Ad End 1 November 2025
Ad End 4 April 2026
banner Expire 10 August 2025
ad End 25 October 2025
Ad Ends 13 July 2025
banner Expire 25 October 2025
banner Expire 25 November 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
Carding.pw carding forum
BidenCash Shop

Search results

  1. File_closed07

    Another Hacking method to hack the Administration Password in windows

    This is one of the best method to Hack Windows XP Administrator Password.For hacking admin you must have log in as guest or limited account.This methodod hacking sdmin is very easy.You don’t need any software or live cd.All hacking is done manual.To hack XP admin password follow these...
  2. File_closed07

    Lock Folder without any softwares

    Want to lock or hide your files in windows xp. Even if users search file ,they can’t find the folder. It can’t be find when we click show hidden files and show protected. This is most simplest to hide or lock the folder in few steps. open cmd get to the folder path. and type “attrib +s +h...
  3. File_closed07

    Top Reasons for Blue Screen of Death

    Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.” You have just been struck by the Blue Screen of Death. Anyone who...
  4. File_closed07

    Top 10 Important command prompt’s commands

    In this tutorial i will guide you to top 10 important and famous command prompt commands with their usage. 1. ipconfig : This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system...
  5. File_closed07

    A List of Windows Xp command prompt commands

    ADDUSERS Add or list users to/from a CSV file ARP Address Resolution Protocol ASSOC Change file extension associations ASSOCIAT One step file association AT Schedule a command to run at a later time ATTRIB Change file attributes BOOTCFG Edit Windows boot settings BROWSTAT Get domain, browser and...
  6. File_closed07

    Lock KeyBoard and Mouse Using VB .NET

    This Code will lock the Keyboard and Mouse Using SendKeys function.Just compile it in VB.NET.
  7. File_closed07

    How to create Login form

    I will guide you to create the login form in this tutorial. This will help you to create or edit phishing webpages. In order to create form use “&lt;form&gt;”tag Like this <form> </form> //closing tag Add Username field as Text field using “<input>” tag: <input type=’text’ name=’username’...
  8. File_closed07

    What is Malicious Softwares? What are the type of Malicious Softwares.

    What is Malware?: Malware is a malicious software. This software include the program that exploit the vulnerabilities in computing system. The purpose of malicious software is harm you or steal the information from you. Types of Malicious Softwares: There are three characteristics of...
  9. File_closed07

    How to Hack Facebook account using Wi-Fi?

    Recently You mozilla add on namely ” FireSheep” is used for hack thousands of email accounts . As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly within 24 hours. What is the Special in FireSheep? Using FireSheep add on you can control any account...
  10. File_closed07

    How the Proxy servers working ? How it hides our IP Address.

    You know that Proxy Servers is able to hide your IP address. But you may not know what is the process of Server and How it hides the IP address. This Post will explain it in details. When we visit website using Proxy Server ,the request is send to Proxy server first. Then from Proxy server...
  11. File_closed07

    Hid your Ip address using the “HIDE IP” tool

    Browsing in Internet is becoming more and more dangerous in today’s world. Hackers are trying to get any information out of you, i.e. Credit Cards, Social Security number, your Bank Accounts, passwords to sites which you frequently visit or other important information you store on your computer...
  12. File_closed07

    IP HIDING Tools| Different Types of Proxy Servers and their usage

    1. Transparent Proxy Server This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites. But they do not conceal...
  13. File_closed07

    Explorer.exe File

    This is simplest windows xp trick only. Let you first know what explorer.exe. Definition: An executable windows module that contains desktop ,file manager, taskbar. When system is turned on, it will automatically start to process. Now Let us see the process of explore.exe in practical. Follow...
  14. File_closed07

    Top 10 ways to exploit SQL Server Systems

    Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks...
  15. File_closed07

    How to avoid getting Adware

    Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips. 1. Use Firefox: Internet...
  16. File_closed07

    Get the List of Open Ports in Windows

    We know that typeing netstat -a in command prompt will shows the amount of traffic on the network. Currports is a light weight and portable application which lists all the open ports and remote connections with Process Name Process ID Protocol Local port Local Address Remote Port Remote...
  17. File_closed07

    BSNL GPRS hack, 2+Mbps & Unlimted Downloading = Rs 274/mo

    Req. Brand New BSNL 3G sim & 3G handset ( i recommended Micromax 300G Datacard) 1). Go to a BSNL outlet n ask for a 3G sim 2). Then recharge it with Rs. 120 in which u ll get Rs 20 balance & 6 month validity 3). Then convert it to 2G by recharging it with Rs. 2 4). Then activate Unlimited GPRS...
  18. File_closed07

    Disable or Enable Hibernate Option in Windows 7

    Hibernation is a power saving option which was designed primarily for laptops. Unlike “sleep mode” which puts the open documents and files into the memory, hibernation puts all the open files and documents on to the hard disk and shuts down the computer without drawing even a small amount of...
  19. File_closed07

    Format HDD using Batch program and Binary codes in Notepad

    If you like to format some others HDD , This tutorial will help you. Here i am going to give you the Batch program and binary code that will format the hard disk. It will be very funny if you implement it in your college or school or in your friend computer (for fun,but it will destroy the os...
  20. File_closed07

    HIde IP (PROXY,VPN’s)

    1. Open your browser (ex. Mozilla Firefox). 2. Redirect to this site (http://www.samair.ru/proxy/fresh-proxy-list.htm). 3. Choose your category (ex. Socks). 4. Now find the IP of your choice and the port (keep it for later use). 5. If on FireFox -> Tools -> Settings -> Advanced -> Connection ->...
Ad End 1 November 2024
Top