background preloader


Facebook Twitter

Intro to packet sniffing - Wireshark. #3038363 - Pastie - StumbleUpon. Free Calls From Your Old Nokia Phones. How To Hack The Nook Color. How To Unlock A Cell Phone - Ubuntu.

Tips and tools

Ruby. Hack into. Howto Rip a DVD - Easy and Free with Linux. How to take down a website in seconds StumbleUpon. The free software listed here is perfect for the most mischievous pranks and computer gags.


This software is great for playing jokes on those unsuspecting users. Click on any of our computer pranks below to get more information and download them. Add/Remove Pretends to remove all of the software from your machine using the standard Windows Add/Remove Programs. Avoid. How To Make Fake Harmless Virus. Exploiting Software: How to break code. 4d00a959a6a17hive.png from How I Change My IP Address (5 Ways) Chat with Your Friends through ms dos Command Prompt. -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt.

Chat with Your Friends through ms dos Command Prompt

Home Page. Internet TV Plugins - XBMC - Linux Mint 7. 30+ Awesome Free and Open Source Audio Applications List. Open Source community has great Audio Applications.

30+ Awesome Free and Open Source Audio Applications List

We had featured 20 Audio Editors. Here is a best of the Audio Applications list that has, Audio Editors, Audio Sequencers, Stream Rippers, CD Rippers and much more. This list is constantly updated and comments, additions are most welcome. Thanks for commenting and helping us to grow the list. Also check out similar posts; Amarok – Rediscover music. Primary CSS. 10 Search Engines to Explore the Invisible Web. No, it’s not Spiderman’s latest web slinging tool but something that’s more real world.

10 Search Engines to Explore the Invisible Web

Like the World Wide Web. The Invisible Web refers to the part of the WWW that’s not indexed by the search engines. Most of us think that that search powerhouses like Google and Bing are like the Great Oracle”¦they see everything. Unfortunately, they can’t because they aren’t divine at all; they are just web spiders who index pages by following one hyperlink after the other. But there are some places where a spider cannot enter. Search engine technology has progressed by leaps and bounds. Linux HOWTO #3, Part 1: Anonymous Web Browsing with Tor. How to write a Keygen Part1/2. Painfully Computer Pranks ~ Computer Hacking. Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank).

Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. Crash a Computer System With Nothing But a URL! I stumbled across this URL while surfing the internet. 2. Open notepad and copy/paste this code: How To Set Up SSH Encrypted MySQL Replication.

Hack This Site! - Removes passwords from viewable PDFs. The Great Boot Race. How to recover deleted files in Ubuntu #12. TIOBE Software: Tiobe Index. TIOBE Index for October 2015 October Headline: Ruby replaces Objective-C in TIOBE index top 10 It was a matter of time.

TIOBE Software: Tiobe Index

Soon after Apple announced to switch from Objective-C to Swift, Objective-C went into free fall. This month Objective-C dropped out of the TIOBE index top 10. Scripting language Ruby exploited this drop and entered the top 10 again. The TIOBE Programming Community index is an indicator of the popularity of programming languages. The Man Behind Linux: The Accidental Invention That Is Taking Hold of Wall... UPDATED - Using Googles Full Capabilities & XBOX, XBOX 360, PS2, PS3,... Here is an updated version of the ‘Using Google’s Full Capabilities’.

UPDATED - Using Googles Full Capabilities & XBOX, XBOX 360, PS2, PS3,...

This is basically a master list found on a Russian hacking website. To save you the dangers of going there, we’ve compiled it here. Enjoy. Each of these things can be copied and pasted into Google search for some good old fashioned fun! Enjoy! Admin account info” filetype:log ! The Hacker Crackdown. ZeroDibs : best of free & opensource software. 25 Best SSH Commands / Tricks. OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is.

OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.

How to easily delete your online accounts. Insight3d - opensource image based 3d modeling software. Know the Trade Your IT Security Information Portal CISSP/CEH/CISA/Hacker... Google Hacking allintitle:Brains, Corp. camera.

Know the Trade Your IT Security Information Portal CISSP/CEH/CISA/Hacker...

Turn Your Home Router Into a Super-Powered Router with DD-WRT. Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it?

Turn Your Home Router Into a Super-Powered Router with DD-WRT

DD-WRT will let you boost your router’s range, add features, and more. DD-WRT has a ton of features—more than we can cover in this guide, which is focused on helping you get your router upgraded. Stay tuned, as we’ll go into more depth in a couple more days on all the great things you can do with it, but even if you don’t use the additional features, DD-WRT is worth installing to make your router work better. PASSWORD HACKING. Need to hack someone’s Facebook password?


Well, you’re at the right place! In this post I’ll show you some of the possible ways to hack Facebook password. Also, at the end of this post, I will be discussing. Hacking with command prompt. We Were Hacked! 8 Tips From A Hacking Victim For Minimizing Your Risk :... Think you're safe from a cyberattack just because you're a small biz?

We Were Hacked! 8 Tips From A Hacking Victim For Minimizing Your Risk :...

Think again. Here's how to prevent a hacking. July 20, 2011 Computer hacking has become front-page news lately, but many small business owners assume that because they’re small potatoes, have a firewall, and use anti-virus software they’re immune to a cyber attack. They're dangerously wrong. The threat Just last week two websites we operate to showcase our research and publications on telework for consumers and researchers were hacked. With 30-plus years of computer and programming experience, I dropped everything else I was doing and spent several days unraveling what they’d done.

Short Film of the Day: Stuxnet: Anatomy of a Computer Virus. Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Even when a documentary short is in the spotlight, it tells a clear tale of people doing things. This short, is none of those things. Stuxnet: Anatomy of a Computer Virus is an informational film made entirely of voice over narration and motion graphics. It’s beautiful, compelling, and it does tell a story, but it’s nothing like most short films.

My Favorite Smallware. How to gain access to system account the most powerful account in Windows.... There is an account in Microsoft Windows that is more powerful than the Administrator account in Windows Operating Systems. That account is called System account it is similar to the root OR super user in the Linux/Unix world . Virtual-Browser&153; - Browse and surf safely & anonymously. Firesheep. The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries.

How to Boost Your BitTorrent Speed and Privacy - Lifehacker. How to Break into a Mac (And Prevent It from Happening to You) - Lifehacker. Hello Necromancer. Mifare Hack.