background preloader

Hack Tricks - Hacking, Facebook Tricks, Pranks, Softwares

Hack Tricks - Hacking, Facebook Tricks, Pranks, Softwares

http://www.hacktricks.in/2011/08/top-sites-to-find-all-serials-you-need.html

How to Pick a Lock with a Bump Key The point that many people miss is that bump keys and lockpicks allow access to an area without any obvious sign of forced entry. This allows for long term theft, especially in an office or retail situation where high value items may be stored in a supposedly secure area and not be missed for some time, but where attempting to force a lock would bring immediate attention. If my wife comes home to a lock drilled off the door, she going to call the police. If an intruder uses a bump key, she could be totally unaware that someone was lurking inside. How to Reset Your Windows Password The easiest way to reset a forgotten Windows password is to use a previously created password-reset disk. You can create such a disk (on USB removable media or a floppy) within the Windows User Accounts menu by opening the Windows Control Panel, selecting User Accounts, and clicking Create a password reset disk in the left pane. You should take this step with a new PC; once you have the disk, you can insert it when starting the PC to cause Windows to display the 'Reset password' option at the login screen, allowing you to regain access to your system. However, if you don’t have a password-reset disk and you need to reset your Windows password, I suggest using the following Sticky Keys trick.

How Do I Pick the Right Lens for My DSLR? You should mention that, for Canon anyway, some lenses are designed to only work with crop-frame cameras (EF-S lenses) and won't be compatible if you upgrade to full frame. Conversely, traditional (EF) lenses will work on crop and full frame. The EF-S lenses tend to cost less, probably because you don't have to worry as much about edge effects since the sensor won't pick it up anyway. Windows Alt Key Codes View Macintosh Accent Codes | Windows Character Map | Windows International Keyboard Codes This page list codes for accented letters and other characters. In order to use these codes, your computer should have a separate numeric keypad on the right. If it does not, then another method of inputting accents is recommended. The list is organized by type.

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) Free Ways to Synchronize Folders Between Computers I've taken a look at the Dropbox website and signed up for the Beta. It looks great in principle, but since it's not yet available to the public. I can't actually comment on using it.

Extend Free Trials Indefinitely to Try Out Services for as Long as You Need "May I suggest that instead of trashing Adam or this site, you save that anger and direct toward sites that explain how to make pipe bombs or dirty bombs. They have to be higher on your list, right?" Not really. I don't frequent those kind of sites. Do you know many people that do? Keyboard Shortcuts for special characters This page will show users (of the Windows or Macintosh OS X operating systems), having a western european “standard” keyboard (showing the latin alphabet), how to generate other characters they might not see on the keyboard. For example a US keyboard will not show accented letters as used in French. A French keyboard will show accented letters common in French, but not accented letters used in Spanish. And so on… You can read the instructions below, or skip directly to the chart. Special characters on Macintosh (Apple keyboards)

March 2011 Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location. Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others. I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location. 1. Before you even begin reading this, you must already have their passwords or e-mails.

85 Windows 7 tips, tricks and secrets Whether you've just bought a second-hand PC running Windows 7 or you've been using it for a while, there are bound to be things you didn't know you could do. Whether it's tweaks to get the desktop the way you want it, tips for troubleshooting or ways to squeeze more performance from Windows 7, we've got it covered. Windows 7: the complete guide We've updated our popular Windows 7 tips article with a load of new ones, including how to recover and reset your system, how to tweak your screen resolution and the legibility of text, play music on a network of PCs, and more.

Want to Read Faster? Stop Saying The Words in Your Head As You Read I'm like you. I naturally read without subvocalization and I read absurdly fast as a result. Any novel that's not horribly complex in terms of plot that is written at about a high-school level of reading is done in less than a day. More advanced stuff takes longer. A Dance with Dragons was a two day read, I think. I was also, like you, reading at a Grade 10 level in Grade 4 and at a college level shortly after that. How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites.

NEW!!!! Destroy someone's Computer! : OFF Topic vampyre is right.1. LIL DEVIL IS AN A-HOLE2. THAT IS HACKING WHICH IS ILLEGAL3. LIL DEVIL IS AN A-HOLE X10= ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE 4. IF YOU ACTUALLY DID THAT, YOU WOULD BE MORE OF AN ASS5. The 50 Best Registry Hacks that Make Windows Better We’re big fans of hacking the Windows Registry around here, and we’ve got one of the biggest collections of registry hacks you’ll find. Don’t believe us? Here’s a list of the top 50 registry hacks that we’ve covered.

Related: