background preloader

PASSWORD HACKING

PASSWORD HACKING
Need to hack someone’s Facebook password? Well, you’re at the right place! In this post I’ll show you some of the possible ways to hack Facebook password. Also, at the end of this post, I will be discussing Read More This post will show you how to hack Windows administrator password at times when you forget it or when you want to gain access to a computer for which you do not know the password. Read More As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Read More MySpace being one of the world’s largest social networks, has become today a favorite place for many to maintain secret relationships and exchange cheating messages. Read More Did you know that using a keylogger is the simplest way to hack passwords?.

How to use Google for Hacking. | Arrow Webzine Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” Click on any of the search results to access a different set of live cameras. 2. filetype:xls inurl:”email.xls” 3. “? 4.

What the Hack ?! - the temptation of the Dark Side 'For educational purposes' ... that must be about the most widespread excuse for publishing virus creation tools,descriptions of exploits, 'hacking' manuals and the likes. Personally,I don't see much of educational effects in using a Windows application to create a virus (next >> next >> next >> finish - congratulations, you have created the Ana Kournikova worm) or following simple instructions to break in to a system - sometimes as simple as 'find a Kazaa user, use your browser to access his PC on TCP port 1214 - you now have access to all his files'. I also disagree with the motivation / excuses such as 'the right to information - all information - anywhere' or 'I am motivated by curiosity'. I would not like someone to enter my house, go through my drawers and read my papers, letters or whatever. I don't give a damn if this person is doing it 'just to see if it can be done', or to demonstrate the poor quality of my front door lock. some thoughts on the original meaning of "hacking"

hackhaven Security Community Training For reference purposes, and whatever purposes you choose, here are the original Fate tutorials which should help you in your attempts to learn. The creators of this site or the ISP hosting this site take no responsibility for the contents of this page, everything is provided for an educational purpose only Training session 1: John the Ripper Difficulty: Extremely EasyLearn to use this tool to crack passwd files Creator: m101 Training session 2: Directory Traversal Difficulty: Extremely EasyLearn how it is possible to 'Directory Surf' Creator: m101 Training session 3: Number Systems Difficulty: Extremely EasyLearn the use of Number Systems and how to convert between them Creator: m101 Training session 4: Basic Linux Commands Difficulty: EasyLearn the commands that can be used in Linux and their MSDOS equivelant Creator: m101 Training session 5: Stealing ISP Accounts Difficulty: EasyLearn how ISP accounts can be stolen Creator: m101

Chat with Your Friends through ms dos Command Prompt -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press Enter. 6) You would then see something like this: 7) Now, type the IP Address of the computer you want to contact and press enter You will see something like this: 8) Now all you need to do is type your message and press Enter. ShareThis

UBCD for Windows The 50 Best Registry Hacks that Make Windows Better We’re big fans of hacking the Windows Registry around here, and we’ve got one of the biggest collections of registry hacks you’ll find. Don’t believe us? Here’s a list of the top 50 registry hacks that we’ve covered. It’s important to note that you should never hack the registry if you don’t know what you’re doing, because your computer will light on fire and some squirrels may be injured. Also, you should create a System Restore point before doing so. Prevent Windows Update from Forcibly Rebooting Your Computer We’ve all been at our computer when the Windows Update dialog pops up and tells us to reboot our computer. There’s a couple of ways that we can disable this behavior, however. Prevent Windows Update from Forcibly Rebooting Your Computer How to Clean Up Your Messy Windows Context Menu One of the most irritating things about Windows is the context menu clutter that you have to deal with once you install a bunch of applications. How to Clean Up Your Messy Windows Context Menu

How to Build a Hackintosh Mini for a Less Expensive, Faster Mac We've shown you how to build a Hackintosh with enough power to rival a Mac Pro, but for those of you who want a still powerful Mac on a budget you can build a Hack Mini. We'll show you what you need to build it and walk you through the entire OS X installation. UPDATE: Check out this updated option if you want an Ivy Bridge-based Hack Mini. For help building it, consult our always up-to-date guide to building a hackintosh. Hackintoshing used to be a complicated process, but since Hackintosh expert tonymacx86 came around it's gotten a lot easier. While I've been hackintoshing netbooks for awhile, I always shied away from building a machine because I was concerned about stability issues. What You'll Need At the time of this writing, the parts necessary for this build came to a total of $599.65. Gigabyte GA-H55N-USB3 Motherboard $104.99 Note: If you're like me and don't need an optical drive, don't try to build this machine without one. Total cost: $587.94 Installing Mac OS X 10.6 The Future

How to Burn Any Video File to a Playable Video DVD With your BitTorrent addiction in full swing, you've filled hard drives with media but can't seem to figure out how to burn any of the videos you downloaded to a DVD. Sound familiar? It's a common problem, and there was a time that it didn't have many simple (or free) solutions. DVD Flick First and foremost, there's DVD Flick, a free, open-source application that supports over 45 different file formats, includes subtitle support, and makes creating a DVD from most common (and even uncommon) video files a breeze. Free DVD Creator If DVD Flick isn't your thing, then check out Free DVD Creator. Also like DVD Flick, the Free DVD Creator wizard is dead simple to use. If you have trouble with the one step convert-and-burn (when I tested it, Free DVD Creator created the DVD but didn't immediately burn), just re-open Free DVD Creator and this time select Video DVD Burner instead of Create Video DVD. Got a favorite tool for burning your various videos to DVD? Free DVD Creator [via Life Rocks 2.0]

How to Crack a Wi-Fi Network. | Arrow Webzine 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. * A compatible wireless adapter—This is the biggest requirement. * A BackTrack 3 Live CD. * A nearby WEP-enabled Wi-Fi network. * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0. Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down macchanger –mac 00:11:22:33:44:55 (interface) airmon-ng start (interface) </i>*} Now it’s time to pick your network. You’re almost there. </b>*} And much more! 3.

The 50 Best How-To Geek Windows Articles of 2010 Even though we cover plenty of other topics, Windows has always been a primary focus around here, and we’ve got one of the largest collections of Windows-related how-to articles anywhere. Here’s the fifty best Windows articles that we wrote in 2010. Want even more? You should make sure to check out our top 20 How-To Geek Explains topics of 2010, or the 50 Windows Registry hacks that make Windows better. How to Customize Your Windows 7 Taskbar Icons for Any App Would you like to change out the icons on your taskbar with a beautiful set of icons that all go together? How to Customize Your Windows 7 Taskbar Icons for Any App Change the Windows 7 Taskbar Color Sure, you can hack Windows and install a custom theme if you really wanted to, or pay for a software package to do it for you. Change the Windows 7 Taskbar Color With No Extra Software (Stupid Geek Tricks) Change Your Windows 7 Taskbar Color the Easy Way (and Rotate Between Colors) How to Crack Your Forgotten Windows Password

Related: