Thursday, 29 September 2011

Posted by Unknown On 08:46
Mission Impossible 4 Ghost Protocol (Theatrical Trailer).mp4[9.43 mb] Harry Potter and the Deathly Hallows - Part 2 (Theatrical Trailer).mp4[7.21 mb] Final Destination 2 (Theatrical Trailer).mp4[5.97 mb] The Three Musketeers (Theatrical Trailer).mp4[5.23 mb] War Horse (Theatrical Trailer).mp4[6.97 mb] Pirates Of The Carribean - On Strangers Tides (Theatrical Trailer).mp4[9.73 mb] Captain America - The First Avenger (Theatrical Trailer).mp4[10.6 mb] Cars 2 (Trailer).mp4[8.86 mb] KungFu Panda 2 (Trailer).mp4[9.38 mb] Puss In Boots (Trailer).mp4[4.32...
Posted by Unknown On 04:29
Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password .. but when? How long will it take? The two-character password will require 26*26=676 combinations. The number of possible combinations (and therefore required time) grows rapidly as the length of the password increases and this...
Posted by Unknown On 04:21
One of the best ways to help you start windows faster quickly is to reduce the number of programs scuh as msn,yahoo etc that are loaded while Windows is “waking up.”To tweak the startup, you must use a utility called msconfig, as follows:Start windows faster - Method:Step 1:Click the Start button in the lower-left corner of Windows.Step 2:Click Run...
Posted by Unknown On 04:17
Here are some windoes shortcut keys Windows Shortcuts keys Alt + E — Opens the Edit menu Alt + Enter — Opens the Properties window Alt + F — Opens the File menu Alt + F4 — Closes the current program Alt + Print — Screen Takes a screen shot of the current window or program Alt + Tab — Switches between the programs currently in use CTRL+TAB — SWITCHES BETWEEN TAB IN DIALOG BOX,I.E 7 Ctrl + A — Selects all text Ctrl + C — Copies the selected object Ctrl + End — Jumps to the end of the current document Ctrl + Esc —...

Monday, 26 September 2011

Posted by Unknown On 04:12
Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.” You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening? 1 Hardware conflict The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices...
Posted by Unknown On 04:10
Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows. Disclaimer: We don’t take any responsibility for Illegal use of this tutorial. Step 1 Get a IP (range) scanner. (superscanner is a fast one, get it here). Scan the victim’s ip on TCP/IP port 139 (More info about TCP/IP port here...
Posted by Unknown On 04:08
With this tutorial u can translate almost any binary file to text. This is a type of cryptographic translation which is commonly used in password creating. Cryptography is a language where we encrypt secret data. And Binary is also one of its way. This tutorial I used in initial stage of hacking and not completely written by me definitely. ( I am Not good in writing tutorials ! ) Hope this can be useful for aspiring coders and ethical hackers. Introduction: We’ve...
Posted by Unknown On 04:07
How to create a bootable Windows XP SP1 CD (Nero): Tip :You can replace XP SP1 with SP2 and 3 as mentioned in disk files. Step 1 Create 3 folders – C:\WINXPSP1, C:\SP1106 and C:\XPBOOT Step 2 Copy the entire Windows XP CD into folder C:\WINXPSP...
Posted by Unknown On 04:04
Follow The steps to block Pop up banners by changing settings in Internet Explorer. 1) Go to TOOLS and then INTERNET OPTIONS. 2) Click the SECURITY tab, move the slider up to HIGH and click APPLY. This applies the highest security settings to IE, which blocks EVERYTHING, including JavaScript, Applets, and so on that pop-ups are based upon...
Posted by Unknown On 04:02
1. Open notepad.exe, type “del c:windowsprefetch tosboot-*.* /q” (without the quotes) & save as “ntosboot.bat” in c: 2. From the Start menu, select “Run…” & type “gpedit.msc”. 3. Double click “Windows Settings” under “Computer Configuration” and double click again on “Shutdown” in the right window. 4. In the new window, click “add”, “Browse”, locate your “ntosboot.bat” file & click “Open”. 5. Click “OK”, “Apply” & “OK” once again to exit...
Posted by Unknown On 03:58
Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication. IP Spoofing Every computer connected to Network have its unique IP address. When Person A sends an email  to person B, The mail is assigned with the header which contains the IP’s of sender and Reciver so that mail can go to the same person...

Sunday, 25 September 2011

Posted by Unknown On 10:57
1 10 minute guide to lotus notes mail 4.5 http://www.parsian.net/set1252/pages/books.htm 2 10 minute guide to Microsoft exchange 5.0 http://www.parsian.net/set1252/pages/books.htm 3 10 minute guide to outlook 9...
Posted by Unknown On 10:43
Bluejacking is one of the type of Blue-tooth hacking. Bluejacking was first carried by the Malaysian IT consultant. In simple words Bluejacking means tempoarly hijacking someones device. Bluejacking allow the user to send business cards anonymously using Bluetooth wireless technology. Bluejacking is carried only to the Bluetooth enable device that is cell phones, PDA’s , laptop’s . Bluejacking can take...
Posted by Unknown On 10:19
Bluebugging is also one form of Bluetooth hacking .It was first discovered German researcher Martin Herfurt . He got the motivation from the Bluesnarf attack. Bluebugging is very much different from the bluesnarfing. In bluebugging allows an individuals to access the mobile phone commands using Bluetooth wireless technology without knowing the phone’s user .The hacker can access the phone memory and...
Posted by Unknown On 10:05
Bluesnarfing is one type of blue-tooth hacking. While it is similar to the bluejacking and bluebugging. It was discovered by Marcel Holtmann in october 2003. Bluesnarfing is unauthorized access of information or data from wireless device through blue-toothtechnology. Connection is often between the desktop’s, LAP’s ,cellphones , PDA’s . Blue-tooth is very high speed but...