• CALL FORGING

    Caller ID Forging the practice of causing the telephone network to display a number on the recipient's caller ID display which is not that of the actual originating station; the term is commonly used to describe situations in which the motivation is considered nefarious by the speaker....
  • 3G technology vulnerable to cyber crime

    As 3G mobile services are set to be rolled out soon in the country, cyber experts sound a word of caution about the high tech enabled mobile phones, which they say are more vulnerable in the world of technology related crimes.While the next generation technology aims to make life simpler enabling...
  • Change the MAC address any os

    Go to Start -> Control Panel. Double click on Network Connections (inside Network and Internet Connections category in Windows XP). The, right click on the active network connection with network adapter that you want to change the MAC address (normally Local Area Network or Wireless Network...
  • How to avoid facebook scams

    v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 Facebook is the part of people's daily life. It's no. 1 socail networking website so it is used for spreading scams by...
  • Mobile Application Testing

    Technology is evolving faster by the day. Today, we see mobiles are no longer mobiles, they are small computers. The smartphones run powerful applications, providing everything to users at their fingertips. Users can use their mobiles for:Logging in to banks in order to transfer funds Purchasing...
  • Special Chat Symbols

    These chat symbols are very interesting. You can use them any chat messenger. The list is as following... Alt+1                        ...

Friday, October 28, 2011

On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know whether a given website is child safe? Well, here are some of the ways to...

Thursday, October 27, 2011

 Researching the topic of installing XP from USB, and after learning a lot from this and other forums,  Based on all the available knowledge, is it possible to install XP from USB using no third party tools, except what's available to me in a standard Windows 7 installation? I realise that there are now lots of good tools available online for a variety of installation scenarios, but there...

Monday, October 10, 2011

Hacking is the art of problem solving. People who engage in computer hacking activities are often called hackers. Basically Hackers are the people who do things in a smarter way which a normal person cannot. Whether its finding a solution or exploiting loopholes in programming. Most of the people misconceive that hacking means "law breaking" which is NOT TRUE. All hackers are not criminals...
Step 1 : First you need to create 3 email account. And sign up for facebook with those fake accounts. So now you must be having 3 new facebook accounts. ( don't forget to confirm your Facebook account) Step 2 : Now u have to send friend request to the Vitim from all those 3 fb accounts. (but you should be clever enough so that your requst must be accepted.) Step 3 : U would be thinking...