Saturday, 22 June 2013

Pen Drive As RAM

How to Use Pen Drive As RAM For XPInsert your pen-drive. Let your PC read it.(Minimum 2 GB)Right click on My Computer.Click on Properties from context menu.Click on Advanced tab.Click on Settings under Performance.Click on Advanced tab.Click on Change button under Virtual memory.Select your USB drive.Click...

How to Remove Autorun.inf

How to Remove Autorun.inf Virus from Pendrive Easily – Without Antivirus! I have heard many peoples suffering from autorun.inf virus that is the major problem of the windows xp usersAnyway, As we know Our Antivirus (Basically, Avira, Avast, AVG, etc), Only detects Virus i.e autorun.inf whenever you...

How Torrent Works

How Torrent WorksBitTorrent BitTorrent is a protocol that enables fast downloading of large files using minimum Internet bandwidth. It costs nothing to use and includes no spyware or pop-up advertising.Unlike...

Stay Anonymous using TOR

Hey guys.In the past, there have been a few hacks that could be traced back by the police, because the hackers used VPN's. The VPN providers gave the US goverment because of the patriot act all the information...

Tuesday, 11 June 2013

Monday, 10 June 2013

anonymous tutorial

Hide like a hackeri- Protectionii- Encryptioniii- Anonymityiv- LinksProtection Basically what I am trying to say in this section is, before you go out hacking other people and other things, just check for a second and make sure it's not as easy to hack your device. There are some pretty simple steps...

secure your password

What is a password?A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those who are not allowed access.Why should I choose a secure...

Friday, 7 June 2013

track IP address

Today also i am going to explain you advanced method. By using method you can get the IP address,location, timing of victim. How to track IP address?step 1: know what is your victim email id.For...

IP Masking

What is IP Masking? How to use Fake IP address? What is Ip Masking?IP masking is hiding your Original(Dynamic/Static) IP address so that you can not be traced. IP masking is using Fake IP address...

facebook password hack

Three passwords to Access your Facebook account Facebook allows the following variation of your passwords:1. Your Original Password: Let us assume that you are using "breakTheSecurity" as password....

computer hacking

What is computer hacking? In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process...

Saturday, 1 June 2013

OLED

An OLED (organic light-emitting diode) is a light emitting diode (LED) in which the emissive electroluminescent layer is a film of organic compoud which emits light in response to an electric current....

Portable Pen Projector

put the projector in pocket? Then see this…Wouldn’t this be nice in case whatever you needed to take to some company speech ended up being a new pen? The latest notion style of your Pattern Web site...