Saturday, 31 March 2012

How to safeguard your files when computer crashes

First thing to keep in mind: If your computer hasn't crashed yet, it will in the future! So instead of waiting for fate to strike, take some precautions now: 1) BACK-UP! Buy some decent DVD-R discs and put everything useful in them. When you have more useful stuff, backup again. Do this often. 2) Keep your computer healthy. Use an...

Read more »

Saturday, 31 March 2012 by w4r-b0y · 0

Tuesday, 20 March 2012

How to hack a website[N00b Friendly]

So say somehow somewhere we ended up choosing a target to start wreaking havoc upon. All we need is an IP Address. Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do...

Read more »

Tuesday, 20 March 2012 by w4r-b0y · 0

Monday, 19 March 2012

How to edit meta tags of Media files using VLC Player

How to edit meta tags of audio and video files using VLC Player. What are meta tags..?? In simple words, Audio and Video files contains some information about Title, Artist, Album, Genre, Date, Publisher, and more.. There are many meta tag editor available. But here is the way to edit them with VLC media player which is very popular...

Monday, 19 March 2012 by w4r-b0y · 1

Sunday, 18 March 2012

Some Basic Bash Commands

List of Some Basic BASH Commands:- I'd like to point out to everyone before reading that this list is very far from completion and does not include all of the extendable possibilities. When I say this, nmap isn't a built-in command until you install nmap. These commands just stand for those that come with a Linux/UNIX BASH installation. A adduser...

Read more »

Sunday, 18 March 2012 by w4r-b0y · 0

Saturday, 17 March 2012

Misconceptions About Computer Worms

Misconceptions About Computer Worms And An Insight Into There Creation Intro There are a few misconceptions that some members have about Internet Worms and their behavior.all too often i hear people saying "Oh it looks like you have been infected by some kind of worm" and almost 99% of the time they are completely wrong. So here goes...

Read more »

Saturday, 17 March 2012 by w4r-b0y · 0

Some Common Terms in Hacking Explained

Q: What is hacking? A: The terms "hack" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft,...

Read more »

by w4r-b0y · 0

Some Useful CMD Commands

Here are some Useful Things to do on CMD!! First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS. Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks...

Read more »

by w4r-b0y · 0

Friday, 16 March 2012

How to setup a keylogger(ardamax) and Spread it [Step by Step]

Ardamax Keylogger 2.85 Complete Download + Tutorial + Guide Download the keylogger here. Please Turn off your anti-virus....It is because keylogging is basically a trojan builder it will show detection...I have checked the copy and it is clean version... SETTING-UP KEYLOGGER:-...

Read more »

Friday, 16 March 2012 by w4r-b0y · 0

Server Rooting Tutorial + Using h00lyshit Exploit

I will show you how to exploit a Linux server and gain root access. This will benefit you in many ways, for example having control of all websites hosted on the server. Enough talking, let's begin! Requirements for this tutorial: - A shelled website. - NetCat installed on your computer. - Patience - Port 443 or any other except 80...

Read more »

by w4r-b0y · 1

Thursday, 15 March 2012

Some Notepad Hacks and Tricks

Here are some Notepad Tricks to make your friend/enemy look  O.o  :O The blue screen of Death [This might be dangerous] *The Blue Screen Of Death can be coded and sent to you like any application. It is up to you to be carefull and try to reveal the trick before getting in serious trouble. It loops a message asking to re-install...

Read more »

Thursday, 15 March 2012 by w4r-b0y · 0

How to infect victim using his IP address

Many of the times I saw this question asked everywhere on the internet that “Is it possible to infect victim using his IP address?” So, I am going to show you how to do it.(n00b friendly TuT)...

Read more »

by w4r-b0y · 0

Wednesday, 14 March 2012

How To Create A Invisible Account In Windows Xp

Here is a Quick tutorial on for windows XP on How To Create A Invisible Account In Windows Xp. What we have do in this hack is really simple just create a DWORD value in the windows registry and hack the windows user accounts ....

Read more »

Wednesday, 14 March 2012 by w4r-b0y · 0

How to Detect Fake Facebook Profile

In Facebook, things are not all as it seems: there are people who are under false names, pictures, interests and even friends. You look at their profile and think “something here does not fit.” These characters seek to trick legitimate users the purpose of sending unsolicited advertising, steal personal information or engage in various...

Read more »

by w4r-b0y · 0

How To Perform DNS Poisoning attack

Hey guys Smile this Tutorial is about DNS poisoning on your network using Cain & Abel. Download Cain here This Tutorial Will be limited to just redirecting the traffic to another website. Note: This Tutorial is for educational purposes only (you’ll be responsible for your own actions) ...

Read more »

by w4r-b0y · 2

Tuesday, 13 March 2012

Anonymous Web surfing With TOR

We all many times use proxies for staying anonymous on internet. Lets quickly check out , what we are actually doing while using proxies. We first connect to a proxy server which brings resources requested by us from the web server. Thus a proxy server hides our identity by acting as an intermediary between us and the web server...

Read more »

Tuesday, 13 March 2012 by w4r-b0y · 0

How To Hack Facebook Accounts with Phishing [Step by Step]

Now im gonna make a step by step tutorial for facebook accounts.. ONE!: go to "www.facebook.com/login.php" and right click on some white space on the page and press "view source code". A LOT of text is gonna appear, copy it all to notepad. ...

Read more »

by w4r-b0y · 0

Collection of 25000+ SQL Injection Google Dorks

The almighty Google is just a search engine for common users, but, for hackers this search engine helps them to use Google Dorks (Kinda God Gift For Newbies) : Google dorks are the center of the Google Hacking. Many hackers use google to find vulnerable webpages and later use these vulnerabilities for hacking. Many...

Read more »

by w4r-b0y · 0

How to Crash PC using E Bomb

WHAT IS AN E-BOMB ?? An E-Bomb is some kind of program that opens many windows, and crashes the target computer. This guide can be followed by any one, but the only problem is getting the victim to open the executable file. First of all, download this and follow the below illustrated steps  :...

Read more »

by w4r-b0y · 0

Monday, 12 March 2012

8 Top Facebook Security Tips

World wide web is now expending, Internet has successfully turn the whole world into a village and for doing this social networks played and playing an important role, in the era of social networks there is a facebook,  Facebook has a large number of user's and it is on hit list of attacker's and scam-er. While you are using facebook...

Read more »

Monday, 12 March 2012 by w4r-b0y · 0

What are Trojan / Worm / Virus / Logic Bomb??

We generally hear some terms like Trojan / Worm / Virus / Logic Bomb,etc.. By the way what are these???Read and know about them below:...

Read more »

by w4r-b0y · 0

How to find a Vulnerable Website and Start Hacking ??

Now a days Website Hacking has become a tradition or fun to create problems for other people. Hackers are searching for finding the holes in the websites having high page ranks and traffic. Many newbies don't know that how to find security holes in random sites..?? Now here is an easy way to do so.. :) Follow the following st...

Read more »

by w4r-b0y · 0

Saturday, 10 March 2012

How To Crack WiFi WEP With Packet Injection

Intro By now most people have wireless networks at home. A lot of them may have experienced leechers or have leeched themselves through an open network. An easy way to prevent that from happening is to encrypt your network traffic. One of these methods is by use of WEP or Wired Equivalent Privacy. I’m going to talk about why...

Read more »

Saturday, 10 March 2012 by w4r-b0y · 0

How to get anyone's IP address

. Here's easy trick to find IP addresse of any one ,we can use it to find anyone's Ip easily while chatting in GTalk, Facebook, Yahoo messenger or anywhere else. You can also use it in a E-mail to find the Ip of the Recieptent. Process:...

Read more »

by w4r-b0y · 0

Wednesday, 7 March 2012

Exploit Classification / Shellcode

====================================================== Exploit Classification / Shellcode (computer security) ====================================================== #[+] Discovered By   : Inj3ct0r #[+] Site                   : Inj3ct0r.com #[+] support e-mail   : submit[at]inj3ct0r.com ?----------------[0x01]--->...

Read more »

Wednesday, 7 March 2012 by w4r-b0y · 0

All Rights Reserved Walk With-[Geeks]- by w4r-b0y
Special Thanx to Team Indishell and The Almighty Google