Usually if you create malicous programs(virus,spyware…), the antivirus will detect easily. It will scan the source code. if it finds the malicious source codes, then it will alert as “virus”. To know more details about antiviru program read this article:
How does Anti Virus detects viruses
I...
Create any type of invitaion cards using microsoft word templates. Microsoft office provides some good templates for you.
Get invitation templates from here.
http://office.microsoft.com/en-us/templates/CT010104323.aspx
I got this template from there only.
Realtime-spy
Now monitor any system remotely using the real time spy tool. This real-time spy provides webspace to store the log details. It can log whatever the target is doing or viewing.
Miscellaneous:No need of Physical Installation
This can record the following
All Keystrokes Typed
All...
Let us the assume this situation: You far from your pc, you want some data files urgently that is in your pc. What will you do? You have to go home and bring it, it may take too much time.
This can fixed by uploading all files in some private hosting service. So you can access it from whenever...
Here is list of anonymous and high anonymous proxy server. There proxy ip address are manually checked by me.
58.254.134.201 :8080
46.160.145.29 :8090
96.255.68.19 :8080
46.181.201.214 :808
69.163.96.2 :8080
195.145.22.46 :80
210.48.147.82 :80
217.172.179.50 :80
89.188.141.51 :80
If a website newly registered in internet world, it may not be loaded in your computer. For example, you register for example.com yesterday, still you may not see your web page. This is problem of DNS cache. Your local DNS cache is old one so it won’t know the newely available domain names...
Microsoft is offering reward of $250,000 for providing identification, arrest and criminal conviction of the individual(s) responsible for controlling the Rustock bot net
This Rustock bot net enslaves around 1 million computers and force them to generate billion of spam mails. It is able to...
Some particular malwares infect the user computer and try to send traffic to Google through a small number of intermediary servers called “proxies.” Google found some unusual traffic while performing routine maintenance on one of their data centers.
After Google is collaborating with...
Today let us start our article with conversation.
What is RATs (Remote Administration Tools)?
N00b: Hello BreakTheSec, i heard a new Keyword RATs in hacking world? what is it? I know only about this rats.
BreakTheSec: RATs are known as Remote Administration Tools. I hope you understand what it...
Want to make your friend shock? Call your friend from their number and make them shocked. Now i will explain you how to do that
Steps to Follow:
1. Go to http://www.mobivox.com and register there for free account.
2. During registration, remember to insert Victim mobile number in “Phone...
Can’t you delete any un wanted files? Then this hack will help you to delete those type of files.
Open a Command Prompt window and leave it open.
Close all open programs.
Click Start, Run and enter TASKMGR.EXE
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open...
1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP...
NSDECODER is a automated website malware detection tools. It can be used to decode and analyze weather the URL exist malware. Also, NSDECODER will analyze which vulnerability been exploit and the original source address of malware.
Functionality:
l Automated analyze and detect website malware...
“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” – Gene Spafford
100 % secure
If you are thinking that you are 100 % percentage, then You may not know the real truth. Let me explain you how you are...
Keyloggers and Trojan can be onlye exe file so victims may be easily find it is some other softwares. Here is tutorial to bind the keylogger or trojan with the Image files(jpeg,gif) or movie files.
What is binder software?
A Binder is a software used to bind or combine to or more files under...