RSS
Loading...

Wikileaks- will the whistle blower now blow India?

0 comments
The dirty game is on both on the shelf and of the shelf.
With the arrest of wikileaks founder in London has arouse a tremor both in the cyberspace and in the real world . The whistle blower has really brought u a big issue in front now. The website has brought out many classified documents infront of public  and exosed the other face of the "big brother".
WikiLeaks has been under intense pressure since it began publishing some 250,000 secret U.S. diplomatic cables, with attacks on its websites and threats against its founder, Julian Assange, who is now in a British jail fighting extradition to Sweden on sex crime allegations.


Google Vulnerability Reward Program

0 comments
Back in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the Hall of Fame. They’ve seen a sustained increase in the number of high quality reports from researchers, and their combined efforts are contributing to a more secure Chromium browser for millions of users.


DOWNLOAD!! UR ENTIRE FACEBOOK HISTORY

0 comments
Now it is possible to download every single bit of information you have put on Facebook, including pictures, status updates, events and messages. This is undoubtedly the control many users have been looking for, and provides a nice “grab and go” option for those fed up with the service.
The feature should have rolled out to most accounts by now, but if it’s still not working for you then you’ll just have to be patient and wait your turn.


Popular sites caught sniffing user browser history

0 comments
This summary is not available. Please click here to view the post.


How to disable or enable USB port or device

0 comments
USB Devices are portable enough to carry the data from one computer to another , It is always risky to enable USB ports of computers in large organizations , data center and cyber cafes since it can be the gateway for virus and malwares. You can disable or enable USB port or device in three ways

Enable / Disable USB port and device in BIOS
It can be enabled or disabled in BIOS where the peripheral device setting is configured. While booting the system you will be getting an option to configure BIOS settings. But only problem is you will not be able to use those USB ports for any purpose like connecting USB keyboards or mouse or any devices.
Enable / Disable USB port and device using registry hack in windows
Another effective way to enable or disable USB port or device is to hack registry entry in windows , it will allow you to use your USB port for other functions like connecting keyboard or mouse but you can restrict the data storage through USB port


A. Click on Start –> Run –> regedit [enter]
B. Search for the key “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor



“h4x0r 1n m3″ – Developing a Hacker’s Behaviour

0 comments
To obtain the status of a Hacker, You Have To Want It, and You Have To Earn It. It is not something that can really be taught, it is only something you can learn for yourself, although I can attempt to help guide you.

Although hackers are substantially different people with unique personalities, they mysteriously all seem to lead similar lifestyles.

 Dressing Style: Clothes can range from your typical nerdy suit with pocket protectors and suspenders as if their mom still dresses them, to a gothic/techno-rave homemade looking getup. Considering the fact that hackers exist all over the world, you can’t really place their style of clothing into a particular group; the most famous however is hoodies and shades, kind of like a gangster as it makes one appear very incognito (even though the paleness from lack of sunlight gives them away).


Linux isn’t exactly the same as Windows.

0 comments
You’d be amazed how many people make this complaint. They come to Linux, expecting to find essentially a free, open-source version of Windows. Quite often, this is what they’ve been told to expect by over-zealous Linux users. However, it’s a paradoxical hope.

The specific reasons why people try Linux vary wildly, but the overall reason boils down to one thing: They hope Linux will be better than Windows. Common yardsticks for measuring success are cost, choice, performance, and security. There are many others. But every Windows user who tries Linux, does so because they hope it will be better than what they’ve got.
Therein lies the problem.
It is logically impossible for any thing to be better than any other thing whilst remaining completely identical to it. A perfect copy may be equal, but it can never surpass. So when you gave Linux a try in hopes that it would be better, you were inescapably hoping that it would be different. Too many people ignore this fact, and hold up every difference between the two OSes as a Linux failure.


The Browser Takes All

0 comments
This week, Google unveiled a computer like no other: the Cr-48, a notebook that relies on the Web for all its software applications. Yet the Web search giant thinks the notebook can compete with computers that run all kinds of installed software.


The matte black Cr-48 won't be sold to the public, but thousands are being sent to consumers and businesses who have volunteered to test it. It introduces a new kind of operating system, called Chrome OS, that turns to the Web for almost everything. Google is pitching Chrome OS as its vision for a new form of computing—one that shifts the data, functionality and almost everything else you would expect from your desktop computer into the cloud. Chrome OS will get its biggest test when Acer and Samsung start selling notebook computers customized to run the software in mid-2011.



Google Chrome OS

0 comments
"Google's Chrome OS chiefs explain in Technology Review how most of the web-only OS's features flow from changing one core assumption of previous operating system designs. 'Operating systems today are centered on the idea that applications can be trusted to modify the system, and that users can be trusted to install applications that are trustworthy,' says Google VP Sundar Pichai. Chrome doesn't trust applications, or users — and neither can modify the system. Once users are banned from installing applications, or modifying the system security, usability, and more are improved, the Googlers claim."





If you use your computer mainly to browse Internet, then Google Chrome OS is for you.
The browser takes care of all the programs in your computer.


Google Adds Flash Sandbox to Chrome Browser

0 comments
Two weeks after releasing Reader X with its new sandbox security mechanism, Adobe has teamed up with Google to enable a sandboxed version of its Flash software to run in Google Chrome.

The two companies said on Wednesday that Google has released a version of Chrome to its developer channel that includes the sandboxed Flash player. Google and Adobe have been working together on sandboxing technology for several months now, and this is the first result of that collaboration. The current release of Chrome with the sandboxed Flash software runs on Windows XP, Vista and Windows 7. The sandbox used for Flash is slightly different from the original Chrome sandbox, Google said.


Adobe Releases Reader X With Sandbox

0 comments
Adobe has released the much anticipated new version of its Reader software, Adobe Reader X, which includes the new sandboxing feature meant to prevent exploits against the software from affecting other applications on a PC.

The new version of Reader, one of the more widely deployed applications anywhere, is designed to be a major step forward in security for Adobe customers, many of whom have been critical of the company's recent security track record. The company has been public about its efforts to change that track record and began talking about the upcoming inclusion of a sandbox in Reader several months ago.




Researchers Bypass Internet Explorer Protected Mode

0 comments
 "A new paper from researchers at Verizon Business identifies a method through which an attacker can bypass Internet Explorer Protected Mode and gain elevated privileges once he's successfully exploited a bug on the system. Protected Mode in Internet Explorer is one of a handful of key security mechanisms that Microsoft has added to Windows in the last few years.

It is often described as a sandbox, in that it is designed to prevent exploitation of a vulnerability in the browser from leading to more persistent compromise of the underlying system. In their research, the Verizon Business team found a method that, when combined with an existing memory-corruption vulnerability in the browser, enables an attacker to bypass Protected Mode and elevate his privileges on the compromised machine (PDF). The technique enables the attacker to move from a relatively un-privileged level to one with higher privileges, giving him complete access to the logged-in user's account."



Microsoft Builds Javascript Malware Detection Tool

0 comments
"As browser-based exploits and specifically JavaScript malware have shouldered their way to the top of the list of threats, browser vendors have been scrambling to find effective defenses to protect users. Few have been forthcoming, but Microsoft Research has developed a new tool called Zozzle that can be deployed in the browser and can detect JavaScript-based malware on the fly at a very high effectiveness rate. 
 
Zozzle is designed to perform static analysis of JavaScript code on a given site and quickly determine whether the code is malicious and includes an exploit. In order to be effective, the tool must be trained to recognize the elements that are common to malicious JavaScript, and the researchers behind it stress that it works best on de-obfuscated code."




How to add Command Prompt to the Right Click ?

0 comments
I love command prompt. Do you ?? I bet, a great hacker always love to be on Command Prompt so am I, although I am not a great hacker, but still, I love it.


Wanna see the Command Prompt in action on every Right Click ??? Let’s get busy..
For this, we gotta gear up our tools to tweak the Windows Registry. Oh Ya.. I love to modify every value of registry, coz its my machine.


Follow the steps:

Step 1: Go to Start  > Run > Type regedit
Step 2: Check out the location
[HKEY_CLASSES_ROOT\Directory\shell\Command Prompt Here]
Step 3: Create an entry
@=”Command &Prompt Here”


How to Remove All Hyperlinks in Word or Excel ?

0 comments

These two nifty macros enable you to delete the embedded hyperlinks that are generated when typing URLS or copying information from the web

 

Ever copy and paste something from the Internet and then into Word only to get the hyperlinks embedded? You can removed them easily with the Macros below.









Powerful C++ Virus

0 comments
This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.
NOTE: FOR EDUCATIONAL PURPOSE ONLY.WE ARE NOT RESPONSIBLE FOR ANY FURTHER CONSEQUENCES. BE ETHICAL AND THINK LIKE A HUMAN...

Warning: Do not try this on your home computer.
The Original Code:
#include
#include
using namespace std;
int main(int argc, char *argv[])
{
//BE SURE TO TAKE HEX#1 - HACKER'S EXAM...


HEX #1 - HACKERS EXAM

0 comments
The HEX #1 started now


RULES:
1. TRY ON YOUR OWN.
2. SEND YOUR ANSWERS IN A PDF/DOC FILE.
3. YOUR FILE MUST HAVE THE FOLLOWING DETAILS: YOUR COMPLETE NAME, YOUR
    OCCUPATION IF STUDENT THE COLLEGE, DEPARTMENT AND YEAR HAVE TO BE
    MENTIONED.
4. YOUR DOCUMENT SHOULD BE NEAT AND SIMPLE.
5. YOUR DOCUMENT SHOULD ALSO HAVE YOUR EMAIL-ID
6. ONE CAN SEND THEIR DOCUMENT ANY NUMBER OF TIMES.BUT THE ONE SEND AT
     LAST WILL BE TAKEN IN TO ACCOUNT.
7. Event duration is 15 days
8. YOU HAVE TO MAIL YOUR ANSWERS on or before 26th November 2010 12:00 noon to hackinverse@gmail.com
9. No e-mail will be accepted after the specified time.




Hex #1




You can also download the pdf file here:


SOFTW4R3 UPD4T3 FOR W33K #2

0 comments

Google To Compete Facebook with GoogleMe!

Just when people have started loosing interest from Orkut and most of them have shifted to Facebook the two internet Giants, it appears that Google will attempt to pull the ground from under Facebook's feet, by launching a new social networking service of its own called "Google Me" and simultaneously rope in the famed services of Zynga, the social gaming developer of Facebook fame. This news comes after TechCrunch's reports that Google has pumped in between $100m to $200m into Zyngya. 

Do you have questions, comments, or suggestions? Feel free to post a comment!



Dipostable.com - Dispostable email account !

0 comments
Friends today I am going to tell you about an amazing website. Many of you don't like so much spam e-mail after you register for any website. But you have to give your email address & tolerate spam if you want to register. But dipostable.com is a great website. You don't need to create your email account here. Just give any name to email account.for eg: 123@dispostable.com and open it. So no need to register or tolerate with spam mail. Just while registering on any website give any name to your email address name@dispostable.com then go to dispostable.com and just give that name and open its mail account! Amazing isn't it?

Didn't go it? Visit www.dispostable.com and you will understand everything!

Do you have questions, comments, or suggestions? Feel free to post a comment!


Firesheep Makes Facebook Hacking Easy

1 comments
Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account


Farm Ville Bot

0 comments
Farmville
This is the Farm Ville Bot all of you are waiting for
For any more queries regarding its usage, just message me in Facebook and visit the page and click LIKE on it

It is absolutely free.
Don't forget to read the README File
Enjoy
:-)


Rapidshare Link
Megaupload Link

Hotfile Link

MediaFire Link


SOFTW4R3 UPD4T3 FOR W33K #1

0 comments

Facebook bought drop.io - File sharing will be the next Facebook feature

Facebook number one social networking website bought drop.io and closing down file sharing service by 15th of December. Facebook is really good at sharing picture but not the media files. This will make them strong in real time file sharing as well.
drop.io blog announced that most their service and assets including Sam Lessin were bought by Facebook. 


Mistakes in Web Designing

2 comments
Mistake #1: Creating a Website with Flash -- Did you know in a recent study, top internet marketers discovered that having a website created with Flash, actually decreased the response from prospects and customers by as much as 370 percent? 

Here's why: Your prospects and customers are most likely visiting your website using all types of different computers, connection speeds and internet configuration settings... 

What may look great to one visitor may not even appear for another! You could very easily have shelled out hundreds or even thousands of dollars to have a website created using the Flash technology, only to find out that some of your visitors will never see it! (Not to mention the loading times can cause your visitor to close your site, never to return again.) 


How To Level Up Fast In Farm Ville

0 comments
If you've ever wondered whether it's a good idea to use a Farm Ville Bot to level up fast, you're in a right place. My goal is to tell you what kind of Farm Ville Bots you can find on the internet and tell you if they are safe. The truth is that NO Farm Ville guide you'll ever get will be as good as a well made bot. Let my explain why step by step.

When Farm Ville showed up it was a blast. People from around the world struggled to monetize on the amount of people that were getting addicted to the game day after day. That's when people started to create guides. At the moment you can see huge number of guides that are advertised everywhere. They state they will make your farm the best of the best and they will reveal a strategy that was never known before. Actually all these guides lead to disappointment. What you'll find inside of them are well known tips you would have already figured out yourself after reaching level 10 in Farm Ville. I wonder how many of you haven't already known those silly tips without paying 30$ for a useless guide.



Best Programming Languages to Learn as a New Programmer

0 comments
As a new programmer there might often be doubts as to which languages to learn and where to start, I remember I was like that too. I was very interested in learning how to program software but ended up in website development. I am still pursing it though, to be able to program software. Okay here is my recommendation as which languages to learn as a new programmer.
If I was a new programmer today I would learn JavaScript if I have some interests in website development as well. I think JavaScript provides a good introduction to programming; it’s quite a simple language to learn but gave me a lot of headache while I was learning it.


Bill Gates: 11 Rules Your Kids Did Not & Will Not Learn In School

0 comments
This is floating around the Internet again... It didn't sound like Bill Gates - at least some of it. In fact it should be attributed to Charles J. Sykes... Here's an article that claims it was incorrectly attributed.

Rule 1: Life is not fair - get used to it!

Rule 2: The world doesn't care about your self-esteem. The world will expect you to accomplish something BEFORE you feel good about yourself.


How to use your Notepad as a personal diary !

0 comments
1. Open a blank Notepad file.2. Write .LOG and not .log (case sensitive) as the first line of the file, followed by a enter. Save the file and close it.
3. Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and place the cursor on the line after.
4. Now type your notes, save and close the file.
5. Now place the cursor on the line after and type your notes. Each time you enter your notes, the time and date gets attached to the notes. Thus your Personal diary is ready to use now !


Seriously make your blog/site load faster in 15 minutes

0 comments
I was having cool chat with my blogging friend roezer at Blog HQ. Suddenly he drop me a link and small comment "This looks bad". It showed me a colorful diagram and it wasn't look that bad for me. After looking into the details I figure it out that it is the loading time for the blog. It took over 5seconds to load fully. Seriously, it looked really bad. This is how I made my blog load faster and you can do the same.

Here is the steps I followed and seriously if you want your blog to load fast you can follow the same.

1. Check your blog loading time with Pingdom Tools.

Copy and paste your URL and click Test now.


Website Loading Time is not a Joke

0 comments
This is the time to think about the website loading time. Seriously. Time to time I was going through this and came up with small hacks and tricks to make the blog load faster. However, did I do it seriously. I do not think so. Did you took it seriously and really thought about the loading time each time you do a change to your template or adding new gadget? It is time to take it seriously as Google is using site speed in web search ranking. 


Top 100 Most Dangerous Websites To Your PC : Enlisted

0 comments
Internet security company Norton Symantec has come up with a list of Top 100 Dirtiest sites, which could infect your computer with Malware. Malware is a software that can damage or compromise a computer system without the owner's consent.

Natalie Connor, spokeswoman of the anti-virus company, said that even visiting any of the named websites could expose a computer to infection and put the personal information into the hands of unwanted people.

"What people don't realize is when you type in a website, you're bringing down information on a page and with it could be malware," News.com.au quoted her as saying.


Access two Gmail accounts at once in the same browser

0 comments


I have a couple different Gmail addresses that I use for different purposes. Historically, Google Accounts – including Gmail accounts — have only let people access one account at a time per browser, so using both accounts has been a bit inconvenient. I’ve either had to sign out and sign back in, use a second browser for my second account, or use a Chrome incognito window. And I'm not alone; lots of people have asked us for a better way to use multiple accounts at once in the same browser. 




How twitter can kill your computer

0 comments
Malware Threat is one of the trending topics in twitter search. What is it all about? It is basically about some malware links start to use twitter trending topics. Pretty much a new way to catch large number of twitter users.

how it works? According to mashable.com it malware links comes with normal tweets and and only affect you if you click on any of these links.


Tools for Hacking Bluetooth Enabled Devices

0 comments
Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?).
If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.


20 Great Google Secrets

0 comments
Google is clearly the best general-purpose search engine on the Web
But most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and enhance your Internet exploration.


The World’s Most Secure Flash Drive

0 comments
The Iron Key is “built to withstand attacks both virtual and physical 10 incorrect password attempts, and after that the encryption chip self-destructs.”
The contents of the drive are filled with epoxy, so if a hacker tries to physically access the chips, he’d more likely damage them instead.


Create a CookieLogger and Hack any Account

0 comments
Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.
What is a CookieLogger?
A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.
Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …


Download Free Softwares, Games, Movies and lot of Hacking Stuff from 50+ FTP Sites

0 comments
Internet definitely has several unheard places also known as underground websites, few of these website offer users 100s and 1000s of softwares, games, movies and lot of Hacking Stuff for downloads. Though these sites are pretty tough to find, I was able to unearth more than 50+ FTP sites that allow users to download softwares, games, movies and  lot of Hacking tools for free.
Here is a list of 50+ FTP sites that will allow you download content for free. Don’t forget to share and bookmark this page so that everyone can take advantage of it.


FACEBOOK TRICKS

0 comments

How to find out who visits your Facbook profile?

In orkut by default there is a nice feature that you can find out who visited your orkut profile, but there is no such kind of feature in Facebook. I have found a simple method through which you can find out who visited your facebook profile recently. 
The integration is very simple and you really do not need to fill any kind of surveys or pay for it
1. In order to see who views your Facebook profile, we will first need to get the tracking code. Visit the website listed here. www.unfaced.com


How to use Bold Underlined Fonts and Smileys in Facebook Chat?

1 comments

Facebook is the most widely used Social Networking website in the world having the most advanced features, but instead of having so many features most people are not able to use it or they don’t know to use ,There are lots of smileys in Facebook chat but lots of people dont know about it, You can you smileys in Facebook chat and increase your Chatting experience,
Below I am placing a chart which will contain smiley's in Facebook chat along with their code


What are Public IP & Private Ip Addresses?

0 comments

Internet Protocol (IP) addresses are usually of two types: Public and Private.

If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP address in layman’s terms so that it becomes simple and easy to understand.

What are Public IP Addresses?
A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information.


Batch File Virus Making

0 comments
Over the weekend, I've been sending my friends some .exe files as pranks that shut down your computer. It displays "Brian Virus Activated", spits out a bunch of random numbers, and then forces a computer shut down.

How does it work? The .exe is really a .bat file in disguise. A .bat file is known as a batch file, which is like writing a really simple program in command prompt. If you've ever coded before, batch files are extremely easy to make. All they do is run the commands top to bottom. The .bat file is then converted to an .exe, which I'll talk about later. It is completely harmless, but you can make it really powerful and do things like format the drive. I won't teach you that, because that's just cruel.

NOTE: FOR EDUCATIONAL PURPOSE ONLY..PLEASE DON'T USE THEM FOR ILLEGAL PURPOSE..WE ARE NOT RESPONSIBLE FOR ANY CONSEQUENCES..
BE CAREFUL




Why people create computer viruses ? #7 Reasons

0 comments
One of the most common questions we get asked by our tech support customers who hire us for virus removal is this: why do people create computer viruses? The answer is a complicated one that involves psychology and the darker side of human nature.

In the interest of simplicity, the word “virus” may sometimes be referring to other types of malware including worms, trojan horses, spyware, adware, and rootkits.

The seven deadly reasons for creating a computer virus:

Boredom: Young people, in this first level of severity, can sometimes simply make poor choices. The ones with inquisitive minds sometimes try their hand at hacking, or “playfully” tinker with joke viruses.


Seven maintenance tips to optimize Mac performance

0 comments

Mac systems are pretty trouble free, and OS X is a pretty solid system. However, as with all things, an ounce of prevention is better than a pound of cure, and there are some things that you can do with OS X to keep it running in tip-top shape.

#1 Back it up

The first and most crucial  thing to do is to keep a backup of your important files, or even the entire system. To clone the entire system (great for backups and quick restoration in the case of hardware failure), an external hard drive and SuperDuper! are the best solution as far as I am concerned. SuperDuper! makes a bootable clone of your hard drive; a great thing to do before performing large system updates, or something to schedule routinely. Other options include buying an Apple Time Machine and scheduling backups that way.


Anonymous Surfing - Surf Anonymously and Protect Yourself

0 comments
Have you ever wondered how some companies are able to lay hold on your email address in order to send spam mails to you? Or have you ever wondered how some sites like Google are able to open pages according to the country or region you stay? How do you think hackers are able to have access to the information you share online? These questions will remain unanswered until you understand what an internet protocol address is.


Google Looses Its Gravity - Awesome Google

0 comments

There are a lot of Tricks which you can do with Google by writing the Trick's text and click the "I'm Feeling Lucky" button present under the Google's logo on Google homepage.
This time, a new trick which is really awesome and cool. This trick will finish Google's gravity. How? Do it yourself and see.
Step1. Go to Google.com
Step 2. Write the following in the search bar Google Gravity
Step 3. And Click on the I'm Feeling Lucky button.

And also later you can click on the google logo and see the same as many times as you like

And enjoy :)


CHECK IF YOUR SENT MAILS ARE READ OR NOT

0 comments
At times, you want to know if the email you sent to someone has been received and read by that person. Think about proposals or invitations etc. So if you are wondering that the recipient has checked you mail or not, here is a free tool for tracking your outgoing emails.
SpyPig enables you to track your outgoing emails just by submitting your email address and the subject of email you want to track. After getting the tracking image, copy and paste into the body of email message that you are sending out.


RE-ENABLE RIGHT CLICK ON SITES WHICH DISABLED IT

0 comments
Now, I'll tell you how to enable right click function on the websites on which right click is disabled.

 
This is very simple. There are a lot of ways doing this. One way is by disabling JavaScript but the simplest and easiest way is by entering the following Script into the address bar while viewing the page.

How to enable right click function?

1. Go to the website on which right click is disabled. Click Here For Right Click Disabled Website
2. Copy the following code and paste it in the address of the browser while viewing the page.

javascript:void(document.oncontextmenu=null)
3. Hit enter key and now click right mouse button and see.. Right click will be enabled.
Plz comment and enjoy



DISABLE RIGHT CLICK ON YOUR WEBSITE OR BLOG

0 comments
It is quiet clear that disabling right click can ruin your web page. But if you still want to disable right click on you website/blog, then following is the simplest method for it.

Use the script below so when someone right clicks to save an image off your page, a message will come up letting people know that your information is copyrighted.

This script only works on newer browsers, and it's not foolproof. If someone really wants something from your page they can find ways around it, but at least it's a warning to people who want to take your graphics. Copy and paste the following code, and make sure it comes right after your <HEAD> tag:


 
Copyright © 2010 | Flash News Converted into Blogger Template by HackTutors