//

0
Truecaller hack How to Unlist Your Number from TrueCaller Truecaller hack How to Unlist Your Number from TrueCaller

TrueCaller is a mobile app and online service that serves as a very large phonebook for reverse phone number lookups. It’s helping you let know the names of unknown callers. How does it work? TrueC…

Read more »

0
Types of Attacks on Web Servers Types of Attacks on Web Servers

Types of Attacks on Web Servers Some of the more popular attack methods are described below. FTP Bounce Attack FTP (File Transfer Protocol) is used to transfer documents and data anonymously from…

Read more »

3
List of Free VPN Service Providers List of Free VPN Service Providers

Why You Need VPN ? To protect privacy, either on a LAN or a public hotspot. Anonymous Internet Surfing Full anonymity by hiding your real IP address. Bypass geographical blocks from certain websites …

Read more »

0
How to Compress your videos 50% without losing quality How to Compress your videos 50% without losing quality

many people ask me to compress their  video  so here is what you need Most of the time when we compress any video file we loos the quality of video. Today i am going to show how easily you can compr…

Read more »

0
How to See if Your Hard Drive is Dying How to See if Your Hard Drive is Dying

Hard drives use S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) to gauge their own reliability and determine if they’re failing.  You can view your hard drive’s S.M.A.R.T. data an…

Read more »

0
Free Network Inventory Software for IT Professional Free Network Inventory Software for IT Professional

Today my company management ask me to make network inventory of entire network. if i am going to collect all all computer information like how many computers are there in my network ? Which operating…

Read more »

0
Get the complete Domain Report of any WebsiteGet the complete Domain Report of any Website

If you want to Find out the information of Registered domain information of any site, Registered Owner name , Hosting company name , Domain creation date , Domain Expiration date, IP-address inform…

Read more »

0
NetBIOS hack in windows OS NetBIOS hack in windows OS

NetBIOS stands for Network Basic Input Output System. It allows your LAN or WAN to share drives, folders, files and printers. Gaining access to a computer through NetBIOS is very simple and easy. The…

Read more »

0
How to configure/use ProRat Trojan to hack someone's PC (Free download and instructions) How to configure/use ProRat Trojan to hack someone's PC (Free download and instructions)

How to configure/use ProRat Trojan to hack someone's PC (Free download and instructions)    It can connect to the server more faster. It has more features/functions to play with your victim's PC. Eas…

Read more »

0
[Metasploit Tutorial] Hacking Windows XP using IP Addres [Metasploit Tutorial] Hacking Windows XP using IP Addres

Do you think it is possible to hack some one computer with just an ip address?! The answer is yes, if you are using unpatched(vulnerable) OS.  If you don't believe me, then read the full article. …

Read more »

0
What is Database?What is SQL injection?What is Database?What is SQL injection?

In this i'll give you intro to the SQL Injections. Next post will give you detailed information about the SQL injections. What is the Database?   Datbase is an application that stores a collection of…

Read more »

0
Introduction to Social Engineering worldIntroduction to Social Engineering world

What is Social Engineering? Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical crackin…

Read more »

0
List Of Every Linux Version and ReleaseList Of Every Linux Version and Release

Read more »

0
A-Z Index of the Bash command line for Linux.A-Z Index of the Bash command line for Linux.

http://ss64.com/bash/ A-Z Index of the Bash command line for Linux.... …

Read more »
 
Top