Pages

Wednesday, December 28, 2011

Computer Can Speak Whatever You Type

This is an amazing trick to amaze your friends.By using this trick you can make your computer to speak whatever you type.This trick is working on all microsoft operating system and does not require any programming skills.You have to follow just simple steps and your own Text to Voicesoftware will be ready.If you show this software to any of your friends he will be certainly impressed with you . 1.Open Notepad and copy and paste the following code...

Friday, December 23, 2011

Hacking yahoo messenger for multi login

we often chat on yahoo messenger. I don't think so that there is anyone who really doesn't know about yahoo messenger. but what most people don't know us that we can chat with multiple accounts on yahoo messenger at same time. In other words we can chat with different IDs at same time. So if you need to open and login multiple Yahoo! Messenger accounts as you have a few Yahoo! ID or various other reason, just use the small registry registration...

Hack Linux Password

Linux is an operating system which is come across it. Though Mac and Linux are both based on UNIX, it is easier to change the password in Linux than it is OS X. step-1:     To change the password, turn on the computer and press the ESC key when GRUB appears. step-2:     Scroll down and highlight  "recovery mode" and press the "B" key; this will cause you to enter in a                ...

Tuesday, December 20, 2011

Making a computer virus

In this post we will study about the making computer virus in an easy way. Step 1:- Download the Necessary software for VIRUS making. Download From Here Step 2:- Unrar the pack. Step 3:- Now open the software and You Will Get the Following Screen.  Step 4:- Now Select any (can be more then one) Victim option from the given options as done above. Step 5:- For Virus of Fake Message select the Fake Error Message and write the message...

WEP Cracking Using Airo Wizard

In This Tutorial We Will learn to hack/crack the WEP (Wired Equipped Privacy). A WEP key is a security code used on some Wi-Fi networks. WEP keys allow a group of devices on a local network (such as a home network) to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders. A WEP key is a sequence of hexadecimal digits. These digits include the numbers 0-9 and the letters A-F. Some examples...

How To View Hidden Password Behind ****

Step 1.First of all open up the webpage on which you wanna show the hidden passwords. Step 2. Then in the username there must be the name and in the password there must be ******** Step 3.Now to see the password which is behind the ******** Just copy and paste the following JavaScript into the address bar of the browser and you are done. javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22; %20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)...

Chat With Friends using MS-DOS

Step 1:- All you need is your friends IP address and your Command Prompt. Step 2 :- Open your notepad and write tis code as it is. @echo off: A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A3. Step 3 :- Now save this as "Messenger.Bat Step 4 :- Drag this file (.bat file)over to Command Prompt and press enter! Step 5 :- You would then see some thing like this: MESSENGER User: Step 6 :- you want to contact. Step 7 :- MESSENGER User: IP_Address User: IP_Address Message: Hi, How are you ?...

Sunday, December 18, 2011

Yahoo Chat Commands

Simple yahoo chat commands you can use directly in the messenger. /join [room] go to what ever room you wish /invite [buddys name] sends invitation request /tell [user] [message] private messages a friend /follow [user] follows a friend /stopfollow [user] stop following someone /stopfollow [yourname] to stop them from following you /goto [user] enters the room the user is in/away [off] turn your private messages back on /think [message] (type this to think what you want /ignore [list] list everyone who you are ignoring /ignore add [user]...

Hacking Deep Freeze

Deep Freeze uses a unique method of disk protection to preserve the exact original standard system configuration on over eight million Windows & Macintosh & Linux computers worldwide! This Attack can mostly be used in cyber café's / colleges / schools etc. Where permissions are not granted to install any software on computer so you can use following steps to hack Deep Freeze. Step 1:- First of all you need software called Deep Unfreezer. Download from here Step 2:- Unrar the downloaded Software and You will find the file named DeepUnfreezerU1.6.exe...

How To Remove and Add Right-Click Menu Items

A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-click menu can get very long with added items you don't even use. The last person I was helping with this had a right context menu so long that the Rename option was no longer visible! Fortunately, you can easily remove those unwanted menu items, if you know the registry values to edit. And it's not at all difficult once you know the keys responsible for the additions. For...

Friday, December 9, 2011

Solve Huawei Modem Problems

We all know that you can try to unlock a Modem with just 3 Attempts, anything other than that, Modem will be Permanently Locked and will never be Unlockable. Today, many toolas are in a market and these Tools can Fetch you a whole Lots of Money, You just have to be Smart and Learn How to Use them solve different Modem Problems. So to upgrade firmware of your modem just download appropriate to your modem and upgrade your modem thats it.... Download...

Hacking Computer In LAN

This technique will be taking advantage of Port 139. Most of the time,Port 139 will be opened in the computer. First of all, we will do a port scanning at the target computer.... As shown in the fig. port 139 is opened. Now you will need both of these following tools:USER2SID & SID2USER and NetBios Auditing Tool User2sid and Sid2user are two small utilities for Windows NT, created by Evgenii Rudny, that allow the administrator to query the...

Thursday, December 8, 2011

Cain & Abel Password Recovery Tool

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows to recover various kind of passwords by sniffing the network, cracking encrypted passwords using dictionary and brute force attacks, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.Change Log :Added SAP R/3 sniffer filter for SAP GUI authentications and SAP DIAG protocol decompression. Added support...

XSS Vulnerability in Google Code site

Just go to http://code.google.com/apis/ajax/playground/ and then click on edit HTML after that remove all the codes and type this script : <img src="<img src=search"/onerror=alert("XSS")//"> and click on DEBUG CODE, and then first it will show you "Sample must have <head> element" click OK and wait for the window to load if nothing happen then try the same thing again or simply you can click on RUN CODE, and you will get a popup which...

Tuesday, December 6, 2011

Latest Hack For All Symbian Mobile

i am giving you a newest and easiest method for hacking all Symbian phones! click here Root Certificate hack Author: stas686 made by dimonvideo.ru team 1. Install CertUpdater.sisx 2. Sign CertHack.sis using your own Devcert 3. Install signed CertHack twice (!!!) -. Phone now hacked! You can sign and install any package using Leftup certificate (see Leftup.zip fold...

Thursday, December 1, 2011

Six Ways to Optimize Your Spam Detection Mechanism

       Spam is a scourge that causes several problems for most organizations and therefore needs to be stopped before it reaches the users’ mailboxes. Luckily, there are various types of anti-spam filters to suit different types of organizations; however, it is important to understand that spam detection can be quite tricky. If the configuration is wrong, valuable emails will be incorrectly classified as spam. You therefore need to ensure your anti-spam filter is configured correctly to avoid as many false negatives as possible...

Related Posts Plugin for WordPress, Blogger...