1) Never trust sites that ask you for money in exchange for Software piracy or claim Hack Email Id in exchange for money . All these things ...
Whatsapp Account Hacking Method
Whatsapp ha c k to spy on some other account: So if all of you have noticed you cannot have your whatsapp account logged in two devices. Mea...
Secure Facebook Account
Take the following steps to ensure your Facebook account never gets hacked- 1. Use HTTPS instead of HTTP in the URL when you save the bookm...
Wireshark Purposes
►Wireshark -has been around for ages and is extremely popular. Wireshark allows the pentester to put a network interface into a promiscuous ...
Metasploit,Nessus and Nmap Detail
►Metasploit -The Metasploit Project is a security project which delivers information about security vulnerabilities and helps penetration te...
John The Ripper Tool Uses:
John The Ripper -is a free password cracking software tool. Originally created for the UNIX operating system, it currently works on every ma...
Ettercap tool uses:
Ettercap - is a free and open source network security tool for man-in-the-middle attacks (MITM) on LAN. The security tool can be used to ana...
Cain & Abel Uses:
Cain & Abel - has a reputation of being a bit of a script-kiddie tool, but it is still awesome nonetheless. Cain & Abel is defined a...
Aircrack-ng Tool Info
Aircrack-ng -is a comprehensive set of network security tools that includes, aircrack-ng (which can cracks WEP and WPA Dictionary attacks), ...
Acunetix Tool Info
Acunetix -has a free and paid version. This hacking tool has many uses but in essence it tests and reports on SQL injection and Cross Site s...
Save Laptop Battery Life
Must Share.. Follow Steps to Save Laptop Battery upto 20%: 1.Reduce Screen Brightness 2.Disable Bluetooth and Other Hardware Devices 3.Remov...
Create Multiple User Accounts With Single Gmail ID
Today I Am telling you a Gmail secret . An amazing trick. Friends. Do u know? You can create multiple user accounts (IDs) on 90% websites wi...
Use The Trial Program Forever
Steps to use the Trial Program Forever:- 1. Note the date and time of the software when it first installed 2. Once after the trial period ha...
INVENTORS OF FAMOUS PROGRAMMING LANGUAGES
★ INVENTORS OF FAMOUS PROGRAMMING LANGUAGES ★ 1. Joe Armstrong — Creator of Erlang. 2. John Backus — Inventor of Fortran. 3. Alan Cooper — D...
Best IT Information Websites
best it information websites 1. ZDNet 2. Cnet's News.Com 3. Information Week 4 Wired News 5 InfoWorld.com 6 Computerworld 7 CNN Tech N...
UseFull important Command
useful commands Display Connection Configuration: ipconfig /all Display DNS Cache Info: ipconfig /displaydns Clear DNS Cache: ipconfig /flu...
Send Files Over Wifi
... .. First of all you should have below thing: 1. A WiFi Internet Modem or You can make your laptop WiFi Hot-spot using this trick. 2. An...
7 MUST HAVE tools for every hacker
1. Nmap -For network exploration 2. Nessus Remote Security Scanner -Vulnerability scanner 3. Wireshark -Sniffer 4. Cain and Abel -Password r...
Major Types OF Internet Errors
Types of Errors. INTERNET ERROR CODES...!!! Error 400 - Bad request. Error 401 - unauthorized request. Error 403 - forbidden. Error 404 - No...
Teenieaccess P0rn Premimum Accounts
http://members.teenieaccess.com/ Username:measy31 Password:coolman31 Username: Genes200 ...