Website of Higher Education Commission of Pakistan was hacked by the Israeli Hackers and Thousands of email addresses, user names and clear text passwords for students with 21667 was published online.…
XSS in Google Finance

On July 11 2013, I reported to Google Security a XSS vulnerability I discovered in google.commain domain, which required no user interaction.It is due to a glitch in Google Finance, which is hosted on…
Learn about SQL injection based Hacks

Put on your black hats folks, it’s time to learn some genuinely interesting things about SQL injection. Now remember – y’all play nice with the bits and pieces you’re about to read, ok?SQL injection i…
Hack a website using remote file inclusion

Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. …
Bluejacking Bluetooth+Hijacking

BlueJacking is one of the mostly harmless activity can happen with any multimedia cell phone. Though it is an unintended and illegal use of a technical feature, mostly hard-core geeks do not find s…
How to become anonymous on Internet and access any block site

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects yo…
Control Mouse Movement by your Hand or Head Gestures with NPointer
if you need to work much on the computer (like me) and tend to take small breaks to sit back and lean on the chair, then you must have felt the need of some wireless mouse controller then this post…
How Antivirus Software Works

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the m…
Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt.2) Open Notepad and write this code as it is.....!@echo off:AClsecho MESSENGERset /p n=User:set /p m=Message:net send %n% %m%PauseGo…
Basic of Password Cracking for Beginner

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the passwo…
Repairing Windows XP in Eight Commands

Windows could not start because the following file is missing or corrupt:\\WINDOWS\\SYSTEM32\\CONFIG\\SYSTEMYou can attempt to repair this file by starting Windows Setupusing the original Setup CD-ROM…
Autorun.inf attak!! ? read this and know what happen to inf file

Autorun.inf virus attack! Is autorun.inf virus? This is the instructions that saved in the infected(call virus programs) autorun.inf file:[Autorun] Open=RECYCLER\QqFvXcB.exe Explore=RECYCLER\QqFvXcB.…