Tuesday, January 22, 2013

Types of Computer Virus

Types of viruses :- The different types of viruses areas follows- 1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of thehard disk or the floppy drive.The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard diskor overwrites it. They infect a computer...

Hacking Mobile Using Bluetooth:-

NOTE : Only For Educational Purpose.>!!!Super Bluetooth hack 2009 is one of the most downloaded Bluetoothhacking tools. Super bluetooth hack 2009 is used for mobile basedSymbian operating system to hack & manage any mobile near you which is vulnerable to Bluetooth hackin­g attack.Download it from [Click Here]How To Install Super Bluetooth Hack 20091) Download to PC2) Transfer it to your Bluetooth...

How to send anonymous mail-!-

Many of the people are trying to spam some ones' mail but are sometimes blocked byYahoo, Hotmail, Gmail! So this is perfect, in which you can send fake and spamemails to your friends and victims'!These are the following steps!1) First off all goto :- (see first comment)2) Enter the name of the sender, from which mail you have to send the fake mail.3) In option enter your victim email, Subject could...

Sunday, January 13, 2013

Deface website

This is a basic methode we can use to deface websites.Here we upload a file to victim website and that file will help us to deface itThese files called Shells..Basicly Shell is a PHP file.When we run that php file on a sever it will give us some permissions like delete files or upload files..Shells can do lot of thingsThe problem is how we going to upload it to victims sever??here we can do some basic...

What is Prorat?

Prorat is one of RAT (Remote Administration Tools) arewidely used to take over the computer system. Tool made byPRO Group, a group of Turkish hackers community, can beused as a tool Hacking computers in a network. Use of Proratquite simple, you simply enter the IP (Internet Protocol) is thetarget computer and then go through...

Best Hacker movies:

 Which of them have you watched and which of them do you like the most.1. Live free or Die Hard 42. Hackers3. Sneakers4. Sword Fish......Click here for more deta...

Saturday, January 5, 2013

The Most Infamous Computer Hacks & Hackers in History::

#1THE HACKER: Onel de GuzmanTHE HACK: The ILOVEYOU computer worm distributed through e-mailTHE RESULT: More than 50 million reported infections across the world with billions of dollars in damage and overwritten files.#2THE HACKER: Jonathan JamesTHE HACK: Accessed vital DTRA and NASA computer servers “for fun”THE RESULT: 10 military computers were hacked which led to an overhaul of government security...