Download Software Here candy crush soda saga hack candy crush soda saga hack tool candy crush soda saga hack cydia candy crush soda saga...
Read More
Home
Archive for July 2015
70 Best New Hacking Ebook Collection Free Download 2015
Download 70 Best New Hacking Ebook Collection Free Download 2015 Description as:: Hacking The Windows Registry Hugo Cornwall – The H...
Read More
Windows 7 serial keys (32bit) or (64bit).
Windows 7 Ultimate keys =================== 22TKD-F8XX6-YG69F-9M66D-PMJBM 342DG-6YJR8-X92GV-V7DCV-P4K27 FJGCP-4DFJD-GJY49-VJBQ7-HYRR2 9JBBV-...
Read More
Why Hackers and Programmers choose Linux instead of Windows and Mac?
-Linux is advanced High Level OS. -Comfortable for Hackers and others. -24/7 always virus free. -Greatest OS for Programmers to develop Soft...
Read More
What happens on the web in 30 seconds
-20,400 GB of global IP data transferred. -70+ BotNet Infections. -12 New victims of identity theft. -3+ New Wikipedia Articles published. -...
Read More
Website Hacking Video Series :
1. SQL Injection (Using Havij ) : https://www.youtube.com/watch?v=q2sOE6c57T8 2. Scanning Websites for Vuln : https://www.youtube.com/wat...
Read More
Top 9 Facts about Wikipedia :
Wkipedia is started in January 2001. Jimmy Donal is the co- founder and promoter of Wikipedia. 1. Wikipedia is non-profit organization. 2. I...
Read More
very Important & Useful full forms
After reading share it please ADIDAS- All Day I Dream AboutSports AUDI-Auto Union Deutschland Ingolstadt BMW- Baverian Motor Works AMW- Asia...
Read More
A Collection some Computer related full forms.
* VIRUS - Vital Information Resource UnderSeized. * 3G -3rd Generation. * GSM - Global System for Mobile Communication. * CDMA - Code Diviso...
Read More
List of Web developing programming languages of Top Websites.
Languages Used.... 1. Google – Java (Web), –C (indexing). 2. Facebook – PHP. 3. YouTube- Flash, Python, Java. 4. Yahoo– PHP and Java. 5. M...
Read More
Online PC Virus Scanners:
Some Reliable Sites To Do A Quick Free ONLINE Anti-Virus Scan: BitDefender QuickScan: http://quickscan.bitdefender.com/ Panda ActiveScan: ht...
Read More
Common Internet ERROR Codes
Error 400 - Bad request. Error 401 -unauthorized request. Error 403 - forbidden. Error 404 - Not found. Error 500 -Internal error. Error 501...
Read More
how to become a profesional hacker?
How To Became A Great hacker ? 1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SS...
Read More
Windows 7 hidden "GOD MODE" folder:
Windows offers a centralized Control Panel for all of the OS settings, which makes it easy for users to tweak everything from desktop backgr...
Read More
What is hacking - by famous hackers/programs
Hacking just means building something quickly or testing the boundaries of what can be done - Mark Zuckerberg Hacking is fun if you're a...
Read More
Hacker VS Programmer
1. A hacker beats the system. A programmer maintains the system. 2. A hacker is trying to get in. A programmer is trying to stop t...
Read More
7,000 Dorks for hacking into various sites
about.php?cartID= accinfo.php?cartId= acclogin.php?cartID= add.php?bookid= add_cart.php?num= ...
Read More
Full Form of Hacker
H - Hide IP A - Aim Victim C - Crack Encrypt K - Kill Firewall E - Enter into Database R - Return Anonymous
Read More
FIRST 1O PEOPLE WHO SIGN UP FOR FACEBOOK
1. Mark Zuckerberg - CEO of Facebook. 2. Chris Hughes - Hughes cofounded Facebook and was college roommates with Zuckerberg. 3. Dustin Mosk...
Read More
Download youtube video using VLC
1. Open your youtube on your browser then open your video and copy the URL. 2. Run your VLC 3. Click on Media 4. Goto Open Network Strea...
Read More
Download Youtube Videos with out installing any software:
Youtube is the paradise for watching videos online. Downloading videos from Youtube is pretty simple. You don't need to install any soft...
Read More
Download Collection of Hacking E-Books and tools (all in one)
Topics ======= Hackers Hierarchy and Becoming a Hacker Basic Computer Hardware Wireless Hacking (Wi-Fi Hacking) Linux Password Cracking Face...
Read More
Keyboard Disco light trick:
This trick just makes your keyboard lights go crazy and do disco. LoL. The script I’m sharing with you, when executed makes your Caps, Num a...
Read More
Disable-Enable Lock Workstation Functionality (Windows + L)
As everybody knows, using the Windows+L keys together will lock your workstation running Windows 7, XP or Vista. Did you realize that you ca...
Read More
Disable/Enable USB port:
1. Goto run 2. Type 'regedit' without quotes 3. Click on HKEY_LOCAL_MACHINE 4. goto SYSTEM 5. Click on CurrentControlSet 6. Cl...
Read More
Different Technologies & Their Founders
1. Google: Larry Page & Sergey Brin 2. Facebook: Mark Zuckerberg 3. Yahoo: David Filo & Jerry Yang 4. Twitter: Jack Dorsey &...
Read More
Difference between http and httpsin URLs
Difference between http and httpsin URLs The addresses that begin with"HTTP," stands for "Hyper Text Transfer Protocol."...
Read More
common passwords list (Download .txt)
A common passwords list download here . (81.06 Kb) Example:- password 123456 12345678 1234 qwerty 12345 dragon pussy baseball football letme...
Read More
Codes to hide folders and made like a system tools.
First make a folder then rename it like this <<Foldername + dot(.)+ below code>> My Briefcase:{85BBD920-42AO-1069-A2E4-08002B303...
Read More
CMD HACKING COMMANDS
I am Sure u guys Know All these commands.... I want to Help The Beginers.. So i am Posting This.... Useful Things to do on CMD! First, open ...
Read More
Check your presence of mind.
Check your presence of mind. Take the test. Proceed systematically. Relax, clear your mind and begin.. 1. What do you put in a toaster? Answ...
Read More
Android Secrete codes
Android Secrete codes ------------------------------------ 1. Phone Information, Usage and Battery – *#*#4636#*#* 2. IMEI Number – *#06#...
Read More
An A-Z Index of the Windows CMD command line
An A-Z Index of the Windows CMD command line A ADDUSERS Add or list users to/from a CSV file ADmodcmd Active Directory Bulk Modify ...
Read More
40+ operation written in c language
Do you know 40+ Operating systems written in C programming.. DG/UX DDC-l OpenVMS Ultrix HP-UX Enea OSE Google Chrome OS Android HP-UX 11i z/...
Read More
10 Free Online Tools a Hacker Must Know
I like the KISS rule, here are some online tools a Hacker must know: 1. Emkei’s Mailer : Email Spoofer 2. GuerillaMail : Email Spoofer - ...
Read More
7 Miscellaneous Hacking Attacks Ever Happened
1.) GIFAR: Graphics Interchange Format Java Archives (GIFAR) was a malware that lets attacker piggy back victim’s HTTP cookies. This attack ...
Read More
Subscribe to:
Posts (Atom)