undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

6 Tips for Windows 8

Windows 8 is not yet released but it has created quite a hot discussion in the cyber world.Let me give you 6 important tips for windows 8.Windows 8 is mainly made for the touchscreen devices as they seem to be the next big thing. You dont have to use the ribbon interface in the explorer windows  You can change this in the Computer Configuration.Select "Administrative Templates"...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Anonumous Email Service

You need a free hosting account which supports PHP and SendMail.The best one is x10hosting.com. Create an Account there. Now in a new notepad paste this PHP code .Click here for code Save it everywhere you want as mail.php,then upload it in your host you created(x10hosting)via FTP. Now we are ready.Just go to yourname.x10hosting.com/mail/php and start sending your fake emails.                       &nb...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Windows Phone 7.5 Denial of Service Attack Vulnerability

A malicious SMS was sent to A windows phone and the message hub was attacked.This had already happened to Android  and Apple.Hackers could get complete control of Apple OS but not of Android.Any way take a look at the video and leave your comments...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Create your own bootable Windows(XP,VISTA&7)

There are many ways to create.But the method shown below is the easiest one. To begin you need a pendrive of 2 GB for XP and 4-8 GB pendrive for Vista and 7 -------------------------------------------------------------------------------------------------------- Download WintoFlash from here.(Its a brothersoft client you can download the software.For your safety!). Click the Windows Setup transfer...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Ardamax Tutorial for Hacking

Ardamax Keylogger is an invisible keylogger that records all user activity and saves it to an encrypted log file. The log file can be stored as a text or web page. Use this keylogger to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically. This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7. Keylogger...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

FIND Facebook Offline Friends

This time I am writing  a topic that took me ,I think, at least a small percent of Cyber World. Any way I have been always thinking to figure out my friends who stay offline but are on FB. To do this you have 2 ways. 1)You must have figured out what I am up to.For those who haven't got even a samll bit of Idea.I can Explain the trick FB's bar upon your chat list...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

View photos of those who are not your friends

...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Lock your Computer Easy

Very useful when you have to leave your system on for some time and you have to go some where else... Right click on an empty area of the desktop and choose 'new' then 'shortcut.' The create shortcut wizard will open. In the first text box, type '%windir%\\System32\\rundll32.exe user32.dll,LockWorkStation' and then give your shortcut an appropriate name on the next page, and hit 'finish.' You will...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Hacking Battlefield 3: Play Without Origin

Origin works primarily the way the well-known “Steam” client works (which is owned by Valve), except the steam client literally pioneered this electronic gaming distribution service almost a decade ago in 2003. Origin literally adds nothing to the table except that it is competing with Steam, and you can only play BF3 through Origin, thus requiring all gamers who already have Steam downloaded...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Bypass Firewall In your school/office/home

Is your teachers,Manager and your papa rude at you and not allowing you to access Facebook,Orkut or any other  site.Understanding this situation I am giving you another post on how to Bypass your firewall. The software used here is a small but Powerful.Its Is UltraSurf What should You Do Download UltraSurf from Here. You will get a zip file with an .exe file.Open it. It should start ultrasurf...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

SMS which destructs.....it self

In this post i will tell you how to send a self deleting SMS to any mobile that is automatically deleted after user reads it. ch_client = "judeosbert"; ch_width = 550; ch_height = 250; ch_type = "mpu"; ch_sid = "Chitika Default"; ch_color_site_link = "#0000CC"; ch_color_title = "#0000CC"; ch_color_border = "#FFFFFF"; ch_color_text = "#000000"; ch_color_bg = "#FFFFFF"; Basically this technique...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Hacking Windows XP

Windows XP, arguably the world's most popular operating system, still has lots of tricks up its sleeve. Today I will show you some hidden rooms, some unknown corners in this column that you never knew existed but wanted to. Without much ado lets login to the wonderful hidden world of Windows XP. 1. Deleting System Softwares XP hides some system software you might want to remove, such as Windows...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Ways of Working and What is Trojan Android

First, how this trojan could be in our phones? The answer is because the lack of attention to activities related to the Internet. Example in terms of download games or applications. Then, what was wrong with the game or an application that we have downloaded? Because the manufacturer Geinimi ‘package’ repeated legal Android applications (especially games) with Trojan Geinimi. Packaging...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

How To Activate Timeline In Facebook Before others Get It

In this post I will show you how to activate timeline in your Facebook before others Get it.The trick is that you become a developer of Facebook.Till the feature becomes accessible to others only developers will be able to view your profile with activated timeline. To be eligible you have to conform you accountwith your mobile number or creditcard. WHAT TO DO? 1)Go to Facebook.com.In...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Keyscrambler to protect You

I have earlier posted about how to hack anyone's email account with keyloggers.When you study an attack method then you have to study the defense attack for that.There is a chance for yourself getting attacked.In this post I will show you how to protect yourself.KeyScrambler can display a small overlay window on top of your browser screen that verifies that your keystrokes are being encrypted. The program is very easy to use and protects you automatically whenever you launch your browser. KeyScrambler...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Lower Someones Subscription Count

YouTube is the largest video-sharing website on which users can upload, share, and view videos. When you subscribe to someone, you are constantly updated on which of your favorites (the people you subscribe to) has uploaded a new video. That way, you don't have to constantly search for their username, you just have a convenient list of the tubers you like the best. But there are users that are...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Fake Emailer :- Send fake emails

Phishing is one of the most useful and simple methods for hacking email accounts. When using phishing you need to send an email to your victim that contains the link to your phisher page. The victim will click on this link only if he finds the mail genuine, so we need a fake mailer to make this mail appear genuine. In this post i will show you how to send anonymous email to your victim using...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Credit Card Hacking

Hi there. This is my first serious "black hat hacking" post of credit cards hacking. Here will be explained all methods used to hack credit cards and bank accounts with lots of $$ it. Now I'm sure most of you think that this is fake or scam, but i want to just tell u this is real and the only working method (in my opinion) to hack a credit card and make your wish come true (lol, hope it doesn't...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Facebok Blaster Pro

Previously i've posted How to Hack Facebook Password. In this article i want to show you a software FaceBook Blaster Pro which can perform mass friend requests, mass messages, mass comments and mass pokes. I tryed this tool few days ago and i can't say any bad words for it, it's graet. Here are some key features of FaceBook Blaster Pro:Auto Mass Friend Requests Auto Mass Friend Messages Auto...
undefined
undefined
0 Comments
Posted in Arrangement, Art, Business

Google Apps Hax

v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} 800x600 Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ...