IP

HACKING IS NOT A CRIME FOR US COZ WE ARE ETHICAL HACKER. DON'T USE THIS BLOG MATERIAL TO CONDUCT A CRIME.THIS SITE's CONTENTS ARE ONLY FOR EDUCATIONAL PURPOSE.....

MOBILE VIRUS

Saturday, October 2, 2010

A mobile virus is an electronic virus that targets mobile phones or wireless-enabled Pads.As wireless phone and PDA networks become more numerous and more complex, it has become more difficult to secure them against electronic attacks in the form of viruses or other malicious softwareHistoryThe first instance of a mobile virus occurred in...
ReaD MorE

Techniques Which Make Your Pen Drive BootAble

Friday, October 1, 2010

You can make your pen drive boot able.its really cool suppose their is no cd rom in your computer and you want to format or repair your windows you can do these all just by making your pen drive bootable.Necessary requirements:Your hardware should be compatible (BIOS should be updated).For details just check the link.........CLICK H...
ReaD MorE

BOM SABADO

BOM SABADO!the lattest orkut attack is a kind of XSS attack which attack on the cookies of orkut users and hope fully also stoling their ID and PASSWORD .it work holds the property of worm with some special features.My advise to you all if you people get such type of scrap in your orkut then plezse del it and change the PASSWORD also your...
ReaD MorE

What does a Hacker do?

Sunday, March 28, 2010

some people ask me what does a hacker do so i am going to...........well here's a pretty blunt definition of a hacker, a person who posseses a superior knowledge of anything that has to do with computers and the internet, a hacker has the ability to munipulate everything that he knows, meaning he can create, destroy, take apart, and put things...
ReaD MorE

HOW PHISHERS CAPTURE YOUR PASSWORDS

HOW PHISHERS CAPTURE YOUR PASSWORDS-1: make an account on ANY form hosting site exam. www.FORMHOSTING.com2: open desktop make a login.txt file3: on form host create a new directory its name may be orkut or yahoo4: open the directory5: upload all the three files to this directory6: fake pages a.mail fake page.php. b.mail fake page.html c....
ReaD MorE

SQL Continues

Hacking is an ART to bypass the security mechanisam of a system , network and/or server.I m going to give you some really exelent web sites which you can easily hackhttp://sic.iuic.net.pk/courseware/index.aspid:admin'--pass:admin'--* this sites relates to multan chief minister's.easily hacked by the help of these passwords which are present...
ReaD MorE

Sql Injection Attack

The passwords and the contents which i m giving hear is just for the education purpose please don't play with that it is a highly sophisticated matter.In the world of hackers and hacking this method of exploiting web based services is very common.As the name SQL injection(Structural query language) means definitely we are going to use some...
ReaD MorE

Google Hacking

Application security vendor Fortify reported in 2006 that 20 percent to 30 percent of the attacks it recorded as part of a six-month study came as a result of some form of search engine hacking.Google is not particularly enamored by the efforts of some of its users to use its index for malicious gain."As part of Google's efforts to index...
ReaD MorE

BSNL GPRS Hack

here are the steps to perform:-Logic: the server has a major bug in it, by which it fails to block two simultaneous connections from the phone and establishes a connection with full internet working,Supported devices: all phones with multichannel gprs supportFor connection on your mobile phone:-1) Make two connections like bsnlportal and...
ReaD MorE

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What...
ReaD MorE

How To Break Syskey

Syskey Breaker A little over a year ago I wrote a little tutorial called "Cracking Windows 2000And XP Passwords With Only Physical Access" [0]. It was pretty popular and the data is still useful but in the last year I've found far better ways to crack a SAM file with SysKey enabled. One reason I'm writing this new tutorial is because...
ReaD MorE

Secure Your Windows

Sunday, March 14, 2010

HOW TO SECURE YOUR WINDOWSConfigure your system security.firewallantivirusautomatic updatesMicrosoft uses a file called sam to store the sam data on windows NTSAM(SECURITY ACCOUNT MANAGER)-It stores the hases of password.Protect your sam file use syskey.To enable syskey in windows go to runType syskeysam lock tool will openclick on updatea...
ReaD MorE

How To Break System Password

If you want to break the administrator or any name User's password you just need ERD Commander tool this tool can break the system password means it can break the administrator password you just need to make a bootable cd or bootable usb and boot with this cd you can easily break system password.... you have just follow these steps:---go...
ReaD MorE

Google Fun Tricks

Hey guy's if u got bore to see the old google logo want your name as google logo just follow these simple steps. you got animated and cool logo...Just click on this link http://www.shinysearch.com/.you've been asked for select style just choose style which you want and now give it your name and click on the create custom home page...now you...
ReaD MorE

Enable Multiple Logins In Yahoo Messenger

Tuesday, March 2, 2010

Multiple login in yahoo Without Using any Software1. Go to Start --> Run . Type regedit, then enter.2. Navigate to HKEY_CURRENT_ USER --------> Software --->yahoo ----->pager---->Test3. On the right page , right-click and choose new Dword value .4. Rename it as Plural.5. Double click and assign a decimal value of 1.Its done!!Now...
ReaD MorE

How To Make a USB Key

Find how you can use your USB Stick to lock your Computer, among other things!Tired of people starting your computer when you are not arround and messing up custom settings? Wouldn't it be cool if you could lock your USB stick from it? Read On, and I'll show you how...Boot LockThis trick will allow you to use your USB stick as a key to boot...
ReaD MorE

Folder Lock Without Any S/W

Open Notepad and copy the below code and save as locker.bat. At first time start it will create folder with Locker automatically for u.after creation of Locker folder again click on the locker.bat.it will ask.press Y then Locker folder will be disappeared. again to get it click on locker.bat. and give ur password u will get the folder again.************...
ReaD MorE

Simple Virus Making

Shut Down Your Freind's MobileHere is a new trick to restart ur friends mobile via smswith this trick only 1110,1110i,1112,1100,2100(Nokia) can be restarted.just type,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,or 79 inverted...
ReaD MorE

Bluetooth Hack

Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users...If u want to be an bluetooth hacker then simply...
ReaD MorE

Windows Registry

All initialization and configuration information used by windows is stored in Registry. Normally the keys in the registry are changed indirectly through the Administrative Tools such as the Control Pannel.The Registry can also be altered directly with a Registry editor however some keys can be alter in no other way.Registry Structure:-HKEY_CLASSES_ROOTHKEY_CURRENT_USERHKEY_LOCAL_MACHINEHKEY_USERSHKEY_CURRENT_CONFIGD!$@BlE...
ReaD MorE

Guest To Admin Hack

Sunday, February 21, 2010

Hii guys today I’m going to tell you some basic tips of hacking, you got a Pc in which you got Guest a/c open and don’t know the password of Administrator A/c and you getting frustrated while doing work in the guest or limited privilege a/c .Want to be a powerful like Administrator and break the all limitation of limited a/c user just...
ReaD MorE

Customizing The Look of The Startup

Windows XP has a great new look, but after a while, the new look can get old.With the help of some cool tools and tricks, you can change many parts of Windows XP.Today I will guide you through customizing two parts of your computer, the boot screen and the Welcome/logon screen. You will learn how to replace the boring boot screen with premade...
ReaD MorE

D!$cL@!mEr



Disclaimer – By Reading all these tutorial given below in this blog You agree that this tutorial is intended for educational purposes only and the author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by some other,creative application of this tutorial.In any case you disagree with the above statement,stop here. In this blog some tricks are mine and some of them i read from...