Posts

Top 10 Ways How hackers Can Hack Facebook Accounts (latest)

Image
Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers,   hence by the means of this post ..i want to tell you about the top 10 methods which are used by hackers to hack facebook profiles..latest which are still in use in 2012 too.Read it Carefuly and defend yourself ..if you are going to be a victim.(for educational purpose only)   10 Ways How Hackers Can Hack Facebook Accounts In 2011 So here are the top 10 methods which have been the most popular in 2011: 1. Facebook Phishing  Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims " E

site ip

Image
You can use the PING utility included with Windows to determine the “real” IP address of a web site. Before using this utility, make sure you are not mapping a host name to some IP address with HostName Commander, because if you do, the PING utility will show the address you’ve set up with HostName Commander, instead of the “real” IP address. To run the PING utility, click on the Windows  Start  button, and choose  Run  from the Start Menu. If you use Windows 95,98, or Me, enter “command” (without the quotes) as the command line to run. If you use Windows XP,2000, or NT, enter “cmd” (again, without the quotes). Click OK and the command prompt window should appear on the screen. Now enter the word “ping” (without the quotes) followed by a space, followed by the host name you want to determine the IP address of, and press Enter: I n this example, the IP address of the host name  www.rkgit.edu.in  is 74.52.201.2  & IP Address of the host name  www.kiet.edu  is 220.225.19.55  

I-Phone Secret Codes

Image
Searching for i phone secret codes, Your search ends here we have brought you the latest codes which work on i phone the codes are Following are the secret codes for your i phone 1) *3001#12345#* and tap Call. Enter Field Mode.Field mode reveals many of the inner settings of your iPhone, specifically up-to-date network and cell information. 2) *#06# Displays your IMEI. No need to tap Call.IMEI is the unique identifier for your cell phone hardware. Together with your SIM information it identifies you to the provider network. 3) *777# and tap Call. Account balance for prepaid iPhone. 4) *225# and tap Call. Bill Balance. (Postpaid only) 5) *646# and tap Call. Check minutes. (Postpaid only)These three are pretty self explanatory. 6) *#21# and tap Call. Setting interrogation for  call forwarding .Discover the settings for your  call forwarding. You’ll see whether you have voice, data, fax, sms, sync, async, packet access, and pad access call forwarding enabled or disabled. 7)

Watch ASCII Star Wars in Windows XP, Vista and 7

Image
Every one of us has watched Star Wars on television, computer or in a theater. It is the same movie with aliens fighting each other for galaxies and such stuff. There is nothing new in it. But wait, have you watched an ASCII(  American Standard  Code for Information Interchange) version of Star Wars and that too in  Windows using   telnet . A word mostly linked with computer wizards. Well if you have not, then you must do it now! There is a complete copy of Star Wars done entirely in ASCII characters that you can watch in theWindows operating system (or any OS that supports  telnet ). The only thing required to watch it is an internet connection; speed does not matter. To watch it on Windows XP, Go to Start, Run. Now type "telnet towel.blinkenlights.nl" without the quotes and press Enter. On Windows 7 and Windows Vista Telnet  is turned off by default in the  latest version windows . So, in order to watch star wars, you must first enable  telnet  by going to Control

Lock/Unlock Computer With Pendrive(USB) in windows

Image
SYSKEY  is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key. SYSKEY was an optional feature added in Windows NT 4.0 SP3. It was meant to protect against offline password cracking attacks so that the SAM database would still be secure even if someone had a copy of it. However, in December 1999, a security team from Bind  View found a security hole in SYSKEY which indicates that a certain form of cryptanalytic attack is possible offline. A brute force attack then appeared to be possible. Microsoft later collaborated with Bind View to issue a fix for the problem (dubbed the ‘Syskey Bug’) which appears to have been settled and SYSKEY has been pronounced secure enough to resist brute force attack. According to Todd Sabin of the Bind View team RAZOR, the pre-RC3 versions of Windows 2000 were also affected. So this is pretty cool, right?  Well, I really like the idea of keeping this on Floppy so that it req

lock/unlock usb port

Image
Step1:  In Windows 7  press  Windows key+R  and type as “regedit Step 2:  It will open the Registry Editor of  your Windows 7 The Path to go:  “HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUSBSTOR” Step 3:  After opening Registry edit browse the following path in reght side bar of registry editor Step4:  Then  right click  the registry “Start” which is rectangled in red color in the below screenshot of registry editor Step:5  Right Click  “Start” and Click modify To enable USB ports:  change the value from “4? to “3? To disable USB ports:  change the Value for “3? to “4? finaly restart your system.Because Restarting Your system Will take The affects of changed registry. .

Any Rar Passwords Protected File

Image
This program recovers forgotten passwords for RAR archives.  Recover  runs in the background and resumes on the next system start-up. When you have completely forgotten a password, Advanced RAR Password Recovery will run a  brute-force  attack that applies all possible combinations one by one. In such a case, you can set the minimum and maximum number of characters and the character sets you used (letters, numbers, and non-English characters). If you recall part of the password, you can restrict the search area with a mask such as  m***l . If you have used a meaningful word for your password, the dictionary attack helps. You can plug in external dictionaries and check all possible lowercase and uppercase combinations. To decrease recoverytime, the program optimizes its code for each type of processor. The trial version limits recovery to three-letter combinations, which doesn't give you the opportunity to fully evaluate performance. If you've forgotten the password for a