Saturday 29 September 2012

Encrypt Your Files With Secure USB

Encrypt Your Files With Secure USB

Recently i found an application which encrypts and decrypts file and folders . Actually it is the tool which is used for encryption of USB's but it also encrypts iles and folders too.

How To Change Mac Address In BackTrack 5 R3

As this tutorial is similar to the tutorial which i had shown you before.
So change your mac address from you terminal.

How To Hack Script Kiddies

Script Kiddies who are those is the first question which comes up in your mind. Script Kiddies are the guys/girls who hack others with the help of tools.

Tuesday 25 September 2012

Random Passsword generator In cmd prompt

 Random Passsword generator In cmd prompt

I  was browsing in the internet and found an simple utility for generating random passwords. Folow this tutorial to generate random passwords.

Wednesday 12 September 2012

How To Auto Save Passwords In Firefox

How To Auto Save Passwords In Firefox

Most of the people does not know to get the passwords directly. If an user simply types an passwords in firefox browser, then password will be save directly in to remember dialog.

Wednesday 5 September 2012

How to View System Properties[Tip By Unter]

Thanks Unter for providing wonderful tip. This shortcut really helps out noobs to view their System properties.

Tuesday 4 September 2012

How To Convert Text To ASCII

How To Convert Text To ASCII

Hackers convert text to ASCII characters because they have to inject these malicious characters by converting them to ASCII as they cannot use direct malicious text so they try using ASCII characters.
Zarabyte.com ha developed an awesome application which converts Text To ASCII.

Mac Address Changer For Windows

Hackers spoof ip 's and MAC Address,. Most of them spoof  MAC Address. In order to change the mac address they have to go the lan properties -> Configure -> Advanced -> Network Address.

Monday 3 September 2012

How To Request New Ip From Your ISP


How To Request New Ip From Your ISP

Some times our IP address will be blocked from websites or banned from websites then we have to we have to request new ip from aour ISP. In thsi tutorial i will teach you how to request an new IP.

Sunday 2 September 2012

How To Trace Location Of An Ip Address

How To Trace Location Of An Ip Address

Now a days there are many cyber attacks are going on. In order to find out the attacker who left his Ip Address in the log then you can easily trace his route by simply tracing the location.

How To Protect Yourself From Keyloggers


How To Protect Yourself From Keyloggers

Keylogger is nothing but an spyware which send the keystrokes of an victim's keyboard to an hacker.
Hackers use keyloggers to steal passwords ,credit card numbers and any other confidential data which has to be secured. When ever you type username & password on any site, key strokes will be forwarded to an hacker's mail box.

Saturday 1 September 2012

Find Out Hash For An Files

Find Out Hash For An Files

HashMyFiles is small utility that allows you to calculate the MD5 and SHA1 hashes of one or more files in your system. You can easily copy the MD5/SHA1 hashes list into the clipboard, or save them into text/html/xml file. 

How To Crack MD5 Passwords With Cain

How To Crack MD5 Passwords With Cain

Most of the people does not know how to crack the passwords with the help of cain. In this tutorial i will show you how to Crack MD5 passwords.

Calculate Hashes For An String With Hashcalc

Calculate Hashes For An String  With Hashcalc

Have you ever wondered by calculating the hashes of  your name. No then follow this tutorial.Simply download an application called HashCalc , Which is freeware.

How To Create Application Bomber

How To Create Application Bomber

Application Bomber is an application where all the applications will be executed simultaneously , which eats the memory of an processor.Follow this tutorial to create an Application Bomber.