background preloader

An Incredible Way to Reveal Passwords Behind Asterisks

An Incredible Way to Reveal Passwords Behind Asterisks
If you use a lot of online services it also means that you have got a lot of passwords and usernames to remember. Aware of this issue, all Internet browsers have got a special feature which, as soon as you login your email account for example, prompt you to save password and username so that, next time you will use the service again, the browser will fill in the login interface for you. However, while the username is fully displayed, the password is hidden by asterisks. Now, if for any reason you don’t remember such a password you won’t have any way to recover it. Usually, to get it back, you will have to buy a special piece of software. Recently, I have found an interesting, amazing piece of code which will reveal all your forgotten passwords hidden behind asterisk in your browser…in a couple of seconds and without spending a dime! The piece of code I am going to show you works with all Internet browsers including: Internet Explorer, Firefox, Google Chrome, Safari etc.

http://www.webtlk.com/2010/09/02/an-incredible-way-to-reveal-passwords-behind-asterisks/

Related:  Privacybhack

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". How To Treat Others: 5 Lessons From an Unknown Author Five Lessons About How To Treat People -- Author Unknown 1. First Important Lesson - "Know The Cleaning Lady" During my second month of college, our professor gave us a pop quiz. I was a conscientious student and had breezed through the questions, until I read the last one: "What is the first name of the woman who cleans the school?"

The Best Hacking Tutorial Sites - Learn Legal Hacking written by: Daniel Robson•edited by: Aaron R.•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. HowTo: Bypass Megavideo Time Limit Are you annoyed and frustrated with Megavideo’s time limit? Don’t worry, I’ll show you how you can bypass that limit and let you enjoy watching your video or movie without any interruptions. Megavideo is one of the best and one of the most popular video sharing sites in the Internet. The problem about watching movies on Megavideo is that there is a 72-minute time limit and once you hit the limit, the video stops and you get this message:

How to foil the NSA and GCHQ with strong encryption "Ye are many - they are few." - Percy Bysshe Shelley THE MOST INTERESTING DEVICE shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone. The Blackphone features anonymous search, automatic disabling of non-trusted WiFi hotspots, and private texting, calling and file transfer capabilities. It's available to the general public, and bundles additional security features that apparently go beyond the basic messaging security provided by Blackberry to enterprise customers in its Blackberry Messaging (BBM) service. US-based aerospace and defence firm Boeing also unveiled its own Black phone - not to be confused with the Silent Circle and Geeksphone Blackphone - at MWC this week, but that appears to be restricted for sale only to government security agencies and defence industry customers, and therefore likely won't be available to the public through mobile operators or in retail shops.

Complete list of Facebook Chat Emoticons While playing with Facebook Chat I wondered if it supported emoticons. Turns out it does. But when I tried the >:-) emoticon (a 'devil') and saw it printed as boring text, I wondered, "what smilies does facebook actually support?" So with the help of Safari and some javascript hacking I present to you a complete list of facebook emoticons. How to Crack a Wi-Fi Network. 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. How To: Protect Any PC Using Windows Steady State One of the biggest challenges Maximum PC readers often face is the never ending battle we endure when it comes to restoring the PC’s of family and friends. We often find ourselves bombarded with machines that may have once been configured by us, but have become infected or modified beyond recognition. The good news is that Microsoft finally has a solution and it comes in the form of a free add on for Windows XP and Vista which promises to restore sanity to your world. Windows Steady State goes far beyond a simple group policy editor. It gives users the protection and peace of mind that until now could only be matched by a virtual machine.

Anonymous BitTorrent Services Simple download & install No records of usage stored 256-bit AES encryption Unlimited download speeds, 10Gbit servers VPN includes OpenVPN & PPTP Servers in Canada, Europe and Asia Things My Father didn’t Teach Me, How to tie a Tie -  this isn't happiness™ ABOUT ARCHIVE FOLLOW Facebook Twitter Instagram Google+ Ads Via The Deck Things My Father didn’t Teach Me, How to tie a Tie share it 3,740 notes How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1.

Help Key: How to Idiot-Proof Your Parents’ Computer This is something that may be near and dear to your hearts: Mom and Dad are calling to ask about this porn pop-up phishing thing they just typed all their credit card info into. Or maybe Grandma wants to make a MySpace page. Regardless of the situation, you have some older folks in your life who probably have a computer. If you’re reading this, you’re good at computers. Therefore, you’re the one who gets the call. This Help Key is for you.

Anonymouse.org AnonWWW Many mice surf the web under the illusion that their actions are private and anonymous. Unfortunately, this is not the way it is. Every time you visit a site for a piece of cheese, you leave a calling card that reveals where you are coming from, what kind of computer you use, and other details. And many cats keep logs of all your visits, so that they can catch you! 6 Ways to Keep Your Search Secrets Safe It’s sad to say but many recent events (Google Search Subpoena, AOL’s BIG Mistake, etc) make it very clear that online your privates are not private anymore. I mean, do you really want people to know your secret love of fairies? Or worse?

Related:  Awesome StuffServices webTech ToolsInformation TechnologyUsefullkbarthauerHacking ArticlesComputersComputerUseful Tips & ToolsCool Tips and Tricksnaomismith93SecuritychrismoranHackinginternet