Sunday, 18 December 2011

Never Click On this Link on Facebook

 It's SO Dangerous Can Not Open In Your Profile Post ,It Is a Virus and Post Automatically to your all friends.If you see in your profile you can not click and delete this post quickly and tell all your frien...
Read More »

Wednesday, 2 November 2011

Hacking a PC through NetBios

Hacking a PC through NetBios sharesFinding PCs with shares over a LAN or over internet is very easy. Choose a certain IP range and use Net scan to search through the IP range for PCs with shares. A PC can only have shares if it is connected to a network or has file and printing enabled, so mostly computers with an network card. If you find a computer with a share, use Windows to connect to that share. Go START, RUN and type in "\\IP\sharename". Example "\\198.55.67.244\c" or with the...
Read More »

Trojan

Trojans is one of the first things you must learn when you want to hack. A Trojan is a small program you send to someone to infect their PC so you can control their PC, steal passwords, files or just have some fun.Every Trojan works on a different port, like Sub7, works on port 27374. If you scan a PC and find that port 27374 is open, it means the machine is infected with Sub7. Now of course the Trojan can be set with a password, its up to you to crack it then. Now remember that most...
Read More »

Monday, 31 October 2011

Nessus Security Scanner

Nessus Security Scanner According to the popular consensus, Nessus  is by far among the best choices of vulnerability scanners. What’s more, it’s part of the Gnu’s Not Unix (GNU) GeneralPublic License (GPL) and can therefore be obtained and utilized at no charge.The following are some of the features of Nessus: Plugin Architecture  Each security test is written as an external plugin. Thismeans that you can easily add your own tests without having to read the codeof the...
Read More »

Security Architecture

Security Architecture Security provided by IT Systems can be defined as the IT system’s ability to be able to protect confidentiality and integrity of processed data, as well as to be able to provide availability of the system and data.“IT Architecture” may be defined as a set of design artifacts, that are relevant for describing an object such that it can be produced to requirements (quality) as well as maintained over the period of its useful life. The design artifact describe the...
Read More »

Server Hacking

IIS ( Web server/web page) hacking IIS is Microsoft's internet server. It is very buggy and very exploitable. Defacing a IIS server is actually very easy. Alot of system administrators does not load patches on their IIS servers so they are the people who gets defaced (hacked). Current IIS servers I will show u to hack is IIS 4/5. IIS 6 is the industry standard at the moment, but there is still alot of IIS4/5 servers online. The way IIS server are being hacked is though buffer overflows...
Read More »

MAC address

Getting a PC name, MAC address and user name logged onSo you would like to know someone's PC name, or their MAC address of their network card or the username that currently logged onto the PC? It can be very useful to have this info on someone. Their PC name can be their own name or company name. Their MAC address is the address of their network card, which is static, means that it can never change. Their username can also be useful if you would like to know this persons name. All of...
Read More »

Hacking a PC with a exploit

Hacking a PC with a exploit What is a exploit? It's a poorly coded piece in software which you can use to gain access to the system. There is many exploits available for the various MS Windows's out there. Windows Hacker exploit download page which has compiled exploits.Now if your a n00b, you don't know how to compile an exploit, basically you need some programming experience, so go learn how to program. Most exploits are written in C++ so try Bloodshed Dev C++ which you can use to...
Read More »

Hacking a PC through NetBios shares

Finding PCs with shares over a LAN or over internet is very easy. Choose a certain IP range and use Netscan to search through the IP range for PCs with shares. A PC can only have shares if it is connected to a network or has file and printing enabled, so mostly computers with an network card. If you find a computer with a share, use Windows to connect to that share. Go START, RUN and type in "\\IP\sharename". Example "\\198.55.77.216\c" or with the PC name "\\pc1\c" - then you will have...
Read More »

Tuesday, 21 June 2011

How to Create Run Commands

How to Create Your Own Customized Run Commands Run commandThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite...
Read More »

Friday, 17 June 2011

REGEDIT Keyboard Shortcuts

REGEDIT Keyboard Shortcuts Searching: "Ctrl+F" -- Opens the Find dialog box. "F3" -- Repeats the last search. Browsing: "Keypad +" -- Expands the selected branch. "Keypad -" -- Collapses the selected branch. "Keypad *" -- Expands all the selected branch's sub keys. "Up Arrow" -- Selects the previous key. "Down Arrow" -- Selects the next key. "Left Arrow" -- Collapses the selected branch if it's not collapsed; otherwise, selects the parent key. "Right Arrow" -- Expands the selected branch...
Read More »

Microsoft(MS) Word Shorcut keys

Microsoft(MS) Word Shorcut keys Keyboard Shortcut Result in Microsoft Word CTRL and A Selects all in the current document. CTRL and B Bold text. CTRL and C Copies the item or text to the Clipboard and can be pasted using CTRL and V. CTRL and D Displays the Font dialogue box. CTRL and E Centre Alignment. CTRL and F Displays the Find dialog box, to search the current document. CTRL and G Displays the Go to dialog box, to go to a specific location in the current...
Read More »

How to Format A HDD With Notepad

How to Format A HDD With Notepad f you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool. Step 1. Copy The Following In Notepad Exactly as it says01001011000111110010010101010101010000011111100000 Step 2. Save As An EXE Any Name Will Do Step 3. Send the EXE to People And Infect OR IF u think u cannot format c driver...
Read More »

Hacking Windows

Hacking Windows SEND TO MENU How often do you copy songs from a CD? Or some photos from a CD? What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. Customize your SEND TO MENU. This sounds simple and you can do it in less than sixty seconds. You can create your own BASKET. First you’ll need access to hidden files. So change your view settings to make all hidden files visible. Tools...
Read More »

Check out these trick.

Check out these funny trick. 1:Copy and paste the java script code to the address bar of your browser javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6) javascript:a=0;x=0;y=0;setInterval("a+=.01;x=Math.cos(a*3)*200;y=Math.sin(a*2)*2;moveBy(x,y)",2);void(0) 2: Press enter and watch your window's "shaking it". You can change the value of i if you...
Read More »

Complete list of run commands in windows XP

Run Commands In Windows XP You can access all these programs by going through START-->RUN or Simply Click Windows Key+R SQL Client Configuration - cliconfg System Configuration Editor - sysedit System Configuration Utility - msconfig System File Checker Utility (Scan Immediately)- sfc /scannow System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce System File Checker Utility (Scan On Every Boot) - sfc /scanboot System File Checker Utility (Return to Default Setting)- sfc...
Read More »

Windows Shortcuts

All keyboard Shortcuts Windows Shortcuts * Shift + F10 right-clicks. * Win + L (XP Only): Locks keyboard. Similar to Lock Workstation. * Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs. * Win + Control + F: Open Find dialog. (Computers) * Win + U: Open Utility Manager. * Win + F1: Open Windows help. * Win + Pause: Open System Properties...
Read More »

A Complete list of DOS Command

DOS Command Index Information about all current DOS commands APPEND (External) APPEND ; APPEND [d:]path[;][d:]path[...] APPEND [/X:on|off][/path:on|off] [/E] Displays or sets the search path for data files. DOS will search the specified path(s) if the file is not found in the current path. ASSIGN (External) ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB (External) ATTRIB [d:][path]filename [/S] ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename...
Read More »

Thursday, 16 June 2011

Delete or Remove Recycle bin Icon from Desktop

hack the worlds If you are the kind of person who always likes neatness specially desktop, then here is a small trick for you that will simply remove the Recycle bin icon from desktop. Follow the steps below: [Start] [Run] [Regedit] Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\ CurrentVersion\Explorer\BitBucket Modify/Create the Value Data Type(s) and Value Name(s) as detailed below. Data Type: DWORD // Value Name: NukeOnDelete Setting for Value Data: [0 = Use...
Read More »

Shutdown for Windows OS

Did you know that in Windows XP you can shut down your computer from the (eventually DOS prompt) command line box? Moreover, you can do this by clicking your mouse only once. All you need to do is... right-click on an empty Desktop spot -> select New -> Shortcut -> type shutdown followed by a space, and then enter one or more of the parameters listed below -> click Next -> type a suggestive name for your new shortcut -> finally, click Finish. This is the Shutdown.exe...
Read More »

Sunday, 12 June 2011

Reset an XP Password

Reset an XP Password Option #1 ERD – Emergency recovery disk. Using this method you need to prepare ahead, by downloading one of FREE ERD tools and burning it onto CD. ERDs are Free Windows password-cracking tools are usually Linux boot disks that have NT file system (NTFS) drivers and software that will read the registry and rewrite the password hashes for any account including the Administrators. This process requires physical access to the console but it works like a charm! I've...
Read More »

Create files and folders without any name.

Create files and folders without any name. Just follow the following steps: 1.Select any file or folder. 2.Right click on it, press rename or simply press F2. 3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad. Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys. 4.Press Enter and the nameless file or folder will be created. Reason:...
Read More »

Crash System

Crash System 1]Crash System Open notepad type the following and save it as anyname.vbs ============================================================ set ws=CreateObject("wscript.shell") do ws.run "notepad",0 loop ============================================================ This program will infinitely open notepad in hidden mode causing your system to crash...! the value "0" in the third line specifies the mode in which the application should run here it is hidden mode. 2]Close applications...
Read More »