You probably store a lot of personal and financial information on your smartphone that you would not want revealed if it is lost or stolen. Here are some ways that you can help increase mobile phone safety and secure our smartphone.01) Protect your phone with a password or Personal Identification Number (PIN).02) Be careful when you install apps on your phone.03) Install updates for your phone.04)...
Categories
- 000 frnds (1)
- 12 UNKNOWN programming language (1)
- Alibaba (1)
- Amazon (1)
- Amd (1)
- Android (7)
- Apple (5)
- Bank (1)
- Bing Maps Preview is Microsoft's answer to Google Earth (1)
- Blackberry (3)
- Breaking News (1)
- Breathalyzer Could Detect Drugs (1)
- Business (2)
- Computer (2)
- Database Leaked (1)
- defacing websites (1)
- ebay (1)
- facebook (3)
- First smart phone for blind people (1)
- Game news (2)
- getting 5 (1)
- Gigabytes (1)
- Google (5)
- Google+ (1)
- Hack (3)
- Hacker can control aircraft system with Android Smartphone (1)
- hacker news (3)
- Hacking Concept (1)
- hacking with smart phone (2)
- How to disable/delete your victim's Antivirus? (1)
- How to sent message on fb if anyone is blocked? (1)
- HP (1)
- Imortant news (1)
- instagram (1)
- Intel (1)
- internet (3)
- iOS (1)
- iphone (1)
- iPhone history (1)
- IT (1)
- Lenovo (1)
- Mac (1)
- Microsoft (11)
- Microsoft Surface 2 A Competitive Offering (1)
- Microsoft's Windows 8.1: When will users get the final bits? (1)
- military (1)
- Mobile (4)
- Modern-style Firefox for Windows 8 pushed back to March (1)
- motorcycle (1)
- New LED Streetlight Design Cuts Light Pollution (1)
- Nokia (1)
- Nokia Asha (1)
- Nvidia (1)
- One Windows Store Is The Key (1)
- Paint your TV on your own style (1)
- Paint' a TV Remote onto Your Coffee Table (1)
- pc facts (2)
- Robot (1)
- Samsung (3)
- Samsung Galaxy S3 hack (1)
- Samsung Galaxy S3 Lock screen bypass vulnerability (1)
- Smartphone (1)
- Smartphone security (1)
- Space (5)
- The 100 Best Android Apps of 2013 (1)
- The first 1 GB hard (1)
- Thinkpad (1)
- This is a list of SQL dorks can use to help you find (1)
- Top 10 PC Games Chart (1)
- Turkish Ajan Hacker Group (1)
- twitter (3)
- Ubuntu forums hacked (1)
- UFC Fight Night: HENDERSON VS. THATCH (1)
- UFC Fight Night: Rockhold vs Bisping (1)
- Video formats (1)
- Windows (5)
- World cup 2014 (1)
- World's Biggest DDoS attack (1)
- Xbox (1)
Text Widget
Thursday, February 21, 2013
Hacking Concept
...
Tuesday, February 19, 2013
Chat Like Anonymous

Chat like Anonymous
1. All you need is your friend's IP Address and your Command Prompt.2. Open Notepad and write this code as it is.....!@echo off:AClsecho MESSENGERset /p n=User:set /p m=Message:net send %n% %m%PauseGoto A3. Now save this as "Messenger.Bat".4. now open the file5. type the IP Address of the computer you...
Is your computer “male” or “female” !!
Is your computer “male” or “female”?1. Open Notepad2. Type the following line in notepad:...CreateObject("SAPI.SpVoice").Speak"Ctgs Home I Love You"3. Save file as computer_gender.vbs4. Run the file.If you hear a male voice, your pc is a boyIf you hear a female voice, your pc is a girl...try it guyz.......!!! its amazin !...
Thursday, February 7, 2013
Hacker Dictionary (please read)
Greetz to My Hacker Friend..... (PCA)You're new to the real hacking?Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out!If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!*---------------------------------------------------------------------------Abbreviations★...
Free Shell for SQL Injection

This is my small collection of Shellhope you enjoy it
Download link : Click he...
Subscribe to:
Posts (Atom)
Popular Posts
-
SQL injection vulnerable websites using google search. Simply goto google and type trainers.php?id= article.php?ID= play_old.php...
-
> Using GOOGLE Hi guys, been a while since I posted something cool related tohacking.Today I am going to show you how to access unsecured...
-
1 Bit = Binary Digit 8 Bits = 1 Byte 1024 Bytes = 1 Kilobyte 1024 Kilobytes = 1 Megabyte 1024 Megabytes = 1 Gigabyte 1024 Gigaby...
-
stealing $14 million from a bank It can be easier than most people think. The alleged thieves who made headlines last week for their...
-
Computer Programming languages are used to develop system programs. According to me C is the best programming language for beginners who ar...
-
Windows 8 has had a bumpy ride since its launch last fall, but this week Microsoft used the Computex stage in Taiwan to try to make am...
-
Short on friends? James Clegg can sell you a few. How about a thousand or so followers on Twitter, delivered overnight for about a penny a...
-
Satellite It sounds like the opener to a sci-fi B-movie plot: Scientists find an old, dead satellite from the 1970′s orbiting Earth...
-
An alleged scammer who is responsible for stealing personal data of more than 10,000k people through a spam mail pretending to be from ...
-
"" Suspected Hacker arrested for World's Biggest DDoS attack against Spamhaus"" The Dutch police have con...