HACKER haku(r) – 1. A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism 2.One who works hard at boring tasks 3.Its is also a term used by some to mean ”a clever programmer”. “A good hack” is a clever solution to a programmingContinue reading “Did you know?”
Tag Archives: Hacking
FaceBook GHOST ID
Here the Few Steps Login to your Facebook Account. Go to the Account Settings. Change the Language to “Bahasa Indonesia” and Save. we’ll Use Indonesian Proxies and Port in our Browser Now Open chrome goto setting–>advance setting–>Change Proxy Setting–> new window will pop up click on LAN setting enble[tick] the check box on proxy serverContinue reading “FaceBook GHOST ID”
Hack WiFi Using Android
1]Root a compatible device. Not every Androidphone or tablet will be able to crack a WPSPIN. The device must have a Broadcom bcm4329 orbcm4330 wireless chipset, and must be rooted . TheCyanogen ROM will provide the best chance ofsuccess. Some of the known supported devicesinclude:Nexus 7Galaxy S1/S2/S3Nexus OneDesire HD!! 2]Download and install bcmon. This toolContinue reading “Hack WiFi Using Android”
Spoofing MAC Address on Android Devices
Even though MAC address is embedded on the hardware device during manufacture, it can still be spoofed to input a new one of your choice. Here is a detailed instruction on how to spoof MAC address on your Android phone. Before you spoof the MAC address, you need to record the original/current MAC address ofContinue reading “Spoofing MAC Address on Android Devices”
OLD BUT GOLD CRACKING NOKIA S40
Batch Files -The Arts Of Creating Viruses
I could just you give the codes to paste in notepad and ask you to save files with extension .bat and your deadly batch viruses would be ready. But instead of that, I have focused on making the basics of batch files clear and developing the approach to code your own viruses. What are Batch FilesContinue reading “Batch Files -The Arts Of Creating Viruses”
Hacking Fb using phishing
Phishing is the most popular and widely used method for hacking email accounts. Phishing is not as easy as it’s name. Creating a phishing page is an easy task and any one can download it from various hacking forums for free. The main step of phishing comes after creation of fake login page. If YouContinue reading “Hacking Fb using phishing”
How to make your PC Talk Just Like JARVIS in Ironman
So Lets Get It Started, Tools You Need : Windows 7 or 8 ( vista will not ) # Windows Speech Recognition Macros. (Download Here) # A Bluetooth/Wireless Headset With Mic (optional) # JARVIS Theme. (read below) Step 1 : Train Your Windows Speech Recognition Program : Yeah I Know, A Basic Step,Continue reading “How to make your PC Talk Just Like JARVIS in Ironman”
How to Setup and Use Nircmd
Nircmd is probably the most powerful command line tool by which you can perform hundreds of tasks. All you need to do is download the Nircmd.exe file on your computer and place it in a proper directory. It will make your command prompt line very powerful and so that you can perform countless numbers ofContinue reading “How to Setup and Use Nircmd”
Dos Attack Tut's
DOS DoS stands for Denial of Service. A DoS is an attempt to make a computer or network resource unavailable to its intended users. DDoS DDoS stands for distributed denial-of-service. To explain it in a couple words, a DDoS is the same as a DoS. But with a DoS you are the one attack. DDoS’ingContinue reading “Dos Attack Tut's”