Showing posts from March 30, 2010

Exploiting Redirect Vulnerabilities

I was surfing through my friend’s forum Secworm.net and read this thread about Redirection Vulnerabilities. So I thought of sharing it with you guys. Phishing is usually considered to be …

Get Your Website Secured – Free Penetration Service

The question which screw every webmaster’s mind is “How secure my website is?”. Every webmaster is very keen about their website’s security because they do not want to compromise any of the…

Windows 7 God Mode

Windows 7 is predominantly the best OS ever in the history of Microsoft. But, do you know that it has a GodMode within it ? There is a hidden “GodMode” feature that lets a user access all…

Isaac Newton on Google logo with dropping Apple

As I was browsing Google today I noticed a new logo which Google created to honor Sir Isaac Newton . The logo has an animated falling Apple and it’s missing an “o” from it. Google usually …

Make Your Keyboard Lights Do DISCO

Howdy Friends! This trick just makes your keyboard lights go crazy and do disco. LoL. The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in…

Wordpress 2.9 Carmen Now Available

Howdy Wordpress Lovers! I woke up in the morning today and as usual I logged into my Wordpress admin account and guess what, I saw this on the top of my admin panel: Hell yeah! Wordpre…

Hack To Make Free Calls

STD call rates are reducing in India every day, but still, they are not free. Today I bring you a hack to make free STD calls. I am exploiting a loophole in Rediff’s ad service. You can sea…

How To Hide Files In A Calculator?

Having read the title of this post you may be wondering if it’s really possible. Yeah! It is possible. As the word suggests, it’s a calculator with a safe which is capable of storing and ke…

HP Ink Cartridges

These days, HP is at the forefront of eco-friendly printing technology, and so are we. With some of the best remanufactured HP ink cartridges in the business, you can get the ink you nee…

Hack MSN Hotmail Using Hotmail Hacker [TUTORIAL]

Hi Hackers, THIS POST IS FOR EDUCATIONAL PURPOSES ONLY. FEEL FREE TO DIGG THIS POST. After the Gmail Hacker , here comes another software to hack MSN Hotmail accounts. Step by Step G…

15 Google Chrome Shortcuts to Save Your Time

Print this out, bookmark it, or remember this list of 15 useful and basic shortcuts. Feel free to DIGG THIS post! Open a new window: Ctrl+N Open link in a new tab: Press Ctrl, and clic…

Shutdown your PC remotely using Twitter and TweetMyPC

Hello to all the readers of Hacking Articles. Feel Free to DIGG THIS POST guys. Twitter is powerful and simple indeed. But then developers were not stopping on creating and obviously de…

Get Free Demonoid Invitation Codes (Code Generator)

Hey Friends, This is an amazing website which can help you create free Demonoid invitation codes but it takes a lot of time (it’s worth a try !).I got this amazing video at Youtube and w…

Google Wave Invite Giveaway

I received my supply of invites for Google Wave recently. Its been almost one month since I am using Wave but did not have he capacity to invite others. Today, Google bestowed in me the po…

How To Access Blocked Websites?

How to access blocked websites like Facebook, MySpace, Bebo at school or office? This article suggests workarounds to help you unblock access to restricted websites at universities, schoo…

Hacking Gmail account using GX Cookie

Disclaimer : This post is only for educational purpose. Introduction Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek f…

A Port Scanner in VB

A small but effective tool (if you know the right way to use it..you might do wonders..) ——————– you need: 2 textboxes 1 listbox 3 commandbuttons 1 timer 1 winsock control ——————– …

Basic BIOS password crack

This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you wil…

How to send fake email / Email Forging

Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain. But this is not possible since these hacks wil…

How to make a Fork Bomb (Rabbit Virus)

Introduction Hey guys, I ‘ve got a new thing for all u guys to have fun with, its very easy and fun to do. Before we start coding ill explain what a fork bomb actually is. A fork bomb or …

How to Hack into a Live Security Camera

Well this is an interesting article. It is a sub-section of a Hacking Technique known as “Google Hacking”. All what we are looking at are unsecured cams from around the world that are inter…

Sniffing Tutorial

Hi, Today I am posting a tutorial on Sniffing which can be done using “BACKTRACK” . You can download Backtrack from here. I prefer using Backtrack 3.0 Final version. Well lets start with…

Top 10 Facebook Hacks

Facebook has become very famous in last 1 year. Orkut which was considered to be the best Social networking website has been sidetracked by emerging Social Networking Websites like Faceboo…

Load More
That is All