OpIslam: Israeli Hackers Hack HEC(Higher Education Commission) of Pakistan Website
Website of Higher Education Commission of Pakistan was hacked by the Israeli Hackers and Thousands of email addresses, user names and clear ...
Wellcome
OpIslam: Israeli Hackers Hack HEC(Higher Education Commission) of Pakistan Website
Website of Higher Education Commission of Pakistan was hacked by the Israeli Hackers and Thousands of email addresses, user names and clear ...
XSS in Google Finance
On July 11 2013, I reported to Google Security a XSS vulnerability I discovered in google.commain domain, which required no user interaction...
Learn about SQL injection based Hacks
Put on your black hats folks, it’s time to learn some genuinely interesting things about SQL injection. Now remember – y’all play nice with ...
Hack a website using remote file inclusion
Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the ...
Bluejacking Bluetooth+Hijacking
BlueJacking is one of the mostly harmless activity can happen with any multimedia cell phone. Though it is an unintended and illegal use o...
How to become anonymous on Internet and access any block site
Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet...
Control Mouse Movement by your Hand or Head Gestures with NPointer
if you need to work much on the computer (like me) and tend to take small breaks to sit back and lean on the chair, then you must have fel...
How Antivirus Software Works
Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus so...
Chat with Friends through ms dos Command Prompt
1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls...
Basic of Password Cracking for Beginner
Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A ...
Repairing Windows XP in Eight Commands
Windows could not start because the following file is missing or corrupt: \\WINDOWS\\SYSTEM32\\CONFIG\\S YSTEM You can attempt to repair thi...
Autorun.inf attak!! ? read this and know what happen to inf file
Autorun.inf virus attack! Is autorun.inf virus? This is the instructions that saved in the infected(call virus programs) autorun.inf file: ...