Sunday, December 25, 2011

Download the best hacker assistant

Hackers Assistant is a multitasking tool for windows. It has several useful features and is updated every time I learn something new (and if it's worth adding). The current version is Hackers Assistant v1.2. Here is a list of the features:Port Scanner - Scan an IP for open ports Ping Flooder - Flood a connection with pings Server Slower - Slow down a small web server Connections - View...
Read More

Friday, December 23, 2011

Anonymous Browsing via Proxy Servers with Proxy SwitcherA Hacker needs to hide his IP address by using free IP Changer software while doing any sort of hacking stuff. This is particularly necessary when you’re trying to DDOS or Deface a website. Website Hacking requires complete anonymity so that it becomes hard to trace the hacker. So, I am here to inform you about Proxy switcher Standard – a software used to hide your IP Address. It is a free IP...
Read More
Note: The article is meant for educational purpose only. I am not responsible for any act done by you. Remember, hacking website is legally offensive and can take you behind the bars.Hack Website using DOS attack:A DOS (Denial Of Service) attack is implemented by sending large number of requests to a web server. Due to large requests, web server clogs up and is unable to respond to other requests. Excess packet traffic in the network leads to congestion...
Read More

IP Hack: How to find someones IP Address

IP Hack – How to find someones IP Address:1. Go to IP Address Finder website to find someone’s IP Address.2. Enter your email id where you want to receive the victim’s IP Address and hit on Get Link.3. Now, you will get a link from IP Address Finder.4. Send this link to your victim and whenever he will simply click on this sent link, his IP Address will be recorded and mailed to you by IP Address Finder.Thus, this is so simple. You can easily find...
Read More

CYBER GHOST

Why surf anonymously?Everyone is curious by nature. Everyone likes gossiping about others and swapping news. But no one would really like to be secretly spied on. That's why we close doors whenever we want to be left undisturbed or chat on the phone with friends without anyone listening in.There is little privacy on the Internet. Website operators would like to know what you're interested in. Businesses want to know what you're up to on the Internet....
Read More

How to find Gmail account creation date

Get Gmail account creation Date: 1. Gmail Welcome Mail:All Gmail accounts receive “Gmail Welcome Mail” after they create their Gmail account. So, this “Welcome Mail” has the same date as your Gmail account creation date. So, noting this date will serve the purpose. Go to Gmail inbox and hit on Oldest button to get the last message. This message will be from Gmail Team. Note this mail’s date. Done!!!But, many readers said that they have deleted...
Read More
How to Autorun USB programs using Autorun.inf: First of all, let us consider a simple situation. What happens when you plug-in USB drive to your computer??? Windows will show you a prompt box. This box is called Autoplay dialog box. On hitting OK, you will be shown the contents of this USB drive.What we want??? To make certain files (our keylogger server, to be exact) to autorun once USB drive is plugged to computer, without any action from...
Read More

TRUE CRYPT download

Introduction True Crypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/key file(s) or correct encryption keys. Entire file system...
Read More

Tuesday, December 13, 2011

IDM 6.08 Beta 1

Internet Download Manager  (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator...
Read More

Thursday, November 24, 2011

KeyScrambler

A safe journey online begins with a single encrypted keystrokeKeyScrambler Protects your secrets from keyloggers & keylogging malware attacking your computer.The advanced key-encryption method keeps your keystrokes scrambled and indecipherable while they travel from your keyboard to the destination app. The encryption of your keystroke stream is displayed realtime in the unobtrusive user interface so you know how and when KeyScrambler is...
Read More

Wednesday, November 2, 2011

How to Hide Data in Image, Audio & Video Files: Steganography Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding...
Read More

Friday, October 14, 2011

     SmartCam - Smart Phone Web Camera - Turns a camera phone (S60, WinMo6.x, Android, Samsung Bada) with bluetooth or WiFi into a handy webcam ready to use with your PC DOWNLOAD Smartcam which is available for f...
Read More
How to share Internet connection from pc to a Symbian or java mobile using Bluetooth Step 1First create a new access point: Copy to clipboard Code:Go to - Tools > Settings > Connection > Access points > Options > Create new access pointName the access point anything you wish. In my case I called it 'Hiisi', but you name it as you want. Example Connection Name > Hiisi (Or anything else you want) Give a valid Access Point Name (you can take it from any valid GPRS/EDGE connection) Leave everything on default then go to Options >...
Read More