Saturday 29 June 2013

Hacking ADSL Routers for free accounts

Most of the people never change their default passwords no matter what it is, they don't change them because they think that they are safe. In this tutorial I'll show you one of the ways how to use this mistake and get free ADSL/Wireless (If wireless router is used) accounts and enjoy in unlimited downloads.

Friday 28 June 2013

How to Bypass the || Youtube SMS Verification

1)To start I suggest using a new email
from yahoo, but I suppose any other
email service will do.


10 Amazing Windows Command Line Tricks !!


Whatever eye candy the graphical interface of windows may offer but it could never match the functionality that could be achieved with command line. Here is the list 10 useful commands and tricks for Windows command line.

Thursday 27 June 2013

Portal Hacking (DNN) - Website Hacking Technique

Hello frnds, One more hacking method called "Portal Hacking (DNN)". This method also uses google search to find hackable sites.. Now you can imagine that how much google.com is important for Hackers also...

Wednesday 26 June 2013

How to Restore Deleted Apps on iPhone, iPad and iPod Touch Easy Way:

If you deleted an app from your iPhone, iPad or iPod Touch, you can recover the app very easily. Re-downloading the app doesn’t cost you anything if you’ve already bought the app. It all stores in the cloud (on your account) so don’t ever worry. Of course, make sure you have iCloud setup at all times so that every inch of the information is safely stored somewhere.

Tuesday 25 June 2013

Types of Hacker in Real Life.

Let’s see the categories of Hackerson the basis on their knowledge.

1] Coders
➔The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits.These Hackers can use those exploits to develop fully patched and secure systems.

How to Protect Your Servers from Attacks and Hackers?

For most internet users, a firewall, spyware and antivirus protection is more than enough to keep hackers at bay. But part of the reason these programs are effective is that hackers rarely waste their time breaking in to personal computers. However, they will go that extra mile to access the servers of businesses where they can find sensitive financial information.

HOW TO MAKE UNLIMITED FREE CALLS...!!!

Here's a trick for android n iphone users only.

Monday 24 June 2013

Five Linux Cool Tricks (Just for fun)

1. Download a website

Here is a simple way to download a whole website without actually visiting all the pages. First up all go into the directory you wish to download the whole website using the command line and type in the following

Sunday 23 June 2013

7 Things VLC Can Do!!

VLC media player is one of the most popular player for most people.It has got almost all codecs. VLC can do a lot of other things beyond your imagination. Find out how many of these listed below you knew, and how many you did not.

How to Talk to Clients if You Want to Get Hired

The days when blogging was just a hobby of teenagers are gone; now, even entrepreneurs want to have their own blogs, but do you know how to talk to clients? What does this mean to freelance web designers?
It means that there are a lot of people out there who are willing to spend money on a custom design for their blogs. How can you impress these potential clients and get lucrative jobs?
Talk to your potential clients  about what is important to THEM!

Saturday 22 June 2013

Using Google.com to Find Usernames and Passwords .(INTERSTING)


Prerequisites: (This one is Easy!)
1. A modern web browser and a internet.
2. Time

Method 1: Facebook!
We will be using a google dork to find usernames and passwords of many accounts including Facebook!

How to Bypass the Youtube SMS Verification?

1) To start I suggest using a new email from yahoo, but I suppose any other email service will do.

2) Click the "sign up now" button.

3) Click the second radio button that should read "I do not use these other services"

How to clear Android Phone before selling it?

Perhaps you thought about or going to consider one day sell your Android phone, and of course you might clear your images, applications, as well as accounts of the device, in order to ensure that browsed the other party? But have you ever wondered to what limit these data are protected now? Can they be retrieved after?
Of course smart phones now become combines many of the sensitive data, which are directly related to us, as well as including us, but removing those files in the traditional way, does not mean they are protected 100% ,because with using some apps , it will be easy to retrieve files and data stored in your phone for a period of more than a month on the day of removal!! Thus, before thinking about selling your Android
phone you must consider this issue.

How to make sure that links you open are not harmful, contain virus and malware ?


This is an obvious question, while surfing Internet, daily we come to links which point to a website which we never visited earlier. Though we can prevent us clicking on the new ‘suspicious’ link, but what if my friend had sent me and it’s urgent to access it, in this case how you would make sure your computer will stay safe ?

Thursday 20 June 2013

COMPUTER FORENSICS SOFTWARE: Forensic Toolkit (FTK) Version 3

THE INDUSTRY-STANDARD COMPUTER FORENSICS SOFTWARE USED BY GOVERNMENT AGENCIES AND LAW ENFORCEMENT AROUND THE WORLD

Forensic Toolkit® (FTK®) is recognized around the world as the standard in computer forensics software. This court-validated digital investigations platform delivers cutting-edge computer forensic analysis, decryption and password cracking all within an intuitive and customizable interface. FTK 3 is built for speed, analytics and enterprise-class scalability. Known for its intuitive interface, email analysis, customizable data views and stability, FTK lays the framework for seamless expansion, so your computer forensics solution can grow with your organization’s needs. Forensic Toolkit 3 is now the most advanced computer forensics software available, providing functionality that normally only organizations with tens of thousands of dollars could afford.

TwitterPasswordDecryptor – Instantly Recover Twitter Account Passwords

TwitterPasswordDecryptor is the FREE tool to instantly recover Twitter account passwords stored by popular web browsers. Most web browsers store the login credentials for visited websites so that user don’t have to remember and enter the password every time. Each of these web browsers use their own proprietary encryption mechanism to store the login passwords including Twitter account passwords.TwitterPasswordDecryptor automatically crawls through each of these browsers and instantly recovers all of the stored Twitter passwords.

Here is a trick to download files from 4shared.com without login or having a premium account with high speed .

Here is a trick to download files from 4shared.com without login or having a premium account with high speed. Hope you like it...

Go to the download link.Now you have to edit the download link as :

" What happens on the web in 30 seconds ! "

The world of internet every second happening something new. That we cant imagine normally here is the list in brief . 

-20,400 GB of global IP data transferred.
-70+ BotNet Infections.
-12 New victims of identity theft.

Wednesday 19 June 2013

HOW TO HACK WEBSITE USING GOOGLE ?


TODAY WE LEARN HACK A WEBSITE USING GOOGLE.
---------SO LET'S START---------

4 best website that will help to find missing dll files ?

There Have been a lots of situations that You get a missing DLL Files Error When Trying To install A software or maybe A game .and one of the most famous of the missing DLL files errors You receive is :

(Msvcr71.dll is Missing)
(D3dx9_41.dll is Missing)
(OPENAL32.DLL is Missing)

How to fix Package file is invalid error on Google Play Store ?


1.Go to settings.

2.Head over to applications.

3.Open all applications/manage applications.

4.Move onto Google Play Store.

Tuesday 18 June 2013

How / Where / What Do I need to Do start Hacking ?

Alot of people ask “How do i learn hacking?”, “Where do i start?”, “How do i become a hacker”… and so on. I answered the question a million times. Now we all can just give them this link to my blog. ^^ This is my opinion about everything. Others might think about it in a different way. Eat it or just throw it away.

Backtrack5 : Using Armitage For Hacking.

What Do We Need ?
Latest Metasploit framework.
Oracle Java 1.7
Preferably Internet on LAN
Brains and Patience.

Basic Linux Commands (very useful for linux students)

Modes of Operation

The linux operating system used for the PARTICLE DAQ system can be used either in a terminal mode where you type commands or in a Windows Explorer style graphical user interface (GUI).

The Explorer-like GUI can be used for file manipulation functions (e.g., copying a file to a floppy) or deleting or moving files on the disk. It cannot be used to run the PARTICLE DAQ itself.

Best Tools to Bypass Firewalls and access blocked websites

With more and more institutions going online, they are also realizing that their employees or students are spending more time online for their personal usage, they have been spending on firewalls to restrict this usage. This series is about the tools and techniques that still work on these firewalls to help you to circumvent across them to your destination websites.

10 Tips for Total Online Security.

With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.

5 Best Puzzle Games for Android Smartphones .

Puzzle games are always a good source of entertainment whether it is played on a personal computer or on mobile phones. Nowadays there are so many types of puzzle games that are offered on the internet. These games are simple in graphics but are very interesting and addictive, you can play for hours.These games can make your brain sharp and improve your problem solving abilities. There are hundreds of puzzle applications for your mobile phones. Below are the 5 most popular applications for android based smartphones:

Fight for the Future - NSA (ARTICLE)

The entire world is talking about the leaked documents -- and the interview with heroic whistleblower Edward Snowden -- that show definitive proof that the U.S. Government has been using the Internet to watch, record, and track huge numbers of innocent people from every corner of the globe. They have our phone calls, know where we are, and what we'll be doing.

How to secure your smartphone from hackers ?

How to secure your smartphone from hackers...

1. Use Passcodes Everywhere:

Whether you have an Android phone or an iPhone, you can prevent access to your device by adding a passcode or a lock pattern on Android. This simple security measure can save tour sensitive information This is especially important if you have a bunch of apps installed where personal data is stored like financial apps (Mint,bank apps, etc), note apps etc.The home screen passcode is important because a lot of the email apps (Mail on iPhone and Gmail on Android) don’t even have an option to passcode your email. Emails can
contain a lot of private information and since most people go to parties and leave their phones on tables and counters. Sp passcode is necessary.

Add Your Name (or) Application to right click Of My Computer Caution .

Add Your Name (or) Application to right click Of My Computer Caution ..
As it is related to Windows registry it can be dangerous so,Try this at your own risk
To write your name on right click application please follow the steps.

Monday 17 June 2013

Manually Hide any file in JPEG

Hello Friends, now i am going to explain you how to hide any file behind the JPEG image manually that is without any software. Its a very easy trick and also very useful if you want to send information secretly to your friend. Also its different from stenography as it does hides text behind images or text behind mp3 files. Its universal, you can hide any file, virus or Trojan or anything behind image using this trick

How To Hack Wi-Fi Network:

Note : Only For Educational Purpose.>!!!

1) First we need to scan for available wireless networks.
Theres this great tool for windows to do this.. called “NetStumbler” or Kismet
for Windows and Linux and KisMac for Mac.

The two most common encryption types are:
1) WEP
2) WAP

HOW TO SET YOUR OWN FTP SERVER ?

This is a full tutorial for creating you're very own FTP.
The first thing to do is to go to
Code:
www.no-ip.com

Register free at the page. (follow all the instructions you get there)
Look at the top, and you see the Host Search. Write the name you want, and press Go! Then download the program called No-IP on the site, or use this:

What is a DOX?

A DOX is a gather of somebodies personal information (Family members, where they reside, pictures, numbers and School they attend if not at school - work or university.

DOXing is a very powerful/ useful knowledge to have. My close friend got infected, I removed the RAT from his computer. I switched the scenario around to him spending over $100 dollars off his mums Credit Card for our own personal use, I called his mother and made her aware that he was hacking and doing blackhat activities. I heard her yelling and screaming on the phone. I warned him he would have to compensate for the issues that he caused my friend. Saying "You've done the wrong thing, my friend. I'm going to have to call the Feds and maybe you'll learn your lesson this way."

What is SQLi ?

The Structured Query Language injection (SQLI) is the internal interface between an application and the Online Web Server.

Are you Confused because of lots of technical jargon's?

I will make it simple. Basically a web hosting saves ALL its information in a table format known as Database. So all the usernames and password for accessing the web hosting will also be saved in the very same format. So SQLi is an interface where the user sends a query and the database gives an automated reply. So we will use this method to get the information about the admin's username and password, hence we get to access the complete web server.

HOW TO READ BAR CODES... (everyone must know)

ALWAYS READ THE LABELS ON THE FOODS YOU BUY--NO MATTER WHAT THE FRONT OF THE BOX OR PACKAGE SAYS, TURN IT OVER AND READ THE BACK CAREFULLY!

With all the food and pet products now coming from China, it is best to make sure you read label at the supermarket and especially when buying food products. Many products no longer show where they were made,only give where the distributor is located. The whole world is concerned about China-made "black-hearted goods".

Lock Your Private Files

All of us want to hide our personal data on our PC but mostly all those software which do so are general costly. But we can also make our own Private Program using notepad. So, just do these steps :
Step 1: Open notepad.
Step 2: Copy the following code in notepad file :

What is BRUTE-FORCE attack ?

A password attack that does not attempt to decrypt any information, but continue to try different passwords. For example, a brute-force attack may have a dictionary of all words or a listing of commonly used passwords. To gain access to an account using a brute-force attack, a program tries all available words it has to gain access to the account. Another type of brute-force attack is a program that runs through all letters or letters and numbers until it gets a match.

What is DNS Poisoning?

Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address. When a Web user seeks the page with that address, the request is redirected by the rogue entry in the table to a different address. Atthat point, a worm , spyware , Web browser hijacking program, or other malware can be downloaded to the user's computer from the rogue location.

Countdown Timer for Shutdown Computer Automatically

Countdown timer for shutdown computer:

Many a times people like to sleep on music, but the problem is that the comp will continue running the whole night. Here is how you can create a countdown timer to shutdown your comp in your specified time.Go to run in start menu and input this command :-

Proxies vs. VPN – What’s the difference?

Proxies vs. VPN – What’s the difference?
----------------------------------------------
The purpose of using both VPN and proxy servers is to conceal the users identity, or to spoof a certain geo-location (so for example geo-locked services such as many TV streaming websites may be watched outside their country of origin). Many VPN Providers, in addition to offering VPN also provide some kind of proxy service, and there are also many public proxy servers which can be used for free.

Sunday 16 June 2013

Here Is An Article On # tags That Facebook Recently Introduced !!

Here Is An Article On # tags That Facebook Recently Introduced !!

Twitter # officially has became part of Facebook now . The change means hashtags are now clickable tags on the biggest social network, allowing users to quickly see what other people are saying about it. Facebook is also making hashtags searchable, even if they originate on different services, such as Twitter, Tumblr, Pinterest, Google+ and Instagram. From the Hashtag feed you can also compose posts directly. For newbies, however, there are a few things to keep in mind. Here’s how to get started with hash tagging your News Feed.

OF GOOGLE GLASS AND HMDS

Maybe you have heard of Google Glass? Glass is an amalgamation of technologies old and new, and one that Google hope will usher in an age of practical head-mounted-displays (HMD), augmented reality (AR), and a brand new revenue stream. The Glass fuses a 1.3 cm display in to the frame of a pair of Glasses.


Hide 'Seen' And 'Is typing ' feature in Facebook !!!

Hide 'Seen' And 'Is typing ' feature in Facebook !!!

When seeing this feature for the first time, it was like 'Wow a great feature..!', but when Privacy is concerned, no one needs it. This 'seen at' feature is great one to confirm whether your friend saw this message or not, but it is quite uncomfortable when others get to know that you have seen their message and not yet replied. Especially, in case of the one you wish not to talk with.As soon as this 'seen at' feature was added to facebook, many addons & extensions were released to save people's privacy by hiding this feature. Unfortunately, leading browsers deleted those addons in the name spam.

HOW TO AUTO LOGOUT FROM FACEBOOK AFTER A CERTAIN TIME ??? (Fire Fox Only )


   HOW TO AUTO LOGOUT FROM FACEBOOK AFTER A CERTAIN TIME ??? (Fire Fox Only )

Hello geeks , today im gonna teach you how to auto logout from facebook after a certain time. We will be ad addon which will help you to set a time after which your account will be automatically logged out from Facebook. Ok here we go

Friday 14 June 2013

How to Earn 100$ per day with Adsense !

This summary is not available. Please click here to view the post.

Metasploit Nmap Version

For those of you wondering why metasploit uses nmap 5.61 instead of 6.01 when you do
an nmap scan in metasploit its because metasploit has its own nmap built in and the metasploit devs haven't upgraded it yet if you want to use Nmap 6.01 in metasploit do the following.

Online Penetration Testing Tools [Private]



Word Press
Remote Code Execution , BruteForce via IP , Theme ScaNne via IP , Theme ScaNne , Site Extracte.  
Joomla
Turbo Brute Force , Token ScaNe Server, ScaNner Site Extracte,
vBulletin 

How to Export Hidden e-mail ID’s of Your Facebook Friends

How to Export Hidden e-mail ID’s of Your Facebook Friends

1. First go to the Yahoo
service from here
address.yahoo.com

How to find someone's chat history Facebook source code ??

How to find someone's chat history Facebook source code ??

1) Login to your facebook profile.
2) Now go to "http://www.facebook.com/" Or alternatively you can click on "home" button.
3) Right-click on any blank part of page and select "view page source" or alternatively open "view-source:https://www.facebook.com/" in a new tab of your browser.
4) Now search for "InitialChatFriendsList" in source code.

Thursday 13 June 2013

How To Send Notes That Will Self Destruct After Being Read ???


How To Send Notes That Will Self Destruct After Being Read ???


Sending confidential information such as password, account information and other sensitive data in emails is not necessarily safe. The data is typically stored with remnants of the bits in place you dont need it to be .

Privnote is a free web based service that allows you to send top secret notes over the internet. Its fast easy and requires no password or user registration at all.


We make super websites ....


Sunday 9 June 2013

How To Make a crypter ? Learn Hacking Online

How To Make a crypter ?

What you will need:
Visual Basic 6 or Visual Basic 6 Portable
A RC4 module
A brain

The RC4 module and Visual Basic 6 Portable will have the download links at the end of this tutorial.


Real-World Security Tests Using Metasploit

 Real-World Security Tests Using Metasploit

The Perl-based Metasploit was designed to be a robust exploit development system. It just so happens that you can use it to run previously developed exploits against your own systems. You can use its security testing features to see if your systems vulnerable to penetration and how they react when specific payloads are sent their way. 


Saturday 8 June 2013

How To Change Your Ip In Less Then 1 Minute

How To: Change Your Ip In Less Then 1 Minute


1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.


How to recover deleted photos from your digital camera with DeleteFIX?

How to recover deleted photos from your digital camera with DeleteFIX?


* Download and install DeleteFIX Photo.
* Connect your camera to your computer.
* Run the software and follow the simple instructions in the program's window. View how this digital photo recovery software works with images.


Amazing!!! 15-year-old Jonathan James once hacked NASA

Amazing!!!  

Make Your Keyboard Type (Any) Message Continuously - VBS Trick


Make Your Keyboard Type (Any) Message Continuously-VBS Trick


 This VBS trick can make any of your friend's keyboard type any message continuously. Open Notepad, copy the code given below and save the file as Tricks.vbs or *.vbs. You will need to restart your computer to stop this. Try this after closing all important programs.





Wednesday 5 June 2013

50+ Serial Keys For Popular Softwares !!! Enjoy:)

50+ Serial Keys For Popular Softwares !!

Ok guys today i present you 50+ Serial Keys For Popular Softwares. Im not sure whether it works or not so dont abuse me :p Jst Try it.
Got it some where so wanna share wid u guys :D

Sunday 2 June 2013

List Of Facebook Shortcuts

List Of Facebook
Shortcuts

Alt+m Or Shift+Alt+m New Message

Alt+0 Or Shift+Alt+0 Help Center

Alt+1 Or Shift+Alt+1 Home Page

Alt+2 Or Shift+Alt+2 Profile Page

Alt+3 Or Shift+Alt+3 Manage Friend List

Alt+4 Or Shift+Alt+4 Message List

How To Post Invisible Status On Facebook !!!

Here is a post on how to publish single line or multiple line blank status on Facebook. You can also use this method in Facebook comments. So lets get started.


FOR SINGLE LINE BLANK STATUS

Copy below codes into your status

@+[275671082513166:0]