Thursday, 30 August 2012

Enter a windows XP without entering the password in the log on screen

Here is a trick from which you can access any friends computer physically without entering there password on the log on screen.This works only on WINDOW XP Operating Systems.Start your Computer and wait for User Log In Screen to appear After  Turning On the computer  Now Just Press the following Keys---> Alt+Ctrl Button and Two times Delete Butto...

Get Free Blogger Followers

Tired of Requesting others to follow your site. Now you can get free blogger followers.     Here's what you have to do.  1. Join my site by clicking on the "join this site button...

Wednesday, 29 August 2012

CREATE BOOTABLE WINDOW

USB: Requirements  Windows 7 or Vista ISO  Pen drive with 4GB+ (2 GB is sufficient for XP)  15 Minutes of free time #WinToFlash Tool Procedure: 1. Insert your USB flash/pen drive to your system and backup all the data from the USB as  your USB drive will be formatted during the process.  2. Now download software WinToFlash tool (free). (FROM google) 3. Run the tool, and browse to your Windows 7, Vista, or XP  DVD files (make sure that your USB drive letter...

Monday, 27 August 2012

Understanding The /etc/Password File Format

Can you explain /etc/passwd file format for Linux and UNIX operating systems? /etc/passwd file stores essential information, which is required during login i.e. user account information.  /etc/passwd is a text file, that contains a list of the system’s accounts, giving for each account some useful information like user ID, group ID, home directory, shell, etc.  It should have general read permission as many utilities, like ls use it to map user IDs to user names, but write access only for the superuser (root).  Understanding...

Hacking Updates, How To Tutorial, Linux Hacking — March 22, 2012 7:24 pm How To: Upgrade To Ubuntu 12.04 from Previous Versions

Ubuntu 12.04 beta is out now and everybody is excited. It has cool new features and some major changes. Banshee Media player has been replaced from Rhythm box Media Player, having some changes in Unity and sidebar. It could be a good option to upgrade from your previous version of Ubuntu to Ubuntu 12.04. Although stable version of Ubuntu 12.04 is going to be release on 26 of April. Now How To: Upgrade to ubuntu 12.04 There are many ways...

How To DeActivate Facebook Timeline

Hello Guys, This is Tajinder and today again I am come up with another tutorial, Recently Facebook launch new Timeline feature but most of the people don’t like this timeline andI got many emails and queries that how can we deactivate or disable this timeline…So I am gonna explain some of the techniques to disable Facebook Timeline. 1. FOR GOOGLE CHROME USERS ...

Sunday, 26 August 2012

How To Download Facebook Video

Have you ever notice that you cant download those video's which are posted by your friend on Facebook ? Oh..!!Yes you did that's the reason you are here .By the way this Post is all about Downloading Videos .Before starting i have one question for you guys ? You know how to download YouTube video from your mobile browser without using any software ? If you don't know then check must read this post...

Bluejacking :: Bluetooth+Hijacking

Hello friends, This is Rahul and I am coming up with article of BlueJacking which is a Bluetooth hack for fun and profit. Well the name given to BlueJacking is Hijacking Bluetooth network to harm someone, so the Bluetooth+Hijacking is known as BlueJacking. Jacking is, however, an extremely common shortening of hijack, the act of taking over something. BlueJacking is one of the mostly harmless activity can happen with any multimedia...

Thursday, 23 August 2012

Ban/Disable Shutdowns : A trick to Play on Lamers

This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box.  This trick involves editing the registry, so please make backups before u do this. Now Open Notepad and Type this....

Use any Sim in any Modem without unlocking it

We all know that, we cannot use any sim in any modem without unlocking the modem. But its now possible by using Nokia PC suite. Follow the Steps : 1) Insert the sim inside the modem and connect it to the PC. 2) It will display the message as invalid sim, ignore that message and Open the Nokia PC suite. 3) Click on Connect to Internet option in PC suite.  4) Goto Configure. Select your data card modem,and make all operator apn setting...

Tuesday, 21 August 2012

Some Key Board Tricks and FUN?

Keyboard Tricks Alt Key + Calculator Number = Symbol.To create the ® symbol Alt + 0174 = ®Alt Key + Number = Symbol130 = é [accent over e ]0176 = ° [degrees for Temperature]0169 = © [Copyright]0174 = ® [Registered Trademark]0153 = ™ [Trade Mark]155 = ¢ [cent sign]156 = £ [Pound Sterling]0165 = ¥ [Japanese Yen sign]0128 = € [Euro symbol]0190 = ¾171 = ½172 =...

Run Commands

START >> RUN Accessibility Controlsaccess.cpl Add Hardware Wizardhdwwiz.cpl Add/Remove Programsappwiz.cpl Administrative Toolscontrol.exe admintools Automatic Updateswuaucpl.cpl Bluetooth Transfer Wizardfsquirt Calculatorcalc Certificate Managercertmgr.msc Character Mapcharmap Check Disk Utilitychkdsk Clipboard Viewerclipbrd Command Promptcmd Component Servicesdcomc...

Trick to play PacMan Game on Google

To play PacMan Game on Google go to http://google.com/pacman...

Disable Automatic Update of Google Chrome

Google chrome has very quickly gained popularity thanks to its speed,minimal design,nice interface.The development of the browser is also taking place at rapid speed.After every few weeks there is a new version of chrome that is launched. Most of you are not even aware when your google chrome gets updated with its silent updater.For heavy computer user’s this can be a waste of memory as google updater stays in the memory silently.This can also...

how to convert any Folder to ISO Image File

An ISO image is uncompressed archive which contains all the files of the DVD or CD from which it is copied.These ISO images can be easily burned to DVD or CD’s.They can also be mounted so that computer will treat them as a actual optical disk.If you want to create a bootable DVD/CD for your windows operating system then you have to create an ISO image of the windows Setup before burning it to DVD/CD.There are large number of...

Hack a website using remote file inclusion

Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. If the attacker gets successful in performing the attack he/she will gain access to the web server and hence can execute any command on it. Searching the Vulnerability Remote File inclusion vulnerability is usually occured in those sites which have a navigation similar to the below one www.Targetsite.com/index.php?page=Anything To...

Sunday, 19 August 2012

Introduction to linux

1. What is Linux? Linux is a free Unix-type operating system for computer devices. The operating system is what makes the hardware work together with the software. The OS is the interface that allows you to do the things you want with your computer. Linux is freely available to everyone. OS X and Windows are other widely used OS.                                                    ...

Universal USB installer

Universal USB Installer is a Live Linux USB Creator that allows you to choose from a selection of Linux Distributions to put on your USB Flash Drive. The Universal USB Installer is easy to use. Simply choose a Live Linux Distribution, the ISO file, your Flash Drive and, Click Install. Other features include; Persistence (if available), and the ability to fat32 format the flash drive (recommended) to ensure a clean install....

Facebook hacking : remote file inclusion

Facebook being the world’s largest social networking website has became the major target for the hackers, attackers and other malicious users. Facebook has hired the team world’s leading security experts in order for them to improve their website’s security. Moreover facebook also pays 500$ to any one who can identify any sort of vulnerability inside facebook. The facebook security team has done a very great job in improving and taking facebook’s security to the maximum level. However, the problem is that Facebook applications are not coded...

Facebook security bug bounty

Facebook is the most recent company to come to the bug-bounty party, officially announcing recently that- “To show our appreciation for our security researchers, we offer a monetary bounty for certain qualifying security bugs.” Here’s how it works: Eligibility: To qualify for a bounty, you must: Adhere to our Responsible Disclosure Policy Be the first person to responsibly disclose the bug Report a bug that could compromise the integrity or privacy of Facebook user data, such as: Cross-Site Scripting (XSS), Cross-Site Request...

Input Validation attacks

Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.The most common input validation attacks are as follows-1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions.To execute...

Saturday, 18 August 2012

What is DOXING and its Uses...

First, let me explain what Doxing is ? Doxing is the process of gaining information about someone or something by using sources on the Internet and using basic deduction skills. Its name is derived from “Documents” and in short it is the retrieval of “Documents” on a person or company. You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is...

Disabling Copy and Select Function in Blogger

Writing articles and posting them sure takes a lot of time. Writing doesn't just involve typing, but collecting resources from different sources to get a neat and complete post.However copying and pasting it on different site takes a couple of minutes. An incident like this happens to be like a blow to the face of the writer.So in order to protect content from getting rewritten anywhere in any other form then the function for selecting and copying must be disabled. So here is the tutorial on disabling them.Tutorial...

Facebook Shortcuts For Mozilla and Chrome

Firefox Facebook Shortcuts :- Shift+Alt+1: View your News Feed Shift+Alt+2: View your own Profile Shift+Alt+3: View pop-up of friend requests Shift+Alt+4: View pop-up of messages Shift+Alt+5: View pop-up of notifications Shift+Alt+6: View Account Settings Shift+Alt+7: View Privacy Settings Shift+Alt+8: View Facebook’s own profile Shift+Alt+9: Read latest Terms of Service agreement. Shift+Alt+0: Open Facebook Help Center Shift+Alt+?: Search Shift+Alt+m:...

Create folders in My computer

Create your own custom system folder, like "My Documents", that can not be deleted or renamed and place it on the desktop and My Computer.Create the following series of keys and values in the registry at [HKEY_CLASSES_ROOT\CLSID] or [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID]. The GUID, globally unique identifier, can be a random number, in this example "FD4DF9E0-E3DE-11CE-BFCF-ABCD1DE12345" is used. Create a new key called [HKEY_CLASSES_ROOT\CLSID\{FD4DF9E0-E3DE-11CE-BFCF-ABCD1DE12345}] and set (Default) to equal the name of the folder...

Tuesday, 14 August 2012

3 Basic Ways to Tell Your Computer Has Been Hacked

Learning how to hack into the accounts of individuals is really convenient and pretty cool—but when the tables get turned around and you become the "hackee"—yeah, not so cool any more. Thankfully there are some clues that may suggest you are the victim of being hacked. To learn what they are, continue reading below.1. It Seems as Though a Ghost Lives Inside Your Computer.  If you start noticing that your computer starts to act strangely, almost paranormal like—for example maybe the cursor starts to move on its own, emails that you know...

7 Things You Should Know About Online Passwords

As online technology has advanced, so have hackers techniques for getting into your accounts and stealing personal information. If you’re still using the same password you made up when you opened your first email account, you are setting yourself up to be a hacking victim. But don’t worry; read on and learn how to set those Internet geniuses-gone-wrong up for failure by knowing the essentials about online passwords. 1.You need different passwords for each site Since passwords are so hard to remember and you...

List of websites to check whether website is safe to use or not

To make sure whether site is free from malware or not, we have to verify the target-link with few more sites.Here ,i list out some websites that helpful to identify whether site is safe or not : 1.My Wot: WOT is a community-based, free safe surfing tool for browsers that provides website ratings & reviews to help web users as they search, surf & shop online.website: www.mywot.com2.Virus Tota...

Sunday, 12 August 2012

How do i block and unblock internet sites

Some times it becomes necessary to block and unblock internet website on our Computers for one or other reason.Procedure to block an unblock internet sites: Go to Start and type RUN . Type C:\WINDOWS\system32\drivers\etc Open the file "HOSTS" in a notepad Under "127.0.0.1 localhost" . Add IP Name IP - IP of the site to be blocked Name - Name of the site (see the pic below for example Example :127.0.0.1 localhost210.210.19.82 www.sifymall.comSifymall is now unaccessable . For every site after that you want...

How To Gain Airtel PUK Code

PUK Code : It is related to your Sim which helps you to lock the phone. Its even in the Nokia 1110 . So many kids miss understand this and thus they lock it without knowing its effects, The effects are: You will loose all your data like contacts and other stuff . And also if you enter the PUK code wrong more than 10 times your sim will itself get blocked! and no one can call you or Message you . This is the method you’ll have to use to get your PUK code You’ll need: A PUK code asking sim of course. And you’ll an another sim of airtel...

Saturday, 11 August 2012

COMPRESS 1GB FILE TO 10MB EASILY USING KGB ARCHIVER

Compressing your file shouldn't be a problem again as a software has been developed to help you do that. Imagine having a flash of 2GB and you wanna copy a file of 5GB to it, you know that won't be possible. But with the help of this new software, you can achieve that without the file be corrupt. KGB Archiver is a free open source software that can compresses 1GB File to 10MB file. KGB Archiver runs on Windows OS and Linux. Compression ratio of this software is very high. Time due to high compression levels, to compress a file goes high...

Friday, 10 August 2012

See 911 attack on notepad

Now the attack of World Trade Center can be seen on a simple Notepad file. Let’s begin this trick with the bit of information – The flight number of the respective flight that hits twin tower was Q339. However,  new notepad versions change it recently. So you have to change 9 to N.  Now let’s begin this interesting trick: Open a new notepad file. Type Q339 Increase the font size to 72 Change the font type to “Wingdings”    I...

How to crack WPA/WPA2 Password

Introduction Hello and welcome to my tutorial about wireless networking. Today I’ll be teaching you how easy it is to obtain access to a wireless protected network by cracking the Wi-Fi network’s password. There are lots of questions coming from the beginners on how to get  WPA/WPA2   password and accessing neighbor’s connection. I will be covering all of the aspects and ways of hacking a network and gaining access to the...

How to Crack wifi network’s password (WEP)

Wireless Hacking Using Backtrack Introduction Hello and welcome to my tutorial about wireless networking. Today I’ll be teaching you how easy it is to obtain access to a wireless protected network by cracking the Wi-Fi network’s password. There are lots of questions coming from the beginners on how to get  WEP/WPA/WPA2   password and accessing neighbor’s connection. I will be covering all of the aspects and ways of hacking...