Tuesday, July 31, 2012

A New Hack FRO Auctions in EBAY

Just found this on the net, so I gave it a try.it actually works.Very handy if you are an Ebayer.EnjoyWhen you look at an item and click on bid history all the bid amount are replacedwith "-" until the end of the auction.To view these amounts before the auction ends when viewing the item changehttp://cgi.ebay.co.uk/ws/eBayISAPI.dll in the address bar tohttp://cgi.ebay.com/ws/eBayISAPI.dll And then click on the bid history. The bid amounts will be shown.Now enj...

SQLI Helper Tutorial - A Must Read Article

Today I am going to show you people how to use SQLi Helper to Hack a Website. The SQLi Helper is a tool used to do all the work automatically which a Hacker would have to do manually. That make it a very popular tool among script-Kiddies as well as Pros.You can download the SQLi Helper from Here.It should look this this:Now the First Step is to give the Target site like http://targethost.com/expoit.php?id=1 (Note: This is not the real site). After you give  the target site click on the Inject button.And then click on the Get Database Button.Now the following Information will be available about the Host:Now to take the attack forward choose a Database from the Database...

3 Ways To Choose A WPA Key That’s Difficult To Hack

Wi-Fi is a great way to stay connected to the Internet all over your home without huge wires, and is the only way many devices like the IPad have access to the Internet. Too often users compromise security for convenience and either leave their network open or choose an easy password. Here are three tips to choosing a secure WPA key for your home WI FI Network. 1. Avoid Dictionary Words Most Wi-Fi hackers get in with a brute force attack. A brute force attack tries random commonly used words and phrases together over and over until it finds the password. If you use simple dictionary words to secure your Wi-Fi than it isn’t a Question of if a hacker can get in but rather when. 2. Use Random Capitalization Since most things are case sensitive getting into the habit of a capitalization...

How to hack a computer with Nmap and Metasploit

I have written different hacking articles about Nmap and Metasploit. Now I am writing this article to teach how to hack a computer using these two great tools. Just got Here and download the Latest Framework.Now open the metasploit console. And type the following commands:1: db_create (this will create database needed for this attack)2: TYPE nmap -sT –sV XXX.XXX.XXX.XXX( X be the IP address of victim)Now give it time to scan and when it is complete type following command.3: db_autopwn -p -t –eThis would start the penetration test and great thing about this is that it does not need any manual configuration. Every thing will be done automatically and if the test is successful a shell will be creat...

10 Best Yahoo! Messenger Tricks and Hacks

Yahoo! Messenger is an instant messaging program which is compatible with all Windows versions. While instant messaging is the focus of Yahoo! Messenger, there are several special tricks that can enhance the user experience. Here are my 10 Best Yahoo! Messenger Tricks and Hacks: 1. Find invisible users on your Yahoo! Messenger list Want to find out someone who’s hiding from you? You can easily do so by going to Yahoo! Invisible Checker. All you need to do is type in the Yahoo! ID and the particular users status will be revealed. 2. Invisible nickname on chat rooms Just go to edit profile and in the nick name type a (space character) on it just press Alt 0160 ( or ALT+255 ) and save it. Now go to any Yahoo! chat room and you’ll notice that your...

How To Find Hidden Web Pages - URL Cracking

URL cracking is a useful technique that anyone can apply but is often overlooked by web surfers content to trust the information they see on the page in front of them. URL cracking is a technique in which a searcher pre-empts, alters and guesses URL's that are likely to appear within a site in order to turn up hidden or ostensibly inaccessible pages. As an example of how this technique can work let's assume you have reached the front page of a site that covers a topic you are interested in but all the page says is:"Welcome to John's Computer Site.This site is under construction, please check back soon".Not very helpful and there are no links on the page.The 'under construction' part serves as a clue. It means that it is likely that John has already prepared some pages for his site. Maybe he's...

Monday, July 30, 2012

How To Send a Self Deleting SMS

Basically this technique is called SAFE-TEXT. It's a technique where a message destroys itself after being read. If you want to call it the Data-centric Suicide Message, that's fine too. This is a website that allows you to send such type of sms for free of cost after registering on it. But it has limitation that you can send only 10 SMS a day.So here's the thing. With Wikileaks on one side and British libel law on the other, there's room for a tool that lets you say what needs to be said, but without it falling into the wrong hands in the process.What it does is allow you to send an expletive-laden opinion of your boss to a co-worker, or an it's-in-the-public's-interest-to-know-this leak to your friend on the Guardian (or Wired), without it having a chance to be read by said boss, or unsaid...

Free Premium Accounts for 13 Download Sites - Download Music, Movies, Games, Software and Much More

Best Download Sites - Get full version Games, Applications, Movies, MP3s, TV Shows, eBooks, Software, Security/Hacking Tools...In this article i will share a list of usernames and passwords of the premium accounts for Best download sites. All of the accounts are working 100%.Here is the list:1. www.butterflydownloadnetwork.com (Download Movies, Music, PC Games, Shows)Username : cinemanetwork20Password : butterfly202. www.downloadprofessional.com (Software, Movies, Music, TV Shows, Full version games)Username : lo886EesPassword : zAgt88er3. www.divxcrawler.com (Direct Download Movies, Software and Music Videos)Username : divx273Password : 83427294. www.sharingzone.net (Games, Software, Movies, TV shows, Music and more)Username : LODMQYHXPassword : 375021402Receipt : 4T5W89RD5. www.watchdirect.tv...

Trojan Virus attacks: An analysis

What is a Trojan virus? A virus that looks like a harmless and useful program but actually contains a code that can destroy data or install adware or spyware on your computer. Trojan viruses can be embedded in email attachments, programs that have been downloaded, or even through operating system vulnerabilities on your computer.A recent tactic that hackers are using is to put the virus in pictures. Never download anything you do not recognize. Unlike the regular computer viruses Trojans do not replicate. What does a Trojan virus do to your computer? Trojan viruses can do much damage to your computer or worse, hackers can read the files and personal information from your computer and steal your identity. They can also add unwanted spyware and ad ware, deliver unsolicited pop-ups and advertising,...

Sunday, July 29, 2012

Send Free Unlimited SMS to Any Country

Hi all users as all the describes the story that by using this site you can send unlimited SMS to any number to any country throughout the world. This site has four SMS servers and the good thing is that you can use them totally free of cost and of course without any registrations. So lets get started.Click here to got to the linkEnjoy.......

Crack Activator Microsoft Office 2010 Plus

Crack Activator Microsoft Office 2010 Plus | 5.02 MbThe Version Of Office 2010 That Supports The Activator:Microsoft Office Professional Plus 2010 32-Bit/64-Bit (Version Retail And VL)Microsoft Visio Professional 2010 32-Bit/64-Bit (Version Retail And VL)Microsoft Project Professional 2010 32-Bit/64-Bit (Version Retail And VL)Activation-Feautures:Fully Automated Activation Process.Automatic Notification Appears If UAC In Windows 7,Not Vista Or WindowsServer 2008 Off.At The Same Time After Clicking Yes Will Turn Off And RestartActivation Duration Is 180 Days.Then Run It Again And It Works Without Problems.Usage:- Turn Off UAC,And Firewall.- First Run The Activator With Admin Rights And Than Activate It.Appearance Dialog Box Asking You Are...

Free Download Microsoft's Office 15

Microsoft is currently testing a Technical Preview version of Office 15, its next-generation Office productivity suite. A small number of third-party partners, OEMs, and businesses have access to the code, but Microsoft is staying mum on the exact features of its next release. We previously took a closer look at Office 15 with detailed screenshots of its new Metro inspired interface, showing off the clean and simple look for the future of Office. Today we are able to share details on a number of new and improved features in each of the core applications for Office 15, thanks to several people with access to the early Technical Preview code. From Touch and Reading Mode to a Weather Bar feature in Outlook 15, we have...

Microsoft Excel 2007 : 10 techniques

Written by professionals working actively in the I.T. industry, this short e-book on ms excel reveals 10 techniques which pros use everyday.This short e-book on ms excel is written in an easy to read style with real examples for you to practice along.You are bound to lift your confidence in under 25 pages of reading. Request your copy to begin learning ms excel toady.Click here to request your FREE c...

Get Microsoft chat support to contact Microsoft Office

Microsoft Office is an Office suite of inter related computer applications like Microsoft Word, Outlook, Excel and PowerPoint, servers and services for Windows operating systems and also certain other operating systems like Mac OS X. Microsoft Office products are so popular among the users and is very useful package providing amazing features to general users for use in office and home. As such it is seen that many issues are being faced by people with this application and the troubleshooting tricks are also widely available.One such easy way to get assistance on the Microsoft Office suite of products is by contacting Microsoft Office, which will provide you with plenty of information and help on all the Office programs. For any support services...

Microsoft Office Hacks

This article is just to make u aware of knowm existing threats only for educational purpose.I have stumbled onto a couple potential security issue in Microsoft Word blogs i would like to share. In both cases the adversary (mis)uses fields to perpetrate the attack. It's important to note that fields are not macros and, as far as I know, cannot be disabled by the user. I am providing a basic description along with a proof-of-concept demo. I am fairly certain that someone with free time and imagination can expand on these principles, possibly applying them to other products.Following tradition I'll use Hacker and Victim as the two parties involved.Hacker will be the adversary.1) Document collaboration spyware.Attack...

Saturday, July 28, 2012

Track changes in Microsoft Word 2010

How to accept Track changes in Microsoft Word 2010?"Track changes" is wonderful and remarkable tool of Microsoft Word 2010. The feature allows editing your documents without making the changes permanent. It means if you have deleted a word, Track back highlights it, though the word is deleted but until final changes are accepted, it remains there.A track change is very helpful when you are working on draft that needs extra care. For Example you are working your project and you are not sure whether changes you made are right and you want to take your professors/superiors opinion. Today the world has become global village, now virtual teams sitting in different parts of world are working on same projects. They need to communicate, they suggest...

Page 1 of 4012345Next

ShareThis

Related Posts Plugin for WordPress, Blogger...

 
Design by Wordpress Theme | Bloggerized by Free Blogger Templates | coupon codes