Mission Impossible 4 Ghost Protocol (Theatrical Trailer).mp4[9.43 mb]
Harry Potter and the Deathly Hallows - Part 2 (Theatrical Trailer).mp4[7.21 mb]
Final Destination 2 (Theatrical Trailer).mp4[5.97 mb]
The Three Musketeers (Theatrical Trailer).mp4[5.23 mb]
War Horse (Theatrical Trailer).mp4[6.97 mb]
Pirates Of The Carribean - On Strangers Tides (Theatrical Trailer).mp4[9.73 mb]
Captain America - The First Avenger (Theatrical Trailer).mp4[10.6 mb]
Cars 2 (Trailer).mp4[8.86 mb]
KungFu Panda 2 (Trailer).mp4[9.38 mb]
Puss In Boots (Trailer).mp4[4.32...
Thursday, 29 September 2011
Posted by Unknown
On 04:29
Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password
.. but when? How long will it take? The two-character password will require 26*26=676 combinations. The number of possible combinations (and therefore required time) grows rapidly as the length of the password increases and this...
Categories: Hacking
Posted by Unknown
On 04:21
One of the best ways to help you start windows faster quickly is to reduce the number of programs scuh as msn,yahoo etc that are loaded while Windows is “waking up.”To tweak the startup, you must use a utility called msconfig, as follows:Start windows faster - Method:Step 1:Click the Start button in the lower-left corner of Windows.Step 2:Click Run...
Categories: Tricks
Posted by Unknown
On 04:17
Here are some windoes shortcut keys
Windows Shortcuts keys
Alt + E — Opens the Edit menu
Alt + Enter — Opens the Properties window
Alt + F — Opens the File menu
Alt + F4 — Closes the current program
Alt + Print — Screen Takes a screen shot of the current window or program
Alt + Tab — Switches between the programs currently in use
CTRL+TAB — SWITCHES BETWEEN TAB IN DIALOG BOX,I.E 7
Ctrl + A — Selects all text
Ctrl + C — Copies the selected object
Ctrl + End — Jumps to the end of the current document
Ctrl + Esc —...
Categories: Tricks
Monday, 26 September 2011
Posted by Unknown
On 04:12
Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1 Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices...
Categories: Tricks
Posted by Unknown
On 04:10
Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows.
Disclaimer: We don’t take any responsibility for Illegal use of this tutorial.
Step 1
Get a IP (range) scanner. (superscanner is a fast one, get it here).
Scan the victim’s ip on TCP/IP port 139 (More info about TCP/IP port here...
Categories: Hacking
Posted by Unknown
On 04:08
With this tutorial u can translate almost any binary file to text. This is a type of cryptographic translation which is commonly used in password creating. Cryptography is a language where we encrypt secret data. And Binary is also one of its way.
This tutorial I used in initial stage of hacking and not completely written by me definitely. ( I am Not good in writing tutorials ! )
Hope this can be useful for aspiring coders and ethical hackers.
Introduction:
We’ve...
Categories: Tricks
Posted by Unknown
On 04:07
How to create a bootable Windows XP SP1 CD (Nero):
Tip :You can replace XP SP1 with SP2 and 3 as mentioned in disk files.
Step 1
Create 3 folders – C:\WINXPSP1, C:\SP1106 and C:\XPBOOT
Step 2
Copy the entire Windows XP CD into folder C:\WINXPSP...
Categories: Tricks
Posted by Unknown
On 04:04
Follow The steps to block Pop up banners by changing settings in Internet Explorer.
1) Go to TOOLS and then INTERNET OPTIONS.
2) Click the SECURITY tab, move the slider up to HIGH and click APPLY.
This applies the highest security settings to IE, which blocks EVERYTHING, including JavaScript, Applets, and so on that pop-ups are based upon...
Categories: Tricks
Posted by Unknown
On 04:02
1. Open notepad.exe, type “del c:windowsprefetch tosboot-*.* /q” (without the quotes) & save as “ntosboot.bat” in c:
2. From the Start menu, select “Run…” & type “gpedit.msc”.
3. Double click “Windows Settings” under “Computer Configuration” and double click again on “Shutdown” in the right window.
4. In the new window, click “add”, “Browse”, locate your “ntosboot.bat” file & click “Open”.
5. Click “OK”, “Apply” & “OK” once again to exit...
Categories: Tricks
Posted by Unknown
On 03:58
Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication.
IP Spoofing
Every computer connected to Network have its unique IP address.
When Person A sends an email to person B, The mail is assigned with the header which contains the IP’s of sender and Reciver so that mail can go to the same person...
Categories: Hacking
Sunday, 25 September 2011
Posted by Unknown
On 10:57
1
10 minute guide to lotus notes mail 4.5
http://www.parsian.net/set1252/pages/books.htm
2
10 minute guide to Microsoft exchange 5.0
http://www.parsian.net/set1252/pages/books.htm
3
10 minute guide to outlook 9...
Categories: Books
Posted by Unknown
On 10:43
Bluejacking is one of the type of Blue-tooth hacking. Bluejacking was first carried by the Malaysian IT consultant. In simple words Bluejacking means tempoarly hijacking someones device. Bluejacking allow the user to send business cards anonymously using Bluetooth wireless technology.
Bluejacking is carried only to the Bluetooth enable device that is cell phones, PDA’s , laptop’s . Bluejacking can take...
Categories: Hacking
Posted by Unknown
On 10:19
Bluebugging is also one form of Bluetooth hacking .It was first discovered German researcher Martin Herfurt . He got the motivation from the Bluesnarf attack.
Bluebugging is very much different from the bluesnarfing. In bluebugging allows an individuals to access the mobile phone commands using Bluetooth wireless technology without knowing the phone’s user .The hacker can access the phone memory and...
Categories: Hacking
Posted by Unknown
On 10:05
Bluesnarfing is one type of blue-tooth hacking. While it is similar to the bluejacking and bluebugging. It was discovered by Marcel Holtmann in october 2003.
Bluesnarfing is unauthorized access of information or data from wireless device through blue-toothtechnology. Connection is often between the desktop’s, LAP’s ,cellphones , PDA’s . Blue-tooth is very high speed but...
Categories: Hacking
Subscribe to:
Posts (Atom)