Popular Posts

Wednesday, December 29, 2010

How to run .exe (win32 application) in Linux platform

Majority of people doesn't like to use ubuntu just because of its inability to run or execute win32 app. or files. I personally sometimes got annoyed with Linux for the same reason. But now there is a solution to all these damn stuffs.

Linux or Windows : which to choose

This can be quite an odd feeling but now a days I am finding quite lot of guys switching from windows to linux based operating systems. In a world that is ruled by windows, Linux is getting itself a lot of looks from allover most of guys are now switching over to Linux based systems.

Tuesday, December 28, 2010

How to recover your lost data, images, files etc

Sometimes you accidentally delete some important stuff and don't know what to do now. Simple actually when ever you delete something, even from the recycle bin. Actually in windows when an item is deleted it doesn't get completely removed from your hard disk but rather is present in invisible from on your hard disk.
Did you accidentally deleted your data or some important file or family photos. Actually you can retrieve it back.

Hide files and Folder in your NOKIA phone without any software

 Have you ever wondered how you could hide folders in your nokia phone. I know there are pretty damn large no. of softwares available in the market that claims to hide all your data. But I personally feel its quite cumbersome to first add software then use it... I don't like my phone littered with softwares.

Saturday, December 25, 2010

Hack any PC remotely with ProRAT

In previous post I wrote about what is a RAT, hope you all read it. Now this time I am posting a tutorial about one of the most famous RAT program ProRAT.

Thursday, December 23, 2010

How to add RUN command to the start menu

Missing RUN command in start menu???? Well Windows7 comes with exciting new features, but I personally missed RUN command from start menu. RUN command allows you to access various commands without lurking for them in folders or searching them

In a few easy steps you can add run command to your start menu.

  1. Right click on the task bar and then click on properties.
  2. Click on the start menu tab and then click on customize.
  3. Scroll down the list to find RUN command and check it.
  4. then click on OK and agin click on OK
  5. now you are done.

Wednesday, December 22, 2010

What is RAT (Remote Administrative Tool)

The Remote Administrative Tool, or more commonly known as RAT over internet. It is used by hackers to remotely use and control single or multiple computers. It has many useful tools embedded into itself.

Sunday, December 19, 2010

How to acccess your Friends laptop by LogMeIn

You can also use LogMeIn to get access to your friends computer. This tricks actually need a bit of social engineering.

Remote access to Computer by using LogMeIn


Many people insists on asking how to access their computer from a remote location. Ever been out on a trip and just remember, "shit I forgot ABC in my personal computer, oh god I have to go back again". Well this short of things are a part of ones everyday life. This is a tutorial which allows you to acess your computer from anywhere in the world, virtually from any device and any browser.

Saturday, December 18, 2010

How to surf internet without exposing yourself


Surf web anonymously and securely. 
Its really an insecure world out there, when ever you are surfing net you leaves all your foot prints behind yourself, just like as if walking on a mud. Its really easy for an attacker to trace you.

Thursday, December 16, 2010

Protect against attacks- 11 things you need to do

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.







1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic

Sunday, December 12, 2010

What is network mapping

Networks are generally mapped with almost no knowledge, from far much away from the actual network we gather information and interpret the network topology is known as Black Box. In this case, cracker initiate with IP address of server or URL of the website of victim organization.

Saturday, December 11, 2010

What is bluetooth hacking

What is bluetooth? 
Bluetooth is a form of wireless communication and can be used to pass information to Bluetooth-enabled devices such as mobile phones.

Bluetooth is an excellent protocol for wireless communication