GET YOUR LAPTOPS CONFIGURED FOR FREE BROWSING
Browse for free using multilinks, swift etc with VPN's like pdproxy,sandwish from the comfort of your home.
This is featured post 3 title
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
Thursday, 21 February 2013
HOW TO HACK SOMEONE BY KNOWING HIS IP
IntroductionThis tutorial will teach you some simple things about NETBIOS, what it does, how to use it, how to hack with it, and some other simple DOS commands that will be useful to you in the future. THIS DOCUMENT IS FOR NEWBIEZ ONLY!!! If you are NOT a newbie then don't go any farther reading this because if you're smart enough you probably already know it all. So don't waste yourt time reading something that you already know.1. Hardware and Firmware
1. The BIOSThe BIOS, short for Basic Input/Output Services, is the control program of the PC. It is responsible for starting up your computer, transferring control of the system to your operating system, and for handling other low-level functions, such as disk access.
REMOTELY SHUTDOWN OTHER COMPUTERS
Things you should know before you begin:
-You NEED a computer
-You NEED a friend’s computer
-You NEED a pencil/pen and paper or a really good memory
-This only works if both computers are on the SAME network (i.e. computer labs at school)
HOW TO REMOTELY SHUTDOWN OTHER’S COMPUTERS
Before I start I want to make sure that anyone reading this guide understands that you MUST be on the same network as the computer you are trying to shutdown. This means that you can’t do it to a friend who lives next door, and most of the time it wont even work on to a computer in your house. However you may be able do this to computers on an office floor, or in a computer room/lab at school or the library.
And mind you, this tutorial is not for you to invade on other peoples privacy but just for the knowledge of it.
Step 1:
First off, you will need to find the computer name of your targeted computer (this is the person you will be turning off).
-You NEED a computer
-You NEED a friend’s computer
-You NEED a pencil/pen and paper or a really good memory
-This only works if both computers are on the SAME network (i.e. computer labs at school)
HOW TO REMOTELY SHUTDOWN OTHER’S COMPUTERS
Before I start I want to make sure that anyone reading this guide understands that you MUST be on the same network as the computer you are trying to shutdown. This means that you can’t do it to a friend who lives next door, and most of the time it wont even work on to a computer in your house. However you may be able do this to computers on an office floor, or in a computer room/lab at school or the library.
And mind you, this tutorial is not for you to invade on other peoples privacy but just for the knowledge of it.
Step 1:
First off, you will need to find the computer name of your targeted computer (this is the person you will be turning off).
Wednesday, 20 February 2013
Easy Way to Hack WEP/WPA/WPA2 Wi-Fi Password
Easy Way to Hack WiFi Password
In this tutorial I’ll show How to hack a WPA/WPA2 Wi-Ficonnection through a bootable USB.
2. beini.iso file. [Download it from HERE].
3. UNetbootin software to make your USB drive bootable. [Download for Windows, Linux or Mac]
Some few steps you should to do ( WEP):
1. Write beini.iso on your USB by UNetbootin. Set everything according to this image bellow.
Best Book For Hackers
How To Create No-iP Host
No-Ip Program offers you many services And is used by a hacker to connect to the victim
1. Start Off By Going To; No-IP.com And Register. If You Have An Account There Already, Then Just Log In.
2. Once You've Logged In, Press "Add Host"
HACK Liberty Reserve [HOT]
Reverse A Phisher Program
Step 1 -Head to http://reflector.red-gate.com/Download.aspx and download .NET reflector
Step 2 - Run .NET reflector
Step 3 - Download the phisher you want to reverse
Step 4 - Go into your Downloads folder and grab your phisher into .NET Reflector
Step 5 - expand your phisher
Step 2 - Run .NET reflector
Step 3 - Download the phisher you want to reverse
Step 4 - Go into your Downloads folder and grab your phisher into .NET Reflector
Step 5 - expand your phisher
Subscribe to:
Posts (Atom)