This is a good trick to hide your exe files into a jpg file..! How about sending a trojan or a keylogger into your victim using this tric...
useful-article.blogspot.com
Welcome to useful-article.blogspot.com, a blog on Computer tips and tricks. I will update new and latest Computer tips here. All Hacking Tips will also be posted.Beware, this site does not contain any virus or malware, all tips are safe and hacking here is only intended for hacking your own computer for speed and more advanced functionality. All the Computer tips will be helpful for beginners as well as advanced.
Home
»
Archives for
June 2010
Hide Entire Drives Partition Without Registry
Hide Entire Drives Partition Without Registry Here is a cool technique which hides entire hard disk drives by a simple procedure. This i...
Google Hacking :-
Google Hacking :- Basic Operators:- 1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in ...
Free Calling to Any US Phone From Your iPhone
Free Calling to Any US Phone From Your iPhone This method REQUIRES a WiFi connection and jailbroken iPhone!!! Thanks goes to Unique311 ...
Folder Lock Without Any Software
Folder Lock Without Any Software Folder Lock With Password Without Any Software- Paste the code given below in notepad and 'Save...
Ethical Hacking eBooks
Ethical Hacking eBooks -: Hacking Exposed-5 :- One of the international best-selling. The book walks through how to use the more power...
Dangerous Google Searching Trick - How To Find Almost Everything Using Google
Dangerous Google Searching Trick - How To Find Almost Everything Using Google Using this Dangerous Searching Technique You will be able...
Create An Ftp Server On Your PC
Create An Ftp Server On Your PC Process-1: First of all u have to get an static IP- Address . Need a a static ip-address for ur FTP Se...
COMPLETE DETAILS ABOUT The TROJON HORSE
The TROJON HORSE What is a Trojan ? "A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to p...
ClickJacking
ClickJacking Definition :- "Clickjacking is a malicious technique of tricking web users into revealing confidential information ...
Password Hacking :-
Password Hacking :- Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by ...
Network Hacking (Port Scanning)
Network Hacking (Port Scanning ) Port Scanning :- Port scanning is carried out to determine a list of open ports on the remote host that h...
Network Hacking
Network Hacking Network Hacking is generally means gathering information about domain by using tools like Telnet , NslookUp, Ping, Tracer...
-: NetBIOS Hacking :-
-: NetBIOS Hacking :- NetBIOS stands for "Network Basic Input Output System". It was originally developed by IBM and Sytek as ...
Linux security
1) Firewalls are your guardian angels. First of all, keep a software firewall active on your system, and restrict access to ports that a...
Latest Airtel Hack
Now a days Airtel gives New option to the Subscriber to access Mobile Office daily @ Rs.25.00/- per day. But this is too Costly. Only 24 h...
Input Validation Attacks :-
Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application . The most comm...
Increase Virtual RAM - To Make Your System Faster 100 percent works
Follow the steps given below :- 1) Hold down the ' Windows ' Key and Press the 'Pause/Break' button at the top right of y...
How to Hack a MySpace Account
MySpace is one of the most widely used Social Networking website by many teenagers and adults acropss the globe. I have seen many cheaters...
How to call your friends with their own number Extreme Hack
Mobile hack to call your friends: Hello Friends after "Make Free Phone Calls From PC to mobile for free " hack today I am sh...
Chat with Friends through ms dos Command Prompt
Chat With Friends Through MS Dos Command Prompt -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend...
Calculations On Command Prompt
Calculations On Command Prompt the command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit si...
Bypassing Windows-XP Firewall
Bypassing Windows-XP Firewall There is a technique using which we can bypass windows-xp service pack-2 firewall. This techniques is nothi...
Address Resolution Protocol (ARP) Attacks
Address Resolution Protocol (ARP) Attacks -: Address Resolution Protocol (ARP) Attacks :- What Does ARP Mean? Address Resolution Proto...
Access Free Airtel GPRS Using TeaShark Browser
Access Free Airtel GPRS Using TeaShark Browser TeaShark, a mobile browser like Opera Mini, allow you to access Airtel GPRS for FREE. Sh...
How to lock your computer
How to lock your computer Creating a desktop shortcut for locking your computer If you use your computer in an area where others may hav...
How To Create A Hidden User Account
How To Create A Hidden User Account This tweak allows an account that is normally displayed on the Welcome screen to be hidden from vi...
Hack Admin Password From User Mode
Hack Admin Password From User Mode Hack Admin Password From User Mode Disclaimer: Use this article for eductational purpose ONLY. F...
Speed up your PC
Speed up your PC Clean Ur RAM You may recognize that your system gets slower and slower when playing and working a lot with your pc. ...
Be Careful Before You ‘Like’ This on Facebook
Warning: If you receive news feed carrying any of the following links ‘Liked’ by any of your Facebook friends, don’t click on the link to...
Popular Posts
-
Let's kick off with keyboard shortcuts – the first thing every power user must memorize with working with a new operating system. In W...
-
At Maximum PC, computer hardware is our bread and butter. We review it, preview it, and just generally love to talk about it. Unfortunately...
-
Create a Cute Cartoon Penguin & Poster In this tutorial I’ll teach you how to create a cute cartoon penguin and a sky background poster ...
-
How to get Free Clickbank Products with Google Search Go to Google and Search for these Queries below: • site:*.com intitle:"Thank...
-
Convert a Guest account into an Admin Convert a Guest account into an Admin ? All you need to do is copy the code below, copy/pas...
-
Pressure cooker cake Eggless vanilla cake baked in a pressure cooker. Prep Time: 10 minutes Cook time: 45 minutes Serves: 6 to 8...
-
Google Search tips for Hacking Google search engine can be used to hack into remote servers or gather confidential or sensitive informa...
-
Afghani Pulao (Chicken Rice) Recipe In Urdu ( افغانی پلاؤ - آسان ترکیب ) Our Other Products shes style fashion , Pakistan ...
-
Airtel/Tata Docomo/Aircel Free gprs on Pc on 2G-3G Network Tools which we are going to need 1.Tsunami VPN Client - Click here to D...
-
Everyone loves a good tip, right? Here are 55 quick tips for search engine optimization that even your mother could use to get cooking. We...