• SMS FORGING

    SMS forging is a relatively new kind of high-tech felony, which uses the short message service (SMS), which is available on most mobile phones and personal digital assistants, to spoof or impersonate another user. The spoofing is often used to send viruses that can be carried from phone...
  • Mobile Application Testing

    Technology is evolving faster by the day. Today, we see mobiles are no longer mobiles, they are small computers. The smartphones run powerful applications, providing everything to users at their fingertips. Users can use their mobiles for:Logging in to banks in order to transfer funds Purchasing...
  • Sql Commands

    ABORT -- abort the current transaction ALTER DATABASE -- change a database ALTER GROUP -- add users to a group or remove users from a group ALTER TABLE -- change the definition of a table ALTER TRIGGER -- change the definition of a trigger ALTER USER -- change a database user account ANALYZE --...
  • THE OFFICIAL SOCIAL ENGINEERING BOOK

    We would like to congratulate Social-Engineer.Org for their official release of the book, Social Engineering : The Art of Human Hacking. The book has proven to be a huge success and being marked by the community as the official social engineering book. We are excited to see...
  • Facebook account hacking without any software or technical knowledge.

    Step 1 : First you need to create 3 email account. And sign up for facebook with those fake accounts. So now you must be having 3 new facebook accounts. ( don't forget to confirm your Facebook account) Step 2 : Now u have to send friend request to the Vitim from all those 3 fb...
  • India is a big market for cyber criminals!

    By Nikita Agarwal Mumbai- With cyber crime on the rise these days, cyber crooks in order to target users, have started using Hindi, while drafting mails. Security firm Symantec has claimed that there is likely to be an increase in spam among regional languages. India has been a constant...

Friday, October 28, 2011

On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know whether a given website is child safe? Well, here are some of the ways to...

Thursday, October 27, 2011

 Researching the topic of installing XP from USB, and after learning a lot from this and other forums,  Based on all the available knowledge, is it possible to install XP from USB using no third party tools, except what's available to me in a standard Windows 7 installation? I realise that there are now lots of good tools available online for a variety of installation scenarios, but there...

Monday, October 10, 2011

Hacking is the art of problem solving. People who engage in computer hacking activities are often called hackers. Basically Hackers are the people who do things in a smarter way which a normal person cannot. Whether its finding a solution or exploiting loopholes in programming. Most of the people misconceive that hacking means "law breaking" which is NOT TRUE. All hackers are not criminals...
Step 1 : First you need to create 3 email account. And sign up for facebook with those fake accounts. So now you must be having 3 new facebook accounts. ( don't forget to confirm your Facebook account) Step 2 : Now u have to send friend request to the Vitim from all those 3 fb accounts. (but you should be clever enough so that your requst must be accepted.) Step 3 : U would be thinking...