
Wednesday, 31 October 2012
A Prank Virus

NOTE : PLEASE DO NOT TRY ON YOUR COMPUTER !!
First open the notepad and copy and paste the below mentioned codes in notepad and see the fun. You can edit the codes to make more funny or even deadly...
Monday, 29 October 2012
Find keylogger or any spyware in PC

Its great method to find or detect a keylogger or any other spyware in your PC or system. As we all know nowadays keyloggers and spywares are big concern as hackers are trying their best to infect the victims to hack their accounts. Today i will teach you how to find a...
Sunday, 28 October 2012
How to shutdown your friend's Pc
How to shutdown your friend's Pc through chating using cmd Hello friends. You can shutdown your friend's computer through chating. This is very simple and cool trick. Kindly follow these
steps ...
Saturday, 27 October 2012
What Is Brute Force and some Softwares for brute force attack

Hi , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat....
Brute force (also known as brute force cracking) is a trial and error method used by application...
Flame (malware) what you need to know

Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.The program is being used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced...
Dangerous Email File Attachments You Should Be Aware Of

Among the email attachment extensions that should not be opened at all, or if completely necessary, should be open in the special secure environment, are:
Very Dangerous File Formats:
.reg Possible Windows registry attac...
Friday, 26 October 2012
Ubuntu: The Complete Introduction for Beginners

Ubuntu is linux based operating system with the origin in south africa. Its name means "humanity towards others". Back in 2004, Linux was already established as a server operating system, but free software was not yet a part of everyday life. Further, Linux was thought of as...
Thursday, 25 October 2012
Advanced Port Scanning techniques

Advanced Port Scanning techniques
-----------------------------------------------------------------------------
Today i will teach you different types of port scanning and their analysis, drawbacks etc. Lets start with a brief overview of yesterday's tutorial.
In simple words,...
How to remove youtube copyright.[tutorial]

How to remove youtube copyright.
This guide will tell you how to resolve copyright issues for your youtube videos. With this, you can have your favorite music and images without that WMG deleting your account.
This method only covers 99% of copyrighted...
Tuesday, 16 October 2012
How To: Delete ghost messages from MS Outlook

Most people who use Microsoft Outlook as an email client for Gmail or their personal POP
mail would sometimes notice that it is trying to send out emails but there aren’t any in the
outbox. These are usually ghost messages that have been sent earlier or are too large
and stuck...
Sunday, 14 October 2012
Creating a Telnet Trojan for Windows XP
Following batch script will act as Telnet Trojan to any windows XP system, the best
part of it is it's fully undetectable to all ant-virus programs. Copy following lines in
notepad and save with any name with .bat extension for example Trojan.bat.
Cod...
Saturday, 13 October 2012
Warning: Fake Skype app. on Android is malware
A new piece of malware is trying to take advantage of Skype's increasing
popularity, especially on mobile devices. Cybercriminals have created a fake
version of the Skype for Android app, designed to earn money from
unsuspecting users. Trend Micro, which first discovered the malware,...
Friday, 12 October 2012
COLLECTION OF SERIEL KEYS ! (part 2)
Macromedia Studio MX ::::WSW600-59791-91721-99978
Magic Converter V 7.9.5.1 - MVC182749
Make Money 2.0 :::: PRF0200153
Mechanical Desktop 6.0 ::::400-19791979 / CD-Key:TLSQBS
MS Office 2007 - KGFVY-7733B-8WCK9-KTG64-BC7D8
MS Office 2010 Key - GGG8W-PJFRT-8MRQH-X99J2-PPPVM
MS XP - User Name - Creative, CD Key - FM9FY TMF7Q KCKCT V9T29 TBBBG
Nero Burning Rom 5.5=> 9M03-01A1-PCX7-K31A-8A94-98PT-KT2E-522A3D
Nero...
COLLECTION OF SERIEL KEYS ! (part 1)

Here is the some keys and serial number of some softwares
3D Studio Max 4 :::: Number:226-19791979 / CD
Key:XLSQBQ9zfll2WrZc+Vn0hWaw2dV/sccwKwsWY05TPwHden
Acrobat Distiller - WAW210P7121183-537
Adobe After Effects 5.5 : EWW470R1001999-030-259
Adobe Frame maker 7.0 ::::1030-1208-8265-3458-9287-7077-
Adobe...
What is CAPTCHA?

INTRODUCTION
A captcha is a program that can generate and grade tests that:
Captcha
(A) most humans can pass, but (B) current computer programs
can't pass. Such a program can be used to differentiate humans
from computers and has many applications for practical security,
including...
Monday, 8 October 2012
List of codes for the fancy alphabets used n the facebook chat box

Here is a list of codes for different alphabets:-
A = [[399197913893]]
B = [[115345298505025]]
C = [[53872404042]]
D = [[226910642728]]
E = [[140775945956538]]
F = [[136046106447549]]
G = [[119431374760220]]
H = [[205082339544090]]
...