Sunday, 28 October 2012

How to Close Open Ports

Trojans are backdoor programs that create a connection with the help of open ports many of us are suffering from Trojans.they are one of the dangerous weapon for hackers.If a hacker install a Trojan on your computer then he can do anything with your computer while sitting to thousands of km far away from your computer.After a successful installation of Trojan hacker can use your computer as a Zombie computer and can do any kind of illegal work with...

Trick to create empty Huge File

Here's the step by step guide to create a Empty Huge File : First we have to convert the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this.To use Windows calculator in scientific mode Open calculator,click on view and select Scientific instead of Simple.Suppose you want a file of 1 million bytes.Enter 1000000 in the calculator and click on the Hex option to convert...

Friday, 26 October 2012

Domain Hijacking

Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).The operation of domain name is as follows...

Facebook Web Search Coming Soon?

The web is all about the queries and the results. For all those who like to spend most of the time on internet, surfing and searching Google, you might get a new search engine soon. Whether or not you like Google, you were supposed to use it to make queries and get a pile of results but not now as it seems like competition in search engines is now growing and we now might see a new competitor soo...

Some Mouse Tricks you might not know

Using mouse is very easy and comfortable which is why we use it daily in our lives. But there are some mouse tricks that not all people know, so here is a list of few of them.1. Vertical Text SelectionThis is one trick which 90 % people dont know about this so i am sharing this as not all people know that it is possible to select text vertically in a word editor like MS Office. This trick does not work in simple text editors like Notepad. Just...

Thursday, 25 October 2012

Ip Commands For Linux Most useful

Display Current Config for all NIC’s:  ifconfig Display Current Config for eth0: ifconfig eth0 Assign IP: ifconfig eth0 192.168.1.2 Ping: ping -c 3 192.168.1.1 Assign multiple IP’s: ifconfig eth0:0 192.168.1.2 ...

How To Increase The Battery Life Of Your Laptop

Just recently I've given 3 reason why you should choose a laptop over a desktop. I also state that one of the biggest advantage over desktop is the ability to save energy but how can you save energy if your laptop remains a slave to your wall outlet because it cannot last longer than an hour? here are several means to make your laptops’ battery last longer. 1. Darken your screen Your laptop screen is found to be the most power-hungry component of your laptop. Your laptop screen needs high amount of battery power to maintain...

Best Tips To Secure Yourself From Hacking

you should know to Secure your computer from getting hacked by some.Remember if you follow these guidelines it will be extremely difficult for a hacker to enter into your pc and to hack your data.As today everything from banking,business,studies etc is online so the threat of being hacked is becoming more and more dangerous.Ok,so listed below are the steps you should follow: 1. Do Not Disclose Your IP Addre...

Tuesday, 23 October 2012

Access your Facebook Account with 3 Passwords

Just recently I've given 3 reason why you should choose a laptop over a desktop. I also state that one of the biggest advantage over desktop is the ability to save energy but how can you save energy if your laptop remains a slave to your wall outlet because it cannot last longer than an hour? here are several means to make your laptops’ battery last longer. 1. Darken your screen Your laptop screen is found to be the most power-hungry component of your laptop. Your laptop screen needs high amount of battery power to maintain...

Friday, 19 October 2012

Disclaimer

The information provided on "http://hackingtalent.blogspot.in/" is to be used for educational purposes only. The website creator is in no way responsible for any misuse of the information provided.  All of the information in this website is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly.  The word “Hack” or “Hacking” on "http://hackingtalent.blogspot.in/" and on "https://www.facebook.com/hackingspirit" should...

Wednesday, 17 October 2012

Top 5 Best Free Antivirus Software for PC

Nothing is safe in Toady's world of Internet.When your are accessing Internet on your PC, it is exposed to various viruses and malicious attacks. Even a computer that is never connected to the Internet can be infected via a USB drive.We already discussed best antivirus softwares of 2012 , in this article we will take a look at some best free antivirus solutions. 1. Microsoft Security Essentials The Microsoft Security Essentials application...

Autorun.inf virus attack! Is autorun.inf virus?

This is the instructions that saved in the infected(call virus programs) autorun.inf file: [Autorun] Open=RECYCLER\QqFvXcB.exe Explore=RECYCLER\QqFvXcB.exe AutoPlay=RECYCLER\QqFvXcB.exe shell\Open\Command=RECYCLER\QqFvXcB.exe shell\Open\Default=1 shell\Explore\command=RECYCLER\QqFvXcB.exe shell\Autoplay\Command=RECYCLER\QqFvXcB.exe Introduction to Autorun.inf File:Auto run is file that triggers other programs,documents ,other files to be opened when the cd or pen drives are inserted.  Simpy triggers.When...

Do You Know Who Used Your Computer In Your Absence|Know it

First you should go“start > run >eventvwr.msc”Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.For our purposes we want the System log. Click on “System” in the left-hand column for a list of events. ...

BACKTRACK MENU HACK SCRIPT

Add backtrack tools with optional Backtrack Menu on latest ubuntu version. simple run backtrack menu hack script install backtack tools automatic. Note: Please do carefully some of tools Dependencies make some time update problem.we are not responsible for any damage.You can see Youtube TUTDOWNLOAD backtrack menu hack scri...

Trick To View Facebook Photos in Full Screen Mode

One Month Ago Facebook Came Up With Photo Viewer . In Revamped Photo Viewer , All Comments , Likes , Tags Were in The Right Side Bar And Photo Was in Left Side . Now Facebook Has Published Out New Photo Viewer . Which Allows Users to View Facebook Photos in Full Screen Mode .  There Is One Easy Way To View Facebook Photos IN Full Screen Mode...

Beware of Balance Transfer Trick

Hello everyone I am back with a new post " Beware of Balance Transfer Trick for Mobile . " Actually these days on every Page and on every Facebook group i saw one common thing People are making fool of innocent people by using some Balance Tranfer Trick .Well here is one advice for all of you guys , Don't fall for any trick to get free sms or free unlimited gprs for one month . you might loose your money . Yes this is true . I saw so many Cases where people fell for...

7 Coolest Picture Codes For Facebook Chat

There are lot of Facebook Chat Emoticons codes are available on the Internet. Earlier, I had written an article on Facebook Number Trick to send colourful text messages. These colourful text messages are associated with unique profile ID’s. Now some chat lovers have also discovered new codes to send Heart, Mr. Bean, Jack Sparrow, Superman, Elmo, Troll Face and Mask images which more than 10 times of the image that users send in text messages. 7 Coolest Picture Codes For Facebook Cha...

How To Completely Block Facebook On Computer: FB Limiter

If you are following our blog regularly then you may already know that you can block any website on your computer by editing Hosts file.The major advantage of this trick is that you don’t need any addtional software to block websites but it has its own Flaw.Host file cannot block website access through Proxy or VPN network.Lately I have been trying to figure out  perfect solution that is free and can completely block facebook even via proxy or VPN. FB Limiter is a windows application that can completely restrict access to facebook...

Different Types of Malware and How They Work

Malware is a collective term used to represent virus, worms, spyware and other malicious programs out there on the Internet. In simple words, any software program that is intended to cause direct or indirect harm to the computer system is referred to as a malware. Some malware programs cause serious problems such as destroying the system files, causing disruption to the computer operation or gathering sensitive information while others may only have a light impact such as redirecting websites to pornographic content or annoying the...

Sunday, 7 October 2012

Real Hide IP v4.1.1.2 + crack

Real Hide IP is a privacy software which allows you to conceal your IP address, choose IP country and surf anonymously. It can protect your privacy, prevent identity theft, and guard against hacker intrusions, all with the click of a button. Using it, you can conceal your identity online by showing these websites a fake IP which you can choose from different countries in Choose IP Country window, blocking hackers and prying eyes from knowing your true location or identity. You can easily change between fake IP and real IP. When you stop running...

7 Web Security Risks of Not Monitoring Internet Activity

Internet access is one of the most important things you can provide to your users. It’s a morale booster, it helps them do their job (for some it is even a vital component of their job,) it enables them to find solutions to problems, research the competition, find new customers, and more. But Internet access comes with a host of threats and if you are not on top of your web security game, allowing your users to have Internet access may cause just as many problems as it can solve. If you are going to provide your users Internet access, consider...

Friday, 5 October 2012

WINDOWS 7 START BUTTON CHANGER V 2.6

Maybe for your OS Windows 7 users already familiar with this one tool, but may still be many people who do not know what the function of this tool. Windows 7 Start Button Changer is a tool specifically designed to transform your Windows 7 start button. Maybe some of you are bored with the start button-that's only. This software may be able to answer your boredom. DOWNLOA...

Wednesday, 3 October 2012

How to become anonymous on Internet and access any block site

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We...

Top 5 Anonymous Tools

Tor Browser Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. And the good thing about tor browser is that you don’t want to install...