• Facebook account hacking without any software or technical knowledge.

    Step 1 : First you need to create 3 email account. And sign up for facebook with those fake accounts. So now you must be having 3 new facebook accounts. ( don't forget to confirm your Facebook account) Step 2 : Now u have to send friend request to the Vitim from all those 3 fb...
  • Special Chat Symbols

    These chat symbols are very interesting. You can use them any chat messenger. The list is as following... Alt+1                        ...
  • A project of network connectivity between two Office with wireless setup and vlan

    Switch:As with hubs, Ethernet implementations of network switches support either 10/100 Mbit/s or 10/100/1000 Mbit/s ports Ethernet standards. Large switches may have 10 Gbit/s ports. Switches differ from hubs in that they can have ports of...

Tuesday, April 26, 2011

Many people want this type of services and searched over internet a waste their time but unable to get desired results. A few days ago i got a website which have a lots of tracing services. It shows tracing results in a map along with all suitable information you want to know. You can trace a Mobile number. For example , when we enter the 10 digit mobile number, then we get the Mobile...
Most of the persons want to know the IP address of their friends or the person they are chatting with. By using this simple trick you will get the IP address of the person you are chatting or your friends. By finding the IP address of the person you can trace the location of that person by using IP to location locators. Use any of my previous post of locating ip address. you have to follow...
v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 Facebook is the part of people's daily life. It's no. 1 socail networking website so it is used for spreading scams by spammers.  Scammers search through Facebook user accounts and gather information from public profiles to...
Normal 0 Everybody  use email accounts and social networking websites such as orkut, twitter and facebook. There are many important informations of a person in these email accounts and social networking website. so it is important to protect these account from hackers. Because hackers always try to get others account to get those secret and personal data for bad purpose. If use...
EC-Council E-Business Certification SeriesCopyright © by EC-Council Developer - Thomas MathewPublisher - OSB PublisherISBN No - 0972936211 By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. IntroductionThis...
The Hacker’s Underground Handbook The Hacker’s Underground HandbookLearn What it Takes to Crack Even the Most Secure SystemsBy: David Melnichuk The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide,...
PUBLISHED BY- Syngress Publishing, Inc. ISBN-10: 1-59749-154-3ISBN-13: 978-1-59749-154-9 This book is all about XSS. It will cover these topics on XSS. Cross-site Scripting Fundamentals.The XSS Discovery ToolkitXSS TheoryXSS Attack MethodsAdvanced XSS Attack VectorsXSS ExploitedExploit FrameworksXSS WormsPreventing XSS Attacks Download Here:http://www.ziddu.com/downloadlink/13171894/Cross_Site_Scripting_Attacks_XSS_Exploits_and_Defense_tqw_darksiderg.pdf...