background preloader

How to use Google for Hacking.

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. 3. “? 4.

http://www.aagneyam.com/blog/?p=551

PASSWORD HACKING Need to hack someone’s Facebook password? Well, you’re at the right place! In this post I’ll show you some of the possible ways to hack Facebook password. Big pile of homemade sackboys - Little BIG Planetoid - Always watching the LittleBigPlanet - Planet news, lbp costume dlc, community Jan 25th 2009 - 6:53 PM The other day we were asking if any of you had been inspired by LittleBigPlanet to get out the scissors and glue, and start creating things. The first email we received was from Paul, who dropped us a line to tell us about his big pile of homemade sackboys… 16 of them to be precise, check them out… Awesome huh? He also sent us some teaser pics of his soon to be completed custom made Solid Snake sackboy doll, with the promise of updating us when it was complete. We want one, I bet you do to.

Chat with Your Friends through ms dos Command Prompt -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. A Showcase of Workstations that’ll Make You Jealous Whether you’re a designer, developer, animator, or blogger, your workstation plays a major role in how you get things done. Some of us like a neat, clean, and inspiring workspace, while others require a crazy over-the-top hardware configuration. In this article, we’ve compiled a showcase of photos that will give you workstation envy. The thing about workstations is that even if you have a nice one, seeing another awesome setup can make you a bit jealous.

The 50 Best Registry Hacks that Make Windows Better We’re big fans of hacking the Windows Registry around here, and we’ve got one of the biggest collections of registry hacks you’ll find. Don’t believe us? Here’s a list of the top 50 registry hacks that we’ve covered. It’s important to note that you should never hack the registry if you don’t know what you’re doing, because your computer will light on fire and some squirrels may be injured. Also, you should create a System Restore point before doing so. Otherwise, keep reading. Sony Nextep Computer Concept for 2020 by Hiromi Kiriki In 2020 We Can Wear Sony Computers On Our Wrist Our present need for internet connectivity is so profound that secondary devices like the Nextep Computer are bound to happen. Developed to be worn as a bracelet, this computer concept is constructed out of a flexible OLED touchscreen. Earmarked for the year 2020, features like a holographic projector (for screen), pull-out extra keyboard panels and social networking compatibility, make the concept plausible. Ten years from now is not too far away, so how many of you think we’d be buying such gadgets?

How to Build a Hackintosh Mini for a Less Expensive, Faster Mac nobody reads the terms, didn't you see the South Park episode? And anyway, if I buy the OS I'm gonna do damn well what I want with it. Once that disk has been legally obtained and is in my hands, it's not Apple's business what I do with it. The Evolution of a Programmer High School/Jr.High First year in College program Hello(input, output) begin writeln('Hello World') end. How to Crack a Wi-Fi Network. 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter.

Related: