Showing posts from August 11, 2008

Boot Block Recovery For Free

You don’t need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks: AWARD Bootblock recovery: That shorting trick should work if the boot block code is n…

BIOS Update Procedure

All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there …

Cracking Password Protected Zip Files |

What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you’re gonna need a passw…

Premium Accounts…!! { 16 Download Sites }

Following are the list of usernames and passwords of the premium accounts for Best downloads sites. …!! ENJOY !!… !!…100% Working Accounts…!! 1.) www.divxcrawler.com {download movies fas…

Latest Airtel Hack 2008

Now a days Airtel gives New option to the Subscriber to access Mobile Office daily @25.00/perday. But this is too Costly. Only 24 hours and the cost is 25.00. Oh GOD!! But I got a Trick tha…

How to Set up your own Proxy Server

Lot´s of people complain that Web Proxys are not working at their Works / Schools computer because they have been banned by administrators. A way around this would be to setup your very own…

Enabling/Disabling User Access Control in Windows Vista

Microsoft’s advertising has stressed the new security features found in Windows Vista. From the user perspective, one such feature, User Access Control, is arguably the most noticeable enha…

Making Windows Genuine

1 . start > run > ” regedit” (without the quotes of course) 2 . Go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WindowsNT\ CurrentVersion\WPAEvents\OOBETimer …and doubleclick …

Access Orkut On Your Mobile Phone or PDA

Here is a Great Hack for all Orkut Users… Have you ever tried to access orkut on your Mobile Browser. If you have tried, you must surely know what happens………. Let me tell u for those who ha…

wÃ…nnÃ… w®Ã®tË lîkË thî§?

This is really cool trick. I am sure everybody will like it. Just follow the steps: Write your Message/Scrap in community or scrapbook. Copy paste the code below in your browser and then pr…

Ripping Flash Movies for Passwords

Ripping Flash Movies for Passwords Is easy Follow My Tutorial. How to rip a flash movie from a website ? Go to the website where the flashfile is located. Open de sourcecode (rightmouse cli…

WEP Cracking, FBI Style( In Just 3 Minutes ) !

Okay, before we begin, I give you Hungry Hacker´s fun facts on WEP. FUN FACTS : -WEP stands for Wired Equivalent Privacy -WEP is used to secure wireless networks from eavesdroppers -WEP usu…

Mobile can be a Life Saver

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do…

Remote Operating System Detection

Now a days we invite the so called victim to a webpage/blog and with the help of a free web traker servive get all his details as in browser/operating system and other details but still i w…

Breaking the Restrictions of the Administrator

Hello Friends many of you have come with this problem of hacking the Administrator in Windows XP. So her is the Solution to your problem. This works on Win 2000 & Win XP. This can be us…

Top 10 Windows Hacking Tools

This is the Collection of Best Windows Hacking Tools: 1. Cain & Abel - Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery o…

How to make Keygens?

Attention : This Article is Only for Real Geeks Disclaimer : I take no responsibility of the usage of this information. This tutorial, is for educational knowledge ONLY. How to make key gen…

Top 10 Linux Hacking Tools

This is a Cool Collection of Top Ten Linux Hacking Tools. 1. nmap - Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to r…

How To Write A Basic Keylogger In VB

Intro: What a Keylogger is made of Before we start programming, we need to answer a basic question: what is a keylogger? As the name implies (key+logger) - a keylogger is a computer program…

Mixed Bag - Mobile Hacking

Nokia 31xx ____________ Firmware version *#0000# or *#3110# IMEI Code *# 06 # Restores Factory Settings *#7780# Warranty Codes *#92702689# (= *#war0anty#) Just scroll down through the in…

Tracking Email

MailTracking.com - What is it and how does it work? What is MailTracking? MailTracking is the most powerful and reliable email tracking service that exists today. In short - MailTrack…

Your Email can be intercepted ! Check How

Top 10 Places Your Email Can Be Intercepted i. The Internet The Internet has radically changed the way we communicate with each other. Email is obviously an extremely valuable and ubiquitou…

Load More
That is All