background preloader

About Hackers & Hacks

Facebook Twitter

Computer Hacking: Facebook Virus Prank - Making fun to your friend. Fake Facebook Virus | Freak Out Your Friends In this post i'll show you an easy step by step tutorial about how to make a Facebook virus using simple commands on notepad. This will make the victims think that they have a virus when they click on an icon such as Internet Explorer or Mozilla Firefox...This "virus" is totlly harmless and won't do any damage to your victims computer.When a victim clicks on the icon he will get a warning message like "WARNING VIRUS DETECTED!!!!!

AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!! TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX! ". You can change the text to whatever you want. Now let's start with the tutorial: 1) Open notepad 2) Type the following text in : @echo offmsg * WARNING VIRUS DETECTED!!!!! PAUSEshutdown -r -t 300 -c " SORRY!!! 3) Save as Internet Explorer .bat (or whatever you want, but be shure that the last letters are .bat) 4) Right click on Internet Explorer .bat and click Create Shortcut 6)Click Change Icon Liked this post? Hackers publish 20,000 FBI employees' contact information. The hackers, tweeting from the account @DotGovs, claim they obtained the details by hacking into a Department of Justice database. The hackers boasted on Twitter, "FBI and DHS info is dropped and that's all we came to do, so now its time to go, bye folks!

#FreePalestine. " The information contained names, titles, phone numbers and email addresses. After the hackers published the data on the DHS employees on Sunday, they tweeted, "Well folks, it looks like @TheJusticeDept has finally realized their computer has been breached after 1 week. " The Justice Department is investigating the hack. Department spokesman Peter Carr told CNN it does not appear there was a breach of private personnel information, such as Social Security numbers. "The department is looking into the unauthorized access of a system operated by one of its components containing employee contact information," said Carr. How to View Passwords Hidden Under Asterisks [Video]

Google Chrome, Firefox and other browsers hide passwords behind asterisks but you can easily view the saved passwords using the built-in developer tools. Web browser hide passwords under asterisk characters for improved security. Say you are on the Gmail login page and the web browser, as always, has auto-filled the username and passwords fields for you. This is convenient because you can sign-in to your account with a click but because you have not been typing these saved passwords for a while now, you don’t even remember the Gmail password anymore. All web browsers, for security reasons, mask the password fields in login forms behind asterisk characters thus making it impossible for passersby to see your secret string.

There’s however an easy workaround that will let you convert those asterisks into the actual password and you don’t need any external utilities or bookmarklets for this. Right-click the password field and then choose “Inspect Element.” Sony Hackers Guardians of Peace Troll FBI, Anonymous Convinced Hack Didn't Come From North Korea. Paramedics strove valiantly to revive grievously wounded Officers Liu and Ramos—and were left shattered when their efforts failed. The medic was gazing down into the grievously wounded cop’s eyes, praying for a sign of life even so tiny as a single blink. “He was just looking at me and I’m looking at him and I’m hoping he would blink at least one time,” recalls the medic, 27-year-old Baron Johnson of the Bedford-Stuyvesant Volunteer Ambulance Corps. “It wasn’t like his eyes rolled back. He was aware of what was going on.

It was a constant stare dead into my face and I just looked back at him, hoping.” Johnson was calling to the officer. “I just kept telling him to blink, if he can hear me just blink or move his eyes, move his hand, try to say something to me if you can hear me. “Watch what I’m gong to do,” he then said. Brinsley stepped up to the passenger side of the patrol car, raised a silver Taurus semi-automatic pistol and began firing. “Officer down, 10-13! Johnson stayed at it. Resist Surveillance. Google Guide Cheatsheet. Data Recovery. D0CS_Forensic_Computing.

EPIC - Electronic Privacy Information Center. How to Break Into a Windows PC (and Prevent It from Happening to You) How to use Google for Hacking. Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.

In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. Using Google to Hack Security Cameras: There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. Inurl:”viewerframe?

Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. Intitle:”Live View / – AXIS” 2. Intitle:index.of finances.xls. Articles: Man-in-the-Middle. 4 Options to Bypass the NYTimes.com 20 Article Limit « WTI NewsBlog.

Cozy, a personal cloud you can hack, host and delete. AdBlock for iOS - Must Have App for iOS 7 - for iPhone, iPad and iPod Touch pour iPhone, iPod touch et iPad dans l’App Store sur iTunes.

Hacking tutorials sites & tools

About Hacking. How To Hack Google Plus For SEO Value. People tend to think of Google Plus as just another social network, built as Google’s challenge to Facebook’s incredible growth over the past decade. What most people don’t realize, however, is the SEO value that makes Google+ so much more than just a social networking platform.

How so? Studies show a powerful correlation between search rankings and the number of Google +1's received by a URL. Searchmetrics found Google +1's to be the most highly correlated factor to search result rankings, and Moz's 2013 scientific correlation study placed Page Authority just above +1's at the top of all correlation factors.

It's probably not a surprise that activity on Google's social network influences Google search results, but the degree of correlation is astonishingly high. While there's a clear divide between correlation and causation, it's clear that Google+ is not simply a social network. So how do we leverage Google+ for SEO value? A Brief Overview of Google+ The Power of User-Created Content 1. How to use Google for Hacking. | Arrow Webzine - StumbleUpon. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.

In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time.

Intitle:”Live View / – AXIS” 2. Filetype:xls inurl:”email.xls” 3. . “? 4. InterN0T - Underground Security Training. Create a temporary phone number with inumbr. Learn How to Trace an Email Address Trace an email address in the most popular programs like Microsoft Outlook, Hotmail, Yahoo, Gmail, AOL, by finding the header. What Is an Email Header Each email you receive comes with headers. The headers contain information about the routing of the message and the originating Internet Protocol address of the message.

Not all electronic messeges you receive will allow you to track them back to the originating point and depending on how you send messages determines whether or not they can trace an email address back to you. How Do I Get The Header to Start the Email Trace Process? Each electronic messaging program will vary as to how you get to the message options. I’ve Got the Header, Now How Do I Start The Trace? The next step to trace an email address is to find the first IP listed in the header.

Can You Trace any Email Address? Yes and No. The following two tabs change content below. Brian Gilbert Latest posts by Brian Gilbert (see all) - Knowledge Should be Shareable Software Tricks, Tips and Hacking. Hacker News 150 (newsyc150) How Hackers Protect Themselves From Getting Hacked. When Adrian Lamo goes online, he leaves nothing to chance. To log in to personal accounts, he uses a digital password generator -- a plastic key chain-like device that displays a new string of digits every 60 seconds.

He adds an extra layer of security to some accounts by entering a special code that he receives via text message. And he uses browser extensions to avoid downloading malware by accidentally visiting dangerous Web sites. Some techniques “may seem like a ‘Mission Impossible’ level of security to the average user," Lamo said. But the average user could learn a thing or two from hackers like Lamo, who are not only skilled at breaking into others' PCs, but have devised sophisticated -- in some cases, extreme -- methods for protecting their own. It has become increasingly easy to fall victim to hackers, from downloading malicious email attachments to logging in to fake banking sites. Two summers ago, I attended DefCon, which Moss hosts every August in a Las Vegas hotel. Is not available. Cool Websites, Software and Internet Tips. Jeremy Hammond Reacts to Hector Monsegur’s “Sentencing”: Reject the NSA White Hat Sabu Ideology.

Jeremy Hammond Reacts to Hector Monsegur’s “Sentencing”: Reject the NSA White Hat Sabu Ideology In many ways, the disgusting spectacle of Sabu’s hearing was similar to mine: we were both sentenced in the same courtroom under the same judge, the outcome already predetermined with all parties reading from well-rehearsed scripts. I was condemned to the maximum prison term for having committed “mass mayhem,” while Sabu received the most lenient of all Anonymous-related sentences for embracing “good, not evil”. Hugs and high-fives all around as Judge Preska saluted Sabu for having betrayed his comrades and his ideals, preventing hundreds of cyber attacks, and helping the FBI catch their “most wanted cybercrime target”. The government hopes the case is closed and that the public will swallow this superficial narrative that even they probably had a hard time reciting in court with a straight face. Sabu bless America.

Video Anonymous “Fuck Sabu”.Sabu was arrested in June 2011 and identified as Hector Xavier Monsegur. Sabu helped FBI stop over 300 cyber attacks. Hector Xavier Monsegur, known as “Sabu”, helped the FBI send his friends to prison and stop some 300 cyber attacks over the past three years, according to court documents filed by prosecutors. “Sabu” used the moniker while working online. Arrested on hacking charges in 2011, Monsegur belonged to the hacking groups known as LulzSec and Anonymous.

The sentencing memo filed this week says Monsegur’s cooperation was instrumental in the arrest of Jeremy Hammond, who’s currently serving a 10-year prison term for hacking into global intelligence firm Strategic Forecasting in December 2011. We are FreeAnons and until every Anon is free we will attest to the Anonymous creed, “We do not forgive. AnonOps FBI FreeAnons Hackers Jeremy Hammond /Anarchaos Judge Loretta Preska LulzSec Prison Sabu Stratfor Traitor USA FreeAnons Benefit CD Hear Us Now.

The Anarchist Library. Schan. The Pirate Bay documentaire français. Documentaire Xenius : NSA et Hackers peuvent tout savoir de nous. Hackers, les nouveaux maîtres du monde [documentaire entier] Nom de code Linux. Les Hackers - Piratage Informatique National Geographic [Documentaire complet] Une contre-histoire de l'internet. La guerre des moteurs de recherche, la véritable histoire d'internet. WikiLeaks secrets et mensonges. Documentaire: Quand l'Internet Fait des Bulles.

Anomymous par Vengeant