Pages

Showing posts with label Protection. Show all posts
Showing posts with label Protection. Show all posts

Saturday, May 7, 2016

Computer Hacking In The New Age, All You Need To Know About Hacking Today


Every human discovery has pros and cons, so is the computer which has pervaded all our lives. The modern humanity is increasingly dependent on computer for various day-to-day activities. Computers do us a whole lot of good things, but it is not without some pitfalls. With the extensive use of internet for hundreds of our needs, computer opens a vicious cycle of hackers. Computer hacking is a term which refers to an individual’s illegal and unauthorized access to the data which are stored in a user’s system. This is done to disturb the confidentiality and security of the user’s computer.

Thursday, July 16, 2015

How To Unlock Password of Android Phone And Tablet


1.First of all Power Off your device.

2.After this just press Up Volume Key and hold it.

3.Now press the power button and hold it.

How to Recover/Trace/Find Stolen Mobile Free 2015



Learn How to Find, Recover of Trace and stolen mobile phone online  with latest trick of year 2015. Step by step  how to trace a mobile number in Pakistan or any other country. If you ever lost your mobile and found no help from police or mobile operator in tracking your mobile? Well now you don't need to be worried about it. Now a days each one of us carry Mobile devices and always fear that it may be stolen. Each mobile carries a unique IMEI i.e International Mobile Identity No. which can be used to track your mobile anywhere in the world. 

Computer Hacking In The New Age, All You Need To Know About Hacking Today

Every human discovery has pros and cons, so is the computer which has pervaded all our lives. The modern humanity is increasingly dependent on computer for various day-to-day activities. Computers do us a whole lot of good things, but it is not without some pitfalls. With the extensive use of internet for hundreds of our needs, computer opens a vicious cycle of hackers. Computer hacking is a term which refers to an individual’s illegal and unauthorized access to the data which are stored in a user’s system. This is done to disturb the confidentiality and security of the user’s computer.

Wednesday, July 15, 2015

How to Hack a Secured Wifi Network With Android mobile

Hi Friends…! After A Long Research… Today We Are Back With Most Wanted Wifi Hacking App, Which Will Really Amaze You With Its Features And Its  Capicity To Hack Wifi Network Effectively. And This App Will Helps You To Crack Any Wpa/Wps Enabled Wifi Networks. And Now Without Wasting Any More Time Come Let Us Go To Actuall Steps To Make Use Of This Wifi Tool.



Your Phone Must Be Rooted!!!


How To Hack Wifi Network Within Few Seconds:

How to MOST USEFUL HACKs AND COMPUTER TRICKS


This is my most favourite part

Chat with Friends through ms dos Command Prompt
1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see Command Prompt Showing Some Thing Like This:
Messenger


User:

7) Now, type the IP Address of the computer you want to contact and press enter

8) Now all you need to do is type your message and press Enter.
Start Chatting.......!

Surfing Internet.

Type in the url and Hit Enter, that's it ?


But...
Have you ever thought what happens after that ?

Lets Trace n see what happens !

Do the following :
# Start >> Run
# Type cmd
# This will open the Command Prompt
# Type cd
# Type tracert www.google.com


Note 


You can replace www.google.com with any website url.

Results :
$ First line shows the IP address of the website... $ You'll be shown steps in which the website gets load !
$ More is the number of steps more is time taken to load the website !

Tuesday, July 14, 2015

Convey your friend a message and shut down his / her computer

 Code:
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s


Save it as "Anything.BAT" in All Files . 

How To Delete Yourself From The Internet

Have you ever wondered what information web pages have on you? Just perform a simple google search and check out the results! You will get surprised that they even know your dog’s name, some photos you took while very drunk are there as well. Even some stupid videos you took way back in college. And your prospective employer has access to all this info too. This may be the reason why you sent job applications and get no answer!

5 Common Mistakes That Fresh Hackers Make

 Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker.

Latest Whatsapp Full Guides ,Hacks and Tricks 2015

Welcome to hacking world

Whatspp is most popular social Instant messaging platform. Whatsapp replaces our sms into Internet chatting messages. We save lots of money from whatsapp. So here I post full guide for whatsapp related to every terms like hacking ,customizations and do many more with whatsapp. Whatsapp is available for all Android users ,so everybody can use it.



Whatspp Tips and Tricks 

So here I post some hidden tricks and Tips for you. If you follow that trick ,you know everything about whatsapp related to android and pc.

Monitor and Spy GirlFriend Whatsapp Account from WhatsDog

We all worried about our Girlfriends activity. In this post I tell you how can you spy on any Whatsapp account like your Girlfriend account. You don’t need any big setup this setup is done by creepy simple android app. This Spy android app named is Whatsdog.  

Whatsdog monitor whatsapp account user online activity like when they login or logout. How much they spend time online. These all data saved in graphs and calender. That’s why this is so cool app. You can check how many times you girlfriend’s online and offline.
 

Download Whatsdog 

Monday, July 13, 2015

Cracking Password Protected zip files



In the above hacking video I’m demonstrating how to crack password protected zip, rar and 7z files. There are many ways for cracking a password protected zip file, we can crack them using password guessing, dictionary attack , brute force etc.

Manually remove the shortcut virus from USB

Hi guys. Sometimes its very irritating when you insert any USB and it shows many shortcuts of My Documents and all the important data and files become invisible. This is due to a shortcut virus. It is usually present in many computers of office, college or cyber cafes. Many of my friends are facing the problems with this virus. So here is a simple trick by which you can remove this virus from your pen drive.

How to format an unformattable pendrive


Format an Unformattable Pen Drive with simple DOS Command, Perhaps these days almost all of us are well aware of pen drives and use them a lot for files transfers from one PC to another or sometimes use them to listen music or videos stored on the flash drives. But sometimes the excess

How to Create a Strong Password




Creating a strong password is our primary step towards our online security. But we still do not put a lot of thought into creating a strong password. Actually it’s not our fault, human brain always try to

Contact Form

Name

Email *

Message *

Widgets