You probably store a lot of personal and financial information on your smartphone that you would not want revealed if it is lost or stolen. Here are some ways that you can help increase mobile phone safety and secure our smartphone.01) Protect your phone with a password or Personal Identification Number (PIN).02) Be careful when you install apps on your phone.03) Install updates for your phone.04)...
Categories
- 000 frnds (1)
- 12 UNKNOWN programming language (1)
- Alibaba (1)
- Amazon (1)
- Amd (1)
- Android (7)
- Apple (5)
- Bank (1)
- Bing Maps Preview is Microsoft's answer to Google Earth (1)
- Blackberry (3)
- Breaking News (1)
- Breathalyzer Could Detect Drugs (1)
- Business (2)
- Computer (2)
- Database Leaked (1)
- defacing websites (1)
- ebay (1)
- facebook (3)
- First smart phone for blind people (1)
- Game news (2)
- getting 5 (1)
- Gigabytes (1)
- Google (5)
- Google+ (1)
- Hack (3)
- Hacker can control aircraft system with Android Smartphone (1)
- hacker news (3)
- Hacking Concept (1)
- hacking with smart phone (2)
- How to disable/delete your victim's Antivirus? (1)
- How to sent message on fb if anyone is blocked? (1)
- HP (1)
- Imortant news (1)
- instagram (1)
- Intel (1)
- internet (3)
- iOS (1)
- iphone (1)
- iPhone history (1)
- IT (1)
- Lenovo (1)
- Mac (1)
- Microsoft (11)
- Microsoft Surface 2 A Competitive Offering (1)
- Microsoft's Windows 8.1: When will users get the final bits? (1)
- military (1)
- Mobile (4)
- Modern-style Firefox for Windows 8 pushed back to March (1)
- motorcycle (1)
- New LED Streetlight Design Cuts Light Pollution (1)
- Nokia (1)
- Nokia Asha (1)
- Nvidia (1)
- One Windows Store Is The Key (1)
- Paint your TV on your own style (1)
- Paint' a TV Remote onto Your Coffee Table (1)
- pc facts (2)
- Robot (1)
- Samsung (3)
- Samsung Galaxy S3 hack (1)
- Samsung Galaxy S3 Lock screen bypass vulnerability (1)
- Smartphone (1)
- Smartphone security (1)
- Space (5)
- The 100 Best Android Apps of 2013 (1)
- The first 1 GB hard (1)
- Thinkpad (1)
- This is a list of SQL dorks can use to help you find (1)
- Top 10 PC Games Chart (1)
- Turkish Ajan Hacker Group (1)
- twitter (3)
- Ubuntu forums hacked (1)
- UFC Fight Night: HENDERSON VS. THATCH (1)
- UFC Fight Night: Rockhold vs Bisping (1)
- Video formats (1)
- Windows (5)
- World cup 2014 (1)
- World's Biggest DDoS attack (1)
- Xbox (1)
Text Widget
Thursday, February 21, 2013
Hacking Concept
...
Tuesday, February 19, 2013
Chat Like Anonymous

Chat like Anonymous
1. All you need is your friend's IP Address and your Command Prompt.2. Open Notepad and write this code as it is.....!@echo off:AClsecho MESSENGERset /p n=User:set /p m=Message:net send %n% %m%PauseGoto A3. Now save this as "Messenger.Bat".4. now open the file5. type the IP Address of the computer you...
Is your computer “male” or “female” !!
Is your computer “male” or “female”?1. Open Notepad2. Type the following line in notepad:...CreateObject("SAPI.SpVoice").Speak"Ctgs Home I Love You"3. Save file as computer_gender.vbs4. Run the file.If you hear a male voice, your pc is a boyIf you hear a female voice, your pc is a girl...try it guyz.......!!! its amazin !...
Thursday, February 7, 2013
Hacker Dictionary (please read)
Greetz to My Hacker Friend..... (PCA)You're new to the real hacking?Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out!If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!*---------------------------------------------------------------------------Abbreviations★...
Free Shell for SQL Injection

This is my small collection of Shellhope you enjoy it
Download link : Click he...
Subscribe to:
Posts (Atom)
Popular Posts
-
SQL injection vulnerable websites using google search. Simply goto google and type trainers.php?id= article.php?ID= play_old.php...
-
> Using GOOGLE Hi guys, been a while since I posted something cool related tohacking.Today I am going to show you how to access unsecured...
-
1 Bit = Binary Digit 8 Bits = 1 Byte 1024 Bytes = 1 Kilobyte 1024 Kilobytes = 1 Megabyte 1024 Megabytes = 1 Gigabyte 1024 Gigaby...
-
Computer Programming languages are used to develop system programs. According to me C is the best programming language for beginners who ar...
-
Video Formats and their Abbreviation A knowledge for u all Video Formats with abbreviation AAF – mostly intended to hold edit dec...
-
Google+ new auto-correct images, tweaking things like contrast, brightness, noise, and skin smoothing. Google's a long way from kn...
-
UFC FIGHT NIGHT BROOMFIELD UFC Fight Night: HENDERSON VS. THATCH Main Event Time Event: UFC Fight Night: HENDERSON VS. THATCH ...
-
That's the claim from TechCrunch, which says that Facebook's special press event on June 20 will be focused in part on video an...
-
A Security Researcher Hugo Teso at Hack In The Box security conference has demonstrated that it is possible for a hacker to take control o...
-
Bitcoin U.S. law enforcement officials cracked down this week on the Bitcoin economy's biggest exchange, Mt. Gox, accusing its oper...