Sunday, 06.23.2024, 10:45 PM

Ethical Hacking - By Chintan Gurjar

Site menu
«  June 2024  »
Our poll
Rate my site
Total of answers: 171

Main » Entries archive

  • Sometimes you read about a criminal who is so much of a small-minded pervert and borderline mutant you almost can’t help but admire him. George Bronk is just such a criminal: the 23-year old has just pleased guilty to hacking into the email accounts of 3,200 girls, looking for nude photographs, then posting the pictures to their public Facebook profiles. That’s some single-minded skeeviness.
  • Bronk was arrested in late October after he used the same technique that was popularized by hacker David Kernell to break into Sarah Palin’s email. Namely, Bronk scoured his victims’ Facebook accounts looking for the answers to security questions used for password recovery by services like Gmail and Yahoo Mail.
  • Onc ... Read more »
Views: 1448 | Added by: handsome_devil | Date: 01.18.2011 | Comments (3)

Here In the title i have mentioned that "Man Tunnels" It means that he literally tunneled into the system.

Game Piracy is the business all over the world.But there are some guys who don't need to do piracy.They are digging into the system of the local game shop sites and making stocks as much as then can in no time.

This man has stolen games like Greeneville & Tennesse , After that he got arrested in last week for being tunneling into the local game shop.Steven Archer, 33, making off with almost $300 in cash and around $5,400 in games.

But truth always wins.He could not enjoy his his gotten gains ( The games which are stolen By this man )and he got arrested last we ... Read more »
Views: 1333 | Added by: handsome_devil | Date: 01.18.2011 | Comments (0)

Make All Images On Facebook To Revolve
This is a really cool trick by using simple Javascipt,Its really cool and its working.I have tested it.There was a fake Virus Spreading a Website that just scams you and automatically sends it to all your friends.But this script which i found is really working.

So this is you have to do:- paste below code in your address bar of your browser

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); D ... Read more »
Views: 1247 | Added by: handsome_devil | Date: 01.15.2011 | Comments (4)

1. Be aware that threats aimed at mobile phones are growing

2. Keep in mind that gaming and entertainment devices are now Internet-connected

3. Use technologies to protect information on USBs

4. Make sure that you are using a comprehensive security software platform for your PC

5. Free anti-virus software doesn’t provide complete protection

6. Make sure to transfer your PC best practices to all of your Internet-connected devices

7. Pay attention to your children’s online activities

8. Search and shop safely

9. Back up critical information

Views: 769 | Added by: handsome_devil | Date: 01.14.2011 | Comments (0)

Hyper V monitors physical, logical, and virtual performance information that is available when running virtual machines under Microsoft Hyper-V.

The graphical display is organized to help easily understand the CPU performaces being experienced.

Views: 764 | Added by: handsome_devil | Date: 01.11.2011 | Comments (0)

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Conn ... Read more »
Views: 858 | Added by: handsome_devil | Date: 01.11.2011 | Comments (0)

Feature-packed tool for manipulating processes and services on your computer 
Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful proc ... Read more »
Views: 903 | Added by: handsome_devil | Date: 01.06.2011 | Comments (0)

Geinimi originated in China, and is being distributed inside applications and games downloadable in third-party Android app stores. Once the application is launched on the user's smartphone, the trojan collects location data, as well as the device's IMEI and IMSI numbers, and a list of all the apps the user has installed on his device. It then attempts to contact a remote server every five minutes to send this infor ... Read more »

Views: 1287 | Added by: handsome_devil | Date: 01.02.2011 | Comments (6)

Windows 7 RT Fire Edition x86 

No Viruses, Malwares and Backdoors. Tested with NOD32. 100% clean.

Platform: Windows
Version: Based on Windows 7 Professional (x86)
Category: Operating System
Activation: Use Crack or Loader (Including)
CD-Key: No
Size: (32-bit : 3.06GB)
Number of Rar parts: N/A
No of DVD's: 1
Image Format: ISO Image File
Installation Time: 10 Mins
Author: Benjamin (Rockers Team)

Minimum ... Read more »
Views: 18991 | Added by: handsome_devil | Date: 01.01.2011 | Comments (13)

How to Add apps to the Start screen

In the world of long application list its evident that you may be having certain important applications which you use more often and which can be pulled on to the start screen itself so that instantly you can open the application. So when you press on the application icon a contextual menu will be popping up in which just select Pin ... Read more »
Views: 1555 | Added by: handsome_devil | Date: 12.31.2010 | Comments (2)

« 1 2 3 4 5 ... 12 13 »