Wednesday, 31 December 2014

Use 2 Whatsapp Accounts In One Phone?

Whatsapp is the world famous messenger to send and receive messages for each other. 88% of people use whatsapp to communicate between them. It has became a trend to chat with friends. I think You are the One who also has whatsapp in your mobile. Many people some or the other time thinks " Can't we use 2 whatsapp accounts in one smartphone". Here comes the biggest questions in every mind is that: can we use multiple whatsapp in a mobile? can we have dual whatsapp account in on mobile? Like this so many questions comes to your mind. Don't worry here is the solution for all your questions. The solution for using 2 whatsapp accounts in one phone is through OGWhatsapp. What...

‘Cut Off’ internet connection of your friend!

 I was wondering that it would be very cool if you would be able to control the internet connection of your friend under the same Wi-Fi! Isn’t it? So I came up with this article… This article will be introducing a tool called “NetCut” which is available at http://arcai.com. The direct download link is available below.  Usually this tool is designed to test the Wi-Fi network or to control the network traffic or to filter the network, but Script kiddies use this tool to take a control over the network traffic. Using this tool you can get the complete list of the systems connected to the network and individually you can decide whether they are supposed to use the internet or not. Suppose, it is your...

Access blocked websites in your college/office Wi-Fi

I got few mails asking for some tricks to access restricted websites in college or office Wi-Fi without using proxy. Generally, if you use proxy to access some website then it might take you some more time to load the page than usual, but a VPN connection rather will improve your speed. In this article I will be helping you to set up a free VPN account for unlimited access to often blocked websites like Torrents, Facebook and YouTube. And then you have some more plus points like you can manage your downloads, that is, you can pause them (if you are under a Wi-Fi network then you won’t be able to pause your downloads, well, in most of them) and you can also be able to perform video call using Skype or some other alternate service. Note...

Monday, 29 December 2014

BEWARE HACKING @ CYBER CAFE -What is a Hardware Keylogger

we are going to tell you about Hardware Keylogger. You all might already know about what is a keylogger. Now we are going to tell you What is a Hardware Keylogger and How a Hardware keylogger works. Here is what a Hardware Keylogger Looks like. What is a Hardware Keylogger | How hardware keylogger works A Hardware Keylogger is nothing but a programmed chip (Mostly in assembly Language), so as to capture all the keystrokes and save them in its internal memory. The keylogger can then be taken out and all the stored information can easily be assessed by the hacker. Hardware Keylogger are most commonly used in cyber cafe’s and other public places where a lot of people come and access theinternet....

Types of Proxy | How to hide IP Address.

Every now and then I come across people who want to change there IP address but don’t know how. In this post I will try to give you every possible information to hide the IP address using the various types of Proxy Servers out there. If you want to know about various kind of proxy servers then this post is for you. A proxy server acts as an interface between the user and the internet if you want to Change your IP Address. Don’t know what is IP Address? Read: What is IP Address Now I’ll come to the heart of the post, which contains the answer to your curious question How to Hide the IP address ? The only solution to hide your IP address is by using a Proxy Server. But...

Sunday, 28 December 2014

How Most Used Website Track You, And How To Avoid It

The search engine giant Google new 'Terms Of Service' has left many people feeling insecure. The major highlight of the update "Shared Endorsements" allows your personal details (Name,Pics,Comments) to be used in targeted advertisements on Google property sites. Google's support page for shared endorsements says "The feature will allow for more friend-based recommendation of music and restaurants." How To Opt Out Of Google Ads : 1 : Google's Shared Endorsements : Click Here To Open Google Endorsement Settings. 2 : Google's Interest-Based Ads : Click Here To Open Google Interest Based Ads Settings. Facebook Also is not far behind blowing holes in people privacy. The Not-So-New "Sponsored...

Shutdown Another PC on a LAN

NOTE: The target PC & server/your PC must be in same Domain/Workgroup to work  this to function correctly. This’ll only work on Microsoft Windows-based Operating systems. Linux & Mac Operating systems will require different terminal commands. Step 1:- Open the command prompt. by clicking on the “Start” button, and selecting “Run”. and type “cmd” and then “ok”. Step 2:- Type  ”shutdown -m \\computername” in cmd. replace “computername” with  Name of the PC which you want to shutdown OR the computer’s IP address.                     Step 3:- Select any of these listed command. -r for force a restart, it will disable any services/user interaction or interrupts. -c for...

Saturday, 27 December 2014

Ways to Hide IP Address Online

Every computer on the Internet has a unique IP address allotted to it which makes it possible to trace it back to its exact location. Even though the concept of Internet Protocol address has been designed for its transparency and traceability, in some cases this questions the privacy of the Internet user where one would not like to reveal his/her identity to the outside world. Well, if you are one such person who is in search of ways to hide your IP address online, then you are at the right place. In this post, I will discuss some of the easy and popular ways to mask your IP address so that your identity and privacy is kept safe. Why Hide IP Address? The following are some of the common reasons why people want to mask their...

Top 6 Black Hat Hackers In The World

There are two types of hackers. First one are good hackers who are known as "white hat" hackers and another one which we will be talking about today are called "black hat" hackers. In this article, we will be talking about six famous black hat hackers and their hacks which made them famous or wanted. George Hotz Young and talented and what is the most important bored teenager, George Hotz wanted to have fun one summer night and  as a result he hacked the Sony’s company Iphone. It happened in June of 2007, by that time George was 17. It was a bit of a challenge, because how to hack device with assistant things?  The secret is to figure out how “to speak to the device”.He also mentioned that what he did was completely...

Page 1 of 8512345Next
Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms