Showing posts with label Tips and Tricks. Show all posts
Showing posts with label Tips and Tricks. Show all posts
There is something special about the tricks and tips people come up with to turn old or useless objects into something fresh and useful. Turning an old gadget or piece of furniture into something completely new is a great way to extend its life, and here are some of our favorite conversions from the last year.
Most Popular Repurposing Tricks of 2011

Top 10 Ways to Turn Your Retired Gadgetry into the Technology of the Future

With the rapid progression of technology each year, it's easy to accumulate a pile of obsolete gadgets that you just can't bear to get rid of. Here's a few of the best ways you can still get use out of those gadgets and repurpose a pile of what might otherwise end up in the landfill. More »

Book List for Hacking 2011..

WIFI NETWORK HACKING VIDEO TUTORIAL....

WIFI NETWORK HACKING  VIDEO TUTORIAL....
 

Hack Facebook Account Without Any Software..It's very Easy..

ASSALAMUALAIKUM.
 
Hack Facebook Account Without Any Software..It's very Easy..

HOW TO JOIN FILE WITH HJSPLIT

With HJSplit you can not only split files, but also join the split parts back together again.

Information: a collection of split parts is set of files having all the same filename, exept for the extension at the end of the file name (.001, .002, .003, etc.) . Combining/joining these split parts is equivalent to restoring the original (pre-split) file.

After clicking on the 'Join' button in the main HJSplit screen, you will see the following screen:

download 100 hacking tutorial books free

hacking ebooks

http://www.mediafire.com/?bvfseflazk9144d

How to auto sql i helper v.2.7


\First go to search engine and search for

"article.php?id=[number]"                                        
then enter any site
if it shows this code then it is hacked before

Code:

Ip Address and Email

Ip Address and Email Hack
  • Ip address Trace
First of all you can find the routes which you follow to connect to a specific website by using the windows default command prompt:
  1. Go to Start--Run and type cmd in the field.
  2. In the command prompt type tracert www."any website". com where you write the website you want to trace and press Enter.
  3. Here you can see all the routes your computer passes in order to reach the website you typed above.
  4. The final IP obviously relates to the desired website of yours.

Top 7 Ways to Avoid Cyber Attacks

Viruses and identity theft are not new issues, but recently, individuals and companies are at a much greater risk as a result of the unanticipated increase in internet and technology use. Follow these tips to protect yourself from such an attack so that you won’t be the next victim.

Foe example, you receive an email promising a great joke if you open the attachment. You're not sure who sent it but you feel like a laugh and open it anyway. Big mistake.
Attackers can break into your computer by sending you an email attachment with malware (malicious software) or downloading malware on to your computer when you open a link on a webpage.
They want to use personal and financial details on your computer to steal money, buy things on your credit card or open up bank accounts in your name.

How to Spy on a Cell Phone - Mobile Spy Software

Every day I get a lot of emails from people asking how to spy on cell phone or How to hack a cellphone. To spy on a given cell phone all you need to do is install a good cell phone spy software on the target cell phone and once you do this you can silently record every SMS and information about each call. You can also see GPS positions every thirty minutes.

There exists many cell phone spy softwares on the market and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy softwares and based on the results we conclude Mobile Spy as one of best one.

Why Mobile Spy?

Mobile Spy is one of the best and award winning cell phone spy softwares on the market with an affordable price. Mobile Spy team provides an excellent support and hence it becomes just a cakewalk to spy on your favorite cell phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to perform cell phone spying.

Using the Internet capabilities of your phone, recorded activities, logs and GPS locations are quickly uploaded to your Mobile Spy account. To view the results, you simply login to your secure account at the Mobile Spy web site. Logs are displayed by categories and sorted for easy browsing.

How to Surf The Internet Without Any Browser

Ever find yourself sitting in front of a computer where Internet Explorer or Firefox was blocked by IT Administrator, and restricted you from installing any software? If that PC is running Windows XP, then there is chance for you to still surf Internet. Just follow these simple steps:

1. Open Calculator, Start> Program Files> Accessories> Calculator or press Windows+R and type 'calc' in the run box, click OK.

2. In Calculator, go to Help> Help Topics.

3. Right click on the left hand side of the title bar and click on 'Jump to URL'.

4. Type in the URL and make sure include the 'http://' at the beginning.

Wireless Wep Key Hacking - For Beginners

Wireless Wep Key Hacking - For Beginners

Thousands of articles have been written about the vulnerability of WEP (Wired Equivalent Privacy), but how many people can actually break WEP encryption? Beginners to WEP cracking have often been frustrated by the many wireless cards available and their distribution-specific commands. And things are further complicated when the beginner is not familiar with Linux.

In this post i will show you a book Wireless Wep Key Hacking where the author gives you a step by step approach to breaking a WEP key. The entire attack is done with publicly available software and doesn't require special hardware.



Can I Hackintosh My Laptop?

Dear Lifehacker,
I have a Sorny Inspironbookmate 2564300iP00. Can I make Hackintosh? But seriously, I know a lot of people ask if they can hackintosh their obscure laptop that nobody has ever heard of and I understand it's very unlikely that they can, but when is it possible? When can Mac OS X be installed on an out-of-the-box laptop and run just like it would on a real Mac?
Sincerely,
Dream the Impossible
Dear DtI,
Never. You can never hackintosh a laptop and have it work just as well as a real Mac. If there's anything that Apple does very well, it's make some slick portable hardware. No other PC laptop is going to run Mac OS X as well, regardless of how compatible the hardware is. That said, some laptops (and netbooks) are easily hackintoshable and you can put together a very cheap, non-Apple alternative. But you get what you pay for.

Why Will a Hackintosh Never Be a Real Mac Even If Everything Works?

Can I Hackintosh My Laptop?

The Most Popular Featured Desktops and Home Screens of 2011

Every week, we feature desktops and home screens submitted by readers that we find elegant, informative, attractive, and in most cases, a great use of the customization tools and UI tweaks available for both desktop and mobile operating systems. This was a great year for desktops and home screens, with more submissions than we could ever possibly highlight. Here are the most popular featured desktops and home screens of 2011.
The Most Popular Featured Desktops and Home Screens of 2011

The Hexagonal Desktop

Claudia is a Fringe fan, but she's also a fan of being able to see a ton of important information at a single glance on her desktop. She combined her two loves into this fun and informative HUD for her Windows 7 desktop using Rainmeter. More »

How to Sync Documents and Other Files to Your iPhone or iPad Without iTunes

If you use a word processor, comic book or PDF reader, video player, or other app that requires syncing files through iTunes, you know how slow and awful it can be. Here's a simple, fast alternative.
iTunes is a pretty slow program to begin with (especially on Windows), but as soon as you try to drag files to specific apps on an iOS device, it slows down to a crawl, and even hangs for long periods of time. Instead of going through the pain of syncing these files with iTunes, you can actually do it with previously mentioned iExplorer, and it works amazingly well. All you need to do, after installing iExplorer, is:

Yahoo Password |

 Hack Yahoo Password

This is our third tutorial to phishing in which we will cover how to hack yahoo password. In this following tutorial to phishing I’ll demonstrate how to phish mail.yahoo.com to hack yahoo account of victim. So as every other tutorial on phishing we start it by creating fake login page. To create fake login page open mail.yahoo.com from your web browser and save it on your desktopas “Web Page, Complete” with name Yahoomail. After above process you’ll have a file named Yahoomail.htm and a folder named Yahoomail_files in folder in which you’ll save web page. Now open Yahoomail.htm in notepad, find for action word and locate following string,