♥♥♥ Nitin Arya ♥♥♥ °ღ• ℐ тнє яєвєℓ ιѕ вα¢к ★彡
Blog
Site menu

Our poll
Rate my site
Total of answers: 100

Online Users

Total online: 4
Guests: 4
Users: 0

Search

Entries archive

Site friends

Welcome, Guest · RSS 2025-01-18, 10:41 AM

Main » 2010 » December » 9 » learn hacking, computer science& information technology
8:35 PM
learn hacking, computer science& information technology

How to Hack a Computer

2010-06-13 12:48
Steps Hack a Windows Password === 1Go to Start-Run-cmd, and then press ENTER. 2 Type in Net User and then press ENTER. 3Look through the list for the user whose password you would like to reset. 4 Type in net user [UserNameHere]* (ex. net user Administrator *) 5Press ENTER three times to blank out...

How to Recovery a Lost Windows 7 Password

2010-06-13 12:41
areyou forgot your Windows 7 password when someday you open your computer? Need someone to help but can’t find a expert? Don’t worry, Today I will show you some ways to let you easy slove your problem. Password Reset Disk Mircrosoft Windows allow you to create a lost or forgotten password. The...

How to hack twitter account?

2010-06-13 12:36
Come and learn how to hack into Twitter accounts. Personally, I think Twitter is probably the most ridiculous and also the most insecure micro-blogging platform in the World Wide Web today. Believe me when I say that it is not really hard to hack into Twitter accounts! What do you have to do in...

Multiple OS Computing Through Virtualization Run any operating system as a client on any other system.

2010-06-11 23:46
I have been quite impressed by the stability and speed of my computer since removing Vista and installing various flavors of Linux. Sometimes, however, there is software that I want to run that is only available in Windows. For example, I...

WiFi Security A few thoughts on privacy and security

2010-06-11 23:43
Wireless networking is convenient, fast, and provides a lot of computing mobility. Wifi does, however, require extra measures if it is to be as secure as hard-wired networks. And WPA is the standard to use. SURVEILANCE OF WIFI NETWORKS Consider for a...

how to makea Long Rangei Wifi Antenna

2010-06-11 23:34
This is the antenna to build when you want results FAST and have just a few inexpensive tools and supplies available. It will extend your wi-fi range well beyond the limits of the dipoles that accompany most routers and some wireless adapters. When connected to a USB wireless...

HOW TO INSTALL BACKTRACK 4 ON A FLASH DRIVE and be able to save you data

2010-06-08 18:04
I wanted to be able to run Backtrack on my laptop, without the worry of having it dual booted, and be able to save my data, such as wallpaper, updates, and settings. Unfortunately all the walkthroughs I could find either didn't work or ended up being a live cd on a flash drive. So,...

Increase BSNL Broadband Speed!

2010-06-08 17:56
To increase BSNL broadband speed, just follow these 6 BSNL hacks: 1. Change BSNL DNS servers: The main reason for slow BSNL Broadband connection speed is slow BSNL DNS servers. So, we can increase BSNL Broadband connection speed by changing default BSNL DNS servers to fast BSNL DNS servers, which...

How To Used Hydra Software And Crack FTP/Telnet/SSH Password

2010-06-08 17:51
How to crack things like FTP/SSH/POP3 etc. Well, here is a quick way to do this for all you Windows users out there, provided you have a decent sized password dictionary. I personally use one of about 3.16GB in size, but for this tutorial I'm only going to use a small password list, just so you get...

Hacking Bsnl Broadband Internet,Disclaimer : The information provided below is for educational purpose only.

2010-06-08 17:44
Disclaimer : The information provided below is for educational purpose only. Bsnl DataOne Broadband continues to grow as one the most popular broadband services in India with high speed facilities of upto 2 mpbs. But a large number of users of this service are vulnerable to hacker attacks because...

How To Hack With An IP Address

2010-06-08 17:40
Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that...

GSM Mobile hacking,warning just dont it ever.educational purpose only.

2010-06-08 12:46
Let's talk about the fun stuff. The first trick I will discuss is an activity that is becoming quite prevalant, SIM cloning. If you have paid attention to any cell phone related tutorials in the past, then you may remember cloning being made popular by certain public figures like Kevin Mitnick in...

How does Identity Theft work?

2010-06-08 12:44
Thieves gain access to personal information in many ways, but the most common method is to take it from the victim themselves. They steal mail such as account statements, new checks and offers of credit left in a mailbox, discarded in the trash or stored in an easy to access location in your...

What is a DDOS attack?How do they Do it?

2010-06-08 12:36
 Simply said, DDOS is an advanced version of DOS attack . Like DOS , DDOS also tries to deny the important services running on a server by broadcasting packets to the destination server in a way that the Destination server cannot handle it. The speciality of the DDOS is that, it relays attacks...

ATM Hacking and Cracking to Steal Money with ATM Backdoor Default Master Password(Disclaimer: This article is not an instruction.)just 4 education.

2010-06-06 09:41
You should know what a Automated Teller Machine (or Automatic Teller Machine or cash machine) which commonly known as ATM is. Yes, ATM is commonly used to access bank accounts in order to make cash withdrawals or credit card cash advances, where after keying in your PIN number, ATM will...

Hack a Windows XP Computer Without Changing Password

2010-06-05 12:07
There is a far better way to get into Windows XP . It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do...

How to Hack Password of any Operating System

2010-06-05 12:03
One thing any hacker should know is how to hack into login account of any operating system. Major Operating Systems that are used these days are Windows, Linux and Mac. So today I will show you how to hack into these Operating Systems. Are you curious how easy it is for someone to gain...

How to Install Linux on a USB

2010-06-05 11:54
There are so many reasons why having a Linux distribution on a USB drive can come in handy. From having a "rescue” OS on your keyring to being able to install a new distribution on your EeePC, a "thumb drive” Linux has many uses. But getting Linux onto a USB drive can’t be simple. Right? Wrong....

How to Encrypt and Hide ur Operating System from Prying Eyes

2010-06-05 11:48
Over the years, we've written about loads of different ways to hide and encrypt your private data from others, but if you're really serious about protecting your data, you can actually hide your entire operating system. Here's exactly how to do it. To accomplish this task, we'll be using...

Secure your PC(tips)

2010-06-05 11:32
you'll notice that household assets are usually locked in to prevent theft, banks have their high-security surveillance systems in place and classified documents are usually stored in ultra-secure lockers. Similarly our computers and networks need several levels and layers of security in order...

How to Make a Web Page With HTML Codes

2010-06-03 10:23
you can learn the basics of HTML (HyperText Markup Language) to produce your own web page, you can spread the word of your product or service to millions of potential customers or contacts online--without needing to pay someone else to do the work! Once you learn the basic codes which allow...

How to Generate and Set Random Password Automatically for Windows User Accounts

2010-06-02 09:08
Strong password is increasingly important in modern computing era in order to protect and secure an user account. An online account accessible from Internet is more prone to hacking and brute-force attacking, however, it doesn’t mean a Windows computer which requires physical access to the...

How to Automatically Log On or Sign In to a User Account in Windows 7

2010-06-02 08:57
On a Windows 7 computer with just a single user, or only one main principal user although with multiple user accounts, it may be more convenient and have faster booting time if the Windows 7 automatically logs on or logs in the preferred user account. By default, if only a single user account...

HACK MICROSOFT OFFICE PASSWORD

2010-05-29 20:26
The Important document in Ms Office is necessary for protection in order to no easily accessed by wrong users. However, if we put a password on Ms Word expesially with a simple password combination, it will be easily broken by a program called passware, a tool designed to recovery forgotten or...

SOME COOLEST WAY TO HACK FACEBOOK ACCOUNT

2010-05-29 20:23
Method of data theft on facebook is a lot of interesting things in the discuss and the search. The following ways are usually used by hackers to obtain personal information of facebook account: 1. Social engineering tools: how to trick the victim to deceptive telephone and internet media, 2....

PASSWORD STEALING WITH GOOGLE HACK

2010-05-29 20:18
Google is a treasure trove full of important information, especially for the underground world. This Potential fact can also be utilized in the data for the username and password stored on a server. If the administrator save important data not in the complete system authentifikasi folder, then...

What are the latest threats in cyberspace?

2010-05-27 18:05
  We are seeing various trends in the distribution of malware. It is now getting more organized. In the past people were developing viruses just for fun. Then there were cyber criminals who were independently developing malware for financial gain. Now they operate in groups. Today this...

Need of more speed,With new USB 3.0 and SATA 6 Gb/s standards, you won’t have to wait too long for data transfers.

2010-05-27 17:58
In the last few months, we have seen updates to two standards. One is Hi-speed USB 2.0, which has been the interface standard for peripherals and external storage devices since almost a decade, and the other is SATA 3 Gb/s, which has been around for five years or so. With the upgrade to version...

The latest-generation GPUs are so powerful that even entry-level graphics cards can handle full HD gaming with ease. Take your pick from 39 graphics cards priced under Rs 10,000.

2010-05-27 17:53
Budget graphics cards are more capable today than they have ever been. Apart from games, an entry-level graphics card can handle tasks that make the CPU's work easier. For instance, all current generation GPUs can decode high-definition videos, provided you use a player that utilizes them...

HTML5: The new language

2010-05-27 17:51
Videos are really popular on the web, so it should come as no surprise that sites like YouTube, Dailymotion and Vimeo are among the first few sites to integrate the new HTML5 standard. HTML stands for Hypertext Markup Language, the language in which the basics of the Internet are written. The...

Windows On A Stick pen drive flash drive,

2010-05-27 17:47
Netbooks have made their mark in the PC segment and are here to stay. What makes them worth the buy is the unquestionable portability that they offer over their laptop counterparts. They are small, light and are definitely easy to lug around. They might not have the processing power to execute...

Bing now throws up Twitter updates too

2010-05-26 09:27
Who would have ever thought that Microsoft would come out with a search-based feature faster than Google? Well, that’s exactly what Bing has done with the new addition of Twitter updates, becoming the first search engine to integrate so tightly with the micro-blogging service. So now when you...

l IPTV of airtel

2010-05-26 09:09
talking about making life simpler and easier, the internet has now made inroads into the television space with internet protocol television (IPTV). IPTV is the latest among the digital TV transmission. Initially, only a handful companies in India provided this service. However, with the ...

How-To Bypass Work and School Filters to Unblock Your Favorite Websites

2010-05-25 18:40
  I have been asked the following questions a lot of times or seen them posted on the Internet (with many variations of them)... How do I unblock MySpace at work / school? How do I bypass my work / school Internet filter to unlock Facebook? How do I get YouTube at work / school? Help! They...

How to Increase Processor Speed

2010-05-25 10:04
Processor speeds can be enhanced by moving circuits closer together and by utilizing new semi-conductor materials. A number of strategies are being used to make computers faster. The simple steps below will enable you to become proficient as to upgrading the speed of your computer. When...

Feeling Through Your Computer

2010-05-25 10:01
Computer Scientists Create System That Gives Users A Sense Of Touch A non-mechanical haptic interface allows computer users to manipulate a three dimensional object on screen and receive immediate tactile response from the surroundings of that object. The interface uses a device shaped like an..
Views: 646 | Added by: Handsome-Hunk | Rating: 0.0/0
Total comments: 0
Name *:
Email *:
Code *:
Copyright MyCorp © 2025
Website builderuCoz