Types of viruses :-
The different types of viruses areas follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of thehard disk or the floppy drive.The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard diskor overwrites it. They infect a computer...
Categories
- 000 frnds (1)
- 12 UNKNOWN programming language (1)
- Alibaba (1)
- Amazon (1)
- Amd (1)
- Android (7)
- Apple (5)
- Bank (1)
- Bing Maps Preview is Microsoft's answer to Google Earth (1)
- Blackberry (3)
- Breaking News (1)
- Breathalyzer Could Detect Drugs (1)
- Business (2)
- Computer (2)
- Database Leaked (1)
- defacing websites (1)
- ebay (1)
- facebook (3)
- First smart phone for blind people (1)
- Game news (2)
- getting 5 (1)
- Gigabytes (1)
- Google (5)
- Google+ (1)
- Hack (3)
- Hacker can control aircraft system with Android Smartphone (1)
- hacker news (3)
- Hacking Concept (1)
- hacking with smart phone (2)
- How to disable/delete your victim's Antivirus? (1)
- How to sent message on fb if anyone is blocked? (1)
- HP (1)
- Imortant news (1)
- instagram (1)
- Intel (1)
- internet (3)
- iOS (1)
- iphone (1)
- iPhone history (1)
- IT (1)
- Lenovo (1)
- Mac (1)
- Microsoft (11)
- Microsoft Surface 2 A Competitive Offering (1)
- Microsoft's Windows 8.1: When will users get the final bits? (1)
- military (1)
- Mobile (4)
- Modern-style Firefox for Windows 8 pushed back to March (1)
- motorcycle (1)
- New LED Streetlight Design Cuts Light Pollution (1)
- Nokia (1)
- Nokia Asha (1)
- Nvidia (1)
- One Windows Store Is The Key (1)
- Paint your TV on your own style (1)
- Paint' a TV Remote onto Your Coffee Table (1)
- pc facts (2)
- Robot (1)
- Samsung (3)
- Samsung Galaxy S3 hack (1)
- Samsung Galaxy S3 Lock screen bypass vulnerability (1)
- Smartphone (1)
- Smartphone security (1)
- Space (5)
- The 100 Best Android Apps of 2013 (1)
- The first 1 GB hard (1)
- Thinkpad (1)
- This is a list of SQL dorks can use to help you find (1)
- Top 10 PC Games Chart (1)
- Turkish Ajan Hacker Group (1)
- twitter (3)
- Ubuntu forums hacked (1)
- UFC Fight Night: HENDERSON VS. THATCH (1)
- UFC Fight Night: Rockhold vs Bisping (1)
- Video formats (1)
- Windows (5)
- World cup 2014 (1)
- World's Biggest DDoS attack (1)
- Xbox (1)
Text Widget
Tuesday, January 22, 2013
Hacking Mobile Using Bluetooth:-
NOTE : Only For Educational Purpose.>!!!Super Bluetooth hack 2009 is one of the most downloaded Bluetoothhacking tools. Super bluetooth hack 2009 is used for mobile basedSymbian operating system to hack & manage any mobile near you which is vulnerable to Bluetooth hacking attack.Download it from [Click Here]How To Install Super Bluetooth Hack 20091) Download to PC2) Transfer it to your Bluetooth...
How to send anonymous mail-!-
Many of the people are trying to spam some ones' mail but are sometimes blocked byYahoo, Hotmail, Gmail! So this is perfect, in which you can send fake and spamemails to your friends and victims'!These are the following steps!1) First off all goto :- (see first comment)2) Enter the name of the sender, from which mail you have to send the fake mail.3) In option enter your victim email, Subject could...
Sunday, January 13, 2013
Deface website
This is a basic methode we can use to deface websites.Here we upload a file to victim website and that file will help us to deface itThese files called Shells..Basicly Shell is a PHP file.When we run that php file on a sever it will give us some permissions like delete files or upload files..Shells can do lot of thingsThe problem is how we going to upload it to victims sever??here we can do some basic...
What is Prorat?
Prorat is one of RAT (Remote Administration Tools) arewidely used to take over the computer system. Tool made byPRO Group, a group of Turkish hackers community, can beused as a tool Hacking computers in a network. Use of Proratquite simple, you simply enter the IP (Internet Protocol) is thetarget computer and then go through...
Best Hacker movies:
Which of them have you watched and which of them do you like the most.1. Live free or Die Hard 42. Hackers3. Sneakers4. Sword Fish......Click here for more deta...
Saturday, January 5, 2013
The Most Infamous Computer Hacks & Hackers in History::
#1THE HACKER: Onel de GuzmanTHE HACK: The ILOVEYOU computer worm distributed through e-mailTHE RESULT: More than 50 million reported infections across the world with billions of dollars in damage and overwritten files.#2THE HACKER: Jonathan JamesTHE HACK: Accessed vital DTRA and NASA computer servers “for fun”THE RESULT: 10 military computers were hacked which led to an overhaul of government security...
Subscribe to:
Posts (Atom)
Popular Posts
-
SQL injection vulnerable websites using google search. Simply goto google and type trainers.php?id= article.php?ID= play_old.php...
-
> Using GOOGLE Hi guys, been a while since I posted something cool related tohacking.Today I am going to show you how to access unsecured...
-
1 Bit = Binary Digit 8 Bits = 1 Byte 1024 Bytes = 1 Kilobyte 1024 Kilobytes = 1 Megabyte 1024 Megabytes = 1 Gigabyte 1024 Gigaby...
-
stealing $14 million from a bank It can be easier than most people think. The alleged thieves who made headlines last week for their...
-
Computer Programming languages are used to develop system programs. According to me C is the best programming language for beginners who ar...
-
Windows 8 has had a bumpy ride since its launch last fall, but this week Microsoft used the Computex stage in Taiwan to try to make am...
-
Short on friends? James Clegg can sell you a few. How about a thousand or so followers on Twitter, delivered overnight for about a penny a...
-
Satellite It sounds like the opener to a sci-fi B-movie plot: Scientists find an old, dead satellite from the 1970′s orbiting Earth...
-
An alleged scammer who is responsible for stealing personal data of more than 10,000k people through a spam mail pretending to be from ...
-
"" Suspected Hacker arrested for World's Biggest DDoS attack against Spamhaus"" The Dutch police have con...