How to Use Pen Drive As RAM
For XPInsert your pen-drive. Let your PC read it.(Minimum 2 GB)Right click on My Computer.Click on Properties from context menu.Click on Advanced tab.Click on Settings under Performance.Click on Advanced tab.Click on Change button under Virtual memory.Select your USB drive.Click...
Saturday, 22 June 2013
How to Remove Autorun.inf
How to Remove Autorun.inf Virus from Pendrive Easily – Without Antivirus! I have heard many peoples suffering from autorun.inf virus that is the major problem of the windows xp usersAnyway, As we know Our Antivirus (Basically, Avira, Avast, AVG, etc), Only detects Virus i.e autorun.inf whenever you...
How Torrent Works

How Torrent WorksBitTorrent BitTorrent is a protocol that enables fast downloading of large files using minimum Internet bandwidth. It costs nothing to use and includes no spyware or pop-up advertising.Unlike...
Stay Anonymous using TOR

Hey guys.In the past, there have been a few hacks that could be traced back by the police, because the hackers used VPN's. The VPN providers gave the US goverment because of the patriot act all the information...
Tuesday, 11 June 2013
Bypassing Login pages on websites using SQL injectable queries
sql injection in 5 chapters
chapter 2
Level: Beginners and Intermediate
Requirements: Patience and stradegy
Alright in this tutorial, we'll be learning how to bypass login pages with the help...
Dork for sql injection

sql injection in 5 chapters
#Chapter1: Knowing How to Use/Create Dorks#
For BeginnersA method of finding websites vulnerable to SQL injection is using what we call "dorks"Dorks:They are like...
wifi hacking

WEP CRACKING ON BACKTRACK 5
AIM
This tutorial aim is to guide you the process of WEP CRACKING On Backtrack 5 .Should have a knowledge of these terms - AP : stands for Access Point...
Monday, 10 June 2013
anonymous tutorial
Hide like a hackeri- Protectionii- Encryptioniii- Anonymityiv- LinksProtection
Basically what I am trying to say in this section is, before you go out hacking other people and other things, just check for a second and make sure it's not as easy to hack your device. There are some pretty simple steps...
secure your password
What is a password?A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those who are not allowed access.Why should I choose a secure...
Friday, 7 June 2013
Find IP address
learn how to find ip address of your friend
...
track IP address

Today also i am going to explain you advanced method. By using method you can get the IP address,location, timing of victim. How to track IP address?step 1:
know what is your victim email id.For...
IP Masking

What is IP Masking? How to use Fake IP address?
What is Ip Masking?IP masking is hiding your Original(Dynamic/Static) IP address so that you can not be traced. IP masking is using Fake IP address...
facebook password hack

Three passwords to Access your Facebook account
Facebook allows the following variation of your passwords:1. Your Original Password:
Let us assume that you are using "breakTheSecurity" as password....
computer hacking

What is computer hacking?
In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process...
Saturday, 1 June 2013
OLED

An OLED (organic light-emitting diode) is a light emitting diode (LED) in which the emissive electroluminescent layer is a film of organic compoud which emits light in response to an electric current....
Portable Pen Projector

put the projector in pocket? Then see this…Wouldn’t this be nice in case whatever you needed to take to some company speech ended up being a new pen? The latest notion style of your Pattern Web site...
The Mouse That Can Float like

The Mouse That Can Float like…
Republic’s capital ‘Prague’ designing studio KibardinDesign has made very unique wireless mouse. The name of this mouse is ‘BAT’.Its height from the pad is...
The Basics of Hacking and Penetration Testing

downloadhttp://www.mediafire.com/view/?ki9qwcu7afx2l7...
Ethical Hacking and Countermeasures: Secure Network Infrastructures by EC-Council

download:
http://longfiles.com/bb8cmy74iljg/6775.pdf.htm...