Sunday, 28 October 2012

How to Close Open Ports

Trojans are backdoor programs that create a connection with the help of open ports many of us are suffering from Trojans.they are one of the dangerous weapon for hackers.

If a hacker install a Trojan on your computer then he can do anything with your computer while sitting to thousands of km far away from your computer.After a successful installation of Trojan hacker can use your computer as a Zombie computer and can do any kind of illegal work with your IP address Or even can able to delete your valuable data.




Trick to create empty Huge File


Here's the step by step guide to create a Empty Huge File :



  1. First we have to convert the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this.To use Windows calculator in scientific mode Open calculator,click on view and select Scientific instead of Simple.

    Suppose you want a file of 1 million bytes.
    Enter 1000000 in the calculator and click on the Hex option to convert it (1 million in hex is F4240.)

    Pad the result with zeroes at the left until the file size reaches eight digits—000F4240.

Friday, 26 October 2012

Domain Hijacking

Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).

The operation of domain name is as follows :

Facebook Web Search Coming Soon?

The web is all about the queries and the results. For all those who like to spend most of the time on internet, surfing and searching Google, you might get a new search engine soon. Whether or not you like Google, you were supposed to use it to make queries and get a pile of results but not now as it seems like competition in search engines is now growing and we now might see a new competitor soon.

Some Mouse Tricks you might not know

Using mouse is very easy and comfortable which is why we use it daily in our lives. But there are some mouse tricks that not all people know, so here is a list of few of them.

1. Vertical Text Selection
This is one trick which 90 % people dont know about this so i am sharing this as not all people know that it is possible to select text vertically in a word editor like MS Office. This trick does not work in simple text editors like Notepad.






Just hold the Alt button before selecting the text with the mouse and this will enable you to select it vertically.

Thursday, 25 October 2012

Ip Commands For Linux Most useful


Display Current Config for all NIC’s:
 ifconfig

Display Current Config for eth0: ifconfig eth0

Assign IP: ifconfig eth0 192.168.1.2

Ping: ping -c 3 192.168.1.1

Assign multiple IP’s: ifconfig eth0:0 192.168.1.2


How To Increase The Battery Life Of Your Laptop


Just recently I've given 3 reason why you should choose a laptop over a desktop. I also state that one of the biggest advantage over desktop is the ability to save energy but how can you save energy if your laptop remains a slave to your wall outlet because it cannot last longer than an hour? here are several means to make your laptops’ battery last longer.

1. Darken your screen

Your laptop screen is found to be the most power-hungry component of your laptop. Your laptop screen needs high amount of battery power to maintain it’s clear and luminous display. To preserve this power you can adjust it’s brightness to a low level.

Best Tips To Secure Yourself From Hacking


you should know to Secure your computer from getting hacked by some.Remember if you follow these guidelines it will be extremely difficult for a hacker to enter into your pc and to hack your data.As today everything from banking,business,studies etc is online so the threat of being hacked is becoming more and more dangerous.Ok,so listed below are the steps you should follow:




1. Do Not Disclose Your IP Address

Tuesday, 23 October 2012

Access your Facebook Account with 3 Passwords


Just recently I've given 3 reason why you should choose a laptop over a desktop. I also state that one of the biggest advantage over desktop is the ability to save energy but how can you save energy if your laptop remains a slave to your wall outlet because it cannot last longer than an hour? here are several means to make your laptops’ battery last longer.

1. Darken your screen

Your laptop screen is found to be the most power-hungry component of your laptop. Your laptop screen needs high amount of battery power to maintain it’s clear and luminous display. To preserve this power you can adjust it’s brightness to a low level.

Friday, 19 October 2012

Disclaimer

The information provided on "http://hackingtalent.blogspot.in/" is to be used for educational purposes only. The website creator is in no way responsible for any misuse of the information provided. 

All of the information in this website is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. 

The word “Hack” or “Hacking” on "http://hackingtalent.blogspot.in/" and on "https://www.facebook.com/hackingspirit" should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk. 

Do you have questions, comments, or suggestions? Feel free to post a comment!

Wednesday, 17 October 2012

Top 5 Best Free Antivirus Software for PC

Nothing is safe in Toady's world of Internet.When your are accessing Internet on your PC, it is exposed to various viruses and malicious attacks. Even a computer that is never connected to the Internet can be infected via a USB drive.We already discussed best antivirus softwares of 2012 , in this article we will take a look at some best free antivirus solutions.

1. Microsoft Security Essentials

The Microsoft Security Essentials application provides real-time protection for your home PC.It safe-guards your PC against viruses, spyware and other malicious software programs.


Autorun.inf virus attack! Is autorun.inf virus?

This is the instructions that saved in the infected(call virus programs) autorun.inf file:

[Autorun] 
Open=RECYCLER\QqFvXcB.exe 
Explore=RECYCLER\QqFvXcB.exe 
AutoPlay=RECYCLER\QqFvXcB.exe 
shell\Open\Command=RECYCLER\QqFvXcB.exe 
shell\Open\Default=1 
shell\Explore\command=RECYCLER\QqFvXcB.exe 
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



Introduction to Autorun.inf File:

Auto run is file that triggers other programs,documents ,other files to be opened when the cd or pen drives are inserted.  Simpy triggers.

When cd or pen drives are inserted, windows will search for the autorun.inf file and follow the instructions of autorun.inf file(instructions have written inside the autorun.inf file).



How to create Autorun file?

Do You Know Who Used Your Computer In Your Absence|Know it

First you should go

“start > run >eventvwr.msc

Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.

For our purposes we want the System log. Click on “System” in the left-hand column for a list of events.




BACKTRACK MENU HACK SCRIPT




Add backtrack tools with optional Backtrack Menu on latest ubuntu version. simple run backtrack menu hack script install backtack tools automatic.







Note: Please do carefully some of tools Dependencies make some time update problem.we are not responsible for any damage.

You can see Youtube TUT


DOWNLOAD backtrack menu hack script

Trick To View Facebook Photos in Full Screen Mode

One Month Ago Facebook Came Up With Photo Viewer . In Revamped Photo Viewer , All Comments , Likes , Tags Were in The Right Side Bar And Photo Was in Left Side . Now Facebook Has Published Out New Photo Viewer . Which Allows Users to View Facebook Photos in Full Screen Mode . 






There Is One Easy Way To View Facebook Photos IN Full Screen Mode .

Beware of Balance Transfer Trick

Hello everyone I am back with a new post " Beware of Balance Transfer Trick for Mobile . " Actually these days on every Page and on every Facebook group i saw one common thing People are making fool of innocent people by using some Balance Tranfer Trick .

Well here is one advice for all of you guys , Don't fall for any trick to get free sms or free unlimited gprs for one month . you might loose your money . Yes this is true . I saw so many Cases where people fell for this kind of trap and lost their mobile balance .


How it happens?

7 Coolest Picture Codes For Facebook Chat


There are lot of Facebook Chat Emoticons codes are available on the Internet. Earlier, I had written an article on Facebook Number Trick to send colourful text messages. These colourful text messages are associated with unique profile ID’s. Now some chat lovers have also discovered new codes to send Heart, Mr. Bean, Jack Sparrow, Superman, Elmo, Troll Face and Mask images which more than 10 times of the image that users send in text messages.

7 Coolest Picture Codes For Facebook Chat

How To Completely Block Facebook On Computer: FB Limiter


If you are following our blog regularly then you may already know that you can block any website on your computer by editing Hosts file.The major advantage of this trick is that you don’t need any addtional software to block websites but it has its own Flaw.Host file cannot block website access through Proxy or VPN network.Lately I have been trying to figure out  perfect solution that is free and can completely block facebook even via proxy or VPN.

FB Limiter is a windows application that can completely restrict access to facebook and Youtube on your computer.It is available in both free and paid versions.The Free version allows only complete blocking of youtube and facebook whereas in paid version you will have the ablity to block or unblock these sites for specific interval of time.

Features Of FB Limiter

Different Types of Malware and How They Work

Malware is a collective term used to represent virus, worms, spyware and other malicious programs out there on the Internet. In simple words, any software program that is intended to cause direct or indirect harm to the computer system is referred to as a malware.
Some malware programs cause serious problems such as destroying the system files, causing disruption to the computer operation or gathering sensitive information while others may only have a light impact such as redirecting websites to pornographic content or annoying the users with pop-ups and banners.
In the normal routine, we have often seen every malicious program being referred to as a virus, but this is not correct! In fact, as mentioned earlier, there exists several malicious programs where virus is one among them. Now, many of you may may be wondering to know what’s the difference between them. Well, this article gives a detailed information on different types of malware that exist, how they work and how they differ from each other:

1. Computer Virus:

As we all know, this is the type of malware that has become highly popular and is one of the most widely discussed topic in the field of computer security. A virus is just a computer program that is designed to take unauthorized control of the infected computer so as to cause harm to the system’s data or degrade it’s performance.

Mode of operation:

Computer viruses operates by attaching themselves to an already existing file or program and replicates itself to spread from one computer to another. In most cases, they tend to infect executable files that are parts of legitimate programs. So, whenever the infected file is executed on a new computer, the virus gets activated and begins to operate by further replication or causing the intended damage to the system.
A virus cannot perform it’s task of harming and replication unless it is allowed to execute. This is the reason why viruses often choose an executable file as it’s host and get attached to them. Viruses are mainly classified into two types:

Sunday, 7 October 2012

Real Hide IP v4.1.1.2 + crack

Real Hide IP is a privacy software which allows you to conceal your IP address, choose IP country and surf anonymously. It can protect your privacy, prevent identity theft, and guard against hacker intrusions, all with the click of a button. Using it, you can conceal your identity online by showing these websites a fake IP which you can choose from different countries in Choose IP Country window, blocking hackers and prying eyes from knowing your true location or identity. You can easily change between fake IP and real IP. When you stop running Real Hide IP, your web browser settings will revert back to normal (without the fake IP). Real hide IP automatically configures your web browser to use our proxy server. You can automatically change your IP address every few minutes or hide your IP address when you start your computerReal Hide IP works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks, and any other kind of Internet connection.

7 Web Security Risks of Not Monitoring Internet Activity

Internet access is one of the most important things you can provide to your users. It’s a morale booster, it helps them do their job (for some it is even a vital component of their job,) it enables them to find solutions to problems, research the competition, find new customers, and more. But Internet access comes with a host of threats and if you are not on top of your web security game, allowing your users to have Internet access may cause just as many problems as it can solve. If you are going to provide your users Internet access, consider these top six web security risks of not monitoring Internet activity, and deploy a web security solution to make sure you don’t regret the generosity to your users.

1. Malware


Friday, 5 October 2012

WINDOWS 7 START BUTTON CHANGER V 2.6



Maybe for your OS Windows 7 users already familiar with this one tool, but may still be many people who do not know what the function of this tool. Windows 7 Start Button Changer is a tool specifically designed to transform your Windows 7 start button. Maybe some of you are bored with the start button-that's only. This software may be able to answer your boredom.





Wednesday, 3 October 2012

How to become anonymous on Internet and access any block site

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. 
Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.
That's why Anchor Free is pleased to offer Hotspot Shield. Our application keeps your Internet connection secure, private, and anonymous.


100% Security Through a VPN

Top 5 Anonymous Tools


Tor Browser

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. And the good thing about tor browser is that you don’t want to install it in your machine.



HOT SPOT SHIED

The Internet connection protector Hotspot Shield encrypts your traffic to protect you from all kinds of spying while your computer communicates with the rest of the world. It's a must-have utility for anybody who uses public Wi-Fi networks, but it's also an excellent tool for ensuring on any network connection that you can access sites and data according to your tastes, and nobody else's. Hotspot Shield's Virtual Private Network services are used by more than 10 million people at the time this review was written, according to the software publisher AnchorFree, making it the largest VPN in the world.