Informations
Software Informations
How to resume broken links with idm
We all know Internet Download Manager (IDM) is the most powerful and popular downloader.But how you feel when you have already downloaded a ...
A Pakistani Informition Website For Learning and Fun
Informations
Software Informations
How to resume broken links with idm
We all know Internet Download Manager (IDM) is the most powerful and popular downloader.But how you feel when you have already downloaded a ...
Security tips
Web Security and Information Society
What is cyber security? It seems that everything relies on computers and the Internet now communication (email, cell phones), entertainment ...
books
Useful Books on security & hacking
1. Hacking Exposed 6- It is a great book on computer security covering all aspects of hacking and security which include system hacking, net...
Serail keys
Microsoft Office 2013 Product Key
Microsoft® Office 2013 Professional Plus 32 Bit Product Key : YFQXN-TCFV6-2DMY4-FFWM4-HQTXR Microsoft® Office 2013 Professional Plus 64 Bit ...
Secret Tricks
Andriod Secret Codes
Secret Codes For Your Android Mobile by Secret Codes For Your Android Mobile by Hi friends, here is a wide collection of secret codes for y...
Security tips
How to avoid getting adware
Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. Yo...
Security tips
Best Password Cracking Methods
These are comman methods which hackers use to hack your accounts and get your personal information 1. Rainbow Table A Rainbow table is a hu...
Security tips
How to Protect Yourself From Hackers
Step 1 Social Profile Change the privacy settings on your social profile (Facebook, MySpace, Friendster, Twitter, etc.) so that the followin...
Security tips
How to safe online shopping
Online shopping has become very popular to purchase all things without leaving your home, and it is a convenient way to buy things like e...
Security tips
How to Protect computer from Viruses
A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge. A Comp...
Security tips
Creditcard Fraud Protection
Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent ...
Security tips
Guidelines for Safe Downloading
While downloading any file close all the applications that are running on your computer, let only one set-up file run at a time of downloadi...
web application security
General Web Application Security Terms
Application Security Manager (ASM) A web application firewall from F5 Networks that integrates with WhiteHat Security Sentinel's vulnera...
Security tips
How to Detect Viruses installed on your PC
In this tutorial, I'll show you the easiest way of finding out malicious applications installed on your PC that transfer data using the ...
wireshark
How Hack (HTTP) Passwords With Wireshark
Most of the websites on the Internet use HTTP protocol for comunication which runs on Port 80, The data send to the server is Un-encrpyp...
Important Tricks
Hide The Files In Image
1. Gather the file you wish to bind, and the image file, and place them in a folder. I will be using C:\New Folder -The image will hereby be...
Wifi Hacking
Wifi Hacking Tool for Iphone
Four Best WiFi Cracking Applications For your Iphone 1. Aircrack-ng for IPhone: It is the simple command line with graphical interface s...
hacking router
REMOTE ROUTER HACKING
REMOTE ROUTER HACKING Introduction Ok, Basically this tutorial deals with how to scan large amounts of addresses for telnet services, which ...