Ad End 1 February 2024
Ad Ends 13 January 2025
ad End 25 April 2025
Ad Ends 20 January 2025
Ad expire at 5 August 2024
banner Expire 25 April 2025
What's new
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
adv exp at 23 August 2024
casino
swipe store
Carding.pw carding forum
BidenCash Shop
Kfc CLub

Search results

  1. File_closed07

    Scan remote system port with its ip address

    This is software which will allow you to scan the port of remote system. To scan the port, just enter the ip address of the remote system,then click the scan button. Advanced Port Scanner Website http://www.radmin.com/products/utilities/portscanner.php Download Page...
  2. File_closed07

    How to Crack the RAR Files with the “RAR PASSWORD CRACKER”

    This is detailed tutorail to use “RAR PASSWORD CRACKER” software. Instatll the Rar Password Cracker software. Opne the “RAR password cracker wizard” Select “Create New project ” and click next button Now click the “Load RAR archieves” button select your RAR file Now click the “add to...
  3. File_closed07

    Change Logon Wallpaper In Windows XP

    Open Startmenu->Run type regedit and press ok to open registry editor.(shows a tree like structure of directories at left) In that hierarchical structure in left, navigate to registry entry HKEY_USERS.DEFAULTControl PanelDesktop In right side pane see a number of values placed in a table...
  4. File_closed07

    Manual Priority for process

    Priority is giving importance to certain process. The windows xp has default process priority. But we can also change the priority of process by simple method. Go to Task manager(alt+ctrl+del) Right click on the task you want to set priority and click the goto process This will bring...
  5. File_closed07

    Bind Two .exe Files -Useful for Hackers

    Every hackers need software to bind two .exe files.. But most of softwares are not available for free..But Windows has a default Binding application. This article will give you info to bind .exe file using Iexpress applications. Use of Binding .exe files: By binding two .exe files ,two .exe...
  6. File_closed07

    Hack the Administration Password in windows

    This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password. Most of us have experienced a situation where in we need to gain access to a...
  7. File_closed07

    Another Hacking method to hack the Administration Password in windows

    This is one of the best method to Hack Windows XP Administrator Password.For hacking admin you must have log in as guest or limited account.This methodod hacking sdmin is very easy.You don’t need any software or live cd.All hacking is done manual.To hack XP admin password follow these...
  8. File_closed07

    Lock Folder without any softwares

    Want to lock or hide your files in windows xp. Even if users search file ,they can’t find the folder. It can’t be find when we click show hidden files and show protected. This is most simplest to hide or lock the folder in few steps. open cmd get to the folder path. and type “attrib +s +h...
  9. File_closed07

    Top Reasons for Blue Screen of Death

    Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.” You have just been struck by the Blue Screen of Death. Anyone who...
  10. File_closed07

    Top 10 Important command prompt’s commands

    In this tutorial i will guide you to top 10 important and famous command prompt commands with their usage. 1. ipconfig : This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system...
  11. File_closed07

    A List of Windows Xp command prompt commands

    ADDUSERS Add or list users to/from a CSV file ARP Address Resolution Protocol ASSOC Change file extension associations ASSOCIAT One step file association AT Schedule a command to run at a later time ATTRIB Change file attributes BOOTCFG Edit Windows boot settings BROWSTAT Get domain, browser and...
  12. File_closed07

    Lock KeyBoard and Mouse Using VB .NET

    This Code will lock the Keyboard and Mouse Using SendKeys function.Just compile it in VB.NET.
  13. File_closed07

    How to create Login form

    I will guide you to create the login form in this tutorial. This will help you to create or edit phishing webpages. In order to create form use “&lt;form&gt;”tag Like this <form> </form> //closing tag Add Username field as Text field using “<input>” tag: <input type=’text’ name=’username’...
  14. File_closed07

    What is Malicious Softwares? What are the type of Malicious Softwares.

    What is Malware?: Malware is a malicious software. This software include the program that exploit the vulnerabilities in computing system. The purpose of malicious software is harm you or steal the information from you. Types of Malicious Softwares: There are three characteristics of...
  15. File_closed07

    How to Hack Facebook account using Wi-Fi?

    Recently You mozilla add on namely ” FireSheep” is used for hack thousands of email accounts . As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly within 24 hours. What is the Special in FireSheep? Using FireSheep add on you can control any account...
  16. File_closed07

    How the Proxy servers working ? How it hides our IP Address.

    You know that Proxy Servers is able to hide your IP address. But you may not know what is the process of Server and How it hides the IP address. This Post will explain it in details. When we visit website using Proxy Server ,the request is send to Proxy server first. Then from Proxy server...
Ad End 1 February 2024
Top