Showing posts from June 27, 2008

How to Send Self-Destructing Emails

Ever sent an email you later regretted writing? We all have, but it can be especially bad when those emails are sent to the wrong person or get leaked on the Internet. You might not know th…

Boeing's New 787 May Be Vulnerable to Hacker Attack

Boeing's new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane's control syst…

new cool ascii for orkut testimonals

[b][red]$$$$$$___$$$$___$$$$$___$$$$$$_$$$_$$$_$$$$$$_$$$$$____ _$___$__$____$___$___$___$___$__$___$___$___$__$___$___ _$_____$______$__$___$___$______$___$___$______$___$___ _$__$__$_____…

Modify Your CD-ROM to Watch DVD Movies

There are two types of CD-ROM drives we can mod: 24x to 40x 40x or higher Drives slower than 24x are too old to be modded. 24x to 40x CD ROMs Laser Head Adjustments: The track pitch of CDs …

Wednesday, October 24, 2007

G talk secret Parameters There are a few secret parameters you can add to Google Talk and make it function differently. Following is the list of parameters /nomutex: This allows you to open…

G talk SECRITS TRIX

Play Music in G talk !! It's possible to broadcast music, MP3, etc.. through Google Talk. Unplug your microphone. Double click on the speaker icon in the lower right corner. This will o…

Perl.com Sends Visitors to Porn Site

Another tale to do with advertising, it just goes to show it’s really not a good idea to run JavaScript from a 3rd party source on your site, especially if you don’t want your visitors redi…

Getting the Password File Through FTP

Well one of the easiest ways of getting superuser access is through anonymous ftp access into a webpage. First you need learn a little about the password file... root:User:d7Bdg:1n2HG2:1127…

How Hackers Work

Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporation…

Protected windows folder

Change Pass to the pass you want. @ECHO OFF title Folder Private if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK if NOT EXIST Private goto MDLOCKER :CO…

go Invisible on Gtalk

see this vedio http://www.metacafe.com/watch/1083191/invisible_in_gtalk/ ----------------------------- or follow me 1. Download this software http://sourceforge.net/project/downloading.php?…

Password Hasher Firefox Extension

Well seen as though we were talking about breaking passwords, here’s a tool for Firefox to help you manage your more secure passwords. Better security without bursting your brain Password…

Get IP address anonymity everytime

i have found one software which hide your IP address every time and give you a new IP address by creating a Tor Network……. If u have Mozilla then it works very fine First Download Vidalia B…

Using exploits. Includes noob protection

ways to handle and compile exploits. Alot of exploits come with "noob protection". Noob protection being they will move or add sections of text or scramble a simple statement so p…

Load More
That is All