How to use Google for Hacking.
Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.
The 50 Best Registry Hacks that Make Windows Better
We’re big fans of hacking the Windows Registry around here, and we’ve got one of the biggest collections of registry hacks you’ll find. Don’t believe us? Here’s a list of the top 50 registry hacks that we’ve covered. It’s important to note that you should never hack the registry if you don’t know what you’re doing, because your computer will light on fire and some squirrels may be injured.
How to Hide Files in JPEG Pictures
If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one!
Making A Cool Login System With PHP, MySQL
Martin Angelov Introduction Today we are making a cool & simple login / registration system.
Network Monitoring Tools
Les Cottrell, SLAC. Last Update: December 14, 2015 ESnet | ESCC | PinGER Internet monitoring | Tutorial This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators.
Google hacking master list
This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd. While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff.
How to use Google for Hacking.
Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras
Open Source Applications « Arrow Webzine
GIMP – The GNU Image Manipulation Program is a Photoshop replacement that doesn’t have “quite” as much functionality but it’s excellent for free. It comes installed by default on many Linux distros and is also available in Windows.
How To Become A Hacker
Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one.
Hot Wire Your Car
From Wired How-To Wiki Nine times out of ten, the term "hot-wire" summons images of car theft. Of course, anyone who's been stranded in a hostile environment without their car keys knows better.
Carina's Craftblog: Tutorial: crochet granny triangle
So! Here we go with the granny triangle tutorial. Did you master the magic circle yet? Ready to go?
Need to hack someone’s Facebook password? Well, you’re at the right place! In this post I’ll show you some of the possible ways to hack Facebook password. Also, at the end of this post, I will be discussing Read More
4 Awesome Visual Search Engines to Transform Your Search
Microsoft’s Bing recently introduced visual search as a different approach to search. I always use regular Google or Bing search for my needs, but sometimes I like to check out other search engines. Variety is the spice of life, and eye-candy is always a refreshing break! In this article, let us look at 4 Visual Search Engines that provide a unique and enjoyable search experience.
10 Alternative Ways To Access Blocked Sites
Websites like facebook , twitter and other social networking sites are generally blocked in schools, colleges and offices . People search on the internet how to access blocked facebook or any website. There exist some tricks by which you can bypass the restrictions and access blocked websites , the most obvious is the use of proxies or Anonymizer websites . Proxies doesn’t always works as they gets blocked by firewall . Here I am listing some other methods to access blocked contents .