Monday, 27 June 2011

how to prevent email account password from hackers.

Hello friends, i going to share now how to prevent email account password from hackers. This is a complete guide to protect yourself from being hacked and secure your personal information from getting leaked or used by anybody online. This guide will also help you to learn several latest techniques that hackers use to hack email accounts and passwords. So guys lets discuss...
Read more...

Thursday, 23 June 2011

5 phases of Web Application attack - A HackingAlert Exclusive research!

Web applications are now the next big victim after games for hackers . A recent research shows that 70% of vulnerabilities exist at the top layer of the web application.The attackers use several techniques to hack web applications . I have been constantly monitoring different types of web attacks involving different methods but there ar some common steps which all hackers follow in order to...
Read more...

Monday, 20 June 2011

Free WinRar Password Recovery

Today i am going to discuss the  awesome Zip password Recovery Magic v6.1.1.169, that can easily crack zip passwords. It provides brute-force and dictionary cracking methods, you can pause and resume recovery job easily. All you need to recover your password is just to add your file to the operation window.Free Download Zip Password Recovery MagicHow to install Zip password Recovery Magic v6.1.1.169...
Read more...

Saturday, 18 June 2011

Perfect Keylogger

 Perfect Keylogger is a new generation keylogger which is absolutely undetectable. Complex internal mechanisms are hidden from the user behind the friendly interface. Perfect Keylogger is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely...
Read more...

Thursday, 16 June 2011

Hack Google Searching

Songsjavascript:Qr=�;if(!Qr){void(Qr=prompt(�ENTER ARTIST OR SONG NAME:�,�))};if(Qr)location.href=�http://www.google.com/ie?query=%22parent+directory%22+%22�+escape(Qr)+�%22+mp3+OR+wma+OR+ogg+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N�E-bookjavascript:Qr=�;if(!Qr){void(Qr=prompt(�Enter Author name OR Book name:�,�))};if(Qr)location.href=�http://www.google.com/ie?query=%22parent+directory%22+%22�+escape(Qr)+�%22+pdf+OR+rar+OR+zip+OR+lit+OR+djvu+OR+pdb+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N�Imagejavascript:Qr=�;if(!Qr){void(Qr=prompt(�ENTER...
Read more...

Tuesday, 14 June 2011

Secure webmail encryption service eCrypt.me

When it comes to send encrypted email messages the easiest way to do it is by using a webmail service that supports it, with email encryption working in the background you do not have to worry about digital certificates and PGP encryption keys, everyone can use it with zero knowledge about encryption, the responsibility for keeping the messages secure lying with the provider and not the...
Read more...

Sunday, 12 June 2011

Hack a website using Directory Transversal attack?

What is root directory of web server ?It is a specific directory on server in which the web contents are placed and can be seen by website visitors. The directories other that root may contain any sensitive data which administrator do not want visitors to see. Everything accessible by visitor on a website is  placed in root directory. The visitor can...
Read more...

Prevent identity theft and fraud with Identity Finder

With hard disks getting bigger in size and thousands of files in our computers it is easy to leave behind personal data that could be used for identity theft, Identity Finder stops the risk of data leakage by finding and securing private information, it would be a good idea to run something like this on your hard disk before taking your laptop to the repair shop or allowing anyone who is not...
Read more...

Wednesday, 8 June 2011

Difference between IPv4 and IPv6

From a long time there is so much debate about changing from ipv4 to ipv6. But what are these so called ipv4 & ipv6, what is the difference between ipv4 and ipv6 and why is it necessary to change from ipv4 to ipv6. In this post we will discuss about all these in simple manner(at least i will try to be simple). What is an IPIP which is the short form of Internet Protocol, In simple, this IP is...
Read more...

Monday, 6 June 2011

How to Bypass Windows XP Firewall using C program.

Hello Friends, today i will share with you the technique using which we can bypass windows-xp service pack-2 firewall. Its a 100% workinghack and its basically an exploit in windows XP.This techniques is nothing but the vulnerability found in windows-xp sp2 firewall.Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall....
Read more...

Friday, 3 June 2011

Make Your Computer Login Screen Like FBI Tunnel

Step 1 : Download Logon Studio ,LogonStudio 1.7 | 7MbInformation:Longing for some change in your life? Why not start with that boring old Windows XP logon screen? With the freeware LogonStudio, choosing another screen is a matter of two clicks. Alternately, you can design your own with a built-in editor.The first option is a lot easier. About 30 cool screens are available on the WinCustomize site,...
Read more...