♥♥♥ Nitin Arya ♥♥♥ °ღ• ℐ тнє яєвєℓ ιѕ вα¢к ★彡
Blog
Site menu

Our poll
Rate my site
Total of answers: 100

Online Users

Total online: 2
Guests: 2
Users: 0

Search

Entries archive

Site friends

Welcome, Guest · RSS 2025-06-15, 3:33 PM

Main » 2010 » December » 09 » learn hacking, computer science& information technology
8:35 PM
learn hacking, computer science& information technology

Protect Yourself From Computer Hackers

2010-05-25 09:46
Computer scientists observe that the people most at risk for the loss of private information and other computer problems are those who create easily guessed passwords and user names. They advise creating and regularly updating complicated passwords that contain upper- and lower-case letters as...

Danger in the Internet Cafe? New Computer Security Threat for Wireless Networks

2010-05-25 03:23
There's a potential threat lurking in your internet café, say University of Calgary computer science researchers. It's called Typhoid adware and works in similar fashion to Typhoid Mary, the first identified healthy carrier of typhoid fever who spread the disease to dozens of people in the New...

Alerts and Prompts

2010-05-23 07:35
Mouseover Alert This script will bring up a JavaScript alert when someone moves the mouse over the link. Script Code Grab a copy of the file below and place it in the same directory as the Web page on which you will use the script (if you wish to place the script file in a different...

How to Build a Website

2010-05-23 07:29
Hosting is where you put your website and all the Web pages. While it's possible to build a website on your personal computer and never move it online, it's somewhat pointless. No one but you will ever be able to see it. So the first thing you'll want to do is find a Web hosting provider. There...

Cool JavaScript Tricks

2010-05-23 06:59
Today, I m gonna a list of some very cool JavaScript hacks and tricks that you can use creatively or just have plain fun. To make each one of these codes work, all you have to do is copy and paste it into the address bar of your browser window and hit "Enter”. So here they are :-  1- This...

Facebook, Twitter and other social networking sites stand accused of abusing privacy

2010-05-22 11:24
Earlier, in August 2009, AT&T Labs and Worcester Polytechnic Institute had pointed out in a paper that 12 social networking sites, including Facebook, Twitter and MySpace, send out user information to outside companies. Nine months on, these sites still haven't learned their lessons....

How to Open .Rar Files on a Mac

2010-05-22 11:19
  Step 1 Learn about .rar files. .Rar files are popular with Windows users (the main .rar expander being WinRar), but you can also open .rar files on your Mac. Step 2 Use StuffIt Expander if your computer runs mac os xThis program is built in to the system....

How to Change a Processor in a PC

2010-05-22 11:13
If you want to upgrade your computer to make it faster, the best thing that you can do is upgrade the processor. Upgrading the processor itself is not hard, but you need to do some research first and make sure that you choose the right upgrade and meet the new processor requirements. ...

How to Connect PC to HDMI TV

2010-05-22 11:07
nowdays so many ways to enjoy your favorite movies and television shows over a broadband internet connection on your computer for a small amount of money, or even for free. Unfortunately, watching such media in the confines of your home office does not make for the most enjoyable experience. If...

how Can use a USB RAM stick to increase system memory?

2010-05-21 18:31
As you can probably guess by now, all memory is not created equal. Your system memory typically resides on your computer's motherboard, and uses a very high speed interface to connect to your computer's CPU. In fact, as fast as that interface is, it's still not as fast as we would like it (so...

How to Make a CD-ROM Play DVDs

2010-05-21 18:19
Playing DVDs with your CD-ROM can be as easy as snapping your fingers. Because most modern computers are made with CD-ROM's that also play DVDs, it's likely that minimal effort is required to play DVDs on your computer. However there are a few computers out there that cannot play DVDs using the...

WIFI WEP Cracking-Using Aircrack-ng

2010-05-21 18:09
  So you’ve got your compatible card and you’ve burned your BackTrack 2 ISO to disk. Now boot Backtrack 2 (alternatively you could install BackTrack 2 in VMWare fusion; use the VMWare image here). You should be prompted with ‘boot:’, hit enter. Once BackTrack has booted you should login...

The Global Positioning System

2010-05-21 18:02
The Global Positioning System (GPS) is a U.S.-owned utility that provides users with positioning, navigation, and timing (PNT) services. This system consists of three segments: the space segment, the control segment, and the user segment. The U.S. Air Force develops, maintains, and operates...

How to Hack Passwords Using USB Drive?

2010-05-20 20:20
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete...

Learn How to Hack Facebook Passwords and Accounts Using Phishing Attack

2010-05-20 20:15
Step 1: Download Facebook fake login page and extract the contents into a folder Step 2: Create your free account at www.110mb.com and upload the extract files here Step 3: Go to file manager and upload all the files. Step 4: Open you fake page, enter user name and password and try...

Know Someone’s IP & Location via Email

2010-05-20 20:05
                                                  

Finding IP From GMAIL Headers

2010-05-20 19:57
When You send an email to any of your friends or others could be your Girl friends Never mind. But When you send the email through any email client like Gmail , Yahoo Mail , Hotmail, AOL, Outlook Express, etc it also sends the Email Header which contains Some important information for Us...

Windows Password Loophole

2010-05-20 19:55
1- ok now, what you need to do is to run compmgmt.msc 2- and click on local users and groups. 3- once you've gotten here you need to open up the 'users' folder. at this point i am walking along with you and notice that there are several major security holes dealing specifically with the...

Hacking your School, College

2010-05-20 19:53
This tutorial is aimed at school servers running Windows underneath (most of them do). It works definitely with Windows 98, 2000, Me, and XP. never tried it with 95, but it should work anyway. However, schools can stop Batch files from working, but it is very uncommon for them to be...

How Criminals Hack Other Peoples Computers

2010-05-20 19:50
For those of you that work in Information Technology and started in the last 20 years or so, chances are you were inspired by movies such as War Games, Sneakers or even Hackers. Remember that 80’s T.V. show Whiz Kids? That was cool too. I so wanted to be one of those kids. Of course,...

How To Repair Detectable But Corrupt USB Drive

2010-05-20 19:48
Have you suddenly encountered with the problem that when you plug in your USB drive, the Removable media shows up but when you try to open it, it returns with the message "Please insert a disk in to drive H:”. If yes then you have been on right tutorial page. By applying this simple...

How to hack a website

2010-05-20 19:45
First of all,why you want to hack a webpage?Is it a certain webpage or any site at all? There are many reasons to hack a website, or a webmaster.Maybe you want to take a revenge or maybe you want to have fun or just learn how to do it ! You can deface the website which means replace...

How to hack Email Accounts

2010-05-20 19:43
you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do...

How to Stop Fishing in Your Mail Box

2010-05-20 19:41
If you have a conventional mail box you have from time to time been faced with the prospect of fishing out pieces of mail from the back of the box. Especially if you like to get you mail from the comfort of your car. I got fed up with looking around for something to fish an obstinate...

fishing for online music with Radio Tuna

2010-05-20 19:39
Like any decent self-proclaimed music discovery slaker should be, I'm a sucker for free services that help me expand my audio horizons. Even better when it's an attractive Web site adorned with bubbles and represented by a pink tuna with a giant googly eye. Naturally, this means I was...

Phishing "Protect urself" Know What Hackers Do

2010-05-20 19:30
Phishing continues to be one of the most significant security threats facing Internet users. During 2007, scammers distributed millions of phishing scam emails that targeted many different entities. Phishing attacks are sure to continue in 2008 and scammers will use such attacks to...

Hacking In Terminal Server Environments

2010-05-20 19:27
  One of the most common techniques used by hackers to penetrate your network, is just plain-old password guessing. This goes for external hacking attempts as well as internal hacking attempts. In this article I will discuss how hackers can use tools to perform brute force password ...

DIY Your Blu-ray Files By Windows Movie Maker

2010-03-01 11:08
Windows Movie Maker is video creating/editing software, included in Microsoft Windows Me, XP, and Vista. It contains features such as effects, transitions, titles/credits, audio track, timeline narration, and Auto Movie. New effects and transitions can be made and existing ones can be...

Computer Scientists Develop a Comfortable and Secure Login Method

2010-02-25 09:50
As most internet users know, it is often hard to remember or keep apart all the passwords and login names for one's different online accounts. Dr. Bernd Borchert, together with students at the Computer Science Department of Tübingen University, has tackled this issue. They developed a new method
Views: 741 | Added by: Handsome-Hunk | Rating: 0.0/0
Total comments: 0
Name *:
Email *:
Code *:
Copyright MyCorp © 2025
Website builderuCoz