IP

HACKING IS NOT A CRIME FOR US COZ WE ARE ETHICAL HACKER. DON'T USE THIS BLOG MATERIAL TO CONDUCT A CRIME.THIS SITE's CONTENTS ARE ONLY FOR EDUCATIONAL PURPOSE.....

What does a Hacker do?

Sunday, March 28, 2010

some people ask me what does a hacker do so i am going to...........well here's a pretty blunt definition of a hacker, a person who posseses a superior knowledge of anything that has to do with computers and the internet, a hacker has the ability to munipulate everything that he knows, meaning he can create, destroy, take apart, and put things...
ReaD MorE

HOW PHISHERS CAPTURE YOUR PASSWORDS

HOW PHISHERS CAPTURE YOUR PASSWORDS-1: make an account on ANY form hosting site exam. www.FORMHOSTING.com2: open desktop make a login.txt file3: on form host create a new directory its name may be orkut or yahoo4: open the directory5: upload all the three files to this directory6: fake pages a.mail fake page.php. b.mail fake page.html c....
ReaD MorE

SQL Continues

Hacking is an ART to bypass the security mechanisam of a system , network and/or server.I m going to give you some really exelent web sites which you can easily hackhttp://sic.iuic.net.pk/courseware/index.aspid:admin'--pass:admin'--* this sites relates to multan chief minister's.easily hacked by the help of these passwords which are present...
ReaD MorE

Sql Injection Attack

The passwords and the contents which i m giving hear is just for the education purpose please don't play with that it is a highly sophisticated matter.In the world of hackers and hacking this method of exploiting web based services is very common.As the name SQL injection(Structural query language) means definitely we are going to use some...
ReaD MorE

Google Hacking

Application security vendor Fortify reported in 2006 that 20 percent to 30 percent of the attacks it recorded as part of a six-month study came as a result of some form of search engine hacking.Google is not particularly enamored by the efforts of some of its users to use its index for malicious gain."As part of Google's efforts to index...
ReaD MorE

BSNL GPRS Hack

here are the steps to perform:-Logic: the server has a major bug in it, by which it fails to block two simultaneous connections from the phone and establishes a connection with full internet working,Supported devices: all phones with multichannel gprs supportFor connection on your mobile phone:-1) Make two connections like bsnlportal and...
ReaD MorE

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What...
ReaD MorE

How To Break Syskey

Syskey Breaker A little over a year ago I wrote a little tutorial called "Cracking Windows 2000And XP Passwords With Only Physical Access" [0]. It was pretty popular and the data is still useful but in the last year I've found far better ways to crack a SAM file with SysKey enabled. One reason I'm writing this new tutorial is because...
ReaD MorE

Secure Your Windows

Sunday, March 14, 2010

HOW TO SECURE YOUR WINDOWSConfigure your system security.firewallantivirusautomatic updatesMicrosoft uses a file called sam to store the sam data on windows NTSAM(SECURITY ACCOUNT MANAGER)-It stores the hases of password.Protect your sam file use syskey.To enable syskey in windows go to runType syskeysam lock tool will openclick on updatea...
ReaD MorE

How To Break System Password

If you want to break the administrator or any name User's password you just need ERD Commander tool this tool can break the system password means it can break the administrator password you just need to make a bootable cd or bootable usb and boot with this cd you can easily break system password.... you have just follow these steps:---go...
ReaD MorE

Google Fun Tricks

Hey guy's if u got bore to see the old google logo want your name as google logo just follow these simple steps. you got animated and cool logo...Just click on this link http://www.shinysearch.com/.you've been asked for select style just choose style which you want and now give it your name and click on the create custom home page...now you...
ReaD MorE

Enable Multiple Logins In Yahoo Messenger

Tuesday, March 2, 2010

Multiple login in yahoo Without Using any Software1. Go to Start --> Run . Type regedit, then enter.2. Navigate to HKEY_CURRENT_ USER --------> Software --->yahoo ----->pager---->Test3. On the right page , right-click and choose new Dword value .4. Rename it as Plural.5. Double click and assign a decimal value of 1.Its done!!Now...
ReaD MorE

How To Make a USB Key

Find how you can use your USB Stick to lock your Computer, among other things!Tired of people starting your computer when you are not arround and messing up custom settings? Wouldn't it be cool if you could lock your USB stick from it? Read On, and I'll show you how...Boot LockThis trick will allow you to use your USB stick as a key to boot...
ReaD MorE

Folder Lock Without Any S/W

Open Notepad and copy the below code and save as locker.bat. At first time start it will create folder with Locker automatically for u.after creation of Locker folder again click on the locker.bat.it will ask.press Y then Locker folder will be disappeared. again to get it click on locker.bat. and give ur password u will get the folder again.************...
ReaD MorE

Simple Virus Making

Shut Down Your Freind's MobileHere is a new trick to restart ur friends mobile via smswith this trick only 1110,1110i,1112,1100,2100(Nokia) can be restarted.just type,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,or 79 inverted...
ReaD MorE

Bluetooth Hack

Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users...If u want to be an bluetooth hacker then simply...
ReaD MorE

Windows Registry

All initialization and configuration information used by windows is stored in Registry. Normally the keys in the registry are changed indirectly through the Administrative Tools such as the Control Pannel.The Registry can also be altered directly with a Registry editor however some keys can be alter in no other way.Registry Structure:-HKEY_CLASSES_ROOTHKEY_CURRENT_USERHKEY_LOCAL_MACHINEHKEY_USERSHKEY_CURRENT_CONFIGD!$@BlE...
ReaD MorE

D!$cL@!mEr



Disclaimer – By Reading all these tutorial given below in this blog You agree that this tutorial is intended for educational purposes only and the author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by some other,creative application of this tutorial.In any case you disagree with the above statement,stop here. In this blog some tricks are mine and some of them i read from...