//

0
Hack a website using remote file inclusion Hack a website using remote file inclusion

Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server.…

Read more »

0
Bluejacking  Bluetooth+Hijacking Bluejacking Bluetooth+Hijacking

BlueJacking is one of the mostly harmless activity can happen with any multimedia cell phone. Though it is an unintended and illegal use of a technical feature, mostly hard-core geeks do not find …

Read more »

0
How to become anonymous on Internet and access any block site How to become anonymous on Internet and access any block site

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects y…

Read more »

0
Control Mouse Movement by your Hand or Head Gestures with NPointer Control Mouse Movement by your Hand or Head Gestures with NPointer

if you need to work much on the computer (like me) and tend to take small breaks to sit back and lean on the chair, then you must have felt the need of some wireless mouse controller then this pos…

Read more »

0
How Antivirus Software Works How Antivirus Software Works

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the …

Read more »

0
Chat with Friends through ms dos Command Prompt Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %…

Read more »

0
Basic of Password Cracking  for BeginnerBasic of Password Cracking for Beginner

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the passwo…

Read more »

0
Repairing Windows XP in Eight Commands Repairing Windows XP in Eight Commands

Windows could not start because the following file is missing or corrupt:\\WINDOWS\\SYSTEM32\\CONFIG\\SYSTEMYou can attempt to repair this file by starting Windows Setupusing the original Setup CD-RO…

Read more »

0
Autorun.inf attak!! ? read this and know what happen to inf file Autorun.inf attak!! ? read this and know what happen to inf file

Autorun.inf virus attack! Is autorun.inf virus? This is the instructions that saved in the infected(call virus programs) autorun.inf file:[Autorun] Open=RECYCLER\QqFvXcB.exe Explore=RECYCLER\QqFvXcB.…

Read more »
 
Top