Do you transfer files by connecting your mobile phone to PC with the
help of USB, thus connecting and disconnecting USB gives you trouble, so
turn into wireless, thus reducing your tension of wire. The benefit of wireless is that it is easy to
connect and there is fast transfer of files. Here are the few wireless
apps which
This blog is all about computer and mobile tips and tricks. Blog is also informative for student and youngsters. Hacking ,Cracking and all information about latest technology you will find it here.
Sunday, 10 November 2013
What is Trojan horse virus and how to Remove it?
Are you facing virus threats on your computer? Is your computer behaving
abruptly or are you the victim of a disk crash? Is your computer
hacked by a Trojan horse virus attack? A Trojan horse virus
attack is one of the most dangerous threats to your computer and needs
to be fixed immediately. If it is not protected on
Thursday, 29 August 2013
There’s a Scientific Calculator inside your Web Browser
You are probably using the Google search box in your browser as an instant calculator
but there’s another calculator in your web browser that also works
offline. You may use this inbuilt browser calculator for basic Maths
calculations or even for solving complex expressions that involve
trigonometry and logarithmic functions.
This calculator can be
found under Developer Tools that are now a standard feature of all
browsers including Chrome, Firefox and IE.
Monday, 26 August 2013
Best Dating Sites
Best
Dating SiteS :D
The online dating picture has seen a
noteworthy growth in last 5-10 years and this doesn’t appear like it’ll be
slowing down ever. If you’re just looking at availability of the online dating
sites, then you might be quite surprised by the extensive choices which are
competent to cater to extremely specific interests and groups, which should
ensure there is dating environment open for almost anyone.
Sunday, 25 August 2013
Increase battery life of android Mobiles
Nowadays , everyone is upgrading their mobile phones to smartphones. But most of us would be complaining about the battery
backup of your android and iPhone. As a result they give up their smartphones
too early. Let us learn in short why a smartphone uses more battery than your
feature mobile phones.
Thursday, 22 August 2013
Top 5 Tips To Increase Blog Pageviews
Blogging is not only the game of receiving traffic. We have to
target each and every visitor to convert them into readers. Blog page
views are also as important as traffic. We have to focus on the
strategies that work on increase blog page views. If a visitor land on
your blog then your aim should be to present a nifty and well
Wednesday, 21 August 2013
How to tweet longer than 140 characters limit from Twitter
Twitter is a popular micro-blogging website on which users are allowed to post tweets
of up to 140 characters only. But there are some services which offers
users to tweet beyond this limit. But it is hard to find an app for
this. But Android has a cool app which offers users to tweet more than
140 characters.
Tuesday, 20 August 2013
New facebook chat trick
Facebook has recently made changes to its chat
features. Now we can use profile images in chat. You can even type anything in
colour using a simple trick. You just need to know how to get facebook profile id which you will learn by reading
this article Trick to find facebook profile id.
Below are codes of A-Z and guide on how to use them in chat.
How to Connect Laptop to a Television Screen
Sesh wants to watch YouTube videos and web photos on his large TV
screen and is wondering if there’s an easy way to connect the laptop
computer to the TV.
Well, there are several ways to connect your
computer to a Television depending on what ports are available on your
PC and your TV (we used an HP Windows computer and a Sony Bravia HDTV
for this example).
Find the Song Name Without Knowing the Lyrics
It happens all the time. You are sitting in a restaurant with friends or driving to work and there’s some beautiful music playing on the FM radio station. You would love to buy a copy of that music album for yourself but the problem is that you didn’t get the lyrics so how do you find out the name of that song.
Find the Person Behind an Email Address
You get an email from a person with whom you have never interacted
before and therefore, before you reply to that message, you would like
to know something more about him or her. How do you do this without
directly asking the other person?
How to Edit PDF Files without Adobe Acrobat
The PDF file format was originally created by Adobe in the early ’90s and there are now over 700+ million PDF documents on the Internet according to Google (search for filetype:pdf).
Sunday, 18 August 2013
How To Send Free Unlimited SmS From Android
There Is an Android app that allows we to send total giveaway SMS on your Android phone with an Internet connection.If we devise to save some income or have a fortitude to be careful this year, afterwards a a contingency have app on your Android.Mobile phones are an constituent partial of a life.They have finished
Fool Ur Friends With Your Intel® Core™ i11 Processor
Note, this trick is really not recommended as this may cause windows to provide falsified information to it self and other applications, which would cause system stability issue and may slow down the system….
How to Change the Processor Name shown in the System properties Dialog Box ??
How to Change the Processor Name shown in the System properties Dialog Box ??
Top TEN Best robot Apps for Hackers and Penetration Testers.
Android is among the the most effective mobile operational systems
currently a days, There square measure a giant variety of mobile phones
mistreatment robot as their software package. at intervals few time,
robot got sensible name in market and a giant variety of users likewise,
there's little question that robot could be a
Malware And Malware Security
What is a malware virus?
A malware virus is virus software spread through malicious programs or software – known as malware. Malware is short for ‘malicious software’ and is another term for ‘computer virus’.
A malware virus is virus software spread through malicious programs or software – known as malware. Malware is short for ‘malicious software’ and is another term for ‘computer virus’.
Friday, 2 August 2013
DIFFERENT FILE FORMATS
1. TEXT FILES FORMATS:-
.txt Plain Text File
.doc Microsoft Word Document
.docx Microsoft Word Open XML Document
.msg Outlook Mail Message
.txt Plain Text File
.doc Microsoft Word Document
.docx Microsoft Word Open XML Document
.msg Outlook Mail Message
Saturday, 20 July 2013
How to Become a Ethical Hacker
OK Many ask me how to become HACKER so here goes go through this-
How to Become a Hacker
--------------- -------------- - ---
How to Become a Hacker
--------------- -------------- - ---
How to Block Websites without using any Software in PC Browser
1.) Open “Run” from the start menu (or press WinKey + r). Just copy paste the following path and hit ENTER.
BEST 10 WAYS OF HACKING FACEBOOK
(Most asked question, here is the answer) BEST 10 WAYS OF HACKING FACEBOOK
Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers.
Top 10 computer mouse tips everyone should know
Mouse clickMost computer users don't take full advantage of the
computer Mouse. Below are computer mouse tips and secrets that help you
get the full potential of your computer mouse and increase your overall
productivity while on the computer.
Friday, 19 July 2013
Permanent Solution To Delete Newfolder.exe Virus
Step A
1. Search for the autorun file (autorun.inf). It is a read only file so you will have to change it to normal by right clicking the file, selecting the properties and un-check the read only option.
2. Open the said file in notepad and delete everything inside it and save the file.
1. Search for the autorun file (autorun.inf). It is a read only file so you will have to change it to normal by right clicking the file, selecting the properties and un-check the read only option.
2. Open the said file in notepad and delete everything inside it and save the file.
Monday, 15 July 2013
Password Protect Any Folder Without Any Software
How To Lock Folder ?
1. Open Notepad and Copy code given below into it.
1. Open Notepad and Copy code given below into it.
cls
@ECHO OFF
title zerowebworld.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
Friday, 12 July 2013
List of 105 websites that you might find useful in your day to day works
Hey guys here is the list of 105 websites that you might find useful in your day to day works .
1. screenr.com – Record movies of your desktop and send them straight to YouTube.
2. bounceapp.com – For capturing full length screenshots of web pages.
3. Goo. gl – Shorten long URLs and convert URLs into QR codes.
4. untiny.me – Find the original URLs that’s hiding behind a short URLs.
Thursday, 11 July 2013
Install Windows XP in 15 Minutes !!!
This post will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, but through this way you can install and save 10-15 minutes.
Some useful Indian websites
In an earlier post about the useful Indian government websites,
I have listed about 10 government websites in India. In this post about
the useful Indian websites, we will be covering both Government as well
as other public websites of my interest.
Wednesday, 10 July 2013
Abbreviation of major IT companies
GOOGLE :- Global Organization Of Oriented Group Language of Earth
APPLE:- Asian Passenger Payload Experiment
HP :- Hewlett-Packard
IBM:- International Business Machines Corporation
APPLE:- Asian Passenger Payload Experiment
HP :- Hewlett-Packard
IBM:- International Business Machines Corporation
Important abbreviations related to internet.
FM –> Frequency Modulation
SIM –> Subscriber Identity Module
RIM –> Removable Identity Module
GSM –> Global System For Mobile
SIM –> Subscriber Identity Module
RIM –> Removable Identity Module
GSM –> Global System For Mobile
Crack Windows Passwords in 5 minutes.
Cracking Windows (xp,vista,7,8) Passwords With Backtrack.
Using OphCrack.
Using OphCrack.
Beginner guide to “hacking" always up to date.
While this short Guide will not give you a step-by-step, hold-your-hand solution ( such a solution is impossible for reasons you’ll find out in this text. ) This text will give you a serious guideline to developing your own techniques and methodologies for hacking.
Tuesday, 9 July 2013
Why should we use encrypted emails?
We all know that the big corporation people can read each and every one of our emails and we can't do nothing about it. There are huge amount of people that filed cases against Gmail, Yahoo, and Hotmail because they have been reading peoples emails. There is no complete privacy while you send a email or receive one. All the big corporation have bots that look for phrases or words that they want to find more information about. They have this things searching the emails all day.
Automatically Post Birthday Wishes In Facebook !!
Most of us wish Birthdays to our friends on Facebook. But we miss some
of them because we can not be there at Facebook every time. Moreover
wishing after midnight is also a problem for some of us. SO today im
gonna share a website that can solve this problem which is “birthdayFB“.
It simply schedules all the Facebook wall posts and publish them on
your friend’s Birthdays. You can plan all the posts in just one
setting. You can also choose the pre-defined messages or can write your
own custom ones.
Thursday, 4 July 2013
How to Access Blocked Websites!!
How to Setup Proxy Servers using their IP Address !!!
If you wish to visit blocked website using a web proxy, you do not need any setup. However, if you wish to use a proxy server that can only be accessed by using its IP address and port number, you must configure your browser to use it.
CEHv7 Video training Leake In Market
CEH Video training by James Conrad. I hope it will be of great use to all of you IT Specialists and Enthusiasts. Has everything you ever wanted to know about being a CEH. Please note that if you like these video training you should buy it.
How to monitor or track any cell phone?
There
is no denying that cell phones are part and parcel of current times and
smartphones with a whole gamut of features are hot favorites. Mobile
phones are being profusely used for a variety of functions and have
become repositories of so much personal and professional information. If
and when people can get at a cell phone’s data, they acquire almost complete knowledge about the owner! But getting at a mobile’s data is more easily said than done.
Monday, 1 July 2013
Hack Yahoo accounts with Session IDs or session cookies !
What are session IDs or session cookies ?
Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when we click on 'Sign Out' option.
Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when we click on 'Sign Out' option.
Saturday, 29 June 2013
Hacking ADSL Routers for free accounts
Most
of the people never change their default passwords no matter what it
is, they don't change them because they think that they are safe. In
this tutorial I'll show you one of the ways how to use this mistake and
get free ADSL/Wireless (If wireless router is used) accounts and enjoy
in unlimited downloads.
Friday, 28 June 2013
How to Bypass the || Youtube SMS Verification
1)To start I suggest using a new email
from yahoo, but I suppose any other
email service will do.
from yahoo, but I suppose any other
email service will do.
10 Amazing Windows Command Line Tricks !!
Whatever eye candy the graphical interface of windows may offer but it could never match the functionality that could be achieved with command line. Here is the list 10 useful commands and tricks for Windows command line.
Thursday, 27 June 2013
Portal Hacking (DNN) - Website Hacking Technique
Hello frnds, One more hacking method called "Portal Hacking (DNN)". This method also uses google search to find hackable sites.. Now you can imagine that how much google.com is important for Hackers also...
Wednesday, 26 June 2013
How to Restore Deleted Apps on iPhone, iPad and iPod Touch Easy Way:
If you deleted an app from your iPhone, iPad or iPod Touch, you can
recover the app very easily. Re-downloading the app doesn’t cost you
anything if you’ve already bought the app. It all stores in the cloud
(on your account) so don’t ever worry. Of course, make sure you have
iCloud setup at all times so that every inch of the information is safely stored somewhere.
Tuesday, 25 June 2013
Types of Hacker in Real Life.
Let’s see the categories of Hackerson the basis on their knowledge.
1] Coders
➔The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits.These Hackers can use those exploits to develop fully patched and secure systems.
1] Coders
➔The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits.These Hackers can use those exploits to develop fully patched and secure systems.
How to Protect Your Servers from Attacks and Hackers?
For most internet users, a firewall, spyware and antivirus protection
is more than enough to keep hackers at bay. But part of the reason these
programs are effective is that hackers rarely waste their time breaking
in to personal computers. However, they will go that extra mile to
access the servers of businesses where they can find sensitive financial information.
Monday, 24 June 2013
Five Linux Cool Tricks (Just for fun)
1. Download a website
Here is a simple way to download a whole website without actually visiting all the pages. First up all go into the directory you wish to download the whole website using the command line and type in the following
Here is a simple way to download a whole website without actually visiting all the pages. First up all go into the directory you wish to download the whole website using the command line and type in the following
Sunday, 23 June 2013
7 Things VLC Can Do!!
VLC media player is one of the most popular player for most people.It
has got almost all codecs. VLC can do a lot of other things beyond your
imagination. Find out how many of these listed below you knew, and how
many you did not.
How to Talk to Clients if You Want to Get Hired
The days when blogging was just a hobby of teenagers are gone; now,
even entrepreneurs want to have their own blogs, but do you know how to
talk to clients? What does this mean to freelance web designers?
It means that there are a lot of people out there who are willing to
spend money on a custom design for their blogs. How can you impress
these potential clients and get lucrative jobs?
Talk to your potential clients about what is important to THEM!
Saturday, 22 June 2013
Using Google.com to Find Usernames and Passwords .(INTERSTING)
Prerequisites: (This one is Easy!)
1. A modern web browser and a internet.
2. Time
Method 1: Facebook!
We will be using a google dork to find usernames and passwords of many accounts including Facebook!
How to Bypass the Youtube SMS Verification?
1) To start I suggest using a new email from yahoo, but I suppose any other email service will do.
2) Click the "sign up now" button.
3) Click the second radio button that should read "I do not use these other services"
How to clear Android Phone before selling it?
Perhaps you thought about or going to consider one day sell your Android phone, and of course you might clear your images, applications, as well as accounts of the device, in order to ensure that browsed the other party? But have you ever wondered to what limit these data are protected now? Can they be retrieved after?
Of course smart phones now become combines many of the sensitive data, which are directly related to us, as well as including us, but removing those files in the traditional way, does not mean they are protected 100% ,because with using some apps , it will be easy to retrieve files and data stored in your phone for a period of more than a month on the day of removal!! Thus, before thinking about selling your Android
phone you must consider this issue.
Of course smart phones now become combines many of the sensitive data, which are directly related to us, as well as including us, but removing those files in the traditional way, does not mean they are protected 100% ,because with using some apps , it will be easy to retrieve files and data stored in your phone for a period of more than a month on the day of removal!! Thus, before thinking about selling your Android
phone you must consider this issue.
How to make sure that links you open are not harmful, contain virus and malware ?
This is an obvious question, while surfing Internet, daily we come to
links which point to a website which we never visited earlier. Though we
can prevent us clicking on the new ‘suspicious’ link, but what if my
friend had sent me and it’s urgent to access it, in this case how you
would make sure your computer will stay safe ?
Thursday, 20 June 2013
COMPUTER FORENSICS SOFTWARE: Forensic Toolkit (FTK) Version 3
THE INDUSTRY-STANDARD COMPUTER FORENSICS SOFTWARE USED BY GOVERNMENT AGENCIES AND LAW ENFORCEMENT AROUND THE WORLD
Forensic Toolkit® (FTK®) is recognized around the world as the standard in computer forensics software. This court-validated digital investigations platform delivers cutting-edge computer forensic analysis, decryption and password cracking all within an intuitive and customizable interface. FTK 3 is built for speed, analytics and enterprise-class scalability. Known for its intuitive interface, email analysis, customizable data views and stability, FTK lays the framework for seamless expansion, so your computer forensics solution can grow with your organization’s needs. Forensic Toolkit 3 is now the most advanced computer forensics software available, providing functionality that normally only organizations with tens of thousands of dollars could afford.
TwitterPasswordDecryptor – Instantly Recover Twitter Account Passwords
TwitterPasswordDecryptor is the FREE tool to instantly recover
Twitter account passwords stored by popular web browsers. Most web
browsers store the login credentials for visited websites so that user
don’t have to remember and enter the password every time. Each of these
web browsers use their own proprietary encryption mechanism to store
the login passwords including Twitter account
passwords.TwitterPasswordDecryptor automatically crawls through each of
these browsers and instantly recovers all of the stored Twitter
passwords.
Here is a trick to download files from 4shared.com without login or having a premium account with high speed .
Here is a trick to download files from 4shared.com without login or having a premium account with high speed. Hope you like it...
Go to the download link.Now you have to edit the download link as :
Go to the download link.Now you have to edit the download link as :
" What happens on the web in 30 seconds ! "
The world of internet every second happening something new. That we cant imagine normally here is the list in brief .
-20,400 GB of global IP data transferred.
-70+ BotNet Infections.
-12 New victims of identity theft.
-20,400 GB of global IP data transferred.
-70+ BotNet Infections.
-12 New victims of identity theft.
Wednesday, 19 June 2013
HOW TO HACK WEBSITE USING GOOGLE ?
TODAY WE LEARN HACK A WEBSITE USING GOOGLE.
---------SO LET'S START---------
4 best website that will help to find missing dll files ?
There Have been a lots of situations that You get a missing DLL Files
Error When Trying To install A software or maybe A game .and one of the
most famous of the missing DLL files errors You receive is :
(Msvcr71.dll is Missing)
(D3dx9_41.dll is Missing)
(OPENAL32.DLL is Missing)
(Msvcr71.dll is Missing)
(D3dx9_41.dll is Missing)
(OPENAL32.DLL is Missing)
How to fix Package file is invalid error on Google Play Store ?
1.Go to settings.
2.Head over to applications.
3.Open all applications/manage applications.
4.Move onto Google Play Store.
Tuesday, 18 June 2013
How / Where / What Do I need to Do start Hacking ?
Alot of people ask “How do i learn hacking?”, “Where do i start?”, “How
do i become a hacker”… and so on. I answered the question a million
times. Now we all can just give them this link to my blog. ^^ This is my
opinion about everything. Others might think about it in a different
way. Eat it or just throw it away.
Backtrack5 : Using Armitage For Hacking.
What Do We Need ?
Latest Metasploit framework.
Oracle Java 1.7
Preferably Internet on LAN
Brains and Patience.
Latest Metasploit framework.
Oracle Java 1.7
Preferably Internet on LAN
Brains and Patience.
Basic Linux Commands (very useful for linux students)
Modes of Operation
The linux operating system used for the PARTICLE DAQ system can be used either in a terminal mode where you type commands or in a Windows Explorer style graphical user interface (GUI).
The Explorer-like GUI can be used for file manipulation functions (e.g., copying a file to a floppy) or deleting or moving files on the disk. It cannot be used to run the PARTICLE DAQ itself.
The linux operating system used for the PARTICLE DAQ system can be used either in a terminal mode where you type commands or in a Windows Explorer style graphical user interface (GUI).
The Explorer-like GUI can be used for file manipulation functions (e.g., copying a file to a floppy) or deleting or moving files on the disk. It cannot be used to run the PARTICLE DAQ itself.
Best Tools to Bypass Firewalls and access blocked websites
With more and more institutions going online, they are also realizing that their employees or students are spending more time online for their personal usage, they have been spending on firewalls to restrict this usage. This series is about the tools and techniques that still work on these firewalls to help you to circumvent across them to your destination websites.
10 Tips for Total Online Security.
With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.
5 Best Puzzle Games for Android Smartphones .
Puzzle games are always a good source of entertainment whether it is played on a personal computer or on mobile phones. Nowadays there are so many types of puzzle games that are offered on the internet. These games are simple in graphics but are very interesting and addictive, you can play for hours.These games can make your brain sharp and improve your problem solving abilities. There are hundreds of puzzle applications for your mobile phones. Below are the 5 most popular applications for android based smartphones:
Fight for the Future - NSA (ARTICLE)
The entire world is talking about the leaked documents -- and the interview with heroic whistleblower Edward Snowden -- that show definitive proof that the U.S. Government has been using the Internet to watch, record, and track huge numbers of innocent people from every corner of the globe. They have our phone calls, know where we are, and what we'll be doing.
How to secure your smartphone from hackers ?
How to secure your smartphone from hackers...
1. Use Passcodes Everywhere:
Whether you have an Android phone or an iPhone, you can prevent access to your device by adding a passcode or a lock pattern on Android. This simple security measure can save tour sensitive information This is especially important if you have a bunch of apps installed where personal data is stored like financial apps (Mint,bank apps, etc), note apps etc.The home screen passcode is important because a lot of the email apps (Mail on iPhone and Gmail on Android) don’t even have an option to passcode your email. Emails can
contain a lot of private information and since most people go to parties and leave their phones on tables and counters. Sp passcode is necessary.
1. Use Passcodes Everywhere:
Whether you have an Android phone or an iPhone, you can prevent access to your device by adding a passcode or a lock pattern on Android. This simple security measure can save tour sensitive information This is especially important if you have a bunch of apps installed where personal data is stored like financial apps (Mint,bank apps, etc), note apps etc.The home screen passcode is important because a lot of the email apps (Mail on iPhone and Gmail on Android) don’t even have an option to passcode your email. Emails can
contain a lot of private information and since most people go to parties and leave their phones on tables and counters. Sp passcode is necessary.
Add Your Name (or) Application to right click Of My Computer Caution .
Add Your Name (or) Application to right click Of My Computer Caution ..
As it is related to Windows registry it can be dangerous so,Try this at your own risk
To write your name on right click application please follow the steps.
As it is related to Windows registry it can be dangerous so,Try this at your own risk
To write your name on right click application please follow the steps.
Monday, 17 June 2013
Manually Hide any file in JPEG
Hello Friends, now i am going to explain you how to hide any file behind the JPEG image manually that is without any software. Its a very easy trick and also very useful if you want to send information secretly to your friend. Also its different from stenography as it does hides text behind images or text behind mp3 files. Its universal, you can hide any file, virus or Trojan or anything behind image using this trick.
How To Hack Wi-Fi Network:
Note : Only For Educational Purpose.>!!!
1) First we need to scan for available wireless networks.
Theres this great tool for windows to do this.. called “NetStumbler” or Kismet
for Windows and Linux and KisMac for Mac.
The two most common encryption types are:
1) WEP
2) WAP
HOW TO SET YOUR OWN FTP SERVER ?
This is a full tutorial for creating you're very own FTP.
The first thing to do is to go to
Code:
www.no-ip.com
Register free at the page. (follow all the instructions you get there)
Look at the top, and you see the Host Search. Write the name you want, and press Go! Then download the program called No-IP on the site, or use this:
Code:
www.no-ip.com
Register free at the page. (follow all the instructions you get there)
Look at the top, and you see the Host Search. Write the name you want, and press Go! Then download the program called No-IP on the site, or use this:
What is a DOX?
A DOX is a gather of somebodies personal information (Family members, where they reside, pictures, numbers and School they attend if not at school - work or university.
DOXing is a very powerful/ useful knowledge to have. My close friend got infected, I removed the RAT from his computer. I switched the scenario around to him spending over $100 dollars off his mums Credit Card for our own personal use, I called his mother and made her aware that he was hacking and doing blackhat activities. I heard her yelling and screaming on the phone. I warned him he would have to compensate for the issues that he caused my friend. Saying "You've done the wrong thing, my friend. I'm going to have to call the Feds and maybe you'll learn your lesson this way."
DOXing is a very powerful/ useful knowledge to have. My close friend got infected, I removed the RAT from his computer. I switched the scenario around to him spending over $100 dollars off his mums Credit Card for our own personal use, I called his mother and made her aware that he was hacking and doing blackhat activities. I heard her yelling and screaming on the phone. I warned him he would have to compensate for the issues that he caused my friend. Saying "You've done the wrong thing, my friend. I'm going to have to call the Feds and maybe you'll learn your lesson this way."
What is SQLi ?
The Structured Query Language injection (SQLI) is the internal interface between an application and the Online Web Server.
Are you Confused because of lots of technical jargon's?
Are you Confused because of lots of technical jargon's?
I will make it simple. Basically a web hosting saves ALL its information in a table format known as Database. So all the usernames and password for accessing the web hosting will also be saved in the very same format. So SQLi is an interface where the user sends a query and the database gives an automated reply. So we will use this method to get the information about the admin's username and password, hence we get to access the complete web server.
HOW TO READ BAR CODES... (everyone must know)
ALWAYS READ THE LABELS ON THE FOODS YOU BUY--NO MATTER WHAT THE FRONT OF THE BOX OR PACKAGE SAYS, TURN IT OVER AND READ THE BACK CAREFULLY!
With all the food and pet products now coming from China, it is best to make sure you read label at the supermarket and especially when buying food products. Many products no longer show where they were made,only give where the distributor is located. The whole world is concerned about China-made "black-hearted goods".
Lock Your Private Files
All of us want to hide our personal data on our PC but mostly all those software which do so are general costly. But we can also make our own Private Program using notepad. So, just do these steps :
Step 1: Open notepad.
Step 2: Copy the following code in notepad file :
Step 1: Open notepad.
Step 2: Copy the following code in notepad file :
What is BRUTE-FORCE attack ?
A password attack that does not attempt to decrypt any information, but continue to try different passwords. For example, a brute-force attack may have a dictionary of all words or a listing of commonly used passwords. To gain access to an account using a brute-force attack, a program tries all available words it has to gain access to the account. Another type of brute-force attack is a program that runs through all letters or letters and numbers until it gets a match.
What is DNS Poisoning?
Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address. When a Web user seeks the page with that address, the request is redirected by the rogue entry in the table to a different address. Atthat point, a worm , spyware , Web browser hijacking program, or other malware can be downloaded to the user's computer from the rogue location.
Countdown Timer for Shutdown Computer Automatically
Countdown timer for shutdown computer:
Many a times people like to sleep on music, but the problem is that the comp will continue running the whole night. Here is how you can create a countdown timer to shutdown your comp in your specified time.Go to run in start menu and input this command :-
Proxies vs. VPN – What’s the difference?
Proxies vs. VPN – What’s the difference?
----------------------------------------------
The purpose of using both VPN and proxy servers is to conceal the users identity, or to spoof a certain geo-location (so for example geo-locked services such as many TV streaming websites may be watched outside their country of origin). Many VPN Providers, in addition to offering VPN also provide some kind of proxy service, and there are also many public proxy servers which can be used for free.
----------------------------------------------
The purpose of using both VPN and proxy servers is to conceal the users identity, or to spoof a certain geo-location (so for example geo-locked services such as many TV streaming websites may be watched outside their country of origin). Many VPN Providers, in addition to offering VPN also provide some kind of proxy service, and there are also many public proxy servers which can be used for free.
Sunday, 16 June 2013
Here Is An Article On # tags That Facebook Recently Introduced !!
Here Is An Article On # tags That Facebook Recently Introduced !!
Twitter # officially has became part of Facebook now . The change means hashtags are now clickable tags on the biggest social network, allowing users to quickly see what other people are saying about it. Facebook is also making hashtags searchable, even if they originate on different services, such as Twitter, Tumblr, Pinterest, Google+ and Instagram. From the Hashtag feed you can also compose posts directly. For newbies, however, there are a few things to keep in mind. Here’s how to get started with hash tagging your News Feed.
Twitter # officially has became part of Facebook now . The change means hashtags are now clickable tags on the biggest social network, allowing users to quickly see what other people are saying about it. Facebook is also making hashtags searchable, even if they originate on different services, such as Twitter, Tumblr, Pinterest, Google+ and Instagram. From the Hashtag feed you can also compose posts directly. For newbies, however, there are a few things to keep in mind. Here’s how to get started with hash tagging your News Feed.
OF GOOGLE GLASS AND HMDS
Maybe you have heard of Google Glass? Glass is an amalgamation of technologies old and new, and one that Google hope will usher in an age of practical head-mounted-displays (HMD), augmented reality (AR), and a brand new revenue stream. The Glass fuses a 1.3 cm display in to the frame of a pair of Glasses.
Hide 'Seen' And 'Is typing ' feature in Facebook !!!
Hide 'Seen' And 'Is typing ' feature in Facebook !!!
When seeing this feature for the first time, it was like 'Wow a great feature..!', but when Privacy is concerned, no one needs it. This 'seen at' feature is great one to confirm whether your friend saw this message or not, but it is quite uncomfortable when others get to know that you have seen their message and not yet replied. Especially, in case of the one you wish not to talk with.As soon as this 'seen at' feature was added to facebook, many addons & extensions were released to save people's privacy by hiding this feature. Unfortunately, leading browsers deleted those addons in the name spam.
Subscribe to:
Posts (Atom)