Every human discovery has pros and cons, so is the computer which has pervaded all our lives. The modern humanity is increasingly dependent on computer for various day-to-day activities. Computers do us a whole lot of good things, but it is not without some pitfalls. With the extensive use of internet for hundreds of our needs, computer opens a vicious cycle of hackers. Computer hacking is a term which refers to an individual’s illegal and unauthorized access to the data which are stored in a user’s system. This is done to disturb the confidentiality and security of the user’s computer.
Showing posts with label Protection. Show all posts
Showing posts with label Protection. Show all posts
Saturday, May 7, 2016
Thursday, July 16, 2015
How To Unlock Password of Android Phone And Tablet
1.First of all Power Off your device.
3.Now press the power button and hold it.
How to Recover/Trace/Find Stolen Mobile Free 2015
Computer Hacking In The New Age, All You Need To Know About Hacking Today
Every human discovery has pros and cons, so is the computer which has pervaded all our lives. The modern humanity is increasingly dependent on computer for various day-to-day activities. Computers do us a whole lot of good things, but it is not without some pitfalls. With the extensive use of internet for hundreds of our needs, computer opens a vicious cycle of hackers. Computer hacking is a term which refers to an individual’s illegal and unauthorized access to the data which are stored in a user’s system. This is done to disturb the confidentiality and security of the user’s computer.
Wednesday, July 15, 2015
How to Hack a Secured Wifi Network With Android mobile
Hi Friends…! After A Long Research… Today We Are Back With Most Wanted Wifi Hacking App, Which Will Really Amaze You With Its Features And Its Capicity To Hack Wifi Network Effectively. And This App Will Helps You To Crack Any Wpa/Wps Enabled Wifi Networks. And Now Without Wasting Any More Time Come Let Us Go To Actuall Steps To Make Use Of This Wifi Tool.
Your Phone Must Be Rooted!!!
How To Hack Wifi Network Within Few Seconds:
How to MOST USEFUL HACKs AND COMPUTER TRICKS
This is my most favourite part
Chat with Friends through ms dos Command Prompt
1) All you need is your friend's IP Address and your Command Prompt.
2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Bat".
4) Open Command Prompt.
5) Drag this file (.bat file) over to Command Prompt and press Enter.
6) You would then see Command Prompt Showing Some Thing Like This:
Messenger
7) Now, type the IP Address of the computer you want to contact and press enter
8) Now all you need to do is type your message and press Enter.
Start Chatting.......!
Surfing Internet.
Type in the url and Hit Enter, that's it ?
Have you ever thought what happens after that ?
Lets Trace n see what happens !
Do the following :
# Start >> Run
# Type cmd
# This will open the Command Prompt
# Type cd
# Type tracert www.google.com
Note
You can replace www.google.com with any website url.
Results :
$ First line shows the IP address of the website... $ You'll be shown steps in which the website gets load !
$ More is the number of steps more is time taken to load the website !
Tuesday, July 14, 2015
Convey your friend a message and shut down his / her computer
Code:
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s
Save it as "Anything.BAT" in All Files .
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s
How To Delete Yourself From The Internet
Have you ever wondered what information web pages have on you? Just perform a simple google search and check out the results! You will get surprised that they even know your dog’s name, some photos you took while very drunk are there as well. Even some stupid videos you took way back in college. And your prospective employer has access to all this info too. This may be the reason why you sent job applications and get no answer!
5 Common Mistakes That Fresh Hackers Make
Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker.
Latest Whatsapp Full Guides ,Hacks and Tricks 2015
Welcome to hacking world |
Whatspp is most popular social Instant messaging platform. Whatsapp replaces our sms into Internet chatting messages. We save lots of money from whatsapp. So here I post full guide for whatsapp related to every terms like hacking ,customizations and do many more with whatsapp. Whatsapp is available for all Android users ,so everybody can use it.
Whatspp Tips and Tricks
So here I post some hidden tricks and Tips for you. If you follow that trick ,you know everything about whatsapp related to android and pc.
Monitor and Spy GirlFriend Whatsapp Account from WhatsDog
We all worried about our Girlfriends activity. In this post I tell you how can you spy on any Whatsapp account like your Girlfriend account. You don’t need any big setup this setup is done by creepy simple android app. This Spy android app named is Whatsdog.
Whatsdog monitor whatsapp account user online activity like when they login or logout. How much they spend time online. These all data saved in graphs and calender. That’s why this is so cool app. You can check how many times you girlfriend’s online and offline.
Download Whatsdog
Whatsdog monitor whatsapp account user online activity like when they login or logout. How much they spend time online. These all data saved in graphs and calender. That’s why this is so cool app. You can check how many times you girlfriend’s online and offline.
Download Whatsdog
Monday, July 13, 2015
Cracking Password Protected zip files
Manually remove the shortcut virus from USB
Hi guys. Sometimes its very irritating when you insert any USB and it shows many shortcuts of My Documents and all the important data and files become invisible. This is due to a shortcut virus. It is usually present in many computers of office, college or cyber cafes. Many of my friends are facing the problems with this virus. So here is a simple trick by which you can remove this virus from your pen drive.
How to format an unformattable pendrive
Format an Unformattable Pen Drive with simple DOS Command, Perhaps these days almost all of us are well aware of pen drives and use them a lot for files transfers from one PC to another or sometimes use them to listen music or videos stored on the flash drives. But sometimes the excess