Wednesday 25 July 2012

Remote attack with "PORTAIL DOKEOS 1.8.5" Deface and Shell Upload vulnerability

Be the first to leave a comment!

Portail Dokeos vulnerability is a Kind of FCK editor remote file upload vulnerability in this vulnerability hacker can upload a shell. Deface page or any file on website without admin username and password

PHISHING

Be the first to leave a comment!

Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.

Sunday 22 July 2012

Know if someone is hacking your computer/ Trace a Hacker

Be the first to leave a comment!

Want to know if someone is hacking your computer? Command Prompt can help you find if someone you don't know is connected to your computer stealing private data. Just execute netstat -a and the command prompt will return a list of computers that your computer is connected to.

Know if your neighbours are stealing your Wifi connection

Be the first to leave a comment!

Command Prompt can let you know if someone is connected to your Local Area Connection and using it.

Know your IP address, DNS Server's address and a lot more about your Internet Connection

Be the first to leave a comment!

Command Prompt can even let you know your IP address. Just type ipconfig/ all in the command prompt and press Enter. Along with your IP address and DNS servers, command prompt will also return a ton of information like your host name, primary DNS suffix, node type, whether IP Routing ,Wins Proxy, and DHCP are enabled, your network adapter's description, your physical (MAC) address etc .

Watch ASCII Star Wars in Windows XP, Vista and 7

Be the first to leave a comment!

Every one of us has watched Star Wars on television, computer or in a theater. It is the same movie with aliens fighting each other for galaxies and such stuff. There is nothing new in it. But wait, have you watched an ASCII( American Standard Code for Information Interchange) version of Star Wars and that too in Windows using telnet. A word mostly linked with computer wizards.

Thursday 19 July 2012

Free Download FUD Crypter 2012 : FUD Crypter To Bypass Antiviruses

1 Comment so far!

So today i will tell you about a software called Crypter,by which you can bypass antivrus detection while installing a keylogger remotely. This Crypter is UD (Undetectable) and not FUD (Fully Undetectable) free software, because it is detected by some antivirus softwares.

Twitter Hacking : How To Use PRORAT Software To Hack Password

2 Comments so far!

This is step by step tutorial that explains how to use pro rat software. ProRat is a Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool). As with other trojan horses it uses a client and server.

How To Remove Recycler & System Volume Information Folder From Computer

Be the first to leave a comment!

In most of the cases Recycler virus enters via permanent media, as well as removable devices (including CD-ROMs, DVDs, USB drives, memory sticks, and other devices). These viruses exploit the autorun feature of windows and can be found in different names inside flash drives like recycler.exe, flashguard.exe, newfolder.exe and also create replicas using the same folder name which they occupy.

Tuesday 17 July 2012

AVAST! FREE ANTIVIRUS + SERIAL KEY VALID FOR 30yrs

2 Comments so far!

Today i am going to release the avast! free antivirus software but not only the software but alongside the registration key also known as ''SERIAL KEY or PRODUCT KEY'' that is going to be valid for 30yrs.

Thursday 12 July 2012

Internet Download Manager Serial Key | Free IDM 6.11 Serial Key

4 Comments so far!










Today I am providing here, Internet Download Manager 6.12 Serial key. But remember:- Always Buy Serial Key from Authorized website.

Skype Vulnerability Allows Collection Of User IP Addresses

Be the first to leave a comment!

Skype is warning users following the launch of a site devoted to harvesting user IP addresses.The Skype IP-Finder site allowed third-parties to see a user's last known IP address by simply typing in a user name.

Tuesday 10 July 2012

How Hackers Get Free Keygens and Serials of any Software Online

1 Comment so far!


I receive a lot of emails from my readers requesting for serials and keygens of different softwares after my post on ANTIVIRUS RANKING 2012. Due to limited time I have in replying them with what they need; now I have decided to compile some cool websites that produce free serials. Check them out if you need any serials or keygens for your softwares.

Thursday 5 July 2012

HACKERS UNDERGROUND HANDBOOK. (free download)

Be the first to leave a comment!
I would be sharing an e-book today named as THE HACKERS UNDERGROUND HANDBOOK for free. Normally, i am not meant to be giving this book out because it is prohibited under the copyright law of the book.


These book currently cost $24.95
If you doubt me, CLICK HERE
But I would be giving it out to you guys all for free.

advert

Blog Archive

 

Author

DMCA.com Protected by Copyscape Online Plagiarism Checker
MyFreeCopyright.com Registered & Protected
free web site traffic and promotion

Followers

Powered by:

CYBER_HACKER HQ © 2012. All Rights Reserved | Author | Advertise |