WikiLeaks Expose Charges China of Hacking GoogleWikiLeaks Expose Charges China of Hacking Google

A leaked document passed on to the New York Times by WikiLeaks cites an unidentified Chinese contact warning the US Embassy in Beijing about the Chinese Politburo's involvement in the 2009 Google atta…

Read more »
30 Nov 2010

HTTP SESSION HIJACKING (Cookie Stealing)HTTP SESSION HIJACKING (Cookie Stealing)

When you log in to your account at a website, your web browser sends your username and password to the website server. The password is first encrypted and then send over the network. Then the server c…

Read more »
16 Nov 2010

HACKING GMAIL AND FACEBOOK ACCOUNTS USING GMAIL SECURITY QUESTIONHACKING GMAIL AND FACEBOOK ACCOUNTS USING GMAIL SECURITY QUESTION

I like to check the password retrieval option of different sites and when i was checking out Gmail's option i found and interesting thing. Its not something ingenious or new thing but thought of s…

Read more »
15 Nov 2010

Twitter users hit by viral hack attackTwitter users hit by viral hack attack

Twitter users were victims of a cross-site scripting (XSS) vulnerability today as users reported message pop-ups and third-party websites being accessed without consent.In a statement, Twitter said th…

Read more »
01 Oct 2010

A DUMB METHOD TO HACK EMAIL IDsA DUMB METHOD TO HACK EMAIL IDs

We all know that hackers are one of the most creative people in the world and they always invent ingenious hacking methods. Here is a method for "mass hacking" email ids. Though its a smart method, mo…

Read more »
31 Aug 2010

THE HACKER'S JARGON FILETHE HACKER'S JARGON FILE

The hacker's jargon file is like a hacker's slang dictionary. It is mostly collected from the early hacking cultures. It was first started by Raphael Finkel of standford university. After that it was …

Read more »
30 Aug 2010

HISTORY OF HACKING (discovery channel documentary)HISTORY OF HACKING (discovery channel documentary)

This is a discovery channel documentary on "history of hacking" giving a brief account of the development of Hacking and tells about the new trends and techniques evolved with time.It is focused on th…

Read more »
28 Aug 2010

Web Hacking-Attacks And DefenseWeb Hacking-Attacks And Defense

The book gives you information about  how Web hacking occurs and teaches you enhanced skill at developing defenses against such Web attacks. Technologies covered in the book include Web languages and …

Read more »
25 Aug 2010

DECRYPTING DVD TO STORE THEM IN HARD-DRIVEDECRYPTING DVD TO STORE THEM IN HARD-DRIVE

DVD are very prone to damage and scratches. They are costly so there is a need to save them as a copy on the hardrive but the copy protection doents allow the user to do so. so here is are some free s…

Read more »
24 Aug 2010

Certified Ethical Hacker Study GuideCertified Ethical Hacker Study Guide

Kimberly Graves, CEH, CWSP, CWNP, CWNA, has over 15 years of IT experience. She is founder of Techsource Network Solutions, a network and security consulting organization located in the Washington, …

Read more »
22 Aug 2010

HOW TO USE PATCH FILE ( provided with cracked softwares)HOW TO USE PATCH FILE ( provided with cracked softwares)

Generally the executable files which are provided by software developers to fix some bugs in their software or as a update to the latest version of their softwares used by the users are called Patch F…

Read more »
13 Aug 2010

GENUINE SERIAL KEYS AND CRACKSGENUINE SERIAL KEYS AND CRACKS

Many sites on the Internet claim to provide free genuine keys and cracks for softwares and games, but mostly all of them are spam and ad sites. So here is a site which genuinely provides free serial ,…

Read more »
11 Aug 2010

CRACKING ACCESS DATABASE PASSWORD (using CAIN & ABEL)

Windows Access is a software from Microsoft for database management.Access database are widely used in many softwares and fields, but this database are mostly password protected by the creator. so her…

Read more »
03 Aug 2010

HACKER MANIFESTOHACKER MANIFESTO

This is a small essay written in 8 January 1986  by Loyd Blankenship a hacker who went by the handle (or pseudonym) of "The Mentor". He wrote this after he was caught. It was published in the "Phrack"…

Read more »
02 Aug 2010

Matriux- open source security distroMatriux- open source security distro

Matriux is a fully featured security distribution consisting of a bunch of powerful, open source and free tools that can be used for various purposes including, but not limited to, penetration testi…

Read more »
24 Jul 2010

Installing Android on HTC TouchInstalling Android on HTC Touch

Interested in Android but think you need to buy a new phone to try it out? Actually, your Windows Mobile phone may already have the capability of running Android. Today we show you how and the type of…

Read more »
16 Jul 2010

SECURITY MEASURE AGAINST USB HACKINGSECURITY MEASURE AGAINST USB HACKING

Now-a-days usb hacking has become very popular because its easy and quick. computers in institution and other public asses computers are very vulnerable to it.so here is the software to protect the co…

Read more »
14 Jul 2010

EASY METHOD TO ACCESS BLOCKED WEBSITE FROM YOUR COLLEGE OR SCHOOL (tutorial)

Many websites are blocked in schools and colleges for avoiding the misuse of the Internet but you can easily bypass this. Some of them use sophisticated methods but mostly the the preventive measures …

Read more »
03 Jul 2010

RESET WINDOWS XP PASSWORD IN 5 MINUTES...

Did your parents or some elder brother set a login password to prevent you from using computer or you think they may in future then here is a way to reset windows XP password in five minutes*MAKING TH…

Read more »
27 Jun 2010

RAR ARCHIVE PASSWORD CRACKER

Many times the free software or books you download online are rar archives which are password protected.first they fool you and allow you to download the files saying that they are absolutely free but…

Read more »
24 Jun 2010

SECURITY MEASURE TO BE TAKEN BEFORE INSTALLING HACKING SOFTWARESSECURITY MEASURE TO BE TAKEN BEFORE INSTALLING HACKING SOFTWARES

1) Please keep your antivirus updated because every passing minute hundreds of new virus and trojans are born and left loose in the cyberspace.2) Use software like "spyware doctor" to protect you aga…

Read more »
19 Jun 2010

SECURITY TIPS AGAINST PHISHING ATTACKSECURITY TIPS AGAINST PHISHING ATTACK

1) Always check the url of the login page of your account before logging in any site.if the url shows any other address then website you want to log in please dont do it.2) Never follow any link to a…

Read more »
19 Jun 2010

HACKING WINDOWS XP EBOOKHACKING WINDOWS XP EBOOK

This is great book on windows XP hacking. From this book you can learn very interesting xp hacks like increasing its speed, customizing it, protecting it better.DOWNLOAD…

Read more »
17 Jun 2010

CRACKING WINDOWS USER PASSWORD USING "CAIN AND ABEL"

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords usin…

Read more »
15 Jun 2010

DOWNLOAD THE BEGINNERS BOOK TO HACKING DOWNLOAD THE BEGINNERS BOOK TO HACKING "HACKING FOR DUMMIES" FOR FREE

DescriptionThere is certainly no shortage of books in this genre- Counter Hack, Hack Attacks Revealed and the best-selling Hacking Exposed (and all of its spin-offs) have covered this information i…

Read more »
13 Jun 2010

PHISHING TUTORIAL FOR BEGINNERS

PHISHING is a hacking method in which the attacker sends a email or link. clicking on which will take you to a site which looks exactly the same as the site you use like facebook, orkut, gmail etc. w…

Read more »
10 Jun 2010

KEYLOGGING AND USING KEYLOGGERSKEYLOGGING AND USING KEYLOGGERS

One of the most popular and easy way of hacking passwords, social networking accounts and other information is keylogging.Keylogging in general refers to keeping a track of the keys pressed on a compu…

Read more »
10 Jun 2010

HACKING SOCIAL NETWORKING SITES LIKE ORKUT ,FACEBOOK,MYSPACE ETC.

I have noticed, that most people get interested in hacking just to hack their Friend's or enemy's social networking account, so i am writing this tutorial to introduce you to some basic, easy and popu…

Read more »
10 Jun 2010

lets take sometime understanding the concept of hackingHacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer.a…

Read more »
10 Jun 2010

welcomewelcome

Welcome all slaves of the cyberworld.There is a general opinion that hacking is some mystical thing dangling between quantum physics and wizardry and can only be done when you master all computer and…

Read more »
05 Jun 2010
 
Top