Friday 29 June 2012

Hack Your Broadband !! No Risk !!

DownloaD The Ip Scanner !
First Go to this Site www.angryziber.com

Then Go To www.whatismyip.com
Get Your Ip Address !!

Unlimited Time In Internet Cafe

Alright , Were Gonna Learn How To Disable The Timer On The Computers On In Internet Cafe's. Alright Create A New Text Document, Than Type CMD

How to Hack Websites & Servers in Step by Step - Tutorial

Preface:
This tutorial is meant for beginners. Anyhow, it might be useful for intermediate/experts too!

I'm going to provide the common methodology that is followed when hacking a machine/network/server. This tutorial will give you a good understanding & an overview about professional penetration test in a

SEND SMS TO ANY MOBILE FREE WITH AND WITHOUT GPRS CONNECTION


Download 160by2 -the Free SMS service-on your mobile and enjoy free SMSing whenever you want. It's now easy to send SMS anywhere to on any mobile device within India.For all over the world service you can use celity sms So, stay connected, even when you step out.

Bluetooth hack

Bluetooth provides an easy way pf communication for a wide range of mobile devices to communicate with each other without the need for cables or wires and transfer files in between them.

internet cafe hacking

Basic overview of this tutorial is if there's some kind of timer or client
software on the computer you're using at the Net Cafe you can hopefully disable it.

HOW TO DOWNLOAD YOUTUBE VIDEOS WITHOUT USING ANY APP

THIS IS VERY SIMPLE TRICK. FOR THIS YOU NEED NOT HAVE ANY SOFTWARE.
FOLLOW THE FOLLOWING STEPS TO DOWNLOAD A VIDEO

How to download torrents, Rapidshare , Mediafire links in a Super High Speed

We like downloading torrents be it Movies , Games, Videos or any file. Its the first thing that comes to our mind when it comes to download.

Wednesday 27 June 2012

increase your torrent download speed


The use of Bit Torrent is an efficient way to transfer files of just about any size quickly and efficiently. How this works is by breaking the huge files into smaller pieces and is from one or many of the different sources. This is one of the best ways to transfer bulky files quickly even when you are using a low bandwidth connection. There are many more things that you can do with Bit Torrent, but here we are going to discuss how to make this work much faster. 

target windows 7-metasploit

This summary is not available. Please click here to view the post.

Hijacking Facebook Users With Clickjacking Attack


Clickjacking is one of most used attack on Facebook. Scammers use this attack to increase like of a Facebook page and spread some malicious links on Facebook user’s profile. Most of the strange looking auto spreading scams on Facebook are Clickjacking attacks.

View Private Facebook Profiles


privateiis It Possible to View Private Facebook Profiles?
What I learned during my nightly hacking sessions is this – whatever sort of hack you uncover today, Facebook will have it patched tomorrow. Early on there were different methods how to view private Facebook profiles by typing a URL using just the right format and code, and inserting the person’s Facebook ID into the URL. However, every time one

Free Temporary Anonymous Email Boxes


Ever needed to provide an email address to someone which would not compromise your identity or unleash a horde of spam on your primary email? Check out MakeMeTheKing – Temporary and anonymous email boxes.

View Webcam without Permission


Sometimes we try to googling or figure out how we can view other webcam in Messenger Services such as AIM Webcam, Yahoo Messenger Webcam or Windows Live Messenger webcam without need a permission. But, after trying to search, you must be face that the answer is almost impossible and there is no software aka program that can be used to view Yahoo, WLM, AIM webcam without permission. Therefore, We try to give you another alternative for view webcam of Messenger that can be obtain without even need a permission.

Sunday 24 June 2012

What Is Doxing? And It's Uses

first, let me explain what Doxing is. Doxing is the process of gaining information about someone or something by using sources on the Internet and using basic deduction skills. Its name is derived from “Documents” and in short it is the retrieval of “Documents” on a person or company.

TARGET XP-METASPLOLT

 Every mey  have  probably heard of the metasploit framework. metasploit was originally written in perl , but later it was re-written in ruby.its basically a large database of exploit code , scanners , encoders and payloads ... 

target :windows XP sp2 ( this exxploit also works with windows sever 
2003 and windows xp sp3)

exploit:ms08_067_netapi 


my OS :backtrack 5R2 

so this is what msfconsole looks like -->

Saturday 23 June 2012

get free recharge to all networks


many of them are eagerly waiting for this type of post so put an end to your waiting and here is the trick.


If you still waiting get Free Recharge then here is the New Latest working Free Recharge Trick of 2012 for You, With this New Free Recharge Trick you can Easily get Free Recharge by Playing Games.





latest airtel 3G trick 2012 | unlimited free internet



Initially it started When BSNL 2G sim was Downloading data at speed of a 3G Network but it was the fault of BSNL administration and technical problem, Which were resolved later by BSNL now we don't get 3G speed (1-10 Mbps) on Simple 2g sim of BSNL.The Pricing of 3G data plans are touching sky, so Common men like us are forced to use slow speed (10-20 KBPS) of 2G networks.

Create your own virus – Test your antivirus software


Virus

Do you want to test your antivirus software to check whether it alive or dead?
First you need to create a virus to test your antivirus software.

Friday 22 June 2012

How To Create A Strong Defense Against Hackers For Your PC


Hello all in this following post we will have a look on how to create a strong defense against hackers for your personal computers.

Two Tips To Speed Up Your Bandwidth By 30%

Tip Number-1
By default all Windows systems reserves 20% of your bandwidth speed. This is done so that any specific application should not overpower other applications for bandwidth. Though this setting is done for good purpose it limits connection speed even though only one application is using bandwidth.

Phishing Countermeasures



In our previous posts to phishing we covered basics, tutorials and vectors about phishing and phishers. So now let’s have a look at final part that is countermeasure. Phishers have lot of methods to vector a phished page so at practical level there can't be a single solution that can help counter phishing. A phishing attack can be avoided only by a combination of awareness and use of security technologies.

how to create Remote Administration Tool(RAT)





In this post we will learn how to create Remote Administration Tool(RAT). But before we proceed let's discus some basic terminologies.

ARP Poisoning


ARP poisoning is also known as ARP Spoofing, ARP Flooding and ARP Poisoning Routing. So what basically is ARP poisoning ? It is technique which allows an attacker sniffs traffic from Local Area Network (LAN), monitors it and even stop it.

Chrome OS, What’s the fuss all about?

Chrome LogoGoogle’s Chrome Operating System is a Linux-based OS designed to work better, at times exclusively with web based applications. Initially launched in July 2009, its open source version is called the Chromium OS.

easiest way to hack gmail passwords


 hope this is my first post on gmail account password hacking hope u all like this is the most easiest way top hack any gmail account password.!!!!! fallow the steps as mentioned below..........

Thursday 21 June 2012

How to Speed Up Your Computer


Now that I have your attention, I can tell you that there are a few things that you have to do first, before you can learn how to speed up your computer with that one double-click. When those things are done, though, it will always be a simple double click to speed up your computer. How can this be possible?


3 Ways To Speed Up The Windows 7 Shutdown Process

windows 7 slow shutdown









One of the key improvements of Windows 7 is its lightning fast start-up. Aaron Dietrich of the Windows Client Performance team received a lot of praise for this achievement. However, what the developers apparently failed to optimize and speed up was the shutdown process.










Wednesday 20 June 2012

Awesome iPhone 4 and 4S Hacks

According to comscore, the Apple iPhone controls approximately 30 percent of the U.S. smartphone market, only to be outdone by Google’s mobile OS, Android. Even so, Apple’s iOS operating system is a bit limited, at least out of the box. Additionally, Apple has stricter guidelines for what and what not to allow in their AppStore. The following 5 hacks for the iPhone 4 and 4S will allow you to do more things with your smartphone and add even more customization.
iPhone 4 Jailbreak

How To Make A Keylogger & Hack Passwords Using It!!!


How to hack yahoo, msn, orkut, gmail or any websites login user name & password anything, you can hack anything using keylogger,keylogger is also known as keystroke logger keylogger is a hardware device or small program that monitors each keystroke a user types ...

HOW TO DECRYPT THE PASSWORD OF THE RAR FILE


 Almost everyone met with passwordprotected winrar file.For example, you have downloaded movies or something else  from torrent or rapidshare, and when you try to open the downloaded file  appears “Enter password for the encrypted file”… Damn… What now…You can decrypt the password of the .rar file with Stellar Phoenix Zip Recovery. I´ve tested and have broken password with 3 charachters for 60 seconds.

How To Break Password Behind The Stars

Ever wanted to know what is behind those ******** passwords. For example if you want to know password from facebook account that somebody else have typed and left it. Here is post which will help you.

Tuesday 19 June 2012

How to Hack Facebook Account Using Phising webPage


Everyone eager to hack the facebook account of others.  Here is the simplest method using phishing webpage ,you can hack the facebook account of your friends .









creating virus in c






This program is an example of how to create a virus in c.This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file.Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on.Here�s the source code of the virus program.



Monday 18 June 2012

HOW TO HACK OR CRACK A WINDOWS XP ADMINISTRATOR PASSWORD


Windows XP Privilege Escalation Exploit
(This is provided only for educational purpose)


Here are the steps involved to Hack the Window XP Administrator Password .

How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial



if you are college/school students, you may curious to hack the admin password in your college or school system. This post is going to help you to crack the any type of windows accounts passwords. Learn how to hack the windows admin password like a geek.







C++,Batch Virus code to disable All Hard disk


Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also.

Havij Tool - Automatic SQL Injection Process


Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.

How to track IP address of anyone using email?


today we are going to learn how to track an ip address, timing,locatin.By using this method you can get the IP address,location, timing of victim. 

Increase the Download speed of Hotfile like premium account-cookies hack


Hi Friends,  i think this is my first about hotfile.   Hotfile is file sharing website.  In hotfile , downloading speed for normal user is very slow.  But for premium account it will be faster.  In this post, i am going to explain how to downlod files from hotfile like premium account.  




Sunday 17 June 2012

Serial keyzzz.. of all games

Wanna waiting for game keys! 
say no to waiting & here are your keys...

Thursday 14 June 2012

What is Session Hijacking?Bypassing Login using Session Stealing?


Know what is Session?


What is Session Hijacking?
Session Hijacking is Stealing the existing active Session. The main purpose of Session Hijacking is to bypass authentication process and gain unauthorized access to the computer or Website. In simple words , hackers will login as some other client using their Sessions

See All Live Webcams with a Google Trick


Google Search for Webcams
 Here’s  a trick that will blow your mind. You can get access to all open public webcams through Google. There are many tricks by which one may get accessed to all the webcams running currently at a particular position and at particular time.





How to Abort The Shutdown Operation in Windows

In some cases,  the shut down or a restart button of the computer is pressed mistakenly

See the 911 Attack on Notepad


 

Now the attack of World Trade Center can be seen on a simple Notepad file. Let’s begin this trick with the bit of information – The flight number of the respective flight that hits twin tower was Q339.

LinkWithin

Related Posts Plugin for WordPress, Blogger...