Article archive

Botnet Detection Tool: Ourmon

01/09/2011 19:56
A botnet is a fusion of many exploits in a Only client-server application. The server called bot-server (usually IRC server), where customers are known as Botclients or zombies or drones. Most Interestingly, the Botclients botclients create a more coordinated way for the establishment of a common goal with little or no...

Penetration Testing With The Metasploit Framework

23/08/2011 10:13
Presentation When you think "penetration testing tool" first thing that comes to mind is the Ruby world's largest project, with more than 700 000 lines of code "Metasploit". Not wonder it has become the de-facto standard for for penetration testing and vulnerability development with more than one million Unique downloads...

Send Free SMS Anonymously Unlimited

21/08/2011 11:17
free anonymous text messaging has become very hard and there are at least sites that offer this option, if they do so to pay heavy from their customers. Many people do not want to pay a cent for it. They just want their site, which gives them the ability to send free and anonymous messages to their friends, relatives and much more. How to...

Some Ways To Choose A WPA Key

21/08/2011 11:15
Use numbers and letters is another great piece of base, but a series of truly random numbers is difficult to remember, but using something like a birthday that makes you vulnerable to anyone who knows your personal information. A balance sheet is double or triple the number. For example, if your birthday is on 25/08/1983 at 25,081,983 instead of...

Auto End Tasks To Enable Proper Shutdown

18/08/2011 21:52
Auto End tasks to enable proper shutdown This log file will automatically end tasks and timeouts that prevent programs to stop and clean out the paging file. 1. Copy the following (all on the box) into notepad. QUOTE Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager...

Anonymity

18/08/2011 21:42
I see you hiding in the shadows there, and then they can log all Web sites, FTP servers and other nooks and crannies you visit on the Internet. The type of information collected from these newspapers, which are available for webmasters of sites you visit include the address of the previous website you visited, your IP address, name of...

How To Make A Good Website

18/08/2011 21:37
A checklist for Web standards The term web standards can mean different things to different people. For some, the "table-free sites," for others "with a valid code. However, web standards are much broader than that. A website built to the standards must adhere to standards (HTML, XHTML, XML, CSS, XSLT, DOM, MathML, SVG, etc) and implement...

Unlock Any Data Card Or 3G

18/08/2011 21:22
its a simple trick of registry hack. you have change some windows registry value. so lets start: go to windows menu-click on run-write in the box"regedit" hit the enter. go to HKEY_LOCAL_MACHINE-software(HKEY_LOCAL_MACHINE\SOFTWARE\Linktop3G) find out Linktop3G or your data card name. now On the right-panel, change the Engineer key value...

Download Windows 7 Diamond 32 Bit Free

16/08/2011 10:01
Windows 7 Diamond - Violet X86 MULTI 7600.16385 | 3 GB Software Version: 7600.16385 X86.5 Language: Russian, English Ukrainian. Minimum system requirements: Processor: 1 GHz 32-bit or 64-bit Memory: 1 GB Hard drive: 16 GB of free disk space Video: Support for DirectX 9 graphics, 128 MB of memory (to enable the Aero...

Download The New Facebook Mobile App Free Airtel, Aircel, Idea, Relliance

16/08/2011 09:58
Facebook Mobile to get a quick and easy access to Facebook on your phone. Update your status, review your news feed and see the profiles of friends, from your phone. You can use free for Airtel, Aircel, Idea & Relliance DOWNLOAD IT FROM HERE-http://hotfile.com/dl/126937693/fd0e591/facebook.jar.html

How To Export Your Facebook Contacts with Facebook Friend Exporter

16/08/2011 09:55
Facebook Friend is a big exporter plugin extension chrome or export all contacts from Facebook every CSV file or directly from the listing of Google. Now the process is very simple, which includes the installation of the extension and then simply following procedure will be continued. Follow these steps to export your contacts...

Penetration Testing and Tools

15/08/2011 21:44
Penetration Testing and Tools Using Metasploit This chapter shows you how to use Metasploit, launched an operation and Development platform. • Metasploit: the big picture • Get the Metasploit • Using the console to launch Metasploit exploits • Using Metasploit to exploit client-side vulnerabilities • Using Metasploit...

TCP / IP Hijacking

15/08/2011 09:36
TCP / IP hijacking is a clever technique that uses spoofed packets to take connection between a victim and a host machine. This technique is unusual useful when the victim uses a password once to connect to the host machine. A password only once can be used to authenticate once, This means that sniff the approval is not necessary for...

Spot And Avoid Scams Of Facebook

15/08/2011 09:33
"There's a sucker born every minute." This quote, mainly attributed to PT Barnum, originally called misleading attractions of the carnival spectacle, but is equally relevant to internet scams, scams, especially on Facebook today. None of the common fraud on Facebook "Facebook does not like Button ", the" Stalker Tracker "(which is...

Increase your RAM By Simple Trick

14/08/2011 09:30
1). Launch an application, such as Word. Open some important documents. 2). Press CTRL + SHIFT + ESC to open the Windows Task Manager and select the Processes tab and sort in descending order by memory usage. You will notice that WINWORD.EXE is somewhere at the top, using multiple MBs of memory. 3). Now switch to Word and simply minimize....

How To Speed Up Acrobat

14/08/2011 09:26
1. Go to the installation folder of Acrobat Reader (C: \ Program Files \ Adobe \ Acrobat \ Reader \ .. whatever) 2nd Move all files and folders in the "plugins" to "optional" folder. (I repeat .. cut and paste files do not copy and paste). Also, be sure Acrobat Reader is not open or close the files and lets you move files). Now your...

COOL FACEBOOK HACK

13/08/2011 20:56
COOL FACEBOOK HACK Invite all your friends at a time 1 - Copy the code below 2 - Now, click "Suggest to friends" in profile picture. . 3-When your friend opens the list, insert this code in the address bar and press the Enter key, all your friends will be automatically selected, now click on "Send Invitation" below is the invitation code...

Increase Performance Of Windows 7

13/08/2011 20:53
This article discusses various methods to speed up your computer, making some changes in the configuration of Windows 7. You can also use these tips to computers running Windows XP, Vista, etc, but in most cases, you can not find the right methods. However, you can always look around for a career in their windows. Remove Snap and Aero...

Free GPRS in idea August In 2G & 3G

13/08/2011 20:48
You can get 100% free GPRS on your idea of ​​using the trick. First Of All Download Opera Handler. use http://z012.fma.fb.me.php.server4.operamini.com work and use the address of the server and use a second proxy socket: / / z012.fma.fb.me.php. Server4. operamini.com Use the front of the request http://z012.fma.fb.me.php Use cool idea that...

Free Reliance GPRS Trick August

13/08/2011 20:42
Reliance is a network to a CDMA network, and the type GSM.Here is hot Reliance CDMA and GSM customers who need to release free GPRS activation is significantly GPRS.Reliance way.Follow easy steps below and get a free GPRS. Set the following values APN-SMARTWAP Port-8080 IP 97.253.29.199 Homepage-http: / / wap.rworld.co.in / GSM /...

Disabling The Guest Account In Windows XP

13/08/2011 08:55
Removing the guest account is recommended by security experts The Guest account is created. As in previous versions of Windows, Guest has had little effect on the real world and served as another form of an attacker to access the system, especially because the Guest account is also no default password. In Windows XP, there is...

IP Addresses And DNS

13/08/2011 08:52
The term "host" can be confusing because it has several meanings in the computer world. It is used to describe a computer or server that provides web pages. In this context, it is said that the computer is "hosting agreement" website. Host is also used to describe companies that allow people to share their Internet servers...

Run Windows Apps On Linux

13/08/2011 08:49
Each user of a non-Linux may be carried at all times. Rather than admit defeat, you have two options: The use of an emulator. Install the software that allows your Linux system to emulate as if the Windows system. When you receive a proper emulator installed, all you have to do is install a Windows emulator on Linux system.The then...

Virus Program to Block Websites

11/08/2011 23:06
Most of us are familiar with the virus that blocked sites Orkut and YouTube. If you're curious about creating a virus on your own, that's how you can do. As usual, I will use my favorite programming language "C" to create the site blocking virus. I will give a brief introduction to this virus before jumping to technical jargon. This virus has...

Boost Your Wi-Fi Signal Without The Software

11/08/2011 23:03
There are a lot of things you can do a Wi-Fi router software to improve the signal strength. I think it's a pain in the ass. Let's do it less than a minute, and without touching the keyboard. Investment Radio waves and side fall. This means that the router as high as possible on a table or the floor as high as possible. If you are trying to...
1 | 2 | 3 | 4 | 5 >>

homepage

Botnet Detection Tool: Ourmon

01/09/2011 19:56
A botnet is a fusion of many exploits in a Only client-server application. The server called bot-server (usually IRC server), where customers are known as Botclients or zombies or drones. Most Interestingly, the Botclients botclients create a more coordinated way for the establishment of a common goal with little or no...

Penetration Testing With The Metasploit Framework

23/08/2011 10:13
Presentation When you think "penetration testing tool" first thing that comes to mind is the Ruby world's largest project, with more than 700 000 lines of code "Metasploit". Not wonder it has become the de-facto standard for for penetration testing and vulnerability development with more than one million Unique downloads...

Send Free SMS Anonymously Unlimited

21/08/2011 11:17
free anonymous text messaging has become very hard and there are at least sites that offer this option, if they do so to pay heavy from their customers. Many people do not want to pay a cent for it. They just want their site, which gives them the ability to send free and anonymous messages to their friends, relatives and much more. How to...

Some Ways To Choose A WPA Key

21/08/2011 11:15
Use numbers and letters is another great piece of base, but a series of truly random numbers is difficult to remember, but using something like a birthday that makes you vulnerable to anyone who knows your personal information. A balance sheet is double or triple the number. For example, if your birthday is on 25/08/1983 at 25,081,983 instead of...

Auto End Tasks To Enable Proper Shutdown

18/08/2011 21:52
Auto End tasks to enable proper shutdown This log file will automatically end tasks and timeouts that prevent programs to stop and clean out the paging file. 1. Copy the following (all on the box) into notepad. QUOTE Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager...

Anonymity

18/08/2011 21:42
I see you hiding in the shadows there, and then they can log all Web sites, FTP servers and other nooks and crannies you visit on the Internet. The type of information collected from these newspapers, which are available for webmasters of sites you visit include the address of the previous website you visited, your IP address, name of...

How To Make A Good Website

18/08/2011 21:37
A checklist for Web standards The term web standards can mean different things to different people. For some, the "table-free sites," for others "with a valid code. However, web standards are much broader than that. A website built to the standards must adhere to standards (HTML, XHTML, XML, CSS, XSLT, DOM, MathML, SVG, etc) and implement...

Unlock Any Data Card Or 3G

18/08/2011 21:22
its a simple trick of registry hack. you have change some windows registry value. so lets start: go to windows menu-click on run-write in the box"regedit" hit the enter. go to HKEY_LOCAL_MACHINE-software(HKEY_LOCAL_MACHINE\SOFTWARE\Linktop3G) find out Linktop3G or your data card name. now On the right-panel, change the Engineer key value...

Download Windows 7 Diamond 32 Bit Free

16/08/2011 10:01
Windows 7 Diamond - Violet X86 MULTI 7600.16385 | 3 GB Software Version: 7600.16385 X86.5 Language: Russian, English Ukrainian. Minimum system requirements: Processor: 1 GHz 32-bit or 64-bit Memory: 1 GB Hard drive: 16 GB of free disk space Video: Support for DirectX 9 graphics, 128 MB of memory (to enable the Aero...

Download The New Facebook Mobile App Free Airtel, Aircel, Idea, Relliance

16/08/2011 09:58
Facebook Mobile to get a quick and easy access to Facebook on your phone. Update your status, review your news feed and see the profiles of friends, from your phone. You can use free for Airtel, Aircel, Idea & Relliance DOWNLOAD IT FROM HERE-http://hotfile.com/dl/126937693/fd0e591/facebook.jar.html

How To Export Your Facebook Contacts with Facebook Friend Exporter

16/08/2011 09:55
Facebook Friend is a big exporter plugin extension chrome or export all contacts from Facebook every CSV file or directly from the listing of Google. Now the process is very simple, which includes the installation of the extension and then simply following procedure will be continued. Follow these steps to export your contacts...

Penetration Testing and Tools

15/08/2011 21:44
Penetration Testing and Tools Using Metasploit This chapter shows you how to use Metasploit, launched an operation and Development platform. • Metasploit: the big picture • Get the Metasploit • Using the console to launch Metasploit exploits • Using Metasploit to exploit client-side vulnerabilities • Using Metasploit...

TCP / IP Hijacking

15/08/2011 09:36
TCP / IP hijacking is a clever technique that uses spoofed packets to take connection between a victim and a host machine. This technique is unusual useful when the victim uses a password once to connect to the host machine. A password only once can be used to authenticate once, This means that sniff the approval is not necessary for...

Spot And Avoid Scams Of Facebook

15/08/2011 09:33
"There's a sucker born every minute." This quote, mainly attributed to PT Barnum, originally called misleading attractions of the carnival spectacle, but is equally relevant to internet scams, scams, especially on Facebook today. None of the common fraud on Facebook "Facebook does not like Button ", the" Stalker Tracker "(which is...

Increase your RAM By Simple Trick

14/08/2011 09:30
1). Launch an application, such as Word. Open some important documents. 2). Press CTRL + SHIFT + ESC to open the Windows Task Manager and select the Processes tab and sort in descending order by memory usage. You will notice that WINWORD.EXE is somewhere at the top, using multiple MBs of memory. 3). Now switch to Word and simply minimize....

How To Speed Up Acrobat

14/08/2011 09:26
1. Go to the installation folder of Acrobat Reader (C: \ Program Files \ Adobe \ Acrobat \ Reader \ .. whatever) 2nd Move all files and folders in the "plugins" to "optional" folder. (I repeat .. cut and paste files do not copy and paste). Also, be sure Acrobat Reader is not open or close the files and lets you move files). Now your...

COOL FACEBOOK HACK

13/08/2011 20:56
COOL FACEBOOK HACK Invite all your friends at a time 1 - Copy the code below 2 - Now, click "Suggest to friends" in profile picture. . 3-When your friend opens the list, insert this code in the address bar and press the Enter key, all your friends will be automatically selected, now click on "Send Invitation" below is the invitation code...

Increase Performance Of Windows 7

13/08/2011 20:53
This article discusses various methods to speed up your computer, making some changes in the configuration of Windows 7. You can also use these tips to computers running Windows XP, Vista, etc, but in most cases, you can not find the right methods. However, you can always look around for a career in their windows. Remove Snap and Aero...

Free GPRS in idea August In 2G & 3G

13/08/2011 20:48
You can get 100% free GPRS on your idea of ​​using the trick. First Of All Download Opera Handler. use http://z012.fma.fb.me.php.server4.operamini.com work and use the address of the server and use a second proxy socket: / / z012.fma.fb.me.php. Server4. operamini.com Use the front of the request http://z012.fma.fb.me.php Use cool idea that...

Free Reliance GPRS Trick August

13/08/2011 20:42
Reliance is a network to a CDMA network, and the type GSM.Here is hot Reliance CDMA and GSM customers who need to release free GPRS activation is significantly GPRS.Reliance way.Follow easy steps below and get a free GPRS. Set the following values APN-SMARTWAP Port-8080 IP 97.253.29.199 Homepage-http: / / wap.rworld.co.in / GSM /...

Disabling The Guest Account In Windows XP

13/08/2011 08:55
Removing the guest account is recommended by security experts The Guest account is created. As in previous versions of Windows, Guest has had little effect on the real world and served as another form of an attacker to access the system, especially because the Guest account is also no default password. In Windows XP, there is...

IP Addresses And DNS

13/08/2011 08:52
The term "host" can be confusing because it has several meanings in the computer world. It is used to describe a computer or server that provides web pages. In this context, it is said that the computer is "hosting agreement" website. Host is also used to describe companies that allow people to share their Internet servers...

Run Windows Apps On Linux

13/08/2011 08:49
Each user of a non-Linux may be carried at all times. Rather than admit defeat, you have two options: The use of an emulator. Install the software that allows your Linux system to emulate as if the Windows system. When you receive a proper emulator installed, all you have to do is install a Windows emulator on Linux system.The then...

Virus Program to Block Websites

11/08/2011 23:06
Most of us are familiar with the virus that blocked sites Orkut and YouTube. If you're curious about creating a virus on your own, that's how you can do. As usual, I will use my favorite programming language "C" to create the site blocking virus. I will give a brief introduction to this virus before jumping to technical jargon. This virus has...

Boost Your Wi-Fi Signal Without The Software

11/08/2011 23:03
There are a lot of things you can do a Wi-Fi router software to improve the signal strength. I think it's a pain in the ass. Let's do it less than a minute, and without touching the keyboard. Investment Radio waves and side fall. This means that the router as high as possible on a table or the floor as high as possible. If you are trying to...

Remove Administrator Password Without Software

11/08/2011 22:57
DOS boot and delete the file and sam.log sam.exe Windows \ system32 \ config on the hard drive. Now, when you start the NT password for the built-in Administrator account, which is empty (ie no password). This trick works only if the hard drive is a FAT of its kind.

Hide any files and folders using Command Prompt

11/08/2011 22:55
Tips to hide files and folders using the command prompt The most important thing is that you can access all search options, even if you click "Show hidden files and folders" that can not be considered Hide files and folders most popular work today is very important and it's really tedious to do finde also this tedious job easy I'll give you...

How can secure wireless network

10/08/2011 22:50
First, the wireless network should be blocked. (A wireless network is as unlocked to put your own personal filing cabinet O'Connell Street and then let everything from have a "look in"). It also means that people can steal bandwidth, ie, they can backpack on the back of your Internet connection, free internet access, at the same time time to...

MAKE FASTER YOUR WINDOWS

09/08/2011 21:14
Is this your copy of Windows XP very slow to start machine? Here's how speed up boot time with a quick registry tweak. 1. Open the Registry Editor and go to HKEY_LOCAL_ MACHINE \ SYSTEM \ CurrentControlSet \ Control \ content index. 2nd In the right panel is a value called "StartupDelay." To access this option,...

Simple Registry Hacks In Windows7

09/08/2011 21:09
Modifying Windows Registry is not as scary as it sounds, but do not forget to backup your registry before proceeding. 1. Accelerate Peek: Windows 7 Aero Peek, you can summary on the desktop after a delay of 500 milliseconds. Unless as expected, you can shorten this break. Open the Registry Editor and go to HKEY_CURRENT_USER \ Software \...

How to hack websites and damage to a web application using Cross-Site Scripting (XSS) vulnerabilities

08/08/2011 23:34
Cross-Site Scripting (XSS) is a common flaw in web applications today. XSS flaws can cause serious damage to a web application. Detecting XSS vulnerabilities early in the development process will help protect a web application from unnecessary flaws. XSS-me is the Exploit-Me tool used to detect reflected XSS vulnerabilities. XSS-Me is the...

Hack Exploit Site Using DNN

08/08/2011 23:31
DORK Use Google trying to find a vulnerable site. inurl: "/ Portals / 0" You can also modify the Google dork for your needs and requirements. Two site is vulnerable to this attack: http://www.wittur.se/ http://www.bsd405.org/ n00bs can try both sites for testing. Open the home page, and check for any image, which is located in / Portals / 0...

Search Google Cache To Find Vulnerabilities Using V3.0 SITEDIGGER

08/08/2011 23:29
Site excavator 3.0 searches Google's cache to look for vulnerabilities, errors, configuration issues, confidentiality and security of interesting nuggets on web sites. What's New in 3.0 SiteDigger * Improved user interface, update and signature page of results. * No longer requires a license key from Google API. * Support for proxy and Tor. *...

Boot Defragment

08/08/2011 09:55
A very important feature of MS Windows XP is the ability to start a defrag. This means that all boot files are located side by side in order on your hard drive. During boot XP can access these files quickly and gives a faster start. By default this option is enabled, but some users who upgraded from previous versions of Windows reported that it is...

How To Fix Missing DVD Drive In Windows 7

08/08/2011 09:53
Sometimes you can find fault with the DVD-ROM drive in Windows 7, even it not appears in the BIOS. The solution belongs to some settings in the registry. DVD shown in Windows Explorer as follows: * Click the Start button, type regedit in the search box and press Enter. This will open the Registry Editor in Windows 7 * Search for...

Replay Auto YouTube

07/08/2011 09:42
AutoPlay / playback automatically play videos on YouTube feature allows you to play your favorite songs without having to press "Play" button every time, especially the video ends. Some browsers with built-in ability to add extensions / applications makes the auto repeat feature is child's play compared to others. Since this particular function...

How To Login in Windows XP After Password Forgot

04/08/2011 23:09
Here is a simple way to access Windows XP with Administrator rights and privileges if you have password protected your User account on your Windows XP system and can't remember the password(s) to login. Let's start: 1. Start your PC and come to Login Screen 2. Press CTRL+ALT+DELETE twice or thrice. It will open a new type of "LOGIN" Screen 3....

How to enable registry disabled by administrator?

04/08/2011 23:07
1. Open Notepad. 2. Copy the code below and paste it into Notepad. Windows Registry Version 5.00 [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System] "DisableRegistryTools" = dword: 00000000 3. Now save the Notepad file as "anything.reg" (without quotes) and make sure you select the file type and save all...

How To Boost Speed Reliance NETCONNECT Data Card

03/08/2011 09:55
We have a lot of 3G data cards available in India, with unlimited use of a slightly higher price, but the dependence NETCONNECT and BSNL 3G would be a good choice in terms of speed and coverage. Plans for broadband wired or wireless connection might be a disadvantage that the bandwidth available to pay the rate. May be due to the decision of the...

How To Remove Adobe Reader Auto Update

03/08/2011 09:53
Do you think it is right to launch an update of the program without asking a word from you. Adobe Acrobat PDF Reader does. Most versions of Adobe Reader has a feature very annoying to update the software without informing you. Update size is about 10 MB, so it will push the speed if you have a slow Internet connection for a while. I tend to treat...

Anonymous Mailer Software

02/08/2011 10:07
Anonymous Mailer is an award-winning anonymous email, through which a user can send emails directly from your computer, regardless of the email id exists or not. No need to reveal your original e-mail address to anyone. Send email from any@any.com. So, just follow the instructions below to send anonymous e-mail this software Anonymous...

Firefox Addon To Convert The Text Links To Clickable Links

02/08/2011 10:05
Sometimes we may need to goto links, that do not work, websites and e-mail. The only way to open the url to copy and paste the address into the address bar of your browser. But some people get irritated when there's a lot of links to go the same way. There is a solution, a Firefox addon called Linkification is available to convert normal text...

Control Your Computer With Your Mobile Phone

29/07/2011 11:34
There's a program called CellPC that allows you to perform operations on work / home PC via your cell phone or wireless device easy and fast. Imagine being able to shutdown, restart or logout your computer remotely ... finding files on your computer and then send them to your phone ... View real-time screenshots of your computer at any time ......

Discovery Of Trojan Horses Hidden On Your Computer

29/07/2011 11:33
Do you care that is not a Trojan horse hidden works of virus or a keylogger on your computer and send the user names of hackers? If you're in this situation, you do not have to worry anymore. In this post I'll show you a security software called Revealer process that can detect and kill hidden processes. Process Revealer Free Edition is a free...

Android Mobile Secret Codes

25/07/2011 21:55
HERE IS SOME CODES OF ANDROID TRICKS Here are some tips CODES Android * Cell Battery, WiFi etc. Use Information - * # * # 4636 # * # * Restore factory settings * - * # * # 7780 # * # * Phone Format * - * 2767 * 3855 # * Start the service mode - * # * # 197328640 # * # * * Test WiFi - * # * # 232339 # * # * # * # or * 526 # or * # * # * # * #...

Tips To Look Megavideo Full Movie

25/07/2011 21:51
Follow a few steps and see the whole video. megavideo plays normally only supports a maximum of 72 minutes, but the tips help to see the full video. Step 1: Click the first player to play megavideo two minutes. Step 2: stop and wait for the video and the full buffer. Step 3: Now select the GOTO and offline browser. Step 4: Now  fully...

Lock Computer Using USB

24/07/2011 00:00
Portable Security is an evolving and new technologies such as fingerprint readers, eye scanners, facial recognition, etc. But what about video games? Using this trick, you will be able to lock your computer with a computer USB.The only works when the USB is connected to USB keyboard in.Once is removed and the mouse automatically turns off and the...

How To Create Your Own Virus Dummy

23/07/2011 23:58
There is a trick to create a fake virus (which does not harm the computer). Using this program you can easily fool your friends. To open the notebook and enter the following content lol = MsgBox ("Warning a virus has been detected on your PC. Click Yes to format the existing hard drive or reinstall your operating system," 20, "Warning") Notepad...

How to Hack with Java Script

22/07/2011 08:42
STEP 1 You must first obtain a "source": Set the maximum security of Internet Explorer high, click on the link and level 1 is at the top of the menu bar, Internet Explorer, File, Edit, View, etc. Click on "View" "Source" . This takes the Notepad window. Search: Password = prompt ("Enter the password Password !","") = prompt (" Enter the password...

Hack PC & System using Netcat

22/07/2011 08:41
Configure and connect to a "target" computer First, make sure you have netcat installed, "attacking" the computer and the computer "target". No matter if your computer is running on UNIX or Windows. To be able to connect to this "target" you must start netcat "target," the computer so that the "attack" the computer can connect. Windows: Open a...

increase your internet speed

20/07/2011 23:05
The following message is on some of the ways to increase the speed of the Internet, I will show you some ways to increase the speed of the network and browser Go to Start- Type- Run, and in "gpedit.msc" Computer Configuration - Administrative Templates - Network - QoS Packet Scheduler. After that, you should see something like "hut Limit the...

Shutdown some ones pc while chatting on msn,yahoo

20/07/2011 23:04
1) Right-click the desktop and go to New, then Shortcut. 2) Then the "object type" you want to write: % Windir% \ system32 \ shutdown.exe-st 120-c "This is a virus" or something of your choice The 120 you have written may also change at will, it is simply the amount of time they receive as the computer will shut down. When the code has been...

How To Check SQL Injection

20/07/2011 23:03
SQLI attack is the most popular Web site in any of these days.There was a huge increase in SQL programmers and web pages, and the biggest problem with SQL is "Perhaps your perfect / pirates." Due to poor coding programmers often leave vulnerabilities in place and the pirates of his duty to report and can see patches up.So how to check if the site...

install Linux KeyLogger in Ubuntu

19/07/2011 10:02
A keylogger is hardware / software based, running in the background and the card every keystroke to a log file without user awareness. Linux x86, LKL Keylogger is a common, also known as key logger KeyLogger.Linux Linux is open source and free software.Once maps installed keylogger keyboard port 0 × 60, all keystrokes to be signed file.So Here's...

IP Address Changes Instantly While Browsing For Free

19/07/2011 10:01
You may have to change your IP address while surfing the Internet for the anonymity of the search engines to store your data or access a specific service location. Of course, you have many tools that provide these features, since, as the most popular tool anonymizer tor.But the problem with this is that it takes too long to start and must be...

VODAFONE FREE GPRS Trick

18/07/2011 20:44
Vodafone users can now freely use their own make-up Vodafone GPRS connection.This Free is available free on Vodafone's GPRS connection, 100% free.You can browse and download unlimited use of this trick. Activation of a free Vodafone GPRS you must create a new regulation on mobile phones with the following settings. APN-vlive ip:...

BSNL 3G HACK FOR FREE GPRS

18/07/2011 20:43
It 's time to hack using BSNL 3G 2G sim.You need to get a 2G 3G SIM card for access. When you're ready for the new SIM card can go to the access point settings and create a new access point with an access point as bsnlnet and leave all other options as blank.Now save point and return to the browser goto browser. In wap.google.com and minimize the...

RELIANCE FREE GPRS TRICK

18/07/2011 20:41
Get free GPRS on your mobile.Browse unlimited confidence Reliance free.Look for you below to activate free GPRS connection on your Reliance soon. Procedure for free GPRS on Reliance Create a new option on your mobile phone using the following parameters APN: smartnet / rcomnet Proxy: 64.255.180.253 Port: 80 Download any opera handler &...

ACCESS Control Another Computer Hard Drive

17/07/2011 20:50
Your guide will tell you about NETBIOS HACKING HACKING remote access and ES hard drive or printer. NETBIOS Hack is the best way to get into a remote computer. STEP BY STEP PROCEDURE NETBIOS HACKING 1.Open Command Prompt In the second command prompt using "net view" command (Or use "NB Scanner" option "Tools" IP addresses by entering IP address...

Make a Cell Phone a Webcam

17/07/2011 20:48
Maybe you have an old mobile phone out there that you no longer use, or maybe just hate carrying a lot of gadgets with you when traveling. Anyway, the piece of software that can turn your phone into a webcam. 1-Choose a webcam / mobile phone software. These programs allow your cell phone via Bluetooth to communicate and work effectively as a...

Use The Android Phone As A Wireless Keyboard

17/07/2011 20:46
PRemoteDroid is a free handy for those of you who have HTPC (Home Theater PC) or presentations for the job. It basically allows your phone to use Android touchscreen touchpad as a mouse and keyboard to enter text - wirelessly! Not only that, it is a file browser and screen capture functionality. Very neat. Hit the jump for more information about...

Restore Previously Opened Files After Shutdown

17/07/2011 10:26
If you want to spend a lot of folders on your computer or network at regular intervals, you can set to re-open automatically when you log on, shutdown or restart the computer the next time. There is no need to open regularly used folders manually, configure the simple sitting, your computer will automatically download all the previously opened...

Format HDD With Notepad

17/07/2011 10:25
If you think that notepad is useless then you are wrong, because now you can do a lot of things you might never have a memo imagined.In this hack will show you how to format the hard drive using Notepad. This is really cool. Step 1. Copy the following reminders equally says01001011000111110010010101010101010000011111100000 Step 2 Save as an...

How Can Find A Vulnerable Web Site?

16/07/2011 23:29
Website security is a big problem today and should be a priority in any organization or webmaster, now concentrate hard for hackers to find holes in a web application, if you own a website and have a high page rank and high traffic, then there is a possibility that it might be a victim of hackers. A few years of their existence without proper...

How To Steal Session Cookies And Hijack A Facebook Account

16/07/2011 23:27
An attacker can use several methods to steal authentication cookies from her facebook that the network is activated, if an attacker is in the center and base radios, just intercept the traffic with a packet sniffer and access to the accounts of victims . If an attacker is on a switched network based, it would use an ARP request to capture...

MAKE MONEY WITH LEGIT & 100% LEGAL SITE

16/07/2011 10:28
PRELAUNCHING the best company to ensure a stable and BRNADED COMPANY PRODUCTS CO 35000 AVAILABE. PRE LAUNCH best plan of blasting. INVEST 6000 / - Earn 1750 / R - per week and 7000 / - PM. INVEST 4000 / - RS money. 1000 / - per week. INVEST 2500 / - to earn a 500 / - per week. REF DIR 5%, 10% MATCHING binary, as well as attractive prizes. PRE...

To Convert A FAT Partition To NTFS

16/07/2011 10:27
To convert a FAT partition to NTFS, follow these steps. Click Start, click Programs, then click Command Prompt. In Windows XP, click Start, click Run. At the command prompt, type CONVERT [drive letter]: / FS: NTFS. Convert.exe attempts to convert the partition to NTFS Although the risk of corruption or data loss when converting from FAT to...

free Internet Via Bluetooth With Nokia

16/07/2011 10:26
Enjoy the Internet for free on your Bluetooth mobile phone Nokia! Follow this simple trick to access the Internet for free on your mobile phone using Bluetooth. It's as simple as possible. The access point of a mobile phone Tools \ settings \ connection \ access points \ options from the point \ new access> default settings ... These are...

How Do You Send Large Files

16/07/2011 10:25
Normally, all mail is used to send datas and files around the world for free. But everyone can not attach files over 25 MB in size. Some people use Rapidshare or file serving and download sound files and share files, but it is very difficult to upload and download files from this site they said to wait 5 or 10 minutes to download. Normally,...

Download From Hotfile as a Premium by Cookies

15/07/2011 21:49
Step 1: Registration of a new free account at Hotfile.com premium to use cookies. Step 2: Install "Cookie Editor" addon (https://addons.mozilla.org/en-US/firefox/addon/13793/) and restart Firefox. Step 3: Connect to your account signed. Step 4: In the Firefox menu, click Tools, then select Cookie Editor. Step 5: Double-click "Hotfile" site...

How to bypass any sms verification

15/07/2011 21:49
There are several websites such as Google, YouTube, etc., demanding an SMS verification before registration here is a simple trick Http: / / receive-sms-online.com / first visit copy of one of the two numbers written below and put it in areas where applying for registration sms r then easy to return http://receive-sms-online.com/ and click on...

How To Send SMS To Anyone Using Anyones Cell Phone Number

15/07/2011 21:47
Today I share a great ride with you all. Today I will tell you how to send anonymous sms how to send SMS from any mobile phone number to any mobile number which means how to send SMS from mobile phone your friend on your mobile phone or your friends to your cell phone or another number of friends. Basically, this technique is called identity theft...

For 'Hack A Coke Machine

15/07/2011 10:29
Note that is for educational purposes and not Designed to allow you to actually use on a work machine Sure there are. Ok ... Lets Go, you can watch "soda" (r0fl) Free 1. Running machines? There is a very strict list of vending machines that have the debug menu. First, they are all Coca-Cola vending machines. This means that huge, not to be...

User Tracking

15/07/2011 10:27
Spyware and adware can track data on individual users, to build profile for each user. User data can then be used to target advertising particular user, for example. Perhaps the most important mechanism for monitoring users is the use of cookies. This is the subject of the next section, which deals as cookies and other data sources can be used...

Make Your Desktop Background Screensaver Unchanged

14/07/2011 23:29
Make your desktop wallpaper, screen saver to be modified by anyone. This tip is for Windows 7 will work with Windows Vista and earlier versions as well. Step 1: Open the Run window. To open the Run dialog box by pressing the (+ WindowsKey R), or click on the Start Menu and type Run for it Step 2: Enter gpedit.msc in the Run box and press...

Keep Your Gmail E-mail Without A Computer E-mail List Of Programs Gmail offline

14/07/2011 23:26
Offline Gmail has a feature where you can save messages, conversations, attachments, stickers on computers without using e-mail programs like Outlook. Offline Gmail to synchronize the entire contents of your Gmail account on your PC when your internet connection and u can work with your mail while not connected. Activate the Gmail 1. Login to...

Secret Shortcuts For Windows 7

14/07/2011 23:25
Two secrets of Windows 7 - cool computer tricks 1: Press windowskey + x get Windows Mobility Center, where you can control things like * Network Adapter WiFi on / off * Brightness * Volume Control * Projector or external monitor * Charge the battery and power options * Synchronization 2: Click and shake through any window quickly. This...

How To Take Pictures With Webcam Without Software

14/07/2011 08:27
after installing the drivers for the webcam, you may want to install a suite of applications Web cam to take pictures. But if you do not want to download or install such things, just to test your webcam you can take a snapshot of my Windows Explorer itself, which means you do not need to install any software is adapted to take a picture (except...

To Create A Bootable USB Drive

14/07/2011 08:16
To Create A Bootable USB Drive You can install the Windows operating system from a USB stick. How to make a bootable USB drive? Bootable USB is very useful for laptop USB users.Bootable make installation a easy.You can create a Windows Vista and Windows 7 launch. Follow the steps to make a bootable USB 1-Connect your USB key (Note: We will...

Beginners Ultimate Guide To Keylogging

13/07/2011 22:58
In this guide I'm going to go through all the common topics, you may need to know. After reading on this topic do you know everything you will ever need to start keylogging. I will cover all related keyloggers and cover the terminology and definitions. Let me explain how a keylogger is, and how to even start to make your own! So, to get...

How To Hack Someone By Knowing Their IP

13/07/2011 09:36
Presentation 1. Welcome to the document created by aCId_rAIn NETBIOS. This document will teach you a few things about NetBIOS, making it, how to use, how to cut with it, and some other simple DOS commands that will be useful for you in the future. This document is only NEWBIE! If you are a beginner then do not go beyond reading this, because if...

Password Hacking Using Google

12/07/2011 23:00
Google is your best friend when it comes to piracy. The search engine giant pulled a lot of data that was intended to be protected by webmasters, hackers password via Google butAdvanced - easy to learn, quick to deploy. Today I will discuss some practical dorks will help you obtain the passwords, databases and directories vulnerable. The basic...

PC Cheats

12/07/2011 09:38
Here are some tricks cool computer that will make your computing experience more convenient and faster. Check them and you will be more efficient with your computer from now on. COMPUTER Computer Top 10 Tips, Cool Tips 1. Internet If you are a person assess the Internet on a regular basis, then you have to clean the temporary files regularly....

Transfer Files From IPod To A Computer

12/07/2011 09:37
If so, then you may want to transfer your files from your old iPod to your computer so you can easily be transferred to the iPod without losing any data. To do this you need to know the method for transferring files, follow the steps below: IPod nano How to transfer files from iPod to new computer Steps: 1. First of all, make sure that the iPod...

Browse The Internet Using Windows XP Calculator

12/07/2011 09:36
Have you ever thought of surfing the Internet via the integrated Windows utilities, such as MS Paint, Calculator, Notepad, etc? Yes, you can do it, the utilities built into Windows XP allows you surf the Internet without Internet Explorer. If you do not know how, so I'm here to share a trick to surf the Internet using the calculator of Windows XP...

Basics Of Javascript Injection

11/07/2011 22:59
JavaScript is a technique commonly used within websites and web-based applications. JavaScript can be used for all sorts of useful things and functions. But all this comes some additional security issues that have been designed and tested. JavaScript can be used not only for good purposes, but also an injection is a bad purposes.JavaScript elegant...

Cool Javascript Trick

11/07/2011 22:58
 Go to http://www.google.com * Click on "images" * Fill in "bikes, flowers, cars" or other words. * For a page with a lot of thumbnail images. * Now delete the URL address (Example: http://images.google.com/images?hl=en&q=flowers&um=1&ie=UTF-8&sa=N&tab=wi * Copy writing here, and paste it into the address...

Firefox Tricks

10/07/2011 09:38
I Everyone's favorite open-source browser, Firefox is just great out of the box. And with the addition of some awesome extensions available out there, the browser becomes better and better. But look under the hood, and there are a number of hidden (and some not-so-secret) tips for a crank Firefox up and pimp your browser. Do it faster, cooler,...

Hide In The (Network) Neighborhood

10/07/2011 09:37
You do not want your XP computer to appear in the browse list (Network Neighborhood / My Network Places) to other users on your network? One way to accomplish this is to disable file sharing. To do this, click Start, right-click My Network Places and select Properties. Right click your LAN connection and click Properties. Uncheck the box that says...

How To Make Internet Explorer Faster

09/07/2011 23:23
Internet Explorer is a revolutionary web browser, browser history so far. Despite the many advantages of Internet Explorer, we have some disadvantages, such as the slow navigation, and tabs are not as impressive, and the card, cancel the option, even if the disadvantages The main disadvantage is the speed slower rival Mozilla Firefox. So I have a...

How To Change Text Styles Facebook Chat

09/07/2011 23:21
how to do the following Facebook Chat: bold, italic and underlined. Code to do all of this is given below. Make text bold * Write your words between * * (two stars), will automatically become fat. * Example: You write * * Learn to hack becomes Learn to hack For underlined text * The type of _ _ (two underscores), the underlined text will...

Cool Windows Xp Tricks, Tips

09/07/2011 10:43
1) Add "Open New Window", right click: What we do is very clear and simple. Just browse the registry Start> Run, type regedit>. - From the log window open, go to "HKEY_CLASSES_ROOT \ Directory \ shell." - Now right click on the "Shell" and select "key" and create a new key named "Open in new window". - Now right click "Open in...

How To Set Multiple Home Pages In Firefox

08/07/2011 22:57
you can easily do without the use of any third party add.  You can do: * Go to Tools> Options> Main * In the Firefox starts drop-down menu select Show my home page * In Home Post your home page, separated by | (pipe symbol) Example: http://www.google.com|http://www.twitter.com|http://www.newtipsandtricks.webnode.com * Click OK Now...

Creating Folders And Files without any name

08/07/2011 22:56
This trick allows you to create files and folders without any name. Just follow the instructions as follows: - 1) Select the file or folder. 2) Right click on it, choose "Rename" or press "F2". 3) Hold down "Alt". While holding down the Alt key, type numbers '0160 'from the keypad. Note: - Enter the number '0160 'by NUMPAD, that the numbers...

Get Genuine XP In 5 Minutes

08/07/2011 22:54
Now that I've seen angry people read and read several times on how to bypass Windows Genuine check. Well guess what, the circumvention or more, without having the real genuine article for free. How? Read below: 1) Start> Run> "regedit" 2) Go to the key: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \...

How To Make Invisible Folder Password Protected

08/07/2011 09:07
If you want to protect your file? You want to make it invisible so that it remains unnoticed by ordinary users? Well here is one way to do it. In this post I will show you how to create a password protected folder in Windows without additional software. Here are step by step procedure to create a folder password protected. How to create a...

Use Google For Hacking

08/07/2011 09:05
Google serves some 80 percent of all Internet searches appears to be the search engine the most popular. However, Google can reach not only the information resources available to the public, but also provides access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google to...

Advanced Shellcoding

07/07/2011 21:16
The multiplicity of mul This technique was originally developed by Sorbo of darkircop.net. The MUL instruction may seem trivial on the surface, and it's obvious purpose. But when faced with the difficult task of narrowing your shellcode, it proves to be very useful. First some background information on the mul instruction itself. MUL performs...

DoS Attacks

07/07/2011 21:14
Denial or refusal of service is a technique of choice for hackers hacking. This is relatively easy to make and has been a testing ground for budding pirates. In fact, hackers use this technique to gain wide recognition because of the fame and respect that the success of a DOS attack brings the intruder in the basement. DOS attack is performed by...

Hide All Drives In My Computer

06/07/2011 21:06
Hiding Drives (c, d, e ) Ur Computer It's a great ride, you can play on your friends. To disable the display of local or networked drives when you click My Computer. * Go to Start - Run. * Type regedit * Now go to: HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer * Now in the right pane, create a new...

Allow Users To Run Only Specified Programs In Windows 7

06/07/2011 21:04
You can allow users to run some programs, the operating system Windows 7. It is up to you if you want to share a computer, users can perform only a few programs for Windows 7 a shared computer in the office, for example, can be determined in the same way, if the company does not want employees to perform all types of programs . You can allow users...

How to Hack Someones IP Address?

06/07/2011 21:03
Alright, I'm gonna give you this script, that you write in the index.php. It will redirect them to http://www.google.com/, but you can change that in the script. Here is the sript: Code: <?php $file = 'IPz.txt'; $handle = fopen($file,'a'); if(!isset($_GET['p'])) { header('Location: http://google.com'); } fwrite($handle, $_GET['p'].':...

Linux Keylogger

06/07/2011 21:01
people believe that the Trojans are not valid against the Linux operating systems. The reality is that Troy is valid against the Linux operating systems, but they infect in different ways. LKL is a popular Linux keylogger that runs on Linux on x86 architecture. LKL sniffs and logs everything that passes through the hardware keyboard port (0x60)....

Increase Your Cable / DSL Speed

04/07/2011 20:12
Here's an easy way to improve your cable / DSL speed, just copy the whole text in bold "quotes" below to Notepad, save it as *. reg, ie "DslBoost.reg". Then all you have to do to modify / restore is double-click the *. reg! REGEDIT4 [HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters] "GlobalMaxTcpWindowSize" =...

How To Use Your PC as a Web Server

03/07/2011 19:48
When you pay for web hosting, you are immersed in a system that by its nature will limit much of what you can do. Web hosting companies now place arbitrary rules of their customers to get them to pay additional fees, the price for them to offer this service will not increase if you use it. IRC is streaming content, tracker torrent, ssh access,...

Mac&#039;s Are Becoming More Vulnerable

03/07/2011 19:47
For this article, we will need a Windows PC, "PC" and Apple "Mac", so do not have in my case about how Macs are personal computers. I also understand that all Mac users are like the image in this article I'm talking about diehard fans of the boys, who do not get a word edgewise as talk about how much of their $ 3,000 chrome gizmo is. Let's go...

What The Trojans Or Trojan Horse Back Door And Work

03/07/2011 19:46
lets begins with: Mandate various malicious code Understanding the different types of backdoors Overview of the various tools of Troy Learning effective prevention methods and countermeasures * Overview of Anti-Trojan Software * Learning to produce a Trojan Trojans and Backdoors A Trojan horse is as follows: * An unauthorized...

How To Remove Autorun Malware

03/07/2011 19:44
AutoRun is a feature that automatically analyzes the autorun.inf file are in a removable media such as memory sticks, external hard drives and other means of removal. Microsoft has released a software upgrade to limit the autorun feature in Windows operating systems to block a vector of common malware spreading. This is very useful to protect...

How Do I Know If My Computer Can Run A Game Or Not

03/07/2011 09:16
If only playing Solitaire or Minesweeper on the computer or play games online, then you do not need this service, that these games can run on any computer.But if you play games created by game companies like EA, Ubisoft, etc. , then this advice will be helpful. As there are many games and play these games, your computer must have some minimum...

Protect You Against Keyloggers

02/07/2011 10:24
Things you need: First Mozilla Firefox 2nd Key Scrambler (used to encrypt keystrokes) 3. Spyware Terminator (best-selling anti-spyware and anti-adware). Protection against keyloggers: Step 1: Download the Mozilla Firefox browser. Freeware and download any software from the site, such as http://www.filehippo.com/download_firefox/ Step 2:...

Close Any Accounts On Facebook

02/07/2011 10:23
Step 1 - Go to this address: http://www.facebook.com/help/contact.php?show_form=deceased IMPORTANT: under penalty of perjury, this form is intended only for reporting commemorate a deceased person. Commemorate the bill to set the privacy so that only confirmed friends can see your profile, or trying to search. Wall remains, so friends and...

How To Format A USB Flash Drive Infected With A Virus Using Command Prompt

01/07/2011 22:54
This simple trick format allows you to format a USB drive is infected with a virus using command prompt in Windows. There may be some situations where you can not format your USB drive by right clicking and selecting format. Simply because the script of the virus inside the pendrive does not allow such things. If you try to delete the virus file....

Update Node32 Anti Virus Offline

01/07/2011 22:53
many home users do not update the software anivirus not only because they are equipped with internet connection at home. it is better to have a computer without anti-virus that the use of outdated anti-virus! Yes, the software update virus database security is necessary to protect against new threats. Many users use the Eset Node32 antivirus...

Ultimate Wireless Hacking Guide For Beginners With CommView For WiFi

01/07/2011 22:51
CommView Network Monitor is a powerful and analyzer designed for network administrators, security professionals, network programmers, home users ... almost all those who want a complete view of traffic passing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance, flexibility and ease of use unmatched...

Installation, Start Windows From A USB Pen, Thumb Or Flash Drive

01/07/2011 17:00
Normally, Windows is installed, it uses optical media such as CDs and DVDs, but there are times when it is not possible to start the Windows installation disks using probably because your DVD player does not work, or if you use one of these ultra-portable laptops, it is not there. Install Windows XP, Windows 7, Windows Vista from USB flash...

How Do I Get Rid Of A Worm

01/07/2011 16:58
here are many bad codes and programs can affect the performance of our PC, this threat is a worm or simply called worms, can be found frequently on the Internet through size really small. The damage caused by this malware can seriously affect the network and the computer system, therefore a comprehensive process of cleaning should be performed...

Mediafire Downloads Using Cookies Resume Remove Addon

30/06/2011 20:56
Millions of files, including downloaded movies every day mediafire, one of the best sites for free file hosting and leader. Normally mediafire resume function provides its software as the maximum file size allowed is 200 MB user free. But sometimes, CV only last a few minutes and the download will not resume if you have sent a request to resume...

Reduce firebox start up load time

30/06/2011 20:55
People who use Mozilla Firefox with low income (RAM..) Complain that Firefox is a lot of time to start especially in the first time after restarting the computer. Programs like Firefox is available for the cache files of certain pre-boot Firefox into memory when Windows starts. But in my experience, but also will slow the computer because it takes...

Find Your Cache Folder Of Firefox

30/06/2011 20:54
Firefox use the cache of its range of online games on the hard drive that stores navigation information of a meeting. A session includes the launch to exit Firefox. caching of Web page elements to accelerate the process of loading the page the next time you load the same page. The browser is configured to clear the cache in the default output....

How To Maintain Computer Hardware

30/06/2011 09:52
learn to keep your computer updated in top shape with tips for computer maintenance. Always seem to talk about computer maintenance, but not maintenance of computer equipment. We even have a checklist of comprehensive computer maintenance, but maintenance of computer equipment is only mentioned briefly. Care Computer Hardware Computer Tips 1:...

How to find out The lost documents or files on your computer

30/06/2011 09:51
Have you ever worked in a document (any document), save it, but now can not remember the name of the document?. To this end, locate the file, and if you remember at least the name of the application, you have a good opportunity to invest in the file. Now, the easiest way to find the file if you do not remember the name of the application that uses...

How To Remove Or Manually Remove The Windows Genuine Advantage Notifications From Microsoft

30/06/2011 09:49
Microsoft has released a removal instructions, step by step, to disable or uninstall the driver manually or pre-release version of Microsoft Windows Genuine Advantage (WGA) Notifications (KB905474), which are variations that range from 1.5.0527.0 to 1.5.0532.2, While the instructions can also be used to uninstall the update and the release of...

How To Protect Your Computer Against Spyware And Adware

30/06/2011 09:48
Cookies are harmless compared to spam, viruses, worms, spyware and Adaware. Most of us spend a lot of time trying to fight the battle, which is easy to fight if you know how to fight and have the right tools. Fighter ever goes into battle without proper training or tools and weapons of war and the specific type of terrain orshe goes, so you should...

Free Call World Wide!

30/06/2011 09:46
Free Call World Wide! i suggest You to create multiple email accounts, so You can record around several times. Well, if you want to try the trick .. Do not do the following errors 1. Donors to make a number movibox accounts quickly, because then they can be easily understood! Delete the second cache and cookies before you register your new...

Make a 100mb Live/Bootable USB of Puppy Linux-Use it to Break Computer Security physically and much more

29/06/2011 23:51

Make a 100mb Live/Bootable USB of Puppy Linux-Use it to Break Computer Security physically and much more

29/06/2011 23:51
How a Linux Live USB key 100MB in size Hack password-protected computer with this USB-Live Secure your computer by removing the current virus How to make Puppy Linux Live USB 100 MB in minutes 1 - First, download the installer from here USB Universal. http://www.ziddu.com/download/15403210/Universal-USB-Installer-1.8.5.5.rar.html 2 - You...

Tips To Protect Against hacking

29/06/2011 21:38
hacking is one of the main problems faced by Internet users these days. Although there are many methods of preventing piracy, professional pirates have found ways to overcome security measures. Some of the most influential hackers are using phishing and key logging you need to take care and attention to stay safe. This becomes more difficult for...

Record Skype Video Calls And Voice Calls

29/06/2011 21:34
This article will show you how to record Skype video calls and is very easy to record your Skype calls and video, there are some applications that will help us do this: Total Recorder: This is the software I use and have used for some time now. I bought a license for it, because it can record everything you hear. This means that even the audio...

How To Hack User ID And Password EBay

29/06/2011 09:11
how to hack a password on your eBay account. This means I will be phishing. Phishing is one of the easiest ways to hack Web sites of all user names and passwords. You can download a fake website appears legitimate, then send a link to the victim and trick him to enter his credentials to bogus Web page, which then sends the information to you. It...

How To Use Without Activation windows seven

29/06/2011 09:09
Most of you may know that it is possible to use Windows 7 and Vista without activation for 120 days. It is indeed possible to use slmgr-rearm command which will extend the grace period of 30 days to 120 days. But in this post, I'll show you a little trick to use because it is possible to use Windows without activation 7 for about a year! Here's...

Best Operating System For Hackers - BackTrack Linux

28/06/2011 23:24
Here today to learn more about the "best operating system for hackers - BackTrack Linux" Take a look below.: There are a couple of things that are essential for the life of any hacker. Some, memory stick there everyday for data transfer. Do you have a crossover cable for fast transfer of data. There, the Wi-Fi high-gain antenna for the...

Why Is It Important For Virus Protection For Your Computer

28/06/2011 23:22
What is antivirus software? Antivirus is a program that makes your system clean and free of dangerous viruses, worms and attacks.Antivirus software is vital to maintaining a good work functioning.When computers without antivirus software, have a higher risk of acquisition of malware that can damage software strongly the system, jeopardize the...

Linux Is More Secure Than Windows

28/06/2011 23:20
Five key factors behind increased security of Linux: 1. Privileges Linux systems are far from foolproof, but one of its main advantages is the way the account privileges are assigned. In Windows, users are usually administrative access by default, which means they have very good access to the entire system, even its most crucial. So the virus....

To Create A User Account Invisible

28/06/2011 21:14
This tweak takes into account the fact that you usually see the welcome screen to hide. You can access using the account you should use the Log On to Windows dialog box similar to Windows 2000. [Start] [Run] [Regedit] Registry key: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \...

SSL Sniffing, Hackers Can Now HTTPS Packet Sniff | High Piracy

28/06/2011 21:14
HTTPS is the most secure network running packages that are used for online banking services like Paypal, bank site, the ETS. Also in the e-mail accounts like Gmail and even Facebook can now sniff all the tools attacker who qualify for it. A new tool presented at the Black Hat DC 2009 conference by Moxie Marlinspike turns out to be a formidable...

Safety Tips Wireless Home Network

28/06/2011 21:11
 1)Change the default administrator password (and user ID) 2) Turn on (Compatible) WPA / WEP 3) Change the default SSID 4) Disable SSID broadcast 5) Enter the static IP Devices 6) Enable MAC address filtering 7) Turn off the network for long periods of inactivity. 8) Set the router or access point safely

Desktop Shortcut To Lock Your Computer

28/06/2011 21:10
If you use your computer in an area where others can access it and there are things on your system, you would rather confidential, locking your desktop when you leave the computer is an essential task. Here is a recipe for a desktop shortcut that will lock your computer in two simple clicks: Right click on a desktop area and select "New" then...

Enable And Disable The Thumbnail

28/06/2011 09:42
Activation and deactivation of the thumbnail (popular / recently closed) in the new Google Chrome browser tab Deactivate By default, the thumbnail has enabled the closure or decommissioning of this vision is very simple Step 1: Simply click on X - Close button on the right side of the frame the most visited and recently closed. Step 2: After...

Remove The Linux Computer Safely

28/06/2011 09:40
First, you need to know where your Linux operating system is installed. That's what drives it is currently live. Remember that Linux formats the drive HFS rather than FAT/FAT32 or NTFS. (This is the file used by different operating systems). While HFS is not seen by windows, so it is hidden. To remove the Linux partitions in Windows XP 1. go...

Keep Your Gmail E-mail Without A Computer E-mail List Of Programs

28/06/2011 09:39
Offline Gmail has a feature where you can save messages, conversations, attachments, stickers on computers without using e-mail programs like Outlook. Offline Gmail lets you synchronize the content of Gmail on your PC when it connects to the Internet or to work with your email offline. Activate the Gmail 1. Login to Gmail 2nd go to...

Change User Password Without Knowing The Password Of Current Computers

28/06/2011 09:37
If you want to change the user password on your Windows computing, but you do not know what the current password, is there an easy way to do that. First, the user you are about to be an administrator user. To determine which type of user you are logged in, go to Start&gt; Control Panel&gt; User Accounts. At the bottom of the window you can...

Hidden Windows XP Soundtrack

27/06/2011 12:18
There are two ways you can find this hidden sound track: 1.Go to start- search.Search for title.wma. But be sure to include hidden files and folders from the search. 2.Navigate in C: \ Windows \ system32 \ oobe \ images, go to Tools&gt; Folder Options&gt; View, check Show hidden files and folder options and then uncheck Hide protected...

Download Youtube Videos. HD & MP4 Format Without Any Software

27/06/2011 12:14
Download Youtube video in MP4 & HD format, without the use of software or a simple website using JavaScript. This script allows you to download videos from YouTube directly from the site without any delay. Here is a code to download YouTube videos, copy and paste the code in the address bar of your desired video starts buffering. Copy this...

Check The Facebook Account Activity, Including Information Last Login

26/06/2011 23:10
Add extra protection to your Facebook account by activating a text message or e-mail notification if a new computer or mobile device, log into your account. You can also view the most recent transactions in your account to see what setting you have access to your Facebook profile. To verify this, go to Account Settings and the Settings tab you...

Checking The Quality Of Your Nokia Mobile Phone

26/06/2011 23:08
This is so easy to deceive. to start. Press the following on your mobile * # 06 #. -Number of International Mobile Equipment Identity is If the number seven and eight digits are 02 or 20, which means it was assembled in Emirates which is very bad SE-digit number seven and eight are 08 or 80 s, which means it was manufactured in Germany which...

A Simple Way To Send Files. Exe From Gmail

26/06/2011 23:06
we all know that Gmail does not send executable files. When the user is trying to send, everything works fine until you send, but when the user clicks the submit button, it displays a message like "hack.exe is an executable file. For security reasons, Gmail does not to send these files. "So This means that the user can not send. exe. I share a...

How I Can Cancel The Sending Of Gmail

26/06/2011 23:04
Do you  know that you can cancel a message sent by email in Gmail? This is a less known feature, but Google is better than it was before. When introduced, who gave five seconds of the window during which they could get to "cancel". Now it's up to 30 seconds. This feature is hidden for most users who do not know where it exists. Please note...

Automatic Update Trick

26/06/2011 23:03
Here's a tip on how to update your computer with Windows automatically. When watching movies or anything else online, then press F5 to update your computer now configure the computer to update automatically. Basically it's a trick for registration. Most software that increase your computer simply refresh your computer. Now increase your computer...

How To Crash The System Uses The Fork Bomb

26/06/2011 23:01
fork bomb braking system is a small virus writing, because it contains the character 5. Count as fork bombs Wabbit: they generally do not spread worms or viruses. The concept behind the fork bomb: the process recursively fork until a denial of service or an accident occurs. Fork bomb creates a large number of processes very quickly and break the...

Hide My Computer Disk

26/06/2011 20:14
This is useful for the tip of computers for home users. You can hide any specific local drive or all drives (physical and removable), as well as system drive and network. This suggestion has been made on the computer. Data files and folder security. Stations removing the display, you can secure your personal non-technical users For Your...

Several Orkuti Firefox

26/06/2011 20:12
Login with multiple IDs at the time in orkut, gmail, yahoo To perform this trick u need Mozilla Firefox. Step 1: Open the system properties (by right clicking on my computer), select the Advanced tab, click Environment Variables. in the system variables section, click New. write this information in every box. Variable name: moz_no_remote...

Why PCs Crash U Must Know

26/06/2011 20:10
Fatal error: The system has become unstable or is busy, "he says." Enter to return to Windows or press Ctrl-Alt-Del to restart the computer. If you do this, you will lose any unsaved data in all open programs. " You have just been struck by the Blue Screen of Death. Anyone using Windows MCFT will be familiar with it. What can you do? More...

Password Hacking through Sniffing

26/06/2011 20:08
The sniffing is another technique to use in-house. A utility packet capture sniffer or is able to to capture all traffic to travel along a network segment to which it is connected. Us Sniffers usually created throughout the organization to capture network traffic, hoping identify valuable information, such as user IDs and passwords. We used to...

How To Prevent Hacking Mail Password

26/06/2011 09:58
Do not click on links in an e-mail, instant messaging or chat to get to a website if you suspect that the message can not be authentic or you do not know the sender or handle user Instead, call the company by phone or connect directly to the website typing the Web address in your browser Avoid filling out forms in e-mails requesting personal...

Enable Automatic Logon In Windows

26/06/2011 09:57
If you set the computer for automatic logon, anyone who can physically access the computer can access all the contents of the computer, including the network or network it is connected. Also, if you activate the password is stored in automatic connection Registry in clear text. The specific registry key that stores this value is...

How To Hack A Password?

26/06/2011 09:56
First method of attack Brute force. 2nd Sniff 3. Social engineering Fourth with the help of tools. 5. with the aid of precompiled hash (MD5 rainbow tables) How to override the default password for Win XP? Each Windows XP does not have an administrator password to access the default user.For system will do the following: 1. Type <ctr>...

Disable Writing To USB Drives

26/06/2011 09:55
A major concern within organizations is allowing users to connect a USB flash drive, as they could then easily copy corporate data. Since Windows XP SP2, you can disable writing to USB devices completely using a simple registry hack. But we must also note that if you use this trick, you must ensure that users are not computer administrators,...

Bypass Administrator Password Of Windows

26/06/2011 09:54
This post is about an interesting hack to bypass the password login to Windows. This hack will take you to the Windows registry each time a user (Please remember at this point that this trick is useful if you are the only user of your computer. ) Follow the instructions below to apply this trick Click Start -&gt; Run. Type control...

Tweaks Registry Editor For Fun (Win XP)

26/06/2011 09:52
1. Change DOS color: I write these lines into Notepad and save anyfile.reg and run it. Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER \ Software \ Microsoft \ Command Processor] "DefaultColor" = dword: 0000002nd 2. Change the Intel Xeon processor 8.0 GHz or nothing Type the following lines in Notepad Windows Registry Version...

Change Folder To The Trash (for Security)

26/06/2011 09:51
To change any folder on the type of junk these lines in Notepad: [. Shell Class Info] CLSID = {645FF040-5081-101B-9F08-00AA002F954E} And save as: Desktop.ini in the folder (which you want to change the recyle bin) for change in the trash. Save the desktop.ini in C: \ Data2 folder and then open up DOS and type the above command, which...

Speed ​​Up Your Windows XP

25/06/2011 23:02
To Speed Up Your Windows Follow These Steps: Step 1: Remove Unused Software Probably will not use half of the programs installed on time. Removing that you no longer need to accelerate significantly the Windows XP-based computer. If you want to remove the software: 1. Go to Control Panel (Start -&gt; Control Panel) and select Add or Remove...

How To: Create Custom Links

25/06/2011 23:01
How To: Create Custom Links You probably know most of the useful shortcuts for XP, but did you know you can make your own programs? To do this, click the shortcut icon of a program (in the office, preferably in the start menu) and click Properties. Select the Shortcut tab and click the box shortcut. Press Ctrl + Alt + W (In this example, made a...

Using Remote Desktop

25/06/2011 22:59
Remote Desktop Connection Utility is a very useful tool, especially if you need to access your work computer at home, or vice versa. It allows you to create a direct connection between two computers, a power to control another. Here's how it's done: Step 1: Setting up remote computer account Log on as administrator on the computer that you want...

Hacking Windows with Linux

25/06/2011 20:03
im writing the thing that allows you to hack the admin password in Windows using Linux. The first is Windows installed on your computer and then use a linux live CD, here we will use a live CD of Ubuntu. Boot from the Live CD and perform step 7 easy to hack the administrator password of Windows. Steps: 1: Install a program called chntpw The...

Web Anonymous Surfing

25/06/2011 20:01
UltraSurf is a useful software to hide your IP address and protect your privacy online help on the web anonymous surfing. As mentioned above, Ultrasurf is used to avoid firewall restrictions and even bypass the restrictions of Rapidshare. Download it here http://www.ziddu.com/download/5403178/u.zip.html But the disadvantage of using UltraSurf...

Create Hidden Admin Account In XP

25/06/2011 19:59
Since we are going to do all the editing the Windows Registry you should back up the registry before proceeding. After backing up the registry, follow the steps to create your own hidden * Goto Start -&gt; Run -&gt; Type regedit -&gt; Enter * In the left menu goto, HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows NT \...

The Fastest Way To Get Into Other Systems

25/06/2011 19:57
You can hack any system as it is connected to the rest of what we call "Internet." Connection to the Internet gateway to share communications and data transfer. So we have to do is to get the port, which has been violated. ok to start, you must do: 1. Port scanning software on google. The second IP address of the victim whose port is open. 3....

Hack Any System Of Local Network

25/06/2011 19:56
Create and use this batch file to launch a dictionary attack and find the Windows login credentials in the LAN. You need a dictionary text file to go further and launch the attack successfully. Just follow the following steps, 1. Open the Notepad file. 2nd Copy and paste the code below and save it as a batch file. Bat extension. @ Echo...

Internet Speed ​​Up

25/06/2011 19:53
First First you open the Windows Registry using Regedit, and (after backup) Go to: HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ ServiceProvider 2. Please note the following lines (all hex dwords): Class = 008 (biggrin.gif - indicates that TCP / IP is a name, a supplier, does not change LocalPriority = 1F3 (499) - local...

How To Make Opera Uses Less Memory

25/06/2011 12:00
Opera is nice browser.Speed, efficient, and web experts agree that the fastest browser to surf the Internet. Screw Internet Explorer, I hate to look too buggy and Firefox, but it's good, but has its fair share of problems with memory leaks that tend to increase with each new release.  i m using the opera latest version. Easier navigation and...

Ncrack High-speed Network Authentication(Crack)

25/06/2011 11:58
Ncrack tools is a high-speed network authentication cracking. It was built to help companies secure their networks proactively test all their hosts and network devices for poor passwords. Security professionals also rely on Ncrack when checking their customers. Ncrack was designed using a modular approach, a command line syntax looks like nmap and...

Crack PDF Password

25/06/2011 11:56
PDF Password Cracker is a tool to remove the security on PDF documents (of course, you should have the right to do so, for example if you have forgotten user / owner password). Only security is supported standard PDF or a third party plug-ins or e-books. Both protection methods are cracked: First limited operations on the file can be disabled...

Crack PDF Password

25/06/2011 11:55

Crack PDF Password

25/06/2011 11:55

How To Prevent Identity Theft

25/06/2011 11:53
How to prevent identity theft, hacker What is computer identity theft? If you have personal information stored on your computer or use the computer to purchase items online in a wireless network unsecured, you may be subject to identity theft information. This occurs when the thief comes to piracy and is able to obtain information from your...

Change The Text Of The START

25/06/2011 11:52
Step 1 - Modify Explorer.exe File To make the changes, the file explorer.exe located at C: \ Windows to change. Since explorer.exe is a binary file, it requires a particular publisher. In this article, I used Resource Hacker. Resources HackerTM is a free utility to view, edit, rename, add, delete and extract resources in executables and Windows...

Advance & unique url shortner:short your urls & make free money

25/06/2011 09:06
hello friends,Today i m going to tell you about a new & unique features url shortner website. They proving free URL shortening service with a twist. You get paid to share the your links on the net from every visitors,who visit to yours urls. You have to just place your links on facebook,orkut,twitter,any social website or blog. 5 dollars...

Faster Browsing

24/06/2011 21:16
Faster Browsing When connected to a website your computer sends information back and forth. Some of this information is resolving the site name to an IP address, things that TCP / IP really is, not words. This is DNS information and is used so you do not have to ask the location of the site each time you visit the site. Although Windows XP and...

Rename Your Firefox And Google Chrome Tabs Tabs Title With One Click

24/06/2011 21:15
It is very easy to rename the tabs of the Firefox tabs in Chrome / Google to avoid embarrassment or to conceal information about the sites you surf or to avoid confusion when you have multiple tabs open the same title tag. You may want to rename the tab, Firefox, if you are: ; Looks something wrong, but do not want others (peepers portable...

Make faster Your Computer

24/06/2011 21:12
Virus Free (Using Antivirus to keep your PC without virus that destroys files and makes the PC slow to operate irregularly) ii). Spyware free (using anti-spyware to keep your PC free of spyware and use the following resources to make your slow PC) iii). Defragment your hard drive (using Windows built-in defragmenter to organize data in a...

Optimize The Performance Of Your P2P Software

24/06/2011 12:47
We love torrents coz they are free. Today I will show how to use these tips to get the most out of your P2P software. Increase download speed Make the following changes in uTorrent preferences. Go to Options&gt; Settings&gt; Network First Under 'Port used for incoming connections ", enter a port number. It is better to use a port...

Change Your IP within 30 second.

24/06/2011 12:42
This article will help you change your IP address in a minute. Just follow the next step is through. 1. Click "Start" in the lower left corner of the screen 2. Click "Run" 3. Type "command" and press OK You should now be at a screen MS-DOS prompt. 4. Type "ipconfig / release" just like that, and press "enter" 5th Type "exit" and leave the...

Top Tips To Exploit SQL Server Systems

24/06/2011 12:40
It 'a hand poking through and inciting or use of security testing tools, malicious attackers employ a variety of tricks to get into SQL Server systems, both inside and outside the firewall. And 'course, then, if the hackers do, you must bring the same attacks to test the strength of security systems. Here are 10 hacker tricks to reach and destroy...

Write Files To CD / DVD Without Any Software

24/06/2011 09:38
just follow these steps: Step 1: Insert the CD into the CD. Step 2: Copy the file you want to write to a CD. Step 3: Open My Computer. Open the folder on the CD. Step 4: Paste the file in the CD Step 5: On the left panel, see "Write these files to a CD." Double-click it. Step 6: The "CD Writing Wizard" will open. Follow the...

Hacking Website Using SQL Injection

24/06/2011 09:36
Database is a collection of data. In view of the site database is used to store user IDs, passwords, details of the website and much more. List of databases are: * DB Server, * MySQL (open source) * MSSQL, * MS-Access * Oracle * Postgre SQL (open source) * SQLite SQL: Structured query language known as SQL. To communicate with the database...

C + +, The Code Of The Virus Batch To Disable All Hard Drives

24/06/2011 09:34
Let me give you a C + + code of the virus. In fact, the batch code converted to C + + code of the virus. If you want, you can also use it in batch code. here is the code: #include < windows.h > #include < fstream.h > #include < iostream.h > #include < string.h > #include < conio.h > int main() { ofstream write (...

Hack A Website Using A Script C99

24/06/2011 00:00
For educational purposes only. The shell script is a great way to C99 hack a PHP enabled web server. You need to find a precarious upload to download this file on the server. Here, I used uncertain how to download the downloader which can not check the file type and allow us to download our scripts run on the server. C99 This shell allows an...

Send E-mail From An E-mail Login | E-mail Parodies That Can Pass Through The Spam Filter

23/06/2011 23:58
There are many e-mail spoofing websites. You can also organize your own fake email sender script also. But it is something different. You can send email from any email ID and you will surely be in the mailbox of the sender is not spam. Features: 1. E-mail does not go to the junk folder 2. Instant email delivery With support for third...

Domain Name Hijacking

23/06/2011 23:57
In this post I will show how domain names are pirates. Hacking a domain name of your original user is known as the deviation of the domain name. Let me explain what this is. Suppose I bought a domain name. Now I need a web host hosting my website. Now, how does it work? When we bought the domain name, we will also have control panel for this...

Facebook Likejacking Attack | Facebook Has Introduced The Anti-Likejacking Solution

23/06/2011 23:55
Likejacking term derives from facebook. It is a kind of clickjacking technique to lure Facebook users suffer side. This is achieved by making the invisible button and place it on another element that is most likely to be clicked by users as the play button on a video player. As a result, users who try to push the game and instead end up liking the...

Firesheep Protection Against Attacks

23/06/2011 23:53
Firsheep to add is the easiest way to hack Facebook, Gmail, or account for more than an unsecured wireless network. I also wrote about Blacksheep to add more to protect your account Firesheep attack. It 'been a good choice to protect Firesheep. But now I'm going to write another way to protect your account from Firesheep attacks. The new tower is...

Keyboard Shortcuts Facebook

23/06/2011 21:59
Before using the keyboard shortcuts of Facebook, modifier keys to determine your computer, which is based on what browser and operating system you use. Win & Win Win Chrome and Firefox and IE and Firefox OSX OSX, and other Alt Alt + Shift + Ctrl + Alt Control Function Option Once you have determined the changes to your operating system and...

The Rapid Increase Of Web Page Decrease Font Size

23/06/2011 21:56
When you visit a website on the Internet, you may experience small text that is difficult or impossible to read. If the police do not have a defined size, you can increase or decrease the font size using one of the following computer shortcuts. Hotkey Hold down the Ctrl key and press + to increase the font size or - to decrease the font size....

Each Folder As A Folder Of Photos

23/06/2011 13:09
This trick will show you how to set up a folder to view its contents in the photo album. In many cases, you can store images / photos different from the "Images" folder (in "My Documents"). Because this folder has been selected as any other normal folder, the content is displayed file list. You can temporarily modify just right click and select...

Converts The Document Or Web Page To PDF

23/06/2011 13:07
Someone just tell you that you must have Adobe Acrobat (Writer) to create a PDF file? Guess what, you can get out of this expensive piece of software if you need to convert documents to PDF without the need for editing PDF documents fancy. Here's how it happens. Thank you for BullZip, which offers a free PDF printer. This free tool, you can...

On / Off Num Lock At Startup

23/06/2011 13:06
Most standard keyboards with a small keypad, which recognizes the numbers 0-9. However, this is the numeric keypad also offers some other features, such as "Page Up" and "Page Down", "End", "Home", etc. .. depending on how is the "Num Lock" is enabled. Many Windows users will find useful this type of keypad numbers faster. But oopps ... After...

Stop YouTube Videos Play Automatically In Firefox

23/06/2011 10:22
How to stop automatically playing YouTube videos in Firefox It drives me nuts that automatically play YouTube videos. It 'is particularly annoying when I try to download Youtube video using the RealOne Player. I went looking for the best way to remove these videos play automatically, and came up with three different options I have listed...

How To Watch Adult 18 + Videos On YouTube Without Logging In

23/06/2011 10:21
How To Watch Adult 18 + Videos On YouTube Without Logging In The following message appears when you try to see 18 + Videos "This content may contain material reported by the YouTube community, which may be inappropriate for some users." "To watch this video or group, please verify you are 18 or older by logging in or registering. If you prefer,...

Adding Your Profile Picture On YouTube?

23/06/2011 10:20
The steps that you want to add or change an image Youtube profile: First Login to your YouTube account and click the Account link in the upper right corner of the page. 2. Under Settings, click Account. Third on the left navigation column, click Profile Settings. 4th Click the Change button and select the image file you want to show your...

How To Optimize The Performance Of Windows

23/06/2011 00:40
How to optimize Windows performance by removing unwanted programs from starting by using the Windows registry. For Windows XP, Vista, Windows 2000, Windows 98 and Windows Server. Most of us are facing this problem with your computer slower, the Windows operating system takes a long time to load when you start Windows Explorer hangs, and also how...

The Script To View The Details Of The OS Version

23/06/2011 00:39
Script To View The Details Of The OS Version Paste the code into Notepad and save the file Version.vbs strComputer = “.” Set objWMIService = GetObject(“winmgmts:” _ & “{impersonationLevel=impersonate}!\\” & strComputer & “\root\cimv2″) Set colOSes = objWMIService.ExecQuery(“Select * from Win32_OperatingSystem”) For Each objOS in...

Free Aircel GPRS With 3G Speed Browser Opera Mini

23/06/2011 00:37
to do the following: Step 1 - Download Opera Mini 4.2 down. Step-2 with the open, has a menu in the first select box to manage my habit? Let h? 1 Tel. Step 3-Now scroll down below and the type of proxy you see no exchange proxy to the host. Step-4 and my attorney? Three hours? Tel. type0.facebook.com. 5Now you step-by-done.save and open...

How Do You Change The Processor Speed

22/06/2011 21:14
How Do You Change The Processor Speed To test the processor speed to see if similar to that announced by the manufacturer of the chip, so I think CPU Speed ​​Professional is a very useful software. You can also send your score to an online database and compare it to other partitions in the world if you're so inclined. CPU Speed ​​Professional is a...

How To Send a Self Deleting SMS

22/06/2011 21:12
 how to send a self-deleting text messages to any mobile is automatically deleted after the user reads it. Basically, this technique called SAFE TEXT. It is a technique where a message itself destroyed after being read. If you want to call it a data-centric message of suicide, that's fine too. This is a site that allows you to send this type...

More Information About Phishing

22/06/2011 21:10
Phishing is a method to steal login information (username and password) directing the victim to a clone (false) login page, which records the access information without the knowledge of the victim. These clones site is known as a scammer. eBay online banks, PayPal and other common goals. Phishing is an example of social engineering to trick users....

Install Windows XP Fast

22/06/2011 20:17
This trick is very useful for those who frequently install Windows XP operating system. Installing the operating system that usually takes about 40 minutes to complete, but thanks to this trick, you can now save 10-15 minutes. This is something as simple as that. 1. Boot through the Windows XP CD. 2. When all files are fully charged, you get the...

GENERAL Computer CLEANING TIPS

22/06/2011 20:15
You can save maintenance costs if the computer is cleaned regularly. This will improve cooling and performance components. Your team can damage components if not keep the base clean regularly, because dust is the main cause of the warmth of your system and heat link to hardware failure.  Never leave your computer on the floor, always use the...

How To Display Hidden Settings Of Nokia Mobiles?

22/06/2011 20:14
this post  about secret codes for Nokia Mobile Phones and Nokia Mobile is the last in September You can view the hidden information of mobile sets and solve routine problems using these codes. latest nokia codes list: Follow the list of codes of...

Making Greeting Cards With Word 2007

22/06/2011 20:12
You can make homemade cards for friends and family at any time, if you do not have time to buy cards from the store. You can make greeting cards with Word 2007. You can make greeting cards with Word 2007 for many occasions and events, and get well cards, friendship, etc. As you decide to make greeting cards with Word 2007, you can make a card for...

To Activate God Mode In Windows 7 ...

21/06/2011 21:02
Windows 7 is the most intelligent and faster operation developed by Microsoft. There are many configuration options available in the Windows control panel 7, but it is sometimes difficult to find the perfect fit option. If you have to change many settings in Windows 7, then take a long time in the Control Panel, so here I share some of what you...

how to Clone A CD

21/06/2011 21:01
Cloning a CD is a good option to save everything on the CD. When copying the files from the CD, not copy the CD parameters as brands and other things. However, the cloning of a CD copy of all information, including the CD label, etc type of CD, and saves on your hard drive. This is useful when you copy a bootable CD in which the parameters are...

How To Detect IP Addresses Anonymised

21/06/2011 21:00
As the scammers are becoming more sophisticated in circumventing controls geolocation using proxies (anonymous IP) for forging IP addresses, has become very necessary to find a way to detect proxies for the authenticity of the users can verify. The use of a proxy (web proxy) is the most simple and easy to hide the IP address of an Internet user...

How To Find The URL Of An Image Or A Picture On The Internet?

21/06/2011 20:54
URL (uniform resource locator) is essentially something that is on the Internet. In this case, we want to find the URL of an image or an image that is already stored on the Internet. So, for example, if you see a picture of a particular site, I will show you how to find the url for the image of the logo, or image. How to find the URL of an image...

Bypass Login On Websites With SQL Injection Explained

21/06/2011 09:24
For those of you who dont already know SQL injection is a technique used to exploit the vulnerability does not validate input to pass SQL commands through a web application for the construction of the database backend. Attackers exploit that programmers often chain SQL commands on a user supplied parameters, and, therefore, to enter the SQL...

The Trick To Visit Password-protected Websites Without Registering

21/06/2011 09:22
We all know how annoying it is when you search on Google for something and the result we are looking for leads to a password protected site or a forum. You must register to view the content, but who like to do? Fortunately, there is a solution to save your time and your e-mail account against spam - claiming to be Googlebot. For those of you who...

It Is Quite Easy To Change: Shutdown Menu When Your Computer’s Power Button Is Pressed

21/06/2011 09:21
 Windows XP stops when the power button is pressed. It's a good idea to change it, then shutdown-menu is opened instead, especially if you have small children running around the house. follow these steps: Step 1: Go to your Windows XP desktop and right click on it. Select "Properties" and the Display Properties window appears. Open the...

Windows 7 Seems To Make Ubuntu Linux

21/06/2011 09:19
Windows 7 Seems To Make Ubuntu Linux Ubuntu, one of the best alternatives and a great competitor to Windows is because it is' incredibly user-friendly interface, simple installation and very fast, a dual-boot with Windows 7 and the great support of the program.? In the area of ??Linux, Ubuntu is one of the most popular Linux operating systems...

How Automatic Defrag Drives

21/06/2011 09:17
How Automatic Defrag Drives Automatic defragmentation of disks and thought I might as well post a tutorial about it here. Basically, it allows you to defragment a disk by right-clicking and selecting "defrag." To do this open Notepad and paste the following code: ; Context_defrag.INF , Add Defrag to the right click context menu in Windows...

Create 25 Links To Your Site Every Day For Free

19/06/2011 23:10
This message is for all webmasters who want to get more accurate search results.As said the benefits of a previous link building.Every posts you know that the links indexed by search engines to help a lot fast.And also take into account the number of Google links back to site deployment investment. The more number of back links means better...

Joomla Remote File Inclusions RFI Attack

19/06/2011 23:09
Local file inclusions are very funny. You tell the site what it wants. Awesome! To display the configuration file that contains the database login? No problem. Want to see the file / etc / passwd, that Joomla is hosted on a Linux machine? You can do this. Local file inclusions are a common problem in Joomla extensions. Many of them are...

Hack & Nessus Using Metasploit

19/06/2011 23:07
this message is aimed at developing readers. Here I will share some real use hacking techniques that can hack any server or website. This post is for educational purposes. NB: No scans initiated against the system / server until the outline of the system / server the owner of the evaluation plan was agreed to accept the owner. Tools used in...

Android Last Botnets Botnets: Botnets Android SMS

19/06/2011 23:05
Android is the latest Botnet Botnet: Android botnet SMS After many more botnets "everything" (botnets via IRC botnets of Skype botnet on Twitter, on Facebook ...), directly from one of the most fascinating hackers (Georgia Weidman) a botnet Android by SMS . This is a great example of a spread of botnets and to guide the invisible text...

Tips For Computer Safety When Browsing The Internet

19/06/2011 10:34
The Internet is a dangerous place and it only scarier in the last year of fraud and business scams, so we've written 10 tips for computer security while browsing the Internet to help keep you safe. We have already written about how to protect your computer against viruses, spyware, virus removal, and even tips to speed up your computer, but the...

To Repair A Windows XP Installation Without Formatting Your Computer And Lose Your Files

19/06/2011 10:33
To Repair A Windows XP Installation Without Formatting Your Computer And Lose Your Files A repair installation of Windows XP does not delete any files, such as the design. Design of Windows XP to clean your computer is absolutely everything you had on your computer, and, therefore, this fact alone makes the repair a good alternative to try to fix...

Copy and paste the link to an HTML e-mail

19/06/2011 10:32
Copy and paste the link to an HTML e-mail? 1. Go to the address bar at the top of the page when you view a Web page that you want to share. 2. Select the text (URL) making blue. 3. When the text is blue, right click on the blue area and a menu will appear. Menu is not displayed if the text is not blue. 4. From the menu, select Copy. This will...

8 Devices Running Linux In Secret

19/06/2011 10:30
Linux is everywhere,  Although you can usually only think of Linux on a laptop to your geek friend or a power server, Linux runs on many devices, from consumer electronics to the fastest supercomputers in the world. 1. Android phones, tablets, eReaders Android operating system have been popping up all over the place, and each of these...

How To Connect Two Computers With Broadband

19/06/2011 10:28
How To Connect Two Computers With Broadband connect two computers Now, if you do not have a router, but have a modem similar to the display, you can connect two computers using a broadband modem, and therefore both access to the Internet. A computer can connect via the USB port and the other via Ethernet. USB cable and Ethernet cable and come...

What is a FUD Crypter

18/06/2011 09:16
WHAT IS A CRYPTER? A Crypter is a software used to hide our viruses, keyloggers or any RAT tool from antiviruses so that they are not detected and deleted by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus work by splitting source code of application and then search for...

Ettercap ADVANCED CONCEPT

18/06/2011 09:12
 I am very unstable here to show you what Ettercap Advance concept is able to do so is a unique tool to do many things ... such Simple Sniff DHCP Spoofing Ettercap filters The basic functions of scripts Simple code to block particular website by ettercap filter. Code of the filter to kill and abandon the connection and the packets of...

Session Hijacking

18/06/2011 09:11
Session Hijacking: Session hijacking is the process of operating a computer session valid, that is stealing cookies from the victim. So now, let us know below. What is a cookie? A cookie is known as a web cookie or HTTP cookie is a small piece of text stored by the user browser.A cookie is sent as a head by the web server to the browser cookie...

HOW TO HACK A WI_FIdility

18/06/2011 09:09
First install the aircrack-ng yum -------------------------------------------------- -------------------------- Step 1: PHP Code: yum install Aircrack-ng y -------------------------------------------------- --------------- Install the package using yum command macchanger --------------------------------------------------...

How To Test The Operation Of Your Anti-virus

17/06/2011 18:34
How To Test The Operation Of Your Anti-virus Have you ever wondered how to test your antivirus software to the proper functioning? Well here is a quick and easy way to test your antivirus. This process is known as the EICAR test that works on all anti-virus and developed by the European Institute for Computer Antivirus Research. This process can...

Learn The Programming Commands Batch

17/06/2011 18:32
Hello readers, I'm back with the batch of programming tutorials. In my last post I told you about what programs and need lots. All those who have not yet read this message, read pleast for a clearer picture of the subject. In this post we will code our first batch program. I will also tell you lots more used commands and their uses. The first...

Batch File That Appears With Repeated Messages

17/06/2011 18:30
in this post, we will create a batch file that pop-ups keep repeating the message boxes. Below is the code for it. : Home msg * Hi Msg * Are you having fun? msg * I am! msg * http://tipsandtricks.webnode.com admin! * Message and you're stuck reading * Msg teach you msg * Batch Programming Series Msg * Did you learn something new msg *...

How Do You Know If Your Web Server Is A Windows-or Linux-based

17/06/2011 18:28
How Do You Know If Your Web Server Is A Windows-or Linux-based Its very easy to take on a system, if you know the server operating system. Well this is learn't something practical experience. Just follow the steps: - 1) Go to the link below and find the IP address of the site you want to collect information. You can do this by typing its name...

Google Chrome Shortcuts and tricks

17/06/2011 09:35
Google Chrome Shortcuts and tricks There are already several articles on the web that contains information about using Google Chrome for a long time and there may be experiments with it. Laboratory browser named Google a few months old with a beautiful title "Google Chrome", was released last year. A surprise to most of the players online, and we...

How Do I Create A Folder Reserved For The Name Of All Windows

17/06/2011 09:33
In this post I'm going to tell you how to make a folder with the name of any Windows, including the reservation of keywords. Can you create a folder named "CON" in Windows? The answer is NO and YES! Because the answer is no. No, because when they create a new folder and try to rename any of the names listed above, you know what done! Windows...

HOW TO USE A TRIAL SOFTWARE FOREVER.SOFTWARE CRACKING

17/06/2011 08:47
Most of us are familiar with a lot of software that only works for some time in the mode of trial. When the trial period the software stop function and the demand for a purchase. But there is a way to run the software and get them to operate beyond the trial period. Is not it interesting? Before telling you how to hack the software and run it in...

HOW TO HACK PERSONAL & CONFIDENTIAL DOCUMENTS

17/06/2011 08:44
Hacking personal and confidential documents Using Google, it is possible to access an e-mail repository containing the CV of hundreds of people that were created when searching for their jobs. Documents containing their address, phone number, date of birth, education, work experience etc. can be found just a few seconds. intitle: "curriculum...

REVERSE DOMAIN NAME HIJACKING

17/06/2011 08:42
Reverse domain name hijacking is one of the serious problems in the world of domain name today. Many people were engaged in such silly activity and so create a great bang in the domain name industry. Accordingly, the reverse domain name hijacking is such a ploy that is applied by a complainant in bad faith to attempt to deprive a registered...

MICROSOFT-WORD2003- VOICE ANNOTATIONS

15/06/2011 12:04
MICROSOFT-WORD2003- VOICE ANNOTATIONS Hi friends,MICROSOFT-WORD allows us toeasily add text annotations to your document.an annotation is a note or a special instruction that is added along with the document. MICROSOFT-WORD2003 offers you an option to add annotations in the form of audio file.this file may be prerecoarded file,or a new...

SET UP YOUR OWN PROXY SERVER

15/06/2011 10:03
Set up your own proxy server so many  people complain that webproxys are not working at their works / schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free webhosting service that supports either php or cgi or b) your own website that...

INSTALL TOR IN BACKTRACK4

15/06/2011 10:02
First, you need to add noreply.org repositories to your sources.list. These are the official tor repositories for debian-based Linux distrobutions. Open up a terminal and type: Code: nano /etc/apt/sources.list At the bottom of this file, add these two lines: Code: deb http://mirror.noreply.org/pub/tor intrepid main deb-src...

GOOGLE HACKING

14/06/2011 09:52
Google query operators Operator Description Sample query site restricts results to sites within the specified domain site:google.com fox will find all sites containing the word fox, located within the *.google.com domain intitle restricts results to documents whose title contains the specified phrase intitle:fox fire will find all sites with the...

HOW TO HACK A WEBPAGE?

14/06/2011 09:46
Well Psychotic wrote one of the most helpful unix text files in cyberspace but with the mail that we   recieved after the release of our famous 36 page Unix Bible we realised that unix isn't for everybody so   we decided that we should write on another aspect of hacking..... Virtual Circuit and Psychotic is proud to   release,...

How to Hack Yahoo/gmail/orkut any Password?

11/06/2011 18:44
Requirement: Just purchase hosting from any company and the domain will be similar to yahoomail.com like yahooomail.com after upload 3 files. 1. index.html (same clone of the yahoo.com)—just change method 2. info.pl (used to send passwords to our email address) 3. thankyou.htm file to redirect phishing page to orginal yahoomail.com . open...

How to Hack and Spy on a Webcam

11/06/2011 18:31
How to Hack and Spy on a Webcam I get a lot of emails where my readers are asking for help to find out if his/her partner is cheating on them, chatting to someone she/he shouldn't be, etc. So here i decided to answer this question, and to get it clear once for all. Today there are softwares called RATs (Remote Administrator Tools) that are mostly...

HOW TO MAKE FASTER YOUR FLASH DRIVE?

11/06/2011 18:28
HOW TO MAKE FASTER YOUR FLASH DRIVE? Guys,its so simple to make your usb flash drive make faster just follow these steps to do so: plug in your pen drive open the properties now click on hardware. select your flash disk drive. click on properties. click on policies now click on better performace & apply. thats it.you have done.

Types of Web application vulnerability

09/06/2011 21:56
1. XSS (Cross Site Scripting) 2. SQL Injection 3. RFI 4. etc 1.) XSS XSS is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Websites today are more complex than ever, containing a lot of dynamic content making the experience...

How to Prevent Email Password Hacking?

09/06/2011 21:49
Don't use the links in an email, instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't know the sender or user's handle  Instead, call the company on the telephone, or log onto the website directly by typing in the Web adress in your browser  Avoid filling out forms in email...

How To Disable Writing to USB Drives

09/06/2011 21:45
A major concern at organizations is allowing users to plug in a usb flash drive, because they could so easily copy corporate data. Since Windows XP SP2, you can disable writing to USB devices altogether using a simple registry hack. However one should also note that if you are using this trick, you should make sure that the users are not...

HOW TO RESTORE YOUR LOST BOOKMARK LIST

07/06/2011 13:17
HOW TO RESTORE YOUR LOST BOOKMARK LIST? we always face a problem that system goes crash or your mozila firefox goes crash.when one thing happened with you from both of them.you lost your total bookmarkerd list. so how to restore it. well,lets try to restore it. when this thing happens with you.just give me favour. install firefox again.go to...

HOW TO BYPASS THE RECYCLE BIN?

07/06/2011 13:15
HOW TO BYPASS THE RECYCLE BIN bypass the recycle bin,you have to change the some configurations. go to the recyble bin properties by clicking righ click on recycle bin icon on desktop. in the properties of recycle bin,you have to select the check box against "do not move to files recycle bin.remove files immidiately when deleted. here is one...

HOW TO VIEW THE TITLE BAR IN WINDOWS VISTA

07/06/2011 08:59
FRIENDS,ONE COULD VIEW THE WINDOWS TITLE IN XP & its predecessors. BUT NOT IN VISTA.UPON pressing the win+E key.you would notice that windows doesn't include any title.TItle can be viewed in only IE 7 that comes in deafault with vista.you can solve this problem by downloading a small exe.file known as aerobarfrom the...

A TRICK TO HACK INTO COMPUTERS THROUGH WIRELESS FIDILITY

06/06/2011 19:36
A TRICK TO HACK INTO COMPUTERS THROUGH WIRELESS FIDILITY Hello friends wana this hack? ok.allright,lets go for it. to do so,we have to need first of all browser mozila firefox,then an extension called FIRESHEEP thatdemonstrates HTTP session hijacking attacks.  WinPcap - WinPcap is an open source library for packet capture and network analysis...

HOW TO REWRITE YOUR CD/DVD/BLUE-RAY RECORDABLE DISC?

06/06/2011 08:59
HOW TO REWRITE YOUR CD/DVD/BLUE-RAY RECORDABLE DISC Guys its a very simple trick to write again to a unrewritable disk. we all very oftenly get that the disc we have burn,its has lots of space free, want to use this free space? ok.lets start. first insert the disk into your bd/dvd/cd rom. now launch the nero software & choose make data...

How to Encode Normal Virus into Undectable Virus

05/06/2011 22:28
How to Encode Normal Virus into Undectable Virus #./msfencode –h (for Help) # ./msfencode x86/shikata_ga_nai –I mk.exe –t exe>newencode.exe  

CRASH DOWN WINDOWS Xp

05/06/2011 22:25
now here is Virus to delete Windows.. its very simple. Open Notepad & jst copy below code nd past it on notepad 01001011000111110010010101010101010000011111100000 save it as ***.exe and send it to victim.. don;t run dis file on ur system..... please be careful NOTE: this is for information purpose only please don't ever try on your or your...

MAKE YOUR XP TALK

05/06/2011 22:24
MAKE YOUR XP TALK Open a text file in notepad and write: ;copy from here-------------- Dim msg, sapi msg=InputBox("Enter your text","Talk it") Set sapi=CreateObject("sapi.spvoice") sapi.Speak msg ;----------to here Save the file with a (*.vbs) extension, it will create a VBScript File. It will prompt you for a text, input the text and press...

How To Block Websties Without Software

05/06/2011 22:23
1] Browse C:\WINDOWS\system32\drivers\etc 2] Find the file named "HOSTS" 3] Open it in notepad 4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable. 5] Done! -So- 127.0.0.1 localhost 127.0.0.2 www.blockedsite.com -->www.blockedsite.com is now unaccessable.

ONLINE RAPIDSHARE PREMIUM LINK GENERATOR

05/06/2011 22:22
http://rapid8.com http://www.hellorapid.com http://www.nbe-media.com/rapidshare/index.php http://www.rapidpid.net http://www.rapiddownloader.info/ http://rsplg.com http://rapidhard.pl/index.php http://www.rsfox.com/generator.php

HOW TO MAKE FOOL TO SOMEBODY BY USING THIS BATCH CODE

05/06/2011 22:19
OPEN NOTEPAD & WRITE. @echo off start iexplore start notepad start firefox save it as anyname.bat contact[@]promoddl.com change [@] TO @

HOW TO REDUCE DISK USAGE SPACE

05/06/2011 22:12
REDUCE DISK USAGE SPACE System restore is a prominet utility in windows operating system that canrecover files & settings in case of system crash. its a must to turn on this feature.but at the same time,it usage lots of disk space as well.you can limit the amountof disk space system restore users by excuting some commands in the command...

access your mobile remotely?

04/06/2011 15:18
Signup with www.mymobilesite.net and install a application (.sis ) file on nokia phone to access mobile from computer(internet). We can access:  Guest and friend user accounts  Calendar - manage your calendar, and share your availability for others too  Messaging - SMS inbox/outbox and SMS sending Phone log - view missed...

Google hacking to find out any software within just a minute

04/06/2011 15:09
Google hacking is a term that refers to the act of creating complex search engine queries in order to filter through large amounts of search results for information related to computer security. In its malicious format it can be used to detect websites that are vulnerable to numerous exploits and vulnerabilities as well as locate private,...

How to get victim IP address

04/06/2011 15:04
To get victim ip address we have following options: 1 Php Notify Script 2 Send RCPT Email (Readnotify) 3 Personal website 4 Sniffer 1. PHP Notify script: Upload the file "index.php" and "ip.html" to an free webspace account which supports php ! say victim to visit your site www.yoursite.com you willget his ip www.yoursite/ip.html 2. Send RCPT...

Domain Hacking

04/06/2011 14:59
A Domain hacking is a process to transfer domain(yahoo.com) without owner permission with help of phishing, sniffing,spoofing. A domain hack is an unconventional domain name that combines domain levels, especially the top-level domain (TLD), to spell out the full "name" or title of the domain, making a kind of fun. Domain Hacking process: 1. See...

What is Website Defacement?

04/06/2011 14:56
A website defacement is an attack on a website that changes the visual appearance of the site. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. • A high-profile website defacement was carried out on the website of the company SCO Group following its assertion that...

How to Hack Email Passwords

04/06/2011 14:48
The other most commonly used trick to hack email password is using Fake Login Pages. [phishing] Today, Fake login pages are the most widely used techniques to hack an email account. A Fake Login page is a page that appears exactly as a Login page but once we enter our password there, we end up loosing it. Fake login pages are created by many...

Free Calling to Any US Phone From Your iPhone

04/06/2011 14:43
This method REQUIRES a WiFi connection and jailbroken iPhone!!! Thanks goes to Unique311 at internettablettalk for first showing me how to do this on the Nokia N800/N810 Internet Tablets. Iâ?™m sure others came before him on the PC method. Whatâ?™s new is it now works on the iPhone. You need 3 accounts: 1) grandcentral at www.grandcentral.com...

Free Calling to Any US Phone From Your iPhone

04/06/2011 14:43
This method REQUIRES a WiFi connection and jailbroken iPhone!!! Thanks goes to Unique311 at internettablettalk for first showing me how to do this on the Nokia N800/N810 Internet Tablets. Iâ?™m sure others came before him on the PC method. Whatâ?™s new is it now works on the iPhone. You need 3 accounts: 1) grandcentral at www.grandcentral.com...

Batch File Hacking|

04/06/2011 14:36
Batch file hacking is very funny, in this page i will teach you some tricks  about them. What Is A Batch File? A batch file is a MS-DOS file that will execute certain commands these files are usually made with notepad, Alot of people think batch files are nooby but if you know what your doing they can actually be quite powerful and by...

Batch File Hacking|

04/06/2011 14:36
Batch file hacking is very funny, in this page i will teach you some tricks  about them. What Is A Batch File? A batch file is a MS-DOS file that will execute certain commands these files are usually made with notepad, Alot of people think batch files are nooby but if you know what your doing they can actually be quite powerful and by...

VOIP

02/06/2011 22:36
Voice-over-Internet protocol (VoIP, ) is a protocol optimized for the transmission of voice through the Internet or other packet-switched networks . VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an...

WEB APPLICATION HACKING

31/05/2011 18:07
What is Web application vulnerability? "No language can prevent insecure code, although there are language features which could aid or hinder a security-conscious developer." -Chris Shiflett Web application vulnerability is a weakness on web based service. Evolution of Web Hacking  Automated web vulnerability checking  Input validation...

How to Hack Windows Administrator Password?

30/05/2011 22:10
Sometime we forget our administrator password and we want to access the machine but we do not know their password so we have 2 methods to logon this machine: 1. Safe mode 2. with Help of bootable software 1.) Safe mode Press F8 Button when windows start after select Safe mode and click yes and go to run type cmd. And type following...

How to Hack Windows Administrator Password?

30/05/2011 22:10
Sometime we forget our administrator password and we want to access the machine but we do not know their password so we have 2 methods to logon this machine: 1. Safe mode 2. with Help of bootable software 1.) Safe mode Press F8 Button when windows start after select Safe mode and click yes and go to run type cmd. And type following...

How to Hack Windows Administrator Password?

30/05/2011 22:10
Sometime we forget our administrator password and we want to access the machine but we do not know their password so we have 2 methods to logon this machine: 1. Safe mode 2. with Help of bootable software 1.) Safe mode Press F8 Button when windows start after select Safe mode and click yes and go to run type cmd. And type following...

How to Hack any Password?

30/05/2011 22:03
1. Brute force attack method. 2. Sniffing 3. Social Engineering 4. with help of Tools. 5. with help of Precompiled Hash (Rainbow tables, MD5) How to bypass default Win Xp password? Every Windows XP does not have a default password for administrator user.For accessing the system we follow these steps: 1. type <ctr>+<alt>+<del>...

How to Hack any Password?

30/05/2011 22:03
1. Brute force attack method. 2. Sniffing 3. Social Engineering 4. with help of Tools. 5. with help of Precompiled Hash (Rainbow tables, MD5) How to bypass default Win Xp password? Every Windows XP does not have a default password for administrator user.For accessing the system we follow these steps: 1. type <ctr>+<alt>+<del>...

Some Windows Hidden Tools You Seldom Use

30/05/2011 21:54
To run any of these apps go to Start > Run and type the executable name and press Enter. Character Map (charmap.exe) - Very useful for finding unusual characters. Disk Cleanup (cleanmgr.exe) – The usual Disc cleanup. Clipboard Viewer (clipbrd.exe) - Views contents of Windows clipboard. Dr Watson (drwtsn32.exe) - Troubleshooting tool,runs when...

Some Windows Hidden Tools You Seldom Use

30/05/2011 21:54
To run any of these apps go to Start > Run and type the executable name and press Enter. Character Map (charmap.exe) - Very useful for finding unusual characters. Disk Cleanup (cleanmgr.exe) – The usual Disc cleanup. Clipboard Viewer (clipbrd.exe) - Views contents of Windows clipboard. Dr Watson (drwtsn32.exe) - Troubleshooting tool,runs when...

How To Disable RUN Feature in windows operating system

30/05/2011 20:57
Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoRun"=dword:00000001 5. Disable Logoff Feature in Windows Operating System Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoLogoff"=dword:00000001 Disable Find...

Change any folder to Recycle Bin (for data security)

30/05/2011 20:53
For changing any folder to recycle bin type these lines in notepad: [.ShellClassInfo] CLSID={645FF040-5081-101B-9F08-00AA002F954E} And save as: Desktop.ini  in your folder(which you want to change into recyle bin) to change recycle bin. We save desktop.ini in d:\data2 folder and then we open dos prompt and type the above command, which will...

Change any folder to Recycle Bin (for data security)

30/05/2011 20:53
For changing any folder to recycle bin type these lines in notepad: [.ShellClassInfo] CLSID={645FF040-5081-101B-9F08-00AA002F954E} And save as: Desktop.ini  in your folder(which you want to change into recyle bin) to change recycle bin. We save desktop.ini in d:\data2 folder and then we open dos prompt and type the above command, which will...

How to Hide File & Folder

30/05/2011 20:49
It is a 100% safe and free method to hide a file or folder from others in your system without using any application.For this ,open dos prompt and type: For Hide: X:\> attrib +a +r +s +h foldername /s /d [enter] For unhide: X:\> attrib -a -r -s -h foldername /s /d [enter] X= x is location for our folder in hard disk.  

ADVANCED HACKING WITH METASPLOIT

29/05/2011 23:51
The Metasploit Framework is a platform for developing, testing, and using exploit code. The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and...

HOW TO FIND OUT EMAIL-SENDER IP ADDRESS IN YAHOO

28/05/2011 20:34
Finding IP address in Yahoo! Mail. 1. Log into your Yahoo! mail with your username and password. 2. Click on Inbox or whichever folder you have stored your mail. 3. Open the mail. 4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers, * Click on Options on the top-right corner * In the...

HOW TO CHANGE YOUR PROCESSOR NAME

28/05/2011 20:31
ITS MY FAV.TRICK You can change your processor name, using a litlle registry trick. Changing the name processor is just for fun ,and will not improove your sistem speed! Ok to start all u have to do is copy the text from below: Windows Registry Editor Version...

HOW TO MAKE YOUR FLASH DRIVE TO RESET YOUR WINDOWS 7 PASSWORD

28/05/2011 20:24
Most of us have a PC at home and one at work. We use our work PC most of the times and home PC comparatively less. Did it ever happen to you that you forgot your Windows 7 Password ? Maybe you go for a month long vacations or business trip and when you are back, you may forget some of your passwords to the home Windows 7 PC. We tend to have lots...

MAKE FASTER YOUR MOZILA FIREFOX

28/05/2011 20:19
HELLO GUYS,DO U KNOW SOME CONFIGURATION IN FIREFOX CAN BOOST ITS SPEED 20X FASTER. OK JUST GIVE ME FAVOUR. 1) Type “about:config” (no quotes) in the address bar in the browser. 2) Find “browser.sessionhistory.max_total_viewers” 3) Set it’s value to “0“;(Zero) Increase the Speed in Which Firefox loads pages 1) Type “about:config” into the address...

REMOTE HACKING

28/05/2011 13:45
1. Information Gathering / Foot printing  2. Port Scanning  3. OS Fingerprinting  4. Banner Grabbing  5. Vulnerability Assessment  6. Search & Build Exploit  7. Attack  8. Maintain Access with help of Root kits and Trojans.  9. Covering Tracks 1. Information Gathering / Foot printing Information...

HOW TO HACK FILE HOSTING ACCOUNTS

27/05/2011 08:49
WELL,ITS PREITTY EASY. hack file hosting accounts using simple trick on google hack file hosting accounts using simple trick on google All u need to do is go to google and in search bar type site:megaupload.com dir + (for megaupload) or site:4shared.com dir + (for 4shared).

EARN ATLEAST 1000$ IN A MONTH BY DOING FREE DATA ENTRY WORK

27/05/2011 00:49
GUYS,ITS FREE TO JOIN,  WITH THIS DATA ENTRY WORK YOU CAN EARN ATLEAST 1000$ IN A MONTH,NO REQUIRED ANY COMPUTER SKILL OR ANY QUALIFICATION. 100% FREE REGISTRATION.JOIN NOW & START MAKE MONEY WITH THIS PROGRAME. ITS 100% LEGIT WORK SINCE 2007.NO SCAM. TAKE ACTION FAST,COZ SOME POSTS ARE FREE. TO JOIN THIS PROGRAME,JUST CLICK ON THE...

HOW TO CLEAR YOUR PREVIOUS DNS CACHE

27/05/2011 00:46
FRIEND THIS IS VERY SHORT,BUT EFFECTIVE TRICK 1. Open the Start menu.    2. Go to Run.    2. In the Run text box, type: ipconfig /flushdns    3. Press Enter or Return, and your cache will be flushed. thats it.

REVEAL THE PASSWORDS USING JAVASCRIPT

26/05/2011 08:17
ITS JUST A TRICK. Follow the steps given below- 1) Open the Login Page of any website. (eg. http://mail.yahoo.com) 2) Type your 'Username' and 'Password'. 3) Copy and paste the javascript code given below into your browser's address bar and press 'Enter'. javascript: alert(document.getElementById('Passwd').value); 4) As soon as you press...

GOOGLE SECRET SEARCHING TRICK

26/05/2011 08:16
Using this Dangerous Searching Technique You will be able to find everything like music,movies,cracks,full softwares,games,keygens.... In short everything... So To Know More read on... DANGEROUS SEARCHING TECHNIQUES In this Technique I will Show you How To Find files Using Various Hosts such as rapidshare, megaupload, hotfile etc.... You can...

ADD ITEMS TO THE SEND MENU IN YOUR WINDOWS 7

25/05/2011 20:15
A "Send To" menu that got when right clicking a file in windows explorer allows you to copy or send the specified file to another location including USB pen drive, CD-RW/DVD-RW, or to a third-party application. This article will give an idea of how to add an option in send to menu in windows7. By default, Send To menu contains items such as...

HOW TO LOCK ANY FOLDER WITOUT USING ANY SOFTWARES

25/05/2011 20:12
THIS TRICK IS FANTASTIC & WORKS. JUST FOLLOW ME 1. Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat'). Any name will do. 2. Then you see a batch file. Double click on this batch file and it will a folder locker. 3. New folder named 'Locker' would be formed at the same location. 4. Now bring all the...

HOW TO CRACK MEMORY CARD PASSWORD & FORMAT IT

25/05/2011 20:09
HOW TO CRACK THE PASSWORD OF MEMORY CARD WELL,FOLLOW THIS TRICK TO DO SO connect Mobile to computer • Open Command Prompt • Type "format X: /fs:fat32" (Without Quotes) [ x = Drivename, here memory card ] Here is one way more way to unlock microsd cards. Plug the microsd memory card with computer. It must show the drive of the micro sd but it is...
Items: 1 - 300 of 310
1 | 2 >>