Showing posts from August 15, 2008

Password Hacking

1. What are some password basics? Most accounts on a computer system usually have some method of restricting access to that account, usually in the form of a password. When accessing the sy…

BlazingTools Perfect Keylogger Lite (Keylogger)

BlazingTools Perfect Keylogger Lite: Description: Do you want to know what your buddy or colleague is typing? May be you want to control your family members - what are they doing on your co…

Keyboard Spectator Free (Keylogger)

Keyboard Spectator Free Description: Keyboard Spectator is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security special…

Ardamax Keylogger Lite (Keylogger)

Ardamax Keylogger Lite Description Ardamax Keylogger Lite is a small, freeware keylogger that captures users activity and saves it to a logfile. The logfile can be viewed as a text or web p…

Quick Keylogger (Keylogger)

Quick Keylogger Description WideStep Software presents light and affordable monitoring utility Quick Keylogger that supports 64 bit Windows as well as other OS. Simple download and deployme…

Hack BSNL Broadband For Speed

If you are a BSNL broadband user, chances are that you are facing DNS issues for the last few weeks or so. Their DNS servers are just unresponsive. The lookup takes a long duration and many…

Bypassing Vista SP1 Windows Genuine Advantage

The fact that Microsoft has relaxed its antipiracy mechanism built into Windows Vista concomitantly with the release of Service Pack 1 failed to stop hackers from providing a crack for the …

A File Embedder Project In C

Some times it is necessary for our compiled project to have it's supporting files embedded within the EXE module itself so that the supporting files may not be put into a seperate folde…

Program To Hack Yahoo Accounts

There are number of sites which provide information about hacking email accounts.So what's special about this site? The only special about this site is that we do not bluff and mislead …

Disable Task Manager

WARNING: Please Backup your registry before attemting this hack.Changes to registry may lead to system failure. The following registry hack enables us to disable the Task Manager. Step1: Go…

Advanced Google Search

Google is clearly the best general-purpose search engine on the Web.But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That …

Hacking Hotmail Password

These are some of the tricks that you can try to hack hotmail passwords. Brute force hacking a. Use telnet to connect to port 110 (Hotmail´s pop-server) b. Type USER and then the victim´s u…

Change The Title Of Yahoo Messenger

Here’s how you change the title text that appears at the top of the Messenger window. By default, this is “Yahoo! Messenger”, followed by your status. Simply edit the ymsgr.ini file, which …

Email Tracking

One of most the frequently asked question is how to track an email back to the sender.That is how to determine the sender of the email? The most obvious answer is by looking at the "Fr…

Change IP Address

How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address. 1. Click on "Start" in the bottom left hand …

How To Disable Windows Logo Key?

At times it becomes necessary to disable the Windows Key on the keyboard.For example when playing games this nasty Windows Logo key keeps annoying , as we often accidently press it and this…

Load More
That is All