Download Microsoft office 2013 Now!

Microsoft has just released the free preview version of the all new Microsoft Office 2013. You can now download Microsoft Office 2013 immediately on your computer to try it.

How to Access Blocked Websites Without Proxy

Access your favorite blocked website and social networking sites at your or college or your workplace without proxy.Download exciting software to access blocked websites.

Make a Very Dangerous Virus with Notepad

Now make your own viruses in Notepad. Make fun with these in your friends computer.

How to remove PDF password

In some PDF files, Owner set the password to that file. It restrict the print, copy or edit the content of PDF file. In such situation PDF password remover application help you to remove password.

How to bypass Surveys on websites

Many websites makes survey to proceed the download or to visit the website. These surveys prove to b headache. To bypass these surveys, there are some tricks to follow.

Showing posts with label learn hacking. Show all posts
Showing posts with label learn hacking. Show all posts

Tuesday, 9 April 2013

Track anyone just by sending an Email

Have your ever wondered to track anyone with a email id.Now its possible to track every details of a person with an email id.All you have to want is the email id of the person who you want to track.Just follow these steps to start tracking your victim

first Go to www.readnotify.com and create an account there

Once registered . . . send a mail to ur victim by the email id u registered at readnotify.com

But before sending the mail just add ".readnotify.com" with the victims id.. for example

victimemail@gmail.com.readnotify.com

and then send it...

What happens next?

Once you have sent a tracked email you can log in to your ReadNotify account to see the status of it. You will also receive a ReadNotification via email when your tracked email (or document) has been opened.

ReadNotify will endeavour to provide the following in your tracking reports:

Complete delivery details
Date and time opened
Approximate geographic location of recipient
Map of location (available on paid subscriptions)
Recipients IP address
Referrer details (ie; if accessed via web email account etc)
URL clicks
How long the email was read for
How many times your email was opened
If your email was opened on a different computer (such as forwarded)


There are lots of great features available to you - these include the following sending options:

Certified email
Ensured-Receipts and retractable emails
Invisible tracking
Self-Destructing emails
Block printing
Adobe Acrobat PDF Document Tracking
Track MS Word or Excel documents 

How to Test the Working of your Antivirus

Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.


1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.

EICAR Test code
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


2. Rename the file from New Text Document.TXT to myfile.com

3. Now run the antivirus scan on this myfile.com file.

If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.

NOTE: Most antivirus will pop-out a warning message in the Step-1 itself

You can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your antivirus can detect the test string in the compressed archive. Any antivirus when scanning this file will respond exactly as it will do for a genuine virus/malicious code. This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any antivirus.

Monday, 8 April 2013

Best 5 Hacking Ebooks to Learn Ethical Hacking

Hey, Many of you want to learn Hacking, my previous articles of Top 5 Websites To Learn How To Hack Like Hackers we have seen Top 5 Best forum and website to learn like hackers. because there are many hackers used to share their knowledge but what about the basic knowledge, a hackers ( no matter what type of but a well-knowledge and experience ) is never interested to teach you "Basics of Hacking", today i'm posting 5 awesome all time best basics of hacking ebooks, this ebook are not free but don't worry in the end of the articles i'll show you a simple way to get any ebooks for FREE.....

1# The secret of Hacking 1 Edition : this book is awesome for those whom have 0 knowledge in hacking and want to learn hacking, its good start up for them. In order to get this book you have order this book from the official website of this ebook. but if you know How to do some tricky search you can get it from google for FREE
Have a look at the Content of this ebook 
 


1. Introduction to real Hacking
2. Advanced Malware research
3. Windows Hacking
4. Password Hacking
5. Email Hacking
6. Web Application Hacking
7. Website Defacement Domain Hacking
8. Miscellaneous Hacking
9. Mobile Computer Forensic
10. VoIP Wireless Hacking
11. Vulnerability discovery Penetration testing
12. Advanced Hacking with Metasploit
13. Firewall, IDs Honey pot Hacking
14. Securing System Networks.

2# Social Engineering: The Art of Human Hacking  
 Kevin Mitnick the most famous all time best top 1 social engineers proved how social engineers dangerous and can Hack Human with the art of social engineering, as the book name implies this books reveal all the secret of social engineering. this is very intresting ebook rather then other because for computer hacking you need the computer device, Internet and a knowledge so you know what you are going to do. but for social engineering you don't need any of this, you need to learn how to manipulate people mind so they will do what you want to do from them. Download awesome ebook from direct link.

3# Dangerous Google - Searching For Secrets
every hackers must have good skills of googling, you might heart it somewhere on internet that google is a best friend of hackers, this will let you help to understand how google is best friend of every hackers. you may able get many paid stuff from google for free like ebooks, mp3, stockimage, etcs. main object of this ebook is "how to use google to find sources of personal and other confidential data. how to find information about vulnerable systems and web services. how to locate publicly available network deivc using google". Download this ebook from here

4# Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray hat hacking book is something of advance users who might already have much knowledge of hacking or beginners, unlike other hacking book this book is helpful for ethical hackers in fixing security loopwhole, testing the black and white box, write malicious code, fixing exploit flaws in linux n windows OS, penetration testing, VoiP and other web seuciryt, developing exploit code and let's see the topic of this ebook. Download this awesome book here.

  1. Develop and launch exploits using BackTrack and Metasploit.
  2. Employ physical, social engineering, and insider attack techniques.
  3. Build Perl, Python, and Ruby scripts that initiate stack buffer overflows.
  4. Understand and prevent malicious content in Adobe, Office, and multimedia files.
  5. Detect and block client-side, Web server, VoIP, and SCADA attacks.
  6. Reverse engineer, fuzz, and decompile Windows and Linux software.
  7. Develop SQL injection, cross-site scripting, and forgery exploits.
  8. Trap malware and rootkits using honeypots and SandBoxed.


5# Hardware Hacking Have Fun While Voiding Your Warranty
About this ebook some description of this ebook by the author
"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty!
This book is Gadget geeky ebook which help you to learn how to hack and repair yourself play-station 2, old mac computer,hacking apple ipod , Hard-drive, Home Theater PCs, Hack Wireless 802.11, Nokia 6210 modification, Operating system, Coding and many more. Get this awesome book from here.

Search