Thursday, 30 June 2011

What are Torrents and its working ?

Torrents have become very popular way to download everything for free of cost like Movies, Games, Software, Music, Scripts etc. Torrents are everywhere on the internet with some advantages and disadvantages, here we will briefly try to explain what actually torrents are and how they work. Torrent actually itself is a small file having *.torrent extension, that you can say it contains a link to the file to be downloaded. But here in this case, files to be downloaded are not hosted on web servers instead these files are downloaded from other computers (just like yours) connected with internet. In simpler words, if you have downloading a file from torrent, same you are providing to download for other downloader and similarly you can download files...

Find Serial Key / Cracks for Any Software !

This summary is not available. Please click here to view the po...

Windows Mystery Exposed : Can you make a folder named ‘CON’ ?

Hello, I am back with a most funny and mysterious artice.. Hope all of you will enjoy to know all this... One day my Sir told me that he got a mail the message written on that is almost as below... Nobody can create a FOLDER anywhere on the computer which can be named as “CON”.This is something pretty cool…and unbelievable… At Microsoft the whole Team, including Bill Gates, couldn’t answer why this happened!TRY IT NOW !! This is not the first time I listen about this funny question that "why we can't create a folder with name 'CON' " ?, and I’m sure most of ICA member also try to make folder "CON" just now after reading the title of article  ! if no,then go and 1st try it .... If you try creating a folder named CON, as the mail...

Hack Yahoo accounts with Session IDs or session cookies

What are session IDs or session cookies ?Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when we click on 'Sign Out' option. Just login to yahoo.com. Type in browser javascript:alert(document.cookie); You would get a pop up box showing you the cookies. Now login to your account and do same thing, you would see more elements added to the cookies. These represent sessions ids Note: By saying , stealing sessions or stealing cookies, I mean the same thing. Sessions are stored in our browser in form...

Doxing - A Way of Tracing Anonymous People

Doxing is a way of tracing someone or getting information about an individual using sources on the internet and social engineering techniques. It's term was derived from --Documents-- as a matter of fact its the retrieval of Documents on a person or an organization. I saw a well detailed information on how to implement this techniques and i will be sharing it here. As presented by Chintan Gurjar below is a technique to trace an anonymous person. What is Doxing ? Doxing(“Documents” or “Docx”) is the part of technique “Tracing”. It plays an important role in tracing. To gathering all available information is called as doxing. In information there are many informations like documents,victim’s name, gender and also that on internet on which...

Sunday, 26 June 2011

Send , identify , trace Fake/Spoofed Email | Email Bombing | Email Spamming

Basics of working of Email ( You can skip this part) Email stands for Electronic Mail. Email sending and receiving is controlled by the Email servers.Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.Users from across the world register in to these Email servers and setup an Email account. Email Travelling Path :- Let’s say we have two Email providers, one is gmail.com and other is yahoo.com, ABC is a registered user in gmail.com and XYZ is a registered user in yahoo.com. • ABC signs in to his Email account in gmail.com, he then writes a mail to the xyz@yahoo.com and sends the message. • But what happens behind the curtains, the Email from...

Saturday, 25 June 2011

Increase uTorrent Download Speed By 80%

Note this trick will work if ur  ISP SPEED IS MORE  Disable your firewall before using this trick Now follow below pictorial TUT - - - - - - -  This method is 100% working Tested by me say thanks to darkmascot...

How to get googlemail.com domain

Each and every Gmail account has two email addresses, one is commonly known regular @gmail.com while another email address that can also be used to receive mail message is ending with @googlemail.com domain. Both email addresses also support multiple email aliases by adding plus symbol (for label) and dots (any number of them) to Gmail user name. Google Mail is a workaround solution by Gmail to provide its service in United Kingdom (UK) and Germany where there is trademark dispute on rights to own the name of Gmail. Both domains basically points to the same mailbox of the user name. For example, for an Gmail account with default e-mail address of billgates@gmail.com, all email messages sent to billgates@googlemail.com will also be delivered to the same inbox, and vice versa. While people...

Friday, 24 June 2011

Use Pen drive As RAM - Speed Up Computer

Today I,ll show you a nice trick to boost the working speed of your computer as now a days there are large number of programs and softwares which require a large amount of memory to be run properly. And often you don’t have that required memory installed as RAM. I,ll talk about this trick generally so that it may be applicable to every windows. First I,ll show you a manual way and after that I,ll provide you a software for this purpose. The basic scheme is this that we are going to use a pendrive or USB drive as a RAM, yes it is possible all the memory available in a removable pendrive/USB can be converted into RAM to increase the working speed of the computer. Manual Method to Convert USB/Pendrive Into RAM:-Here is the required procedure for converting USB/pendrive memory into RAM manually… 1)...

Bandwidth Stealer For Fast Browsing

If you are in your school's computer lab or in home , this software will always help you in your work . It is common thing to have many computer's connected with one device for internet and it causes your bandwidth to fall down . Here I am introducing a software called netcut which cuts the one's connection in such a crucial condition as I stated, I am stating it as crucial as really it’s a headache causing problem for me I hate slow surfing.When it cuts the one's connection , it automatically increases bandwidth of your connection which will let you work more easily and fastly. Download Netcut here for Free:-You can download this bandwidth stealing software named as Netcut from below:- Download Netcut Using Netcut :- 1: Download...

Hijack into Facebook, twitter or YouTube accounts using just an Android phone

. This time around we'll do away with having to use a PC.. Instead we will be using only an android phone.. This is very useful if you want to hack a Facebook account of someone and you don't have a laptop. People would even think you were only texting. Here's what you will need: 1- Any android Phone with an app called "FaceNiff" 2- And a Bit brain Yep, that's all. You can download FaceNiff at their website:- Download FaceNiff Regardless if the network is encrypted with WEP, WPA-PSK or WPA2-PSK as long as you are on the same Local area network or Wi-Fi you could easily sniff and hi jack into anyone's Facebook, Twitter or YouTube account as long as they are logged in. Steps Used to Hijack accounts using FaceNiff:-Here are the steps...

Sunday, 12 June 2011

Facebook keyboard Shortcuts !

Facebook has Keyboard Shortcuts to make your navigation easier. It is an automatic feature which is already enabled. You can now use shortcuts to quickly jump from facebook home page to any page. This is very useful for smooth and fast facebook user who ever not very much want to use mouse/track-pad while on facebook chat or navigation through pages. So these are shortcuts which will really help you for sure. List of FacebooK Keyboard Shortcuts Alt + 1 Return to FB Homepage Alt + 2 To goto Wall Tab of your Profile Page Alt + 3 To view Friends Requests list Drop down List Alt + 4 To view latest Messages list in Drop down List Alt + 5 To view Notification list Drop down List Alt + 6 To goto Account setting Webpage Alt + 7 To goto Account privacy configuration Webpage Alt + 8 To open Facebook...

How To Reveal Hidden Passwords and Unmask Asterisks Without Using Any Software !!

Well, as the title says, today we will show a very simple way to unveil hidden and saved passwords in any internet browser. Rather than wasting time and money on various programs, there is actually an extremely easy and straightforward way to reveal passwords under the asterisks. All you have to do is to copy and past the following code into the address line of your browser and press enter. You can also save it as a Bookmark or Favorite, and then whenever you want to run the script, just click on the bookmark. javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords...

Cool Keyboard Tricks (Windows) : Make a Disco

Keyboards usually have small LED's which indicate whether different types of locks are activated or not. Here is a trick to use the lights of your keyboard in a more creative manner in Windows. This trick uses a simple Visual basic script which when activated makes your scroll lock, caps lock and num locks LED's flash in a cool rhythmic way which gives the perception of a live disco on your keyboard. To make your own live disco, follow the steps given below:- 1. Open Notepad. 2. Copy paste the exact code given below:- Set wshShell =wscript.CreateObject("WScript.Shell") do wscript.sleep 100 wshshell.sendkeys "{CAPSLOCK}" wshshell.sendkeys "{NUMLOCK}" wshshell.sendkeys "{SCROLLLOCK}" loop3. Save the file as Disco.vbs or "*.vbs". Double...

Password Protect/ Lock folders in Windows without any Software

Most of us have private data. Not all of us have a private computer to keep that data. So, we just end up with other people viewing that data. Although password protecting software do work, it is almost useless to hide private data with these software(because we are always questioned as to what it is that we are hiding with the help of these software). Hidden folders do not work as they can be easily searched with Windows Search. So, we need an alternative way to create hidden password protected folders which only we can access. And that is exactly what we will learn in this post. With this trick, you can create a secure password protected folder in Windows which no one except you can access. To use this trick, follow the instructions...

Install, Boot Windows from USB Pen, Thumb or Flash Drive

Normally, Windows is installed using optical media like DVDs and CDs but there are times when it is not possible to boot into the windows setup using disks probably because your DVD drive is not working or, if you are using one of those ultra-portable laptops, it is not there at all. To overcome this problem, one can either use external disks and install windows normally or create a bootable pen drive (flash drive) to install Windows on the go. In this tutorial, we will discuss about the latter and learn how can we create a bootable USB drive for installing Windows XP, Windows Vista or Windows 7. Moreover, as installing Windows from a CD/ DVD is much slower than from a flash drive, installation will also take less time. This...

Reveal hidden passwords under asterisks

You might have seen that the saved passwords masked under stars or hidden under asterisks.I found out that there is are a couple of ways to reveal passwords that hidden by asterisks. Reveal hidden passwords under asterisks - Tools Asterisk Key shows passwords hidden under asterisks. It is able to instantly uncover hidden passwords on password dialog boxes and web pages. The setup is less than 500KB and it works perfectly. Reveal hidden password in Google Talk (Software)Reveal hidden password in Internet Explorer (Web Page) Both Google Talk and Internet Explorer is active. I then launch Asterisk Key and click the “Recover” button. Within a second, Asterisk Key shows the passwords hidden under asterisks.Download Asterisk...

Page 1 of 8512345Next
Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms