Xiaomi Mi4c Leaked To Come With Type-C USB port and Even More Internal Storage

It was earlier reported that Xiaomi Mi4c is going to carry a price of less than $250, which is a steal of a deal considering that you will get a smartphone running a Snapdragon 808 chipset in it.

Wednesday, 31 October 2012

A Prank Virus

NOTE : PLEASE DO NOT TRY ON YOUR COMPUTER !!  First open the notepad and copy and paste the below mentioned codes in notepad and see the fun. You can edit the codes to make more funny or even deadly...

Monday, 29 October 2012

Find keylogger or any spyware in PC

Its  great method to find or detect a keylogger or any other spyware in your PC or system. As we all know nowadays keyloggers and spywares are big concern as hackers are trying their best to infect the victims to hack their accounts. Today i will teach you how to find a...

Sunday, 28 October 2012

How to shutdown your friend's Pc

How to shutdown your friend's Pc through chating using cmd Hello friends. You can shutdown your friend's computer through chating. This is very simple and cool trick. Kindly follow these steps ...

Saturday, 27 October 2012

What Is Brute Force and some Softwares for brute force attack

Hi , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat.... Brute force (also known as brute force cracking) is a trial and error method used by application...

Flame (malware) what you need to know

Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.The program is being used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced...

Dangerous Email File Attachments You Should Be Aware Of

Among the email attachment extensions that should not be opened at all, or if completely necessary, should be open in the special secure environment, are: Very Dangerous File Formats: .reg Possible Windows registry attac...

Friday, 26 October 2012

Ubuntu: The Complete Introduction for Beginners

Ubuntu is linux based operating system with the origin in south africa. Its name means "humanity towards others". Back in 2004, Linux was already established as a server operating system, but free software was not yet a part of everyday life. Further, Linux was thought of as...

Thursday, 25 October 2012

Advanced Port Scanning techniques

Advanced Port Scanning techniques ----------------------------------------------------------------------------- Today i will teach you different types of port scanning and their analysis, drawbacks etc. Lets start with a brief overview of yesterday's tutorial. In simple words,...

How to remove youtube copyright.[tutorial]

How to remove youtube copyright. This guide will tell you how to resolve copyright issues for your youtube videos. With this, you can have your favorite music and images without that WMG deleting your account. This method only covers 99% of copyrighted...

Tuesday, 16 October 2012

How To: Delete ghost messages from MS Outlook

Most people who use Microsoft Outlook as an email client for Gmail or their personal POP mail would sometimes notice that it is trying to send out emails but there aren’t any in the outbox. These are usually ghost messages that have been sent earlier or are too large and stuck...

Sunday, 14 October 2012

Creating a Telnet Trojan for Windows XP

Following batch script will act as Telnet Trojan to any windows XP system, the best part of it is it's fully undetectable to all ant-virus programs. Copy following lines in notepad and save with any name with .bat extension for example Trojan.bat. Cod...

Saturday, 13 October 2012

Warning: Fake Skype app. on Android is malware

A new piece of malware is trying to take advantage of Skype's increasing popularity, especially on mobile devices. Cybercriminals have created a fake version of the Skype for Android app, designed to earn money from unsuspecting users. Trend Micro, which first discovered the malware,...

Friday, 12 October 2012

COLLECTION OF SERIEL KEYS ! (part 2)

Macromedia Studio MX ::::WSW600-59791-91721-99978 Magic Converter V 7.9.5.1 - MVC182749 Make Money 2.0 :::: PRF0200153 Mechanical Desktop 6.0 ::::400-19791979 / CD-Key:TLSQBS MS Office 2007 - KGFVY-7733B-8WCK9-KTG64-BC7D8 MS Office 2010 Key - GGG8W-PJFRT-8MRQH-X99J2-PPPVM MS XP - User Name - Creative, CD Key - FM9FY TMF7Q KCKCT V9T29 TBBBG Nero Burning Rom 5.5=> 9M03-01A1-PCX7-K31A-8A94-98PT-KT2E-522A3D Nero...

COLLECTION OF SERIEL KEYS ! (part 1)

Here is the some keys and serial number of some softwares 3D Studio Max 4 :::: Number:226-19791979 / CD Key:XLSQBQ9zfll2WrZc+Vn0hWaw2dV/sccwKwsWY05TPwHden Acrobat Distiller - WAW210P7121183-537 Adobe After Effects 5.5 : EWW470R1001999-030-259 Adobe Frame maker 7.0 ::::1030-1208-8265-3458-9287-7077- Adobe...

What is CAPTCHA?

INTRODUCTION A captcha is a program that can generate and grade tests that: Captcha (A) most humans can pass, but (B) current computer programs can't pass. Such a program can be used to differentiate humans from computers and has many applications for practical security, including...

Monday, 8 October 2012

List of codes for the fancy alphabets used n the facebook chat box

Here is a list of codes for different alphabets:-   A = [[399197913893]]   B = [[115345298505025]]   C = [[53872404042]]   D = [[226910642728]]   E = [[140775945956538]]   F = [[136046106447549]]   G = [[119431374760220]]   H = [[205082339544090]]  ...