Wireless Hacking :-
Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-
Where The Saved Passwords Stores In Windows Xp & Vista - Must for hackers and Beginers
HOW TO ACCESS REGISTRY ??
1. Goto Start Menu.
2. Click on Run.
3. Type "regedit" (without quotes) in the Run Box .After that this Windows Opens . Now you are ready to see that.
LOCATIONS OF SAVED PASSWORDS !
VODAFONE HACK FOR FREE GPRS!
This method has been tested on different mobiles and has been confirmed to be working.
Followng are the Settings you require to configure on your Mobile:
Account Name: Vodafone_gprs
User Name: (no need)
Pass: (no need)
What to do if you're locked out of Gmail? It's a question too many users ask, after they are already locked out and are attempting to recover their account. Given the incredible amount of personal and financial information we keep in our inboxes, gaining access to a compromised Gmail account is incredibly important. Here's how to recover your Gmail account, and what you can do now, to make a future recovery easier.
Types of viruses :-
The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Tips for Wireless Home Network Security
1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
The ZIP of Death
This is a exploit of the compression algorithms to make a small zip that will extract into extream amounts their are more ways and better ones than this one but i will only show how to make a simple 1k = 1m ratio.
1) Make a.txt file
2) Open and type the null character (alt + 255)
3) Press ctrl + a then ctrl + v a couple times to make some null bytes
Sitemeter Hack - Hide Visual Tracker (Counter)
Sitemeter, one of the best traffic counter for websites/blogs, it shows online users, Referrals (From where people coming to your site), country locations, browser etc etc.. all in detail.
This counter is visible to all visitors.
Invisible Counters (Tracker) is available for Premium Accounts Only…!
Shutdown Command Via Command Prompt :-
The 'Shutdown' Command Becomes More Flexible and Automated when used from the Command Prompt.
To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'.
In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command.
You have to use at least one switch for the shutdown command to work.
Run Firefox inside Firefox
How to run Firefox inside Firefox.?
Yup you can run Firefox inside firefox just by typing following url.
How about Opening Firefox inside Firefox which is again in another Firefox..?
Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!
Want to Reveal the Passwords Hidden Behind Asterisk (****) ?
Follow the steps given below-
1) Open the Login Page of any website. (eg. http://mail.yahoo.com)
2) Type your 'Username' and 'Password'.
Remove shortcut arrow from desktop icons completely
To remove shortcut arrow from desktop icons in any type of document:
a) Perform instructions described under ‘Remove shortcut arrow from desktop icons’. For your convenience, steps 1 to 3 are reported here.
b) Perform instructions described under ‘Remove shortcut arrow from desktop icons (2)’. For your convenience, steps 4 and 5 are reported here.
Rapidshare Hack,No waiting for 15 mins
-: Rapidshare Hack :-
There are two hacks to beat Rapidshare download limits and waiting time.
1) Rapidshare Hack (For Firefox Users) :-
The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors.
Pop A Banner Each Time Windows Boots
o pop a banner which can contain any message you want to display just before a user is going to log on.
Go to the key :- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon
Now create a new string Value in the right pane named 'LegalNoticeCaption' and enter the value that you want to see in the MenuBar.
Password Hacking :-
Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :