javascript Injection
11/07/2011 22:59
JavaScript is a technique commonly used within websites and web-based applications. JavaScript can be used for all sorts of useful things and functions. But all this comes some additional security issues that have been designed and tested. JavaScript can be used not only for good purposes, but also an injection is a bad purposes.JavaScript elegant...
Cool Javascript Trick
11/07/2011 22:58
Go to https://www.google.com
* Click on "images"
* Fill in "bikes, flowers, cars" or other words.
* For a page with a lot of thumbnail images.
* Now delete the URL address
(Example: https://images.google.com/images?hl=en&q=flowers&um=1&ie=UTF-8&sa=N&tab=wi
* Copy writing here, and paste it into the address...
Firefox Tricks
10/07/2011 09:38
I
Everyone's favorite open-source browser, Firefox is just great out of the box. And with the addition of some awesome extensions available out there, the browser becomes better and better.
But look under the hood, and there are a number of hidden (and some not-so-secret) tips for a crank Firefox up and pimp your browser. Do it faster, cooler,...
Hide In The (Network) Neighborhood
10/07/2011 09:37
You do not want your XP computer to appear in the browse list (Network Neighborhood / My Network Places) to other users on your network? One way to accomplish this is to disable file sharing. To do this, click Start, right-click My Network Places and select Properties. Right click your LAN connection and click Properties. Uncheck the box that says...
How To Make Internet Explorer Faster
09/07/2011 23:23
Internet Explorer is a revolutionary web browser, browser history so far. Despite the many advantages of Internet Explorer, we have some disadvantages, such as the slow navigation, and tabs are not as impressive, and the card, cancel the option, even if the disadvantages The main disadvantage is the speed slower rival Mozilla Firefox. So I have a...
How To Change Text Styles Facebook Chat
09/07/2011 23:21
how to do the following Facebook Chat: bold, italic and underlined.
Code to do all of this is given below.
Make text bold
* Write your words between * * (two stars), will automatically become fat.
* Example: You write
* * Learn to hack
becomes
Learn to hack
For underlined text
* The type of _ _ (two underscores), the underlined text will...
Cool Windows Xp Tricks, Tips
09/07/2011 10:43
1) Add "Open New Window", right click:
What we do is very clear and simple. Just browse the registry Start> Run, type regedit>.
- From the log window open, go to "HKEY_CLASSES_ROOT \ Directory \ shell."
- Now right click on the "Shell" and select "key" and create a new key named "Open in new window".
- Now right click "Open in...
How To Set Multiple Home Pages In Firefox
08/07/2011 22:57
you can easily do without the use of any third party add.
You can do:
* Go to Tools> Options> Main
* In the Firefox starts drop-down menu select Show my home page
* In Home Post your home page, separated by | (pipe symbol)
Example: https://www.google.com|https://www.twitter.com|https://www.newtipsandtricks.webnode.com
* Click OK
Now...
Creating Folders And Files without any name
08/07/2011 22:56
This trick allows you to create files and folders without any name.
Just follow the instructions as follows: -
1) Select the file or folder.
2) Right click on it, choose "Rename" or press "F2".
3) Hold down "Alt". While holding down the Alt key, type numbers '0160 'from the keypad.
Note: - Enter the number '0160 'by NUMPAD, that the numbers...
Get Genuine XP In 5 Minutes
08/07/2011 22:54
Now that I've seen angry people read and read several times on how to bypass Windows Genuine check. Well guess what, the circumvention or more, without having the real genuine article for free. How? Read below:
1) Start> Run> "regedit"
2) Go to the key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \...
How To Make Invisible Folder Password Protected
08/07/2011 09:07
If you want to protect your file? You want to make it invisible so that it remains unnoticed by ordinary users? Well here is one way to do it. In this post I will show you how to create a password protected folder in Windows without additional software. Here are step by step procedure to create a folder password protected.
How to create a...
Use Google For Hacking
08/07/2011 09:05
Google serves some 80 percent of all Internet searches appears to be the search engine the most popular. However, Google can reach not only the information resources available to the public, but also provides access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google to...
Advanced Shellcoding
07/07/2011 21:16
The multiplicity of mul
This technique was originally developed by Sorbo of darkircop.net. The MUL instruction may seem trivial on the surface, and it's obvious purpose. But when faced with the difficult task of narrowing your shellcode, it proves to be very useful. First some background information on the mul instruction itself.
MUL performs...
DoS Attacks
07/07/2011 21:14
Denial or refusal of service is a technique of choice for hackers hacking. This is relatively easy to make and has been a testing ground for budding pirates. In fact, hackers use this technique to gain wide recognition because of the fame and respect that the success of a DOS attack brings the intruder in the basement.
DOS attack is performed by...
Hide All Drives In My Computer
06/07/2011 21:06
Hiding Drives (c, d, e ) Ur Computer
It's a great ride, you can play on your friends. To disable the display of local or networked drives when you click My Computer.
* Go to Start - Run.
* Type regedit
* Now go to: HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
* Now in the right pane, create a new...
Allow Users To Run Only Specified Programs In Windows 7
06/07/2011 21:04
You can allow users to run some programs, the operating system Windows 7. It is up to you if you want to share a computer, users can perform only a few programs for Windows 7 a shared computer in the office, for example, can be determined in the same way, if the company does not want employees to perform all types of programs . You can allow users...
How to Hack Someones IP Address?
06/07/2011 21:03
Alright, I'm gonna give you this script, that you write in the index.php. It will redirect them to https://www.google.com/, but you can change that in the script.
Here is the sript:
Code:
<?php
$file = 'IPz.txt';
$handle = fopen($file,'a');
if(!isset($_GET['p'])) { header('Location: https://google.com'); }
fwrite($handle, $_GET['p'].':...
Linux Keylogger
06/07/2011 21:01
people believe that the Trojans are not valid against the Linux operating systems. The reality is that Troy is valid against the Linux operating systems, but they infect in different ways.
LKL is a popular Linux keylogger that runs on Linux on x86 architecture. LKL sniffs and logs everything that passes through the hardware keyboard port (0x60)....
Increase Your Cable / DSL Speed
04/07/2011 20:12
Here's an easy way to improve your cable / DSL speed, just copy the whole text in bold "quotes" below to Notepad, save it as *. reg, ie "DslBoost.reg".
Then all you have to do to modify / restore is double-click the *. reg!
REGEDIT4
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters]
"GlobalMaxTcpWindowSize" =...
How To Use Your PC as a Web Server
03/07/2011 19:48
When you pay for web hosting, you are immersed in a system that by its nature will limit much of what you can do. Web hosting companies now place arbitrary rules of their customers to get them to pay additional fees, the price for them to offer this service will not increase if you use it. IRC is streaming content, tracker torrent, ssh access,...
Mac's Are Becoming More Vulnerable
03/07/2011 19:47
For this article, we will need a Windows PC, "PC" and Apple "Mac", so do not have in my case about how Macs are personal computers. I also understand that all Mac users are like the image in this article I'm talking about diehard fans of the boys, who do not get a word edgewise as talk about how much of their $ 3,000 chrome gizmo is. Let's go...
What The Trojans Or Trojan Horse Back Door And Work
03/07/2011 19:46
lets begins with:
Mandate various malicious code
Understanding the different types of backdoors
Overview of the various tools of Troy
Learning effective prevention methods and countermeasures
*
Overview of Anti-Trojan Software
*
Learning to produce a Trojan
Trojans and Backdoors
A Trojan horse is as follows:
*
An unauthorized...
How To Remove Autorun Malware
03/07/2011 19:44
AutoRun is a feature that automatically analyzes the autorun.inf file are in a removable media such as memory sticks, external hard drives and other means of removal.
Microsoft has released a software upgrade to limit the autorun feature in Windows operating systems to block a vector of common malware spreading. This is very useful to protect...
How Do I Know If My Computer Can Run A Game Or Not
03/07/2011 09:16
If only playing Solitaire or Minesweeper on the computer or play games online, then you do not need this service, that these games can run on any computer.But if you play games created by game companies like EA, Ubisoft, etc. , then this advice will be helpful.
As there are many games and play these games, your computer must have some minimum...
Protect You Against Keyloggers
02/07/2011 10:24
Things you need:
First Mozilla Firefox
2nd Key Scrambler (used to encrypt keystrokes)
3. Spyware Terminator (best-selling anti-spyware and anti-adware).
Protection against keyloggers:
Step 1: Download the Mozilla Firefox browser. Freeware and download any software from the site, such as
https://www.filehippo.com/download_firefox/
Step 2:...
Close Any Accounts On Facebook
02/07/2011 10:23
Step 1 - Go to this address:
https://www.facebook.com/help/contact.php?show_form=deceased
IMPORTANT: under penalty of perjury, this form is intended only for reporting commemorate a deceased person. Commemorate the bill to set the privacy so that only confirmed friends can see your profile, or trying to search. Wall remains, so friends and...
How To Format A USB Flash Drive Infected With A Virus Using Command Prompt
01/07/2011 22:54
This simple trick format allows you to format a USB drive is infected with a virus using command prompt in Windows. There may be some situations where you can not format your USB drive by right clicking and selecting format. Simply because the script of the virus inside the pendrive does not allow such things. If you try to delete the virus file....
Update Node32 Anti Virus Offline
01/07/2011 22:53
many home users do not update the software anivirus not only because they are equipped with internet connection at home. it is better to have a computer without anti-virus that the use of outdated anti-virus! Yes, the software update virus database security is necessary to protect against new threats.
Many users use the Eset Node32 antivirus...
Ultimate Wireless Hacking Guide For Beginners With CommView For WiFi
01/07/2011 22:51
CommView Network Monitor is a powerful and analyzer designed for network administrators, security professionals, network programmers, home users ... almost all those who want a complete view of traffic passing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance, flexibility and ease of use unmatched...
Installation, Start Windows From A USB Pen, Thumb Or Flash Drive
01/07/2011 17:00
Normally, Windows is installed, it uses optical media such as CDs and DVDs, but there are times when it is not possible to start the Windows installation disks using probably because your DVD player does not work, or if you use one of these ultra-portable laptops, it is not there.
Install Windows XP, Windows 7, Windows Vista from USB flash...
How Do I Get Rid Of A Worm
01/07/2011 16:58
here are many bad codes and programs can affect the performance of our PC, this threat is a worm or simply called worms, can be found frequently on the Internet through size really small.
The damage caused by this malware can seriously affect the network and the computer system, therefore a comprehensive process of cleaning should be performed...
Mediafire Downloads Using Cookies Resume Remove Addon
30/06/2011 20:56
Millions of files, including downloaded movies every day mediafire, one of the best sites for free file hosting and leader. Normally mediafire resume function provides its software as the maximum file size allowed is 200 MB user free. But sometimes, CV only last a few minutes and the download will not resume if you have sent a request to resume...
Reduce firebox start up load time
30/06/2011 20:55
People who use Mozilla Firefox with low income (RAM..) Complain that Firefox is a lot of time to start especially in the first time after restarting the computer. Programs like Firefox is available for the cache files of certain pre-boot Firefox into memory when Windows starts. But in my experience, but also will slow the computer because it takes...
Find Your Cache Folder Of Firefox
30/06/2011 20:54
Firefox use the cache of its range of online games on the hard drive that stores navigation information of a meeting. A session includes the launch to exit Firefox. caching of Web page elements to accelerate the process of loading the page the next time you load the same page. The browser is configured to clear the cache in the default output....
How To Maintain Computer Hardware
30/06/2011 09:52
learn to keep your computer updated in top shape with tips for computer maintenance. Always seem to talk about computer maintenance, but not maintenance of computer equipment. We even have a checklist of comprehensive computer maintenance, but maintenance of computer equipment is only mentioned briefly.
Care Computer Hardware
Computer Tips 1:...
How to find out The lost documents or files on your computer
30/06/2011 09:51
Have you ever worked in a document (any document), save it, but now can not remember the name of the document?. To this end, locate the file, and if you remember at least the name of the application, you have a good opportunity to invest in the file. Now, the easiest way to find the file if you do not remember the name of the application that uses...
How To Remove Or Manually Remove The Windows Genuine Advantage Notifications From Microsoft
30/06/2011 09:49
Microsoft has released a removal instructions, step by step, to disable or uninstall the driver manually or pre-release version of Microsoft Windows Genuine Advantage (WGA) Notifications (KB905474), which are variations that range from 1.5.0527.0 to 1.5.0532.2, While the instructions can also be used to uninstall the update and the release of...
How To Protect Your Computer Against Spyware And Adware
30/06/2011 09:48
Cookies are harmless compared to spam, viruses, worms, spyware and Adaware. Most of us spend a lot of time trying to fight the battle, which is easy to fight if you know how to fight and have the right tools. Fighter ever goes into battle without proper training or tools and weapons of war and the specific type of terrain orshe goes, so you should...
Free Call World Wide!
30/06/2011 09:46
Free Call World Wide!
i suggest You to create multiple email accounts, so You can record around several times.
Well, if you want to try the trick .. Do not do the following errors
1. Donors to make a number movibox accounts quickly, because then they can be easily understood!
Delete the second cache and cookies before you register your new...
Make a 100mb Live/Bootable USB of Puppy Linux-Use it to Break Computer Security physically and much more
29/06/2011 23:51
How a Linux Live USB key 100MB in size
Hack password-protected computer with this USB-Live
Secure your computer by removing the current virus
How to make Puppy Linux Live USB 100 MB in minutes
1 - First, download the installer from here USB Universal.
https://www.ziddu.com/download/15403210/Universal-USB-Installer-1.8.5.5.rar.html
2 - You...
Make a 100mb Live/Bootable USB of Puppy Linux-Use it to Break Computer Security physically and much more
29/06/2011 23:51Tips To Protect Against hacking
29/06/2011 21:38
hacking is one of the main problems faced by Internet users these days. Although there are many methods of preventing piracy, professional pirates have found ways to overcome security measures. Some of the most influential hackers are using phishing and key logging you need to take care and attention to stay safe. This becomes more difficult for...
Record Skype Video Calls And Voice Calls
29/06/2011 21:34
This article will show you how to record Skype video calls and is very easy to record your Skype calls and video, there are some applications that will help us do this:
Total Recorder: This is the software I use and have used for some time now. I bought a license for it, because it can record everything you hear. This means that even the audio...
How To Hack User ID And Password EBay
29/06/2011 09:11
how to hack a password on your eBay account. This means I will be phishing. Phishing is one of the easiest ways to hack Web sites of all user names and passwords. You can download a fake website appears legitimate, then send a link to the victim and trick him to enter his credentials to bogus Web page, which then sends the information to you. It...
How To Use Without Activation windows seven
29/06/2011 09:09
Most of you may know that it is possible to use Windows 7 and Vista without activation for 120 days. It is indeed possible to use slmgr-rearm command which will extend the grace period of 30 days to 120 days. But in this post, I'll show you a little trick to use because it is possible to use Windows without activation 7 for about a year! Here's...
Best Operating System For Hackers - BackTrack Linux
28/06/2011 23:24
Here today to learn more about the "best operating system for hackers - BackTrack Linux" Take a look below.:
There are a couple of things that are essential for the life of any hacker. Some, memory stick there everyday for data transfer. Do you have a crossover cable for fast transfer of data. There, the Wi-Fi high-gain antenna for the...
Why Is It Important For Virus Protection For Your Computer
28/06/2011 23:22
What is antivirus software?
Antivirus is a program that makes your system clean and free of dangerous viruses, worms and attacks.Antivirus software is vital to maintaining a good work functioning.When computers without antivirus software, have a higher risk of acquisition of malware that can damage software strongly the system, jeopardize the...
Linux Is More Secure Than Windows
28/06/2011 23:20
Five key factors behind increased security of Linux: 1. Privileges
Linux systems are far from foolproof, but one of its main advantages is the way the account privileges are assigned. In Windows, users are usually administrative access by default, which means they have very good access to the entire system, even its most crucial. So the virus....
To Create A User Account Invisible
28/06/2011 21:14
This tweak takes into account the fact that you usually see the welcome screen to hide. You can access using the account you should use the Log On to Windows dialog box similar to Windows 2000.
[Start] [Run] [Regedit]
Registry key: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \...
SSL Sniffing, Hackers Can Now HTTPS Packet Sniff | High Piracy
28/06/2011 21:14
HTTPS is the most secure network running packages that are used for online banking services like Paypal, bank site, the ETS. Also in the e-mail accounts like Gmail and even Facebook can now sniff all the tools attacker who qualify for it.
A new tool presented at the Black Hat DC 2009 conference by Moxie Marlinspike turns out to be a formidable...
Safety Tips Wireless Home Network
28/06/2011 21:11
1)Change the default administrator password (and user ID)
2) Turn on (Compatible) WPA / WEP
3) Change the default SSID
4) Disable SSID broadcast
5) Enter the static IP Devices
6) Enable MAC address filtering
7) Turn off the network for long periods of inactivity.
8) Set the router or access point safely
Desktop Shortcut To Lock Your Computer
28/06/2011 21:10
If you use your computer in an area where others can access it and there are things on your system, you would rather confidential, locking your desktop when you leave the computer is an essential task. Here is a recipe for a desktop shortcut that will lock your computer in two simple clicks:
Right click on a desktop area and select "New" then...
Enable And Disable The Thumbnail
28/06/2011 09:42
Activation and deactivation of the thumbnail (popular / recently closed) in the new Google Chrome browser tab
Deactivate
By default, the thumbnail has enabled the closure or decommissioning of this vision is very simple
Step 1: Simply click on X - Close button on the right side of the frame the most visited and recently closed.
Step 2: After...
Remove The Linux Computer Safely
28/06/2011 09:40
First, you need to know where your Linux operating system is installed. That's what drives it is currently live. Remember that Linux formats the drive HFS rather than FAT/FAT32 or NTFS. (This is the file used by different operating systems).
While HFS is not seen by windows, so it is hidden.
To remove the Linux partitions in Windows XP
1. go...
Keep Your Gmail E-mail Without A Computer E-mail List Of Programs
28/06/2011 09:39
Offline Gmail has a feature where you can save messages, conversations, attachments, stickers on computers without using e-mail programs like Outlook.
Offline Gmail lets you synchronize the content of Gmail on your PC when it connects to the Internet or to work with your email offline.
Activate the Gmail
1. Login to Gmail
2nd go to...
Change User Password Without Knowing The Password Of Current Computers
28/06/2011 09:37
If you want to change the user password on your Windows computing, but you do not know what the current password, is there an easy way to do that. First, the user you are about to be an administrator user. To determine which type of user you are logged in, go to Start> Control Panel> User Accounts. At the bottom of the window you can...
Hidden Windows XP Soundtrack
27/06/2011 12:18
There are two ways you can find this hidden sound track:
1.Go to start- search.Search for title.wma. But be sure to include hidden files and folders from the search.
2.Navigate in C: \ Windows \ system32 \ oobe \ images, go to Tools> Folder Options> View, check Show hidden files and folder options and then uncheck Hide protected...
Download Youtube Videos. HD & MP4 Format Without Any Software
27/06/2011 12:14
Download Youtube video in MP4 & HD format, without the use of software or a simple website using JavaScript.
This script allows you to download videos from YouTube directly from the site without any delay.
Here is a code to download YouTube videos, copy and paste the code in the address bar of your desired video starts buffering.
Copy this...
Check The Facebook Account Activity, Including Information Last Login
26/06/2011 23:10
Add extra protection to your Facebook account by activating a text message or e-mail notification if a new computer or mobile device, log into your account.
You can also view the most recent transactions in your account to see what setting you have access to your Facebook profile.
To verify this, go to Account Settings and the Settings tab you...
Checking The Quality Of Your Nokia Mobile Phone
26/06/2011 23:08
This is so easy to deceive.
to start.
Press the following on your mobile * # 06 #.
-Number of International Mobile Equipment Identity is
If the number seven and eight digits are 02 or 20, which means it was assembled in Emirates which is very bad
SE-digit number seven and eight are 08 or 80 s, which means it was manufactured in Germany which...
A Simple Way To Send Files. Exe From Gmail
26/06/2011 23:06
we all know that Gmail does not send executable files. When the user is trying to send, everything works fine until you send, but when the user clicks the submit button, it displays a message like "hack.exe is an executable file. For security reasons, Gmail does not to send these files. "So
This means that the user can not send. exe. I share a...
How I Can Cancel The Sending Of Gmail
26/06/2011 23:04
Do you know that you can cancel a message sent by email in Gmail? This is a less known feature, but Google is better than it was before. When introduced, who gave five seconds of the window during which they could get to "cancel".
Now it's up to 30 seconds.
This feature is hidden for most users who do not know where it exists. Please note...
Automatic Update Trick
26/06/2011 23:03
Here's a tip on how to update your computer with Windows automatically. When watching movies or anything else online, then press F5 to update your computer now configure the computer to update automatically. Basically it's a trick for registration. Most software that increase your computer simply refresh your computer. Now increase your computer...
How To Crash The System Uses The Fork Bomb
26/06/2011 23:01
fork bomb braking system is a small virus writing, because it contains the character 5. Count as fork bombs Wabbit: they generally do not spread worms or viruses.
The concept behind the fork bomb: the process recursively fork until a denial of service or an accident occurs. Fork bomb creates a large number of processes very quickly and break the...
Hide My Computer Disk
26/06/2011 20:14
This is useful for the tip of computers for home users. You can hide any specific local drive or all drives (physical and removable), as well as system drive and network. This suggestion has been made on the computer. Data files and folder security. Stations removing the display, you can secure your personal non-technical users For Your...
Several Orkuti Firefox
26/06/2011 20:12
Login with multiple IDs at the time in orkut, gmail, yahoo
To perform this trick u need Mozilla Firefox.
Step 1:
Open the system properties (by right clicking on my computer), select the Advanced tab, click Environment Variables. in the system variables section, click New. write this information in every box.
Variable name: moz_no_remote...
Why PCs Crash U Must Know
26/06/2011 20:10
Fatal error: The system has become unstable or is busy, "he says." Enter to return to Windows or press Ctrl-Alt-Del to restart the computer. If you do this, you will lose any unsaved data in all open programs. "
You have just been struck by the Blue Screen of Death. Anyone using Windows MCFT will be familiar with it. What can you do? More...
Password Hacking through Sniffing
26/06/2011 20:08
The sniffing is another technique to use in-house. A utility packet capture sniffer or is able to
to capture all traffic to travel along a network segment to which it is connected. Us
Sniffers usually created throughout the organization to capture network traffic, hoping
identify valuable information, such as user IDs and passwords. We used to...
How To Prevent Hacking Mail Password
26/06/2011 09:58
Do not click on links in an e-mail, instant messaging or chat to get to a website if you
suspect that the message can not be authentic or you do not know the sender or handle user
Instead, call the company by phone or connect directly to the website
typing the Web address in your browser
Avoid filling out forms in e-mails requesting personal...
Enable Automatic Logon In Windows
26/06/2011 09:57
If you set the computer for automatic logon, anyone who can physically access the
computer can access all the contents of the computer, including the network or
network it is connected. Also, if you activate the password is stored in automatic connection
Registry in clear text. The specific registry key that stores this value is...
How To Hack A Password?
26/06/2011 09:56
First method of attack Brute force.
2nd Sniff
3. Social engineering
Fourth with the help of tools.
5. with the aid of precompiled hash (MD5 rainbow tables)
How to override the default password for Win XP?
Each Windows XP does not have an administrator password to access the default user.For
system will do the following:
1. Type <ctr>...
Disable Writing To USB Drives
26/06/2011 09:55
A major concern within organizations is allowing users to connect a USB flash drive, as they could then
easily copy corporate data. Since Windows XP SP2, you can disable writing to USB devices
completely using a simple registry hack. But we must also note that if you use
this trick, you must ensure that users are not computer administrators,...
Bypass Administrator Password Of Windows
26/06/2011 09:54
This post is about an interesting hack to bypass the password login to Windows.
This hack will take you to the Windows registry each time a user
(Please remember at this point that this trick is useful if you are the only user of your
computer. ) Follow the instructions below to apply this trick
Click Start -> Run.
Type control...
Tweaks Registry Editor For Fun (Win XP)
26/06/2011 09:52
1. Change DOS color:
I write these lines into Notepad and save anyfile.reg and run it.
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER \ Software \ Microsoft \ Command Processor]
"DefaultColor" = dword: 0000002nd
2. Change the Intel Xeon processor 8.0 GHz or nothing
Type the following lines in Notepad
Windows Registry Version...
Change Folder To The Trash (for Security)
26/06/2011 09:51
To change any folder on the type of junk these lines in Notepad:
[. Shell Class Info]
CLSID = {645FF040-5081-101B-9F08-00AA002F954E}
And save as: Desktop.ini in the folder (which you want to change the recyle bin) for
change in the trash.
Save the desktop.ini in C: \ Data2 folder and then open up DOS and type the above
command, which...
Speed Up Your Windows XP
25/06/2011 23:02
To Speed Up Your Windows Follow These Steps:
Step 1: Remove Unused Software
Probably will not use half of the programs installed on time. Removing that you no longer need to accelerate significantly the Windows XP-based computer. If you want to remove the software:
1. Go to Control Panel (Start -> Control Panel) and select Add or Remove...
How To: Create Custom Links
25/06/2011 23:01
How To: Create Custom Links
You probably know most of the useful shortcuts for XP, but did you know you can make your own programs? To do this, click the shortcut icon of a program (in the office, preferably in the start menu) and click Properties.
Select the Shortcut tab and click the box shortcut. Press Ctrl + Alt + W (In this example, made a...
Using Remote Desktop
25/06/2011 22:59
Remote Desktop Connection Utility is a very useful tool, especially if you need to access your work computer at home, or vice versa. It allows you to create a direct connection between two computers, a power to control another. Here's how it's done:
Step 1: Setting up remote computer account
Log on as administrator on the computer that you want...
Hacking Windows with Linux
25/06/2011 20:03
im writing the thing that allows you to hack the admin password in Windows using Linux.
The first is Windows installed on your computer and then use a linux live CD, here we will use a live CD of Ubuntu.
Boot from the Live CD and perform step 7 easy to hack the administrator password of Windows.
Steps:
1: Install a program called chntpw
The...
Web Anonymous Surfing
25/06/2011 20:01
UltraSurf is a useful software to hide your IP address and protect your privacy online help on the web anonymous surfing. As mentioned above, Ultrasurf is used to avoid firewall restrictions and even bypass the restrictions of Rapidshare.
Download it here
https://www.ziddu.com/download/5403178/u.zip.html
But the disadvantage of using UltraSurf...
Create Hidden Admin Account In XP
25/06/2011 19:59
Since we are going to do all the editing the Windows Registry you should back up the registry before proceeding.
After backing up the registry, follow the steps to create your own hidden
* Goto Start -> Run -> Type regedit -> Enter
* In the left menu goto,
HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows NT \...
The Fastest Way To Get Into Other Systems
25/06/2011 19:57
You can hack any system as it is connected to the rest of what we call "Internet." Connection to the Internet gateway to share communications and data transfer. So we have to do is to get the port, which has been violated.
ok to start, you must do:
1. Port scanning software on google.
The second IP address of the victim whose port is open.
3....
Hack Any System Of Local Network
25/06/2011 19:56
Create and use this batch file to launch a dictionary attack and find the Windows login credentials in the LAN.
You need a dictionary text file to go further and launch the attack successfully.
Just follow the following steps,
1. Open the Notepad file.
2nd Copy and paste the code below and save it as a batch file. Bat extension.
@ Echo...
Internet Speed Up
25/06/2011 19:53
First First you open the Windows Registry using Regedit, and (after backup) Go to:
HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ ServiceProvider
2. Please note the following lines (all hex dwords):
Class = 008 (biggrin.gif - indicates that TCP / IP is a name, a supplier, does not change
LocalPriority = 1F3 (499) - local...
How To Make Opera Uses Less Memory
25/06/2011 12:00
Opera is nice browser.Speed, efficient, and web experts agree that the fastest browser to surf the Internet. Screw Internet Explorer, I hate to look too buggy and Firefox, but it's good, but has its fair share of problems with memory leaks that tend to increase with each new release.
i m using the opera latest version.
Easier navigation and...
Ncrack High-speed Network Authentication(Crack)
25/06/2011 11:58
Ncrack tools is a high-speed network authentication cracking. It was built to help companies secure their networks proactively test all their hosts and network devices for poor passwords. Security professionals also rely on Ncrack when checking their customers. Ncrack was designed using a modular approach, a command line syntax looks like nmap and...
Crack PDF Password
25/06/2011 11:56
PDF Password Cracker is a tool to remove the security on PDF documents (of course, you should have the right to do so, for example if you have forgotten user / owner password). Only security is supported standard PDF or a third party plug-ins or e-books. Both protection methods are cracked:
First limited operations on the file can be disabled...
Crack PDF Password
25/06/2011 11:55Crack PDF Password
25/06/2011 11:55How To Prevent Identity Theft
25/06/2011 11:53
How to prevent identity theft, hacker
What is computer identity theft?
If you have personal information stored on your computer or use the computer to purchase items online in a wireless network unsecured, you may be subject to identity theft information. This occurs when the thief comes to piracy and is able to obtain information from your...
Change The Text Of The START
25/06/2011 11:52
Step 1 - Modify Explorer.exe File
To make the changes, the file explorer.exe located at C: \ Windows to change. Since explorer.exe is a binary file, it requires a particular publisher. In this article, I used Resource Hacker. Resources HackerTM is a free utility to view, edit, rename, add, delete and extract resources in executables and Windows...
Advance & unique url shortner:short your urls & make free money
25/06/2011 09:06
hello friends,Today i m going to tell you about a new & unique features url shortner website.
They proving free URL shortening service with a twist.
You get paid to share the your links on the net from every visitors,who visit to yours urls.
You have to just place your links on facebook,orkut,twitter,any social website or blog.
5 dollars...
Faster Browsing
24/06/2011 21:16
Faster Browsing
When connected to a website your computer sends information back and forth. Some of this information is resolving the site name to an IP address, things that TCP / IP really is, not words. This is DNS information and is used so you do not have to ask the location of the site each time you visit the site. Although Windows XP and...
Rename Your Firefox And Google Chrome Tabs Tabs Title With One Click
24/06/2011 21:15
It is very easy to rename the tabs of the Firefox tabs in Chrome / Google to avoid embarrassment or to conceal information about the sites you surf or to avoid confusion when you have multiple tabs open the same title tag.
You may want to rename the tab, Firefox, if you are:
; Looks something wrong, but do not want others (peepers portable...
Make faster Your Computer
24/06/2011 21:12
Virus Free (Using Antivirus to keep your PC without virus that destroys files and makes the PC slow to operate irregularly)
ii). Spyware free (using anti-spyware to keep your PC free of spyware and use the following resources to make your slow PC)
iii). Defragment your hard drive (using Windows built-in defragmenter to organize data in a...
Optimize The Performance Of Your P2P Software
24/06/2011 12:47
We love torrents coz they are free. Today I will show how to use these tips to get the most out of your P2P software.
Increase download speed
Make the following changes in uTorrent preferences.
Go to Options> Settings> Network
First Under 'Port used for incoming connections ", enter a port number. It is better to use a port...
Change Your IP within 30 second.
24/06/2011 12:42
This article will help you change your IP address in a minute. Just follow the next step is through.
1. Click "Start" in the lower left corner of the screen
2. Click "Run"
3. Type "command" and press OK
You should now be at a screen MS-DOS prompt.
4. Type "ipconfig / release" just like that, and press "enter"
5th Type "exit" and leave the...
Top Tips To Exploit SQL Server Systems
24/06/2011 12:40
It 'a hand poking through and inciting or use of security testing tools, malicious attackers employ a variety of tricks to get into SQL Server systems, both inside and outside the firewall. And 'course, then, if the hackers do, you must bring the same attacks to test the strength of security systems. Here are 10 hacker tricks to reach and destroy...
Write Files To CD / DVD Without Any Software
24/06/2011 09:38
just follow these steps:
Step 1:
Insert the CD into the CD.
Step 2:
Copy the file you want to write to a CD.
Step 3:
Open My Computer. Open the folder on the CD.
Step 4:
Paste the file in the CD
Step 5:
On the left panel, see "Write these files to a CD."
Double-click it.
Step 6:
The "CD Writing Wizard" will open. Follow the...
Hacking Website Using SQL Injection
24/06/2011 09:36
Database is a collection of data. In view of the site database is used to store user IDs, passwords, details of the website and much more.
List of databases are:
* DB Server,
* MySQL (open source)
* MSSQL,
* MS-Access
* Oracle
* Postgre SQL (open source)
* SQLite
SQL:
Structured query language known as SQL. To communicate with the database...
C + +, The Code Of The Virus Batch To Disable All Hard Drives
24/06/2011 09:34
Let me give you a C + + code of the virus. In fact, the batch code converted to C + + code of the virus. If you want, you can also use it in batch code.
here is the code:
#include < windows.h >
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write (...
Hack A Website Using A Script C99
24/06/2011 00:00
For educational purposes only.
The shell script is a great way to C99 hack a PHP enabled web server. You need to find a precarious upload to download this file on the server. Here, I used uncertain how to download the downloader which can not check the file type and allow us to download our scripts run on the server.
C99 This shell allows an...
Send E-mail From An E-mail Login | E-mail Parodies That Can Pass Through The Spam Filter
23/06/2011 23:58
There are many e-mail spoofing websites. You can also organize your own fake email sender script also. But it is something different. You can send email from any email ID and you will surely be in the mailbox of the sender is not spam.
Features:
1. E-mail does not go to the junk folder
2. Instant email delivery
With support for third...
Domain Name Hijacking
23/06/2011 23:57
In this post I will show how domain names are pirates. Hacking a domain name of your original user is known as the deviation of the domain name. Let me explain what this is.
Suppose I bought a domain name. Now I need a web host hosting my website.
Now, how does it work?
When we bought the domain name, we will also have control panel for this...
Facebook Likejacking Attack | Facebook Has Introduced The Anti-Likejacking Solution
23/06/2011 23:55
Likejacking term derives from facebook. It is a kind of clickjacking technique to lure Facebook users suffer side. This is achieved by making the invisible button and place it on another element that is most likely to be clicked by users as the play button on a video player. As a result, users who try to push the game and instead end up liking the...
Firesheep Protection Against Attacks
23/06/2011 23:53
Firsheep to add is the easiest way to hack Facebook, Gmail, or account for more than an unsecured wireless network. I also wrote about Blacksheep to add more to protect your account Firesheep attack. It 'been a good choice to protect Firesheep. But now I'm going to write another way to protect your account from Firesheep attacks.
The new tower is...
Keyboard Shortcuts Facebook
23/06/2011 21:59
Before using the keyboard shortcuts of Facebook, modifier keys to determine your computer, which is based on what browser and operating system you use.
Win & Win Win Chrome and Firefox and IE and Firefox OSX OSX, and other
Alt Alt + Shift + Ctrl + Alt Control Function Option
Once you have determined the changes to your operating system and...
The Rapid Increase Of Web Page Decrease Font Size
23/06/2011 21:56
When you visit a website on the Internet, you may experience small text that is difficult or impossible to read. If the police do not have a defined size, you can increase or decrease the font size using one of the following computer shortcuts.
Hotkey
Hold down the Ctrl key and press + to increase the font size or - to decrease the font size....
Each Folder As A Folder Of Photos
23/06/2011 13:09
This trick will show you how to set up a folder to view its contents in the photo album. In many cases, you can store images / photos different from the "Images" folder (in "My Documents"). Because this folder has been selected as any other normal folder, the content is displayed file list. You can temporarily modify just right click and select...
Converts The Document Or Web Page To PDF
23/06/2011 13:07
Someone just tell you that you must have Adobe Acrobat (Writer) to create a PDF file? Guess what, you can get out of this expensive piece of software if you need to convert documents to PDF without the need for editing PDF documents fancy.
Here's how it happens. Thank you for BullZip, which offers a free PDF printer. This free tool, you can...
On / Off Num Lock At Startup
23/06/2011 13:06
Most standard keyboards with a small keypad, which recognizes the numbers 0-9. However, this is the numeric keypad also offers some other features, such as "Page Up" and "Page Down", "End", "Home", etc. .. depending on how is the "Num Lock" is enabled. Many Windows users will find useful this type of keypad numbers faster. But oopps ... After...
Stop YouTube Videos Play Automatically In Firefox
23/06/2011 10:22
How to stop automatically playing YouTube videos in Firefox
It drives me nuts that automatically play YouTube videos. It 'is particularly annoying when I try to download Youtube video using the RealOne Player. I went looking for the best way to remove these videos play automatically, and came up with three different options I have listed...
How To Watch Adult 18 + Videos On YouTube Without Logging In
23/06/2011 10:21
How To Watch Adult 18 + Videos On YouTube Without Logging In
The following message appears when you try to see 18 + Videos
"This content may contain material reported by the YouTube community, which may be inappropriate for some users."
"To watch this video or group, please verify you are 18 or older by logging in or registering. If you prefer,...
Adding Your Profile Picture On YouTube?
23/06/2011 10:20
The steps that you want to add or change an image Youtube profile:
First Login to your YouTube account and click the Account link in the upper right corner of the page.
2. Under Settings, click Account.
Third on the left navigation column, click Profile Settings.
4th Click the Change button and select the image file you want to show your...
How To Optimize The Performance Of Windows
23/06/2011 00:40
How to optimize Windows performance by removing unwanted programs from starting by using the Windows registry. For Windows XP, Vista, Windows 2000, Windows 98 and Windows Server. Most of us are facing this problem with your computer slower, the Windows operating system takes a long time to load when you start Windows Explorer hangs, and also how...
The Script To View The Details Of The OS Version
23/06/2011 00:39
Script To View The Details Of The OS Version
Paste the code into Notepad and save the file Version.vbs
strComputer = “.”
Set objWMIService = GetObject(“winmgmts:” _
& “{impersonationLevel=impersonate}!\\” & strComputer & “\root\cimv2″)
Set colOSes = objWMIService.ExecQuery(“Select * from Win32_OperatingSystem”)
For Each objOS in...
Free Aircel GPRS With 3G Speed Browser Opera Mini
23/06/2011 00:37
to do the following:
Step 1 - Download Opera Mini 4.2 down.
Step-2 with the open, has a menu in the first select box to manage my habit? Let h? 1 Tel.
Step 3-Now scroll down below and the type of proxy you see no exchange proxy to the host.
Step-4 and my attorney? Three hours? Tel. type0.facebook.com.
5Now you step-by-done.save and open...
How Do You Change The Processor Speed
22/06/2011 21:14
How Do You Change The Processor Speed
To test the processor speed to see if similar to that announced by the manufacturer of the chip, so I think CPU Speed Professional is a very useful software. You can also send your score to an online database and compare it to other partitions in the world if you're so inclined. CPU Speed Professional is a...
How To Send a Self Deleting SMS
22/06/2011 21:12
how to send a self-deleting text messages to any mobile is automatically deleted after the user reads it.
Basically, this technique called SAFE TEXT. It is a technique where a message itself destroyed after being read. If you want to call it a data-centric message of suicide, that's fine too. This is a site that allows you to send this type...
More Information About Phishing
22/06/2011 21:10
Phishing is a method to steal login information (username and password) directing the victim to a clone (false) login page, which records the access information without the knowledge of the victim. These clones site is known as a scammer. eBay online banks, PayPal and other common goals. Phishing is an example of social engineering to trick users....
Install Windows XP Fast
22/06/2011 20:17
This trick is very useful for those who frequently install Windows XP operating system. Installing the operating system that usually takes about 40 minutes to complete, but thanks to this trick, you can now save 10-15 minutes. This is something as simple as that.
1. Boot through the Windows XP CD.
2. When all files are fully charged, you get the...
GENERAL Computer CLEANING TIPS
22/06/2011 20:15
You can save maintenance costs if the computer is cleaned regularly. This will improve cooling and performance components. Your team can damage components if not keep the base clean regularly, because dust is the main cause of the warmth of your system and heat link to hardware failure.
Never leave your computer on the floor, always use the...
How To Display Hidden Settings Of Nokia Mobiles?
22/06/2011 20:14
this post about secret codes for Nokia Mobile Phones and Nokia Mobile is the last in September You can view the hidden information of mobile sets and solve routine problems using these codes.
latest nokia codes list:
Follow the list of codes of...
Making Greeting Cards With Word 2007
22/06/2011 20:12
You can make homemade cards for friends and family at any time, if you do not have time to buy cards from the store. You can make greeting cards with Word 2007. You can make greeting cards with Word 2007 for many occasions and events, and get well cards, friendship, etc. As you decide to make greeting cards with Word 2007, you can make a card for...
To Activate God Mode In Windows 7 ...
21/06/2011 21:02
Windows 7 is the most intelligent and faster operation developed by Microsoft. There are many configuration options available in the Windows control panel 7, but it is sometimes difficult to find the perfect fit option. If you have to change many settings in Windows 7, then take a long time in the Control Panel, so here I share some of what you...
how to Clone A CD
21/06/2011 21:01
Cloning a CD is a good option to save everything on the CD. When copying the files from the CD, not copy the CD parameters as brands and other things. However, the cloning of a CD copy of all information, including the CD label, etc type of CD, and saves on your hard drive. This is useful when you copy a bootable CD in which the parameters are...
How To Detect IP Addresses Anonymised
21/06/2011 21:00
As the scammers are becoming more sophisticated in circumventing controls geolocation using proxies (anonymous IP) for forging IP addresses, has become very necessary to find a way to detect proxies for the authenticity of the users can verify. The use of a proxy (web proxy) is the most simple and easy to hide the IP address of an Internet user...
How To Find The URL Of An Image Or A Picture On The Internet?
21/06/2011 20:54
URL (uniform resource locator) is essentially something that is on the Internet. In this case, we want to find the URL of an image or an image that is already stored on the Internet. So, for example, if you see a picture of a particular site, I will show you how to find the url for the image of the logo, or image.
How to find the URL of an image...
Bypass Login On Websites With SQL Injection Explained
21/06/2011 09:24
For those of you who dont already know SQL injection is a technique used to exploit the vulnerability does not validate input to pass SQL commands through a web application for the construction of the database backend. Attackers exploit that programmers often chain SQL commands on a user supplied parameters, and, therefore, to enter the SQL...
The Trick To Visit Password-protected Websites Without Registering
21/06/2011 09:22
We all know how annoying it is when you search on Google for something and the result we are looking for leads to a password protected site or a forum. You must register to view the content, but who like to do?
Fortunately, there is a solution to save your time and your e-mail account against spam - claiming to be Googlebot. For those of you who...
It Is Quite Easy To Change: Shutdown Menu When Your Computer’s Power Button Is Pressed
21/06/2011 09:21
Windows XP stops when the power button is pressed. It's a good idea to change it, then shutdown-menu is opened instead, especially if you have small children running around the house.
follow these steps:
Step 1:
Go to your Windows XP desktop and right click on it. Select "Properties" and the Display Properties window appears.
Open the...
Windows 7 Seems To Make Ubuntu Linux
21/06/2011 09:19
Windows 7 Seems To Make Ubuntu Linux
Ubuntu, one of the best alternatives and a great competitor to Windows is because it is' incredibly user-friendly interface, simple installation and very fast, a dual-boot with Windows 7 and the great support of the program.? In the area of ??Linux, Ubuntu is one of the most popular Linux operating systems...
How Automatic Defrag Drives
21/06/2011 09:17
How Automatic Defrag Drives
Automatic defragmentation of disks and thought I might as well post a tutorial about it here. Basically, it allows you to defragment a disk by right-clicking and selecting "defrag."
To do this open Notepad and paste the following code:
; Context_defrag.INF
, Add Defrag to the right click context menu in Windows...
Create 25 Links To Your Site Every Day For Free
19/06/2011 23:10
This message is for all webmasters who want to get more accurate search results.As said the benefits of a previous link building.Every posts you know that the links indexed by search engines to help a lot fast.And also take into account the number of Google links back to site deployment investment.
The more number of back links means better...
Joomla Remote File Inclusions RFI Attack
19/06/2011 23:09
Local file inclusions are very funny. You tell the site what it wants. Awesome! To display the configuration file that contains the database login? No problem.
Want to see the file / etc / passwd, that Joomla is hosted on a Linux machine? You can do this.
Local file inclusions are a common problem in Joomla extensions. Many of them are...
Hack & Nessus Using Metasploit
19/06/2011 23:07
this message is aimed at developing readers. Here I will share some real use hacking techniques that can hack any server or website. This post is for educational purposes.
NB: No scans initiated against the system / server until the outline of the system / server the owner of the evaluation plan was agreed to accept the owner.
Tools used in...
Android Last Botnets Botnets: Botnets Android SMS
19/06/2011 23:05
Android is the latest Botnet Botnet: Android botnet SMS
After many more botnets "everything" (botnets via IRC botnets of Skype botnet on Twitter, on Facebook ...), directly from one of the most fascinating hackers (Georgia Weidman) a botnet Android by SMS .
This is a great example of a spread of botnets and to guide the invisible text...
Tips For Computer Safety When Browsing The Internet
19/06/2011 10:34
The Internet is a dangerous place and it only scarier in the last year of fraud and business scams, so we've written 10 tips for computer security while browsing the Internet to help keep you safe. We have already written about how to protect your computer against viruses, spyware, virus removal, and even tips to speed up your computer, but the...
To Repair A Windows XP Installation Without Formatting Your Computer And Lose Your Files
19/06/2011 10:33
To Repair A Windows XP Installation Without Formatting Your Computer And Lose Your Files
A repair installation of Windows XP does not delete any files, such as the design. Design of Windows XP to clean your computer is absolutely everything you had on your computer, and, therefore, this fact alone makes the repair a good alternative to try to fix...
Copy and paste the link to an HTML e-mail
19/06/2011 10:32
Copy and paste the link to an HTML e-mail?
1. Go to the address bar at the top of the page when you view a Web page that you want to share.
2. Select the text (URL) making blue.
3. When the text is blue, right click on the blue area and a menu will appear. Menu is not displayed if the text is not blue.
4. From the menu, select Copy. This will...
8 Devices Running Linux In Secret
19/06/2011 10:30
Linux is everywhere, Although you can usually only think of Linux on a laptop to your geek friend or a power server, Linux runs on many devices, from consumer electronics to the fastest supercomputers in the world.
1. Android phones, tablets, eReaders
Android operating system have been popping up all over the place, and each of these...
How To Connect Two Computers With Broadband
19/06/2011 10:28
How To Connect Two Computers With Broadband
connect two computers
Now, if you do not have a router, but have a modem similar to the display, you can connect two computers using a broadband modem, and therefore both access to the Internet.
A computer can connect via the USB port and the other via Ethernet.
USB cable and Ethernet cable and come...
What is a FUD Crypter
18/06/2011 09:16
WHAT IS A CRYPTER?
A Crypter is a software used to hide our viruses, keyloggers or any RAT tool from antiviruses so that they are not detected and deleted by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus work by splitting source code of application and then search for...
Ettercap ADVANCED CONCEPT
18/06/2011 09:12
I am very unstable here to show you what Ettercap Advance concept is able to do so is a unique tool to do many things ... such
Simple Sniff
DHCP Spoofing
Ettercap filters
The basic functions of scripts
Simple code to block particular website by ettercap filter.
Code of the filter to kill and abandon the connection and the packets of...
Session Hijacking
18/06/2011 09:11
Session Hijacking:
Session hijacking is the process of operating a computer session valid, that is stealing cookies from the victim.
So now, let us know below.
What is a cookie?
A cookie is known as a web cookie or HTTP cookie is a small piece of text stored by the user browser.A cookie is sent as a head by the web server to the browser cookie...
HOW TO HACK A WI_FIdility
18/06/2011 09:09
First install the aircrack-ng yum
-------------------------------------------------- --------------------------
Step 1:
PHP Code:
yum install Aircrack-ng y
-------------------------------------------------- ---------------
Install the package using yum command macchanger
--------------------------------------------------...
How To Test The Operation Of Your Anti-virus
17/06/2011 18:34
How To Test The Operation Of Your Anti-virus
Have you ever wondered how to test your antivirus software to the proper functioning? Well here is a quick and easy way to test your antivirus. This process is known as the EICAR test that works on all anti-virus and developed by the European Institute for Computer Antivirus Research. This process can...
Learn The Programming Commands Batch
17/06/2011 18:32
Hello readers, I'm back with the batch of programming tutorials. In my last post I told you about what programs and need lots. All those who have not yet read this message, read pleast for a clearer picture of the subject.
In this post we will code our first batch program. I will also tell you lots more used commands and their uses.
The first...
Batch File That Appears With Repeated Messages
17/06/2011 18:30
in this post, we will create a batch file that pop-ups keep repeating the message boxes.
Below is the code for it.
: Home
msg * Hi
Msg * Are you having fun?
msg * I am!
msg * https://tipsandtricks.webnode.com admin!
* Message and you're stuck reading
* Msg teach you
msg * Batch Programming Series
Msg * Did you learn something new
msg *...
How Do You Know If Your Web Server Is A Windows-or Linux-based
17/06/2011 18:28
How Do You Know If Your Web Server Is A Windows-or Linux-based
Its very easy to take on a system, if you know the server operating system.
Well this is learn't something practical experience.
Just follow the steps: -
1) Go to the link below and find the IP address of the site you want to collect information. You can do this by typing its name...
Google Chrome Shortcuts and tricks
17/06/2011 09:35
Google Chrome Shortcuts and tricks
There are already several articles on the web that contains information about using Google Chrome for a long time and there may be experiments with it.
Laboratory browser named Google a few months old with a beautiful title "Google Chrome", was released last year. A surprise to most of the players online, and we...
How Do I Create A Folder Reserved For The Name Of All Windows
17/06/2011 09:33
In this post I'm going to tell you how to make a folder with the name of any Windows, including the reservation of keywords.
Can you create a folder named "CON" in Windows?
The answer is NO and YES!
Because the answer is no.
No, because when they create a new folder and try to rename any of the names listed above, you know what
done! Windows...
HOW TO USE A TRIAL SOFTWARE FOREVER.SOFTWARE CRACKING
17/06/2011 08:47
Most of us are familiar with a lot of software that only works for some time in the mode of trial. When the trial period the software stop function and the demand for a purchase. But there is a way to run the software and get them to operate beyond the trial period. Is not it interesting?
Before telling you how to hack the software and run it in...
HOW TO HACK PERSONAL & CONFIDENTIAL DOCUMENTS
17/06/2011 08:44
Hacking personal and confidential documents
Using Google, it is possible to access an e-mail repository containing the CV of hundreds of people that were created when searching for their jobs. Documents containing their address, phone number, date of birth, education, work experience etc. can be found just a few seconds.
intitle: "curriculum...
REVERSE DOMAIN NAME HIJACKING
17/06/2011 08:42
Reverse domain name hijacking is one of the serious problems in the world of domain name today. Many people were engaged in such silly activity and so create a great bang in the domain name industry.
Accordingly, the reverse domain name hijacking is such a ploy that is applied by a complainant in bad faith to attempt to deprive a registered...
MICROSOFT-WORD2003- VOICE ANNOTATIONS
15/06/2011 12:04
MICROSOFT-WORD2003- VOICE ANNOTATIONS
Hi friends,MICROSOFT-WORD allows us toeasily add text annotations to your document.an annotation is a note or a special instruction that is added along with the document.
MICROSOFT-WORD2003 offers you an option to add annotations in the form of audio file.this file may be prerecoarded file,or a new...
SET UP YOUR OWN PROXY SERVER
15/06/2011 10:03
Set up your own proxy server
so many people complain that webproxys are not working at their works / schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free webhosting service that supports either php or cgi or b) your own website that...
INSTALL TOR IN BACKTRACK4
15/06/2011 10:02
First, you need to add noreply.org repositories to your sources.list. These are the official tor repositories for debian-based Linux distrobutions. Open up a terminal and type:
Code:
nano /etc/apt/sources.list
At the bottom of this file, add these two lines:
Code:
deb https://mirror.noreply.org/pub/tor intrepid main
deb-src...
GOOGLE HACKING
14/06/2011 09:52
Google query operators
Operator Description Sample query
site restricts results to sites within the
specified domain
site:google.com fox will find all sites containing the
word fox, located within the *.google.com domain
intitle restricts results to documents whose
title contains the specified phrase
intitle:fox fire will find all sites with the...
HOW TO HACK A WEBPAGE?
14/06/2011 09:46
Well Psychotic wrote one of the most helpful unix text files in cyberspace but with the mail that we
recieved after the release of our famous 36 page Unix Bible we realised that unix isn't for everybody so
we decided that we should write on another aspect of hacking..... Virtual Circuit and Psychotic is proud to
release,...
How to Hack Yahoo/gmail/orkut any Password?
11/06/2011 18:44
Requirement:
Just purchase hosting from any company and the domain will be similar to yahoomail.com
like yahooomail.com after upload 3 files.
1. index.html (same clone of the yahoo.com)—just change method
2. info.pl (used to send passwords to our email address)
3. thankyou.htm file to redirect phishing page to orginal yahoomail.com .
open...
How to Hack and Spy on a Webcam
11/06/2011 18:31
How to Hack and Spy on a Webcam
I get a lot of emails where my readers are asking for help to find out if his/her partner is cheating on them, chatting to someone she/he shouldn't be, etc. So here i decided to answer this question, and to get it clear once for all.
Today there are softwares called RATs (Remote Administrator Tools) that are mostly...
HOW TO MAKE FASTER YOUR FLASH DRIVE?
11/06/2011 18:28
HOW TO MAKE FASTER YOUR FLASH DRIVE?
Guys,its so simple to make your usb flash drive make faster
just follow these steps to do so:
plug in your pen drive
open the properties
now click on hardware.
select your flash disk drive.
click on properties.
click on policies
now click on better performace & apply.
thats it.you have done.
Types of Web application vulnerability
09/06/2011 21:56
1. XSS (Cross Site Scripting)
2. SQL Injection
3. RFI
4. etc
1.) XSS
XSS is a type of computer security vulnerability typically found in web applications
which allow code injection by malicious web users into the web pages viewed by
other users.
Websites today are more complex than ever, containing a lot of dynamic content
making the experience...
How to Prevent Email Password Hacking?
09/06/2011 21:49
Don't use the links in an email, instant message, or chat to get to any web page if you
suspect the message might not be authentic or you don't know the sender or user's handle
Instead, call the company on the telephone, or log onto the website directly by
typing in the Web adress in your browser
Avoid filling out forms in email...
How To Disable Writing to USB Drives
09/06/2011 21:45
A major concern at organizations is allowing users to plug in a usb flash drive, because they could so
easily copy corporate data. Since Windows XP SP2, you can disable writing to USB devices
altogether using a simple registry hack. However one should also note that if you are using
this trick, you should make sure that the users are not...
HOW TO RESTORE YOUR LOST BOOKMARK LIST
07/06/2011 13:17
HOW TO RESTORE YOUR LOST BOOKMARK LIST?
we always face a problem that system goes crash or your mozila firefox goes crash.when one thing happened with you from both of them.you lost your total bookmarkerd list.
so how to restore it.
well,lets try to restore it.
when this thing happens with you.just give me favour.
install firefox again.go to...
HOW TO BYPASS THE RECYCLE BIN?
07/06/2011 13:15
HOW TO BYPASS THE RECYCLE BIN
bypass the recycle bin,you have to change the some configurations.
go to the recyble bin properties by clicking righ click on recycle bin icon on desktop.
in the properties of recycle bin,you have to select the check box against "do not move to files recycle bin.remove files immidiately when deleted.
here is one...
HOW TO VIEW THE TITLE BAR IN WINDOWS VISTA
07/06/2011 08:59
FRIENDS,ONE COULD VIEW THE WINDOWS TITLE IN XP & its predecessors.
BUT NOT IN VISTA.UPON pressing the win+E key.you would notice that windows doesn't include any title.TItle can be viewed in only IE 7 that comes in deafault with vista.you can solve this problem by downloading
a small exe.file known as aerobarfrom the...
A TRICK TO HACK INTO COMPUTERS THROUGH WIRELESS FIDILITY
06/06/2011 19:36
A TRICK TO HACK INTO COMPUTERS THROUGH WIRELESS FIDILITY
Hello friends wana this hack?
ok.allright,lets go for it.
to do so,we have to need first of all browser mozila firefox,then an extension called FIRESHEEP thatdemonstrates HTTP session hijacking attacks.
WinPcap - WinPcap is an open source library for packet capture and network analysis...
HOW TO REWRITE YOUR CD/DVD/BLUE-RAY RECORDABLE DISC?
06/06/2011 08:59
HOW TO REWRITE YOUR CD/DVD/BLUE-RAY RECORDABLE DISC
Guys its a very simple trick to write again to a unrewritable disk.
we all very oftenly get that the disc we have burn,its has lots of space free,
want to use this free space?
ok.lets start.
first insert the disk into your bd/dvd/cd rom.
now launch the nero software & choose make data...
How to Encode Normal Virus into Undectable Virus
05/06/2011 22:28
How to Encode Normal Virus into Undectable Virus
#./msfencode –h (for Help)
# ./msfencode x86/shikata_ga_nai –I mk.exe –t exe>newencode.exe
CRASH DOWN WINDOWS Xp
05/06/2011 22:25
now here is Virus to delete Windows..
its very simple.
Open Notepad
& jst copy below code nd past it on notepad
01001011000111110010010101010101010000011111100000
save it as ***.exe and send it to victim..
don;t run dis file on ur system..... please be careful
NOTE: this is for information purpose only please don't ever try on your or your...
MAKE YOUR XP TALK
05/06/2011 22:24
MAKE YOUR XP TALK
Open a text file in notepad and write:
;copy from here--------------
Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
;----------to here
Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text, input the text and press...
How To Block Websties Without Software
05/06/2011 22:23
1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!
-So-
127.0.0.1 localhost
127.0.0.2 www.blockedsite.com
-->www.blockedsite.com is now unaccessable.
ONLINE RAPIDSHARE PREMIUM LINK GENERATOR
05/06/2011 22:22
https://rapid8.com
https://www.hellorapid.com
https://www.nbe-media.com/rapidshare/index.php
https://www.rapidpid.net
https://www.rapiddownloader.info/
https://rsplg.com
https://rapidhard.pl/index.php
https://www.rsfox.com/generator.php
HOW TO MAKE FOOL TO SOMEBODY BY USING THIS BATCH CODE
05/06/2011 22:19
OPEN NOTEPAD & WRITE.
@echo off
start iexplore
start notepad
start firefox
save it as anyname.bat
contact[@]promoddl.com
change [@] TO @
HOW TO REDUCE DISK USAGE SPACE
05/06/2011 22:12
REDUCE DISK USAGE SPACE
System restore is a prominet utility in windows operating system that canrecover files & settings in case of system crash.
its a must to turn on this feature.but at the same time,it usage lots of disk space as well.you can limit the amountof disk space system restore users by excuting
some commands in the command...
access your mobile remotely?
04/06/2011 15:18
Signup with www.mymobilesite.net and install a application (.sis ) file on nokia phone to
access mobile from computer(internet).
We can access:
Guest and friend user accounts
Calendar - manage your calendar, and share your availability for others too
Messaging - SMS inbox/outbox and SMS sending
Phone log - view missed...
Google hacking to find out any software within just a minute
04/06/2011 15:09
Google hacking is a term that refers to the act of creating complex search engine queries in order
to filter through large amounts of search results for information related to computer security. In
its malicious format it can be used to detect websites that are vulnerable to numerous exploits
and vulnerabilities as well as locate private,...
How to get victim IP address
04/06/2011 15:04
To get victim ip address we have following options:
1 Php Notify Script
2 Send RCPT Email (Readnotify)
3 Personal website
4 Sniffer
1. PHP Notify script:
Upload the file "index.php" and "ip.html" to an free webspace account which supports php !
say victim to visit your site www.yoursite.com you willget his ip www.yoursite/ip.html
2. Send RCPT...
Domain Hacking
04/06/2011 14:59
A Domain hacking is a process to transfer domain(yahoo.com) without owner permission
with help of phishing, sniffing,spoofing.
A domain hack is an unconventional domain name that combines domain levels,
especially the top-level domain (TLD), to spell out the full "name" or title of the domain,
making a kind of fun.
Domain Hacking process:
1. See...
What is Website Defacement?
04/06/2011 14:56
A website defacement is an attack on a website that changes the visual
appearance of the site. These are typically the work of system crackers, who break
into a web server and replace the hosted website with one of their own.
• A high-profile website defacement was carried out on the website of the company
SCO Group following its assertion that...
How to Hack Email Passwords
04/06/2011 14:48
The other most commonly used trick to hack email password is using Fake Login Pages.
[phishing] Today, Fake login pages are the most widely used techniques to hack an email
account. A Fake Login page is a page that appears exactly as a Login page but once we
enter our password there, we end up loosing it.
Fake login pages are created by many...
Free Calling to Any US Phone From Your iPhone
04/06/2011 14:43
This method REQUIRES a WiFi connection and jailbroken iPhone!!!
Thanks goes to Unique311 at internettablettalk for first showing me how to do this on the Nokia N800/N810 Internet Tablets. Iâ?™m sure others came before him on the PC method. Whatâ?™s new is it now works on the iPhone.
You need 3 accounts:
1) grandcentral at www.grandcentral.com...
Free Calling to Any US Phone From Your iPhone
04/06/2011 14:43
This method REQUIRES a WiFi connection and jailbroken iPhone!!!
Thanks goes to Unique311 at internettablettalk for first showing me how to do this on the Nokia N800/N810 Internet Tablets. Iâ?™m sure others came before him on the PC method. Whatâ?™s new is it now works on the iPhone.
You need 3 accounts:
1) grandcentral at www.grandcentral.com...
Batch File Hacking|
04/06/2011 14:36
Batch file hacking is very funny, in this page i will teach you some tricks about them.
What Is A Batch File?
A batch file is a MS-DOS file that will execute certain commands these files are usually made with notepad, Alot of people think batch files are nooby but if you know what your doing they can actually be quite powerful and by...
Batch File Hacking|
04/06/2011 14:36
Batch file hacking is very funny, in this page i will teach you some tricks about them.
What Is A Batch File?
A batch file is a MS-DOS file that will execute certain commands these files are usually made with notepad, Alot of people think batch files are nooby but if you know what your doing they can actually be quite powerful and by...
VOIP
02/06/2011 22:36
Voice-over-Internet protocol (VoIP, ) is a protocol optimized for the transmission of
voice through the Internet or other packet-switched networks .
VoIP systems employ session control protocols to control the set-up and tear-down of
calls as well as audio codecs which encode speech allowing transmission over an IP
network as digital audio via an...
WEB APPLICATION HACKING
31/05/2011 18:07
What is Web application vulnerability?
"No language can prevent insecure code, although there are language features which
could aid or hinder a security-conscious developer."
-Chris Shiflett
Web application vulnerability is a weakness on web based service.
Evolution of Web Hacking
Automated web vulnerability checking
Input validation...
How to Hack Windows Administrator Password?
30/05/2011 22:10
Sometime we forget our administrator password and we want to access the machine but
we do not know their password so we have 2 methods to logon this machine:
1. Safe mode
2. with Help of bootable software
1.) Safe mode
Press F8 Button when windows start after select Safe mode and click yes and go to run
type cmd. And type following...
How to Hack Windows Administrator Password?
30/05/2011 22:10
Sometime we forget our administrator password and we want to access the machine but
we do not know their password so we have 2 methods to logon this machine:
1. Safe mode
2. with Help of bootable software
1.) Safe mode
Press F8 Button when windows start after select Safe mode and click yes and go to run
type cmd. And type following...
How to Hack Windows Administrator Password?
30/05/2011 22:10
Sometime we forget our administrator password and we want to access the machine but
we do not know their password so we have 2 methods to logon this machine:
1. Safe mode
2. with Help of bootable software
1.) Safe mode
Press F8 Button when windows start after select Safe mode and click yes and go to run
type cmd. And type following...
How to Hack any Password?
30/05/2011 22:03
1. Brute force attack method.
2. Sniffing
3. Social Engineering
4. with help of Tools.
5. with help of Precompiled Hash (Rainbow tables, MD5)
How to bypass default Win Xp password?
Every Windows XP does not have a default password for administrator user.For accessing the
system we follow these steps:
1. type <ctr>+<alt>+<del>...
How to Hack any Password?
30/05/2011 22:03
1. Brute force attack method.
2. Sniffing
3. Social Engineering
4. with help of Tools.
5. with help of Precompiled Hash (Rainbow tables, MD5)
How to bypass default Win Xp password?
Every Windows XP does not have a default password for administrator user.For accessing the
system we follow these steps:
1. type <ctr>+<alt>+<del>...
Some Windows Hidden Tools You Seldom Use
30/05/2011 21:54
To run any of these apps go to Start > Run and type the executable name and press Enter.
Character Map (charmap.exe) - Very useful for finding unusual characters.
Disk Cleanup (cleanmgr.exe) – The usual Disc cleanup.
Clipboard Viewer (clipbrd.exe) - Views contents of Windows clipboard.
Dr Watson (drwtsn32.exe) - Troubleshooting tool,runs when...
Some Windows Hidden Tools You Seldom Use
30/05/2011 21:54
To run any of these apps go to Start > Run and type the executable name and press Enter.
Character Map (charmap.exe) - Very useful for finding unusual characters.
Disk Cleanup (cleanmgr.exe) – The usual Disc cleanup.
Clipboard Viewer (clipbrd.exe) - Views contents of Windows clipboard.
Dr Watson (drwtsn32.exe) - Troubleshooting tool,runs when...
How To Disable RUN Feature in windows operating system
30/05/2011 20:57
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoRun"=dword:00000001
5. Disable Logoff Feature in Windows Operating System
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoLogoff"=dword:00000001
Disable Find...
Change any folder to Recycle Bin (for data security)
30/05/2011 20:53
For changing any folder to recycle bin type these lines in notepad:
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
And save as: Desktop.ini in your folder(which you want to change into recyle bin) to
change recycle bin.
We save desktop.ini in d:\data2 folder and then we open dos prompt and type the above
command, which will...
Change any folder to Recycle Bin (for data security)
30/05/2011 20:53
For changing any folder to recycle bin type these lines in notepad:
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
And save as: Desktop.ini in your folder(which you want to change into recyle bin) to
change recycle bin.
We save desktop.ini in d:\data2 folder and then we open dos prompt and type the above
command, which will...
How to Hide File & Folder
30/05/2011 20:49
It is a 100% safe and free method to hide a file or folder from others in your system without
using any application.For this ,open dos prompt and type:
For Hide:
X:\> attrib +a +r +s +h foldername /s /d [enter]
For unhide:
X:\> attrib -a -r -s -h foldername /s /d [enter]
X= x is location for our folder in hard disk.
ADVANCED HACKING WITH METASPLOIT
29/05/2011 23:51
The Metasploit Framework is a platform for developing, testing, and using exploit code.
The Metasploit Project is a computer security project which provides information about security
vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known
sub-project is the Metasploit Framework, a tool for developing and...
HOW TO FIND OUT EMAIL-SENDER IP ADDRESS IN YAHOO
28/05/2011 20:34
Finding IP address in Yahoo! Mail.
1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed.
To display the headers,
* Click on Options on the top-right corner
* In the...
HOW TO CHANGE YOUR PROCESSOR NAME
28/05/2011 20:31
ITS MY FAV.TRICK
You can change your processor name, using a litlle registry trick.
Changing the name processor is just for fun ,and will not improove your sistem speed!
Ok to start all u have to do is copy the text from below:
Windows Registry Editor Version...
HOW TO MAKE YOUR FLASH DRIVE TO RESET YOUR WINDOWS 7 PASSWORD
28/05/2011 20:24
Most of us have a PC at home and one at work. We use our work PC most of the times and home PC comparatively less. Did it ever happen to you that you forgot your Windows 7 Password ? Maybe you go for a month long vacations or business trip and when you are back, you may forget some of your passwords to the home Windows 7 PC.
We tend to have lots...
MAKE FASTER YOUR MOZILA FIREFOX
28/05/2011 20:19
HELLO GUYS,DO U KNOW SOME CONFIGURATION IN FIREFOX CAN BOOST ITS SPEED 20X FASTER.
OK JUST GIVE ME FAVOUR.
1) Type “about:config” (no quotes) in the address bar in the browser.
2) Find “browser.sessionhistory.max_total_viewers”
3) Set it’s value to “0“;(Zero)
Increase the Speed in Which Firefox loads pages
1) Type “about:config” into the address...
REMOTE HACKING
28/05/2011 13:45
1. Information Gathering / Foot printing
2. Port Scanning
3. OS Fingerprinting
4. Banner Grabbing
5. Vulnerability Assessment
6. Search & Build Exploit
7. Attack
8. Maintain Access with help of Root kits and Trojans.
9. Covering Tracks
1. Information Gathering / Foot printing
Information...
HOW TO HACK FILE HOSTING ACCOUNTS
27/05/2011 08:49
WELL,ITS PREITTY EASY.
hack file hosting accounts using simple trick on google
hack file hosting accounts using simple trick on google
All u need to do is go to google and in search bar type
site:megaupload.com dir + (for megaupload)
or
site:4shared.com dir + (for 4shared).
EARN ATLEAST 1000$ IN A MONTH BY DOING FREE DATA ENTRY WORK
27/05/2011 00:49
GUYS,ITS FREE TO JOIN,
WITH THIS DATA ENTRY WORK YOU CAN EARN ATLEAST 1000$ IN A MONTH,NO REQUIRED ANY COMPUTER SKILL OR ANY QUALIFICATION.
100% FREE REGISTRATION.JOIN NOW & START MAKE MONEY WITH THIS PROGRAME.
ITS 100% LEGIT WORK SINCE 2007.NO SCAM.
TAKE ACTION FAST,COZ SOME POSTS ARE FREE.
TO JOIN THIS PROGRAME,JUST CLICK ON THE...
HOW TO CLEAR YOUR PREVIOUS DNS CACHE
27/05/2011 00:46
FRIEND THIS IS VERY SHORT,BUT EFFECTIVE TRICK
1. Open the Start menu.
2. Go to Run.
2. In the Run text box, type: ipconfig /flushdns
3. Press Enter or Return, and your cache will be flushed.
thats it.
REVEAL THE PASSWORDS USING JAVASCRIPT
26/05/2011 08:17
ITS JUST A TRICK.
Follow the steps given below-
1) Open the Login Page of any website. (eg. https://mail.yahoo.com)
2) Type your 'Username' and 'Password'.
3) Copy and paste the javascript code given below into your browser's address bar and press 'Enter'.
javascript: alert(document.getElementById('Passwd').value);
4) As soon as you press...
GOOGLE SECRET SEARCHING TRICK
26/05/2011 08:16
Using this Dangerous Searching Technique You will be able to find everything like music,movies,cracks,full softwares,games,keygens.... In short everything... So To Know More read on...
DANGEROUS SEARCHING TECHNIQUES
In this Technique I will Show you How To Find files Using Various Hosts such as rapidshare, megaupload, hotfile etc.... You can...
ADD ITEMS TO THE SEND MENU IN YOUR WINDOWS 7
25/05/2011 20:15
A "Send To" menu that got when right clicking a file in windows explorer allows you to copy or send the specified file to another location including USB pen drive, CD-RW/DVD-RW, or to a third-party application.
This article will give an idea of how to add an option in send to menu in windows7.
By default, Send To menu contains items such as...
HOW TO LOCK ANY FOLDER WITOUT USING ANY SOFTWARES
25/05/2011 20:12
THIS TRICK IS FANTASTIC & WORKS.
JUST FOLLOW ME
1. Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat'). Any name will do.
2. Then you see a batch file. Double click on this batch file and it will a folder locker.
3. New folder named 'Locker' would be formed at the same location.
4. Now bring all the...
HOW TO CRACK MEMORY CARD PASSWORD & FORMAT IT
25/05/2011 20:09
HOW TO CRACK THE PASSWORD OF MEMORY CARD
WELL,FOLLOW THIS TRICK TO DO SO
connect Mobile to computer
• Open Command Prompt
• Type "format X: /fs:fat32" (Without Quotes)
[ x = Drivename, here memory card ]
Here is one way more way to unlock microsd cards. Plug the microsd memory card with computer. It must show the drive of the micro sd but it is...
Items: 1 - 300 of 310