
Loading...
Wikileaks- will the whistle blower now blow India?


The dirty game is on both on the shelf and of the shelf.
With the arrest of wikileaks founder in London has arouse a tremor both in the cyberspace and in the real world . The whistle blower has really brought u a big issue in front now. The website has brought out many classified documents infront of public and exosed...
Google Vulnerability Reward Program


Back in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the Hall of Fame. They’ve seen a sustained increase in the number of high quality...
DOWNLOAD!! UR ENTIRE FACEBOOK HISTORY


Now it is possible to download every single bit of information you have put on Facebook, including pictures, status updates, events and messages. This is undoubtedly the control many users have been looking for, and provides a nice “grab and go” option for those fed up with the service.The feature should have rolled out to most...
How to disable or enable USB port or device

.jpg)
USB Devices are portable enough to carry the data from one computer to another , It is always risky to enable USB ports of computers in large organizations , data center and cyber cafes since it can be the gateway for virus and malwares. You can disable or enable USB port or device in three ways
Enable / Disable USB port and device in...
“h4x0r 1n m3″ – Developing a Hacker’s Behaviour


To obtain the status of a Hacker, You Have To Want It, and You Have To Earn It. It is not something that can really be taught, it is only something you can learn for yourself, although I can attempt to help guide you.
Although hackers are substantially different people with unique personalities, they mysteriously all seem to lead similar...
Linux isn’t exactly the same as Windows.


You’d be amazed how many people make this complaint. They come to Linux, expecting to find essentially a free, open-source version of Windows. Quite often, this is what they’ve been told to expect by over-zealous Linux users. However, it’s a paradoxical hope.
The specific reasons why people try Linux vary wildly, but the overall...
The Browser Takes All


This week, Google unveiled a computer like no other: the Cr-48, a notebook that relies on the Web for all its software applications. Yet the Web search giant thinks the notebook can compete with computers that run all kinds of installed software.
The matte black Cr-48 won't be sold to the public, but thousands are being sent to consumers...
Google Chrome OS

"Google's Chrome OS chiefs explain in Technology Review how most of the web-only OS's features flow from changing one core assumption of previous operating system designs. 'Operating systems today are centered on the idea that applications can be trusted to modify the system, and that users can be trusted to install applications that are trustworthy,' says Google VP Sundar Pichai. Chrome doesn't trust applications, or users...
Google Adds Flash Sandbox to Chrome Browser


Two weeks after releasing Reader X with its new sandbox security mechanism, Adobe has teamed up with Google to enable a sandboxed version of its Flash software to run in Google Chrome.
The two companies said on Wednesday that Google has released a version of Chrome to its developer channel that includes the sandboxed Flash player....
Adobe Releases Reader X With Sandbox


Adobe has released the much anticipated new version of its Reader software, Adobe Reader X, which includes the new sandboxing feature meant to prevent exploits against the software from affecting other applications on a PC.
The new version of Reader, one of the more widely deployed applications anywhere, is designed to be a major step...
Researchers Bypass Internet Explorer Protected Mode


"A new paper from researchers at Verizon Business identifies a method through which an attacker can bypass Internet Explorer Protected Mode and gain elevated privileges once he's successfully exploited a bug on the system. Protected Mode in Internet Explorer is one of a handful of key security mechanisms that Microsoft has added...
Microsoft Builds Javascript Malware Detection Tool


"As browser-based exploits and specifically JavaScript malware have shouldered their way to the top of the list of threats, browser vendors have been scrambling to find effective defenses to protect users. Few have been forthcoming, but Microsoft Research has developed a new tool called Zozzle that can be deployed in the browser and...
How to add Command Prompt to the Right Click ?


I love command prompt. Do you ?? I bet, a great hacker always love to be on Command Prompt so am I, although I am not a great hacker, but still, I love it.
Wanna see the Command Prompt in action on every Right Click ??? Let’s get busy..For this, we gotta gear up our tools to tweak the Windows Registry. Oh Ya.. I love to modify every value...
How to Remove All Hyperlinks in Word or Excel ?

Powerful C++ Virus


This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.NOTE: FOR EDUCATIONAL PURPOSE ONLY.WE ARE NOT RESPONSIBLE FOR ANY FURTHER CONSEQUENCES. BE ETHICAL AND THINK LIKE A HUMAN...
Warning: Do not try this on your home computer.
The Original...
HEX #1 - HACKERS EXAM


The HEX #1 started now
RULES:
1. TRY ON YOUR OWN.
2. SEND YOUR ANSWERS IN A PDF/DOC FILE.
3. YOUR FILE MUST HAVE THE FOLLOWING DETAILS: YOUR COMPLETE NAME, YOUR
OCCUPATION IF STUDENT THE COLLEGE, DEPARTMENT AND YEAR HAVE TO BE
MENTIONED.
4. YOUR DOCUMENT SHOULD BE NEAT AND SIMPLE.
5. YOUR DOCUMENT...
SOFTW4R3 UPD4T3 FOR W33K #2


Google To Compete Facebook with GoogleMe!Just when people have started loosing interest from Orkut and most of them have shifted to Facebook the two internet Giants, it appears that Google will attempt to pull the ground from under Facebook's feet, by launching a new social networking service of its own called "Google Me" and simultaneously...
Dipostable.com - Dispostable email account !


Friends today I am going to tell you about an amazing website. Many of you don't like so much spam e-mail after you register for any website. But you have to give your email address & tolerate spam if you want to register. But dipostable.com is a great website. You don't need to create your email account here. Just give any...
Firesheep Makes Facebook Hacking Easy


Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds...
Farm Ville Bot


Farmville
This is the Farm Ville Bot all of you are waiting for
For any more queries regarding its usage, just message me in Facebook and visit the page and click LIKE on it
It is absolutely free.
Don't forget to read the README File
Enjoy
:-)
Rapidshare Link
Megaupload Link
Hotfile Link
MediaFire Li...
SOFTW4R3 UPD4T3 FOR W33K #1


Facebook bought drop.io - File sharing will be the next Facebook featureFacebook number one social networking website bought drop.io and closing down file sharing service by 15th of December. Facebook is really good at sharing picture but not the media files. This will make them strong in real time file sharing as well.
drop.io blog announced...
Mistakes in Web Designing

.jpg)
Mistake #1: Creating a Website with Flash -- Did you know in a recent study, top internet marketers discovered that having a website created with Flash, actually decreased the response from prospects and customers by as much as 370 percent? Here's why: Your prospects and customers are most likely visiting your website using all...
How To Level Up Fast In Farm Ville


If you've ever wondered whether it's a good idea to use a Farm Ville Bot to level up fast, you're in a right place. My goal is to tell you what kind of Farm Ville Bots you can find on the internet and tell you if they are safe. The truth is that NO Farm Ville guide you'll ever get will be as good as a well made bot. Let my explain why step...
Best Programming Languages to Learn as a New Programmer

.jpg)
As a new programmer there might often be doubts as to which languages to learn and where to start, I remember I was like that too. I was very interested in learning how to program software but ended up in website development. I am still pursing it though, to be able to program software. Okay here is my recommendation as which languages to...
Bill Gates: 11 Rules Your Kids Did Not & Will Not Learn In School

.jpg)
This is floating around the Internet again... It didn't sound like Bill Gates - at least some of it. In fact it should be attributed to Charles J. Sykes... Here's an article that claims it was incorrectly attributed.
Rule 1: Life is not fair - get used to it!
Rule 2: The world doesn't care about your self-esteem. The world will expect...
How to use your Notepad as a personal diary !

.jpg)
1. Open a blank Notepad file.2. Write .LOG and not .log (case sensitive) as the first line of the file, followed by a enter. Save the file and close it.
3. Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and place the cursor on the line after.
4. Now type your notes,...
Seriously make your blog/site load faster in 15 minutes

I was having cool chat with my blogging friend roezer at Blog HQ. Suddenly he drop me a link and small comment "This looks bad". It showed me a colorful diagram and it wasn't look that bad for me. After looking into the details I figure it out that it is the loading time for the blog. It took over 5seconds to load fully. Seriously,...
Website Loading Time is not a Joke

.jpg)
This is the time to think about the website loading time. Seriously. Time to time I was going through this and came up with small hacks and tricks to make the blog load faster. However, did I do it seriously. I do not think so. Did you took it seriously and really thought about the loading time each time you do a change to your template...
Top 100 Most Dangerous Websites To Your PC : Enlisted

.jpg)
Internet security company Norton Symantec has come up with a list of Top 100 Dirtiest sites, which could infect your computer with Malware. Malware is a software that can damage or compromise a computer system without the owner's consent.
Natalie Connor, spokeswoman of the anti-virus company, said that even visiting any of the named...
Access two Gmail accounts at once in the same browser

.jpg)
I have a couple different Gmail addresses that I use for different purposes. Historically, Google Accounts – including Gmail accounts — have only let people access one account at a time per browser, so using both accounts has been a bit inconvenient. I’ve either had to sign out and sign back in, use a second browser for my second account,...
How twitter can kill your computer

.jpg)
Malware Threat is one of the trending topics in twitter search. What is it all about? It is basically about some malware links start to use twitter trending topics. Pretty much a new way to catch large number of twitter users.
how it works? According to mashable.com it malware links comes with normal tweets and and only affect...
Tools for Hacking Bluetooth Enabled Devices

.jpg)
Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?).If you are planning...
20 Great Google Secrets


Google is clearly the best general-purpose search engine on the WebBut most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number.But Google...
The World’s Most Secure Flash Drive

Create a CookieLogger and Hack any Account

.jpg)
Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.What is a CookieLogger?A CookieLogger is a Script...
Download Free Softwares, Games, Movies and lot of Hacking Stuff from 50+ FTP Sites

Internet definitely has several unheard places also known as underground websites, few of these website offer users 100s and 1000s of softwares, games, movies and lot of Hacking Stuff for downloads. Though these sites are pretty tough to find, I was able to unearth more than 50+ FTP sites that allow users to download softwares, games,...
FACEBOOK TRICKS


How to find out who visits your Facbook profile?In orkut by default there is a nice feature that you can find out who visited your orkut profile, but there is no such kind of feature in Facebook. I have found a simple method through which you can find out who visited your facebook profile recently. The integration is very simple and...
How to use Bold Underlined Fonts and Smileys in Facebook Chat?

.jpg)
Facebook is the most widely used Social Networking website in the world having the most advanced features, but instead of having so many features most people are not able to use it or they don’t know to use ,There are lots of smileys in Facebook chat but lots of people dont know about it, You can you smileys in Facebook chat and...
What are Public IP & Private Ip Addresses?

Internet Protocol (IP) addresses are usually of two types: Public and Private.
If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP address in layman’s terms so that it becomes...
Batch File Virus Making


Over the weekend, I've been sending my friends some .exe files as pranks that shut down your computer. It displays "Brian Virus Activated", spits out a bunch of random numbers, and then forces a computer shut down.
How does it work? The .exe is really a .bat file in disguise. A .bat file is known as a batch file, which is like writing a...
Why people create computer viruses ? #7 Reasons


One of the most common questions we get asked by our tech support customers who hire us for virus removal is this: why do people create computer viruses? The answer is a complicated one that involves psychology and the darker side of human nature.
In the interest of simplicity, the word “virus” may sometimes be referring to other types...
Seven maintenance tips to optimize Mac performance


Mac systems are pretty trouble free, and OS X is a pretty solid system. However, as with all things, an ounce of prevention is better than a pound of cure, and there are some things that you can do with OS X to keep it running in tip-top shape.#1 Back it upThe first and most crucial thing to do is to keep a backup of your important...
Anonymous Surfing - Surf Anonymously and Protect Yourself

Have you ever wondered how some companies are able to lay hold on your email address in order to send spam mails to you? Or have you ever wondered how some sites like Google are able to open pages according to the country or region you stay? How do you think hackers are able to have access to the information you share online? These questions...
Google Looses Its Gravity - Awesome Google


There are a lot of Tricks which you can do with Google by writing the Trick's text and click the "I'm Feeling Lucky" button present under the Google's logo on Google homepage. This time, a new trick which is really awesome and cool. This trick will finish Google's gravity. How? Do it yourself and see.Step1. Go to Google.comStep 2. Write...
CHECK IF YOUR SENT MAILS ARE READ OR NOT


At times, you want to know if the email you sent to someone has been received and read by that person. Think about proposals or invitations etc. So if you are wondering that the recipient has checked you mail or not, here is a free tool for tracking your outgoing emails.
SpyPig enables you to track your outgoing emails just by submitting...
RE-ENABLE RIGHT CLICK ON SITES WHICH DISABLED IT


Now, I'll tell you how to enable right click function on the websites on which right click is disabled.
This is very simple. There are a lot of ways doing this. One way is by disabling JavaScript but the simplest and easiest way is by entering the following Script into the address bar while viewing the page.
How to enable right click...
DISABLE RIGHT CLICK ON YOUR WEBSITE OR BLOG


It is quiet clear that disabling right click can ruin your web page. But if you still want to disable right click on you website/blog, then following is the simplest method for it.
Use the script below so when someone right clicks to save an image off your page, a message will come up letting people know that your information...
Subscribe to:
Posts (Atom)