Tuesday, 12 July 2011
Hide Folders With A Simple CMD Command
Here is an easy trick to hide your private files or folders. But remember one thing, once you hide your file then you can not find it through simply browsing around, through the command prompt, or even if you click "Show hidden files & folders".
How To Hide A File...
1) Open DOS Prompt (Start-> Run -> cmd).
Monday, 4 July 2011
Steganography : Hide Your Confidential Data/ Files Into Image File Or Other File
Saturday, 2 July 2011
Google's Image Search Engine : Search With Your Image Simultaneously On Web
Seems to be strange but it is true that we can also search the contents with the help of an image file.
Google provides us the facility to search by image also. We can drag & drop an image file to its search box & get relative results.
How To Search By An Image File :
We can search any content with an image file within two steps:
Google provides us the facility to search by image also. We can drag & drop an image file to its search box & get relative results.
How To Search By An Image File :
We can search any content with an image file within two steps:
Friday, 20 May 2011
How To Hack Facebook Account Using Phishing Technique
Phishing is just similar to the word fishing. As the fishermen uses net to catch fishes, similarly phishing is the process to catch the useful / private information of the victim.
This is generally used to gather the private information like- Username, password, contact no. etc. Phishing page looks exactly like the original page of any website.
How To Create Phishing Page ??
This is generally used to gather the private information like- Username, password, contact no. etc. Phishing page looks exactly like the original page of any website.
How To Create Phishing Page ??
Thursday, 21 April 2011
Hack Anyone's Computer Using Trojan Server
Trojan is a program, which contains malicious codes. Which may cause loses or theft of data. To activate these programs you have to invite these programs onto your computer e.g., by downloading any mail attachment or by clicking the server send by any person.
These servers can be made by binding with any other file type. Like - One can create a server by binding it with any picture, document, or any other kind of file.
Once we create a server then we can send this to any person. If this server is clicked by any person, then the Trojan will start its working.
* Now, we only need to know the IP Address of that person. Then by entering this IP to the Trojan we have to click on connect option.
* If the person had clicked our server then we will get connected to the
Friday, 15 April 2011
How to Create Funny Virus using Notepad..
A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also used to refer to other types of malware and programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer.
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
Do you know that we can make simple viruses by using Notepad? Notepad is a simple but very powerful tool to make viruses. Let us have fun with some Viruses (developed on notepad).
Thursday, 14 April 2011
How to Know Password of Someone's Facebook or any Email Account Using a Keylogger
Keylogger is a software, which stores the keys pressed through the keyboard i.e., it maintains the record of keys pressed by the user.
This is very useful software, which can be used for various purposes. Like -
* To record the username & password of any person.
* To know about the activities performed by any person, through keyboard.
* Parents can also use this software to watch the activities performed by their children.
To use this software we simply have to install it to the system. When it will be installed & start working then we can watch its records just by viewing logs.
Let see how keylogger works. Here I am explaining my favorite keylogger i.e., Family Keylogger.
Subscribe to:
Posts (Atom)