Not found what you looking for?

Monday, August 1, 2011

BlackBerry

BlackBerry Decibel meter. Displays your signal strength in decibels, instead of bars. Hold “Alt” and press “N”, “M”, “L”, “L” (repeat to reverse the effect). Address Book file verification. Checks the data in your Address Book for inconsistencies. In the Address Book, hold “Alt” and press “V”, “A”, “L”, “D”. Address Book data structure rebuild. Forces a data structure re-build in the Address Book… In the Address Book, hold “Alt” and press “R”, “B”, “L”, “D”. View source code. Displays the source code of a Web page. In the Browser, hold “Alt” and press “R”, “B”, “V”, “S”. Help Me! menu. Provides crucial technical information about your device, for when seeking technical support or help in forums… Hold “Alt” and (left) “shift”, then press “H”. IMEI...

Saturday, July 30, 2011

Hack Gmail:Fake Login/Phishing Page for Gmail

I'll give you a sample of a Gmail phishing page which i made recently.It is quite easily to make a phishing page once you understand the whole idea behind it. File Details: Download: Gmail Phishing Page File Size: 4 KB File Extension: .rar (Compressed Archive) How to use it ? I have made a generalized tutorial on how to use fake login pages and how to set them up for hacking over here : How to Install / Setup / Use a Fake Login Page for hacking If you follow that guide careful you should be able to use this file successfully.If you have any problems on your way then just E-mail me using the contact form or just leave a comment.I'll get to you immediately. What can i do with a Phishing page ? The main reason i made this phishing...

Friday, July 29, 2011

How to use Rapidshare-Hotfile | Fileserve Premium Cookie ?

What are Cookies ? The website saves a complimentary file with a matching ID tag. In this file various information can be stored, from pages visited on the site, to information voluntarily given to the site. When you revisit the site days or weeks later, the site can recognize you by matching the cookie on your computer with the counterpart in its database. In a nutshell: It is something that a website needs in order to identify and automatically log you into the site without asking for your account details again and again. Anyway lets proceed on how exactly it is being used in hacking premium accounts such as Fileserve,Hotfile,Rapidshare,Depositfiles etc. Where can i get a Premium Cookie ? You can always you the "Mulitple Search...

Dell removes the Streak from its shelves for a possible update

Dell has removed their massive Android-powered smartphone the Streak from shelves and their online store in what apparently is an attempt to the update device which may be re-released in early August. The Dell Streak sports a massive 5-inch display but never really took off due to the dated version of Android that was featured on the device. There is no word on what the update to this smartphone is, but it may actually have nothing to do with Android. So really, your guess is as good as ours. The Streak may be unavailable for a couple of weeks since they aren’t even taking orders for it right now. We’ll all just have to wait and see what changes on the handset next month. Any guesses as to what it is Dell could be updating on the Streak?...

Seed Torrents Faster | Download Dead Torrents Faster

How many of you have had this problem ? I get frustrated when i see the same download speed nearly for 2 days.So today i have an good method and a working one of course, because I checked it myself and seemed to be working right. What does this method actually do ? It quite simple if i have to put it in points.. Faster Seeding for uploader. Relatively faster downloads than earlier for leecher Now what we are going to do is add a "HELL LOT OF TRACKERS" to the current ones. Here is a list of about 1200+ Trackers,that is going to boost your download experience by like x10 or something So now coming to the point this is what you have to do.First of all you have to copy this torrent list (Ctrl + C). Here is the download link for the...

Restore It! : Restore and Recover Your Deleted Data From Recycle Bin

Hello Everyone, Here is yet another interesting post.This tool was helpful for me because i deleted an Important file by mistake from my PC and luckily i came across this wonderful tool which set me right back on track.Yes,I'm not joking ! This really works 100%,I can guarantee you that. So before we see more about this program lets first download it File Details: Download: Restore it ! File Size: 150 KB File Extension: .rar (Compressed Archive) How to use this tool ? Its quite simple and self explanatory ! 1.In the first step select the drive in which your file was present earlier. 2.Then type the name of the file in the first text box. 3.Then you select both the Check boxes.So that your files is searched even in the corners...

Hack Yahoo | Yahoo Hacking Software

What is Phishing ? Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. This is similar to Fishing, where the fisherman puts a bait at the hook, thus, pretending to be a genuine food for fish. But the hook inside it takes the complete fish out of the lake. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are...

How to Hack Facebook Password in 5 Steps

This is one of the most popular questions which I'm asked via my email.And today I'm going to solve this problem one it for all.Even though i have already written a few ways of hacking a facebook password.Looks like i got to tidy up the the stuff here.The first thing i want to tell is.You can not hack or crack a facebook password by a click of a button.That's totally impossible and if you find such tools on the internet then please don't waste your time by looking at them! They are all fake.Ok now let me tell you how to hack a facebook account. I'll be telling you 5 of the basic ways in which a beginner hacker would hack.They are: 1.Social Engineering 2.Keylogging 3.Reverting Password / Password Recovery Through Primary Email 4.Facebook...

Hack Any Facebook ID Easily Using A Phishing Page / Fake Login Page

My first post on Phishing was how to install a phishing page and in order to install a phishing page you need one.So in this article I'll give you a sample of a facebook phishing page which i made recently.It is quite easily to make a phishing page once you understand the whole idea behind it. File Details: Download: Facebook Phishing Page File Size: 4 KB File Extension: .rar (Compressed Archive) What is a Facebook Phishing Page ? Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. This is similar to Fishing, where the fisherman puts a bait at the hook, thus, pretending to be a genuine food for fish....

Tuesday, July 26, 2011

Hacking Facebook Accounts/Passwords By Keylogger

Hello friends today i will explain you how to hack the Facebook password or accounts remotely using keylogger. Its a 100% working hack and you can easily hack anyone's Facebook account or password using this hack. In this tutorial i will explain you how to hack Facebook and other passwords of any user using 100% FUD keylogger. The keylogger in this tutorial we will discuss is L33ts keylogger and its 100% FUD(fully undetectable). Hacking Facebook account is very easy and just requires not more than 10 minutes of work. Don't worry i will also tell you how to protect your facebook account or passwords from such hacks and hackers. But for this you must know how hackers hack your facebook account. So first i teach you how to hack facebook...

China

ALL CHINA MOBILES CODE *#66*# Set Factory Mode CONFIRMED *#8375# Show Software Version CONFIRMED *#1234# A2DP ACP Mode CONFIRMED *#1234# A2DP INT Mode CONFIRMED *#0000# + Send : Set Default Language CONFIRMED *#0007# + Send : Set Language to Russian CONFIRMED *#0033# + Send : Set Language to French CONFIRMED *#0034# + Send : Set Language to Spanish CONFIRMED *#0039# + Send : Set Language to Italian CONFIRMED *#0044# + Send : Set Language to English CONFIRMED *#0049# + Send : Set Language to German CONFIRMED *#0066# + Send : Set Language to Thai CONFIRMED *#0084# + Send : Set Language to Vietnamese CONFIRMED *#0966# + Send : Set Language to Arabic CONFIRMED default user code: 1122, 3344, 1234, 5678 Engineer mode: *#110*01# Factory mode: *#987# Enable...

Monday, July 25, 2011

Secure Sockets Layer

Secure Sockets Layer or SSL is a secure protocol, which is the reason why secure E-Commerce and E-Banking is possible. It has become the de facto standard for secure and safe only transactions. When Netscape first developed SSL, the main aim or motive behind it was to ensure that the client and host can communicate or transfer data and information securely. What SSL does in short would be, encrypt data at the sender’s end and decrypt data at the receiver’s end. This encrypted data cannot be picked up or hijacked in between and any tampering would not only be very difficult, it would easily be detected. Not only that, SSL also provides for two-way authentication i.e. verification of the client’s and the server’s identity. The various...

The Basics of Cryptography

1.What is this text about? -=-=-=-=-=-=-=-=-=-=-=-=-= In this text I'll explain you everything about encryption,what is it,PGP, ways that someone can read your encrypted files etc.Every hacker or paranoid should use encryption and keep the other from reading their files.The encryption is very important thing and I'll explain you how can someone break and decrypt your files. 2.About Encryption and how it works -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- The Encryption is very old.Even Julius Caesar used it when he was sending messages because he didn't trust to his messengers.You see encryption is everywhere,when you watch some spy film you see there's always a computer with encrypted files or some film about hackers when the feds busted...

Data Encryption Standard or DES

Data Encryption Standard or DES The U.S government in 1977 adopted the Data Encryption Standard (DES) algorithm. According to it’s developer the DES algorithm is: “ It is a block cipher system which transforms 64-bit data blocks under a 56-bit secret key under a 56-bit secret key, by means of permutation and substitution.”  Now, this tutorial will guide you through the various steps of the DES encryption algorithm making you more confident in dealing with DES encryption. The following is a step by step guide to the DES algorithm, which was originally written by  Matthew Fischer  and has been edited by me-: 1.) Firstly, we need to process the key.  1.1   Get a 64-bit key from the user. (Every 8th bit is considered a parity bit. For a key to...

Page 1 of 3212345Next

 
Design by Raj Bali Helped by Ashish Saini