Poor Man's Text 2 Speech convertor : VB script


We have taught you many cool tricks under the title Poor Man's technology .This latest post of the series talks about a text to speech convertor created without the help of any particular software.This code is designed in VBscript.All you have to do is to copy and paste the code and save it in notepad as .vbs.(for eg. Te-Bay.vbs).

 So here goes the code:

Comments

Google Heart Page i'm feeling lucky trick

In this I'm feeling lucky trick you will see Google Heart Page

 1.Go to www.google.com

Comments

Early Google ,Google weblog ,Google history i'm feeling lucky trick

In this I'm feeling lucky trick you will see the history of Google :-)

 1.Go to www.google.com

Comments

Google Magic i'm feeling lucky trick

In this I'm feeling lucky trick you will see a Google Magic page.

 1.Go to www.google.com

Comments

Google pacman i'm feeling lucky trick

In this I'm feeling lucky trick you will see  Google Pacman Page

 1.Go to www.google.com

Comments

Annoying Google i'm feeling lucky trick

In this I'm feeling lucky trick you will see a Annoying  Google Page :-)

 1.Go to www.google.com

Comments

Rainbow google i'm feeling lucky trick

In this I'm feeling lucky trick you will see Google rainbow page.

 1.Go to www.google.com

Comments

Epic Google i'm feeling lucky trick

In this I'm feeling lucky trick you will see Google epic page.

 1.Go to www.google.com

Comments

LOL Limewire - you are a pirate ;I'm feeling lucky trick

In this I'm feeling lucky trick you will see yourself as a pirate.

 1.Go to www.google.com

Comments

2204355 - You haves been chicken rolled ;i'm feeling lucky trick


In this I'm feeling lucky trick you get yourself chicken rolled :D

 1.Go to www.google.com

Comments

Find Chuck Noris i'm feeling lucky trick - A must search keyword for all Chuck Norris Fans :D

In this I'm feeling lucky trick you will see more facts about Chuck Norris

 1.Go to www.google.com

Comments

French Military Victories I'm feeling lucky trick

In this I'm feeling lucky trick you will see Funny Political Pix

 1.Go to www.google.com

Comments

How to Activate GodMode in Windows 7


GodMode windowGod mode is one of the most celebrated features of Windows 7.If you haven't heard of it, GodMode is a feature that was revealed by CNet's Microsoft Correspondent, Ina Fried.It provides a single place to access all Windows settings without needing to browse options and folders in the Control Panel.

Comments

Fight against copy protecting :Hack any website to copy any text from it!


Many So called Big Buddies of the blogosphere does a mischief ,they copy protect the information hosted on their blogs.I'm personally opposed to this injustice.Knowledge is nobodies freehold.Sharing it does not reduce it.

Comments

How to watch videos as desktop background with VLC player


First of all download VLC player

VLC allows you to output any video playback to desktop.I don’t see much point to this, but it is entertaining to watch movies as a background.

Comments

Nokia mobile secret codes,Tricks and Hacks

*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display (operator logo).
*#0000# To view software version. 
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
*#62209526# - Display the MAC address of the WLANadapter. This is available only in the newer devices that support WLAN
#pw+1234567890+1# -Shows if sim have restrictions.

Comments

Download KeePass Password Safe : Free Open Source Password Manager to Secure Your Online Accounts


On an average every internet user register's a new account a week.This is because most often in order to receive services they have to register on the respective sites.You need a password for the Windows network logon, your e-mail account, your homepage's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, homepage, etc. Unimaginable.

Comments

Hiding Trojan Using Extention Hiding: False Linking/Fake Shortcut


False Linking or Fake Shortcut is a widely used method of hiding any file's extension.You can use this method to hide Trojan server created using RAT client , for example we are gonna hide a a Trojan to one text file with .txt extension. Now move your Trojan server into an empty folder . Right click to select create shortcut from the context menu. Now rename shortcut name to same name that of Trojan file and make sure not to change extension of shortcut file. ChangeTrojan'sxtension to .txt.Right click on shortcut file to select properties. Now change target to,C:\Windows\System32\cmd.exe /c Trojan.txt,Set Start in to,"%currentdir%"and select Run minimized.Click on change icon and select an icon that suits a text file and click on OK.

Comments

Install Google Earth In Ubuntu 11.04 (Natty Narwhal)

Hey friends,

This is j3rky admin once again. Today I'm gonna tell you about How to install Google Earth in Ubuntu Natty Narwhal which is also called Ubuntu 11.04. What you will get in Ubuntu is similar to What you see in Windows or in other OS.
Everyone must have used Google Earth at-least once. But there are many people like me who use it very frequently, specially when you have to go to an unknown place for the first time. So without wasting your time, lets start our operation. :)

Comments

'My pendrive/USB drive/Flash Drive fell in water' : First aid for a Wet USB Flash Drive?

Have you ever dropped USB Flash Drive in water ?It happens,sometimes we keep it in our shirt pocket and later just stuff it into the washing machine.What will you do when you find your USB drive wet???

Comments

USB stick/Pen Drive/Thumb Drive not working : How to fix a dead flash drive


Often people have no idea what to do if their USB drive is not working.They simply throw it into thrash.But here is a utility provided by hewlett packard(HP) ,give it a chance.It can fix minute problems.

Comments

Awesome Java script which makes pictures in any page move like a spiral


Script : Spiral Java script

What it will do?
It will make your image live moving. This script will animate your pictures on the screen and it will move like a spiral.

Comments

Awesome Java script which makes pictures in any page move like a snake




Script : Snake Java script

What it will do?
It will make your image live moving. This script will animate your pictures on the screen and it will move like a snake.

Comments

Step Ahead In FaceBooking : Hack any facebook account or page with javascript

  • Short-cuts To Facebook

  1. Alt+/ : Search
  2. Alt+m : Compose a new message
  3. Alt+1 : Home page
  4. Alt+2 : Your profile page
  5. Alt+3 : Friend requests
  6. Alt+4 : Your messages
  7. Alt+5 : Notifications
  8. Alt+6 : Account page
  9. Alt+7 : Privacy
  10. Alt+8 : Facebook's Facebook page
  11. Alt+9 : Facebook Terms/Agreement
  12. Alt+0 : Facebook help center

Comments

Multi Password Recovery - Best multifunctional password decryption


Multi Password Recovery (MPR) - multifunctional password decryption, removal and
auditing solution for Windows. MPR instantly finds and recovers passwords from more
than 80 popular applications (FTP, E-mail clients, IM, Browsers and so on). It can also
delete stored passwords, shows passwords hidden under asterisks, copies SAM file and
can generate new passwords. Under W2K/XP/2K3 MPR is able to process blocked for
reading files.

Comments

Facebook Virus\Malware Removal : Manual Removal of Koobface Virus:

The Koobface.b virus, which targets Facebook users, creates spam messages and sends them to the infected users’ friends via the messaging system on Facebook.

Comments

Facebook, spammers in an 'arms race' : How to Avoid/Prevent/Stop Facebook Spam/Scam


Have to give it to facebook, it has done a great job minimizing 95% of the spams. It filters and deletes all spam posts/comments as soon as possible too. But it being a very large and growing platform, there are still more annoying spammers emerging! 

Most of them are easy to spot like OMG, you wont believe this.. that whatever. Like the ones below:

Comments

Poor Man's System Lock : Different ways to lock a Windows computer without any software

Hey guys, many of you might know only one or even two ways to lock Windows.. but there are actually three interesting ways!

Comments

Conclusion


Well,you might be feeling that we should have gone a bit more forward and should have talked about each step in a bit more detail.Well,my friend the main of our tutorial was to create an awareness on how the whole process of hacking is done.I believe we were enough successful in proving that hacking is not something very impossible.But in fact stopping hackers from doing bad is a hard job.We recommend you to read more on hacking to gain a more clearer view.

Comments

Erasing your presence : escape strategy


Covering Tracks is a process to delete all logs on the remote system. If target system is linux or
UNIX, delete all entries of /var folder and if it is windows os delete all events and logs.

Comments

Attacking and Maintaining access

In this step of Remote hacking, try to get reverse shell by launching the attack on a remote system.
After getting remote access we place a root kit or Trojan virus for future remote access, without
any password,anytime :D.

Comments

Exploits : Hacker's Ammunition



For exploit and final attack, open the websites which providesyou the source code format. You need to download the code and compile them for preparing exploit for final attack.

Comments

Vulnerability assessment : Time consuming job


A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.Assessments are typically performed according to the following steps:

Comments

Banner Grabbing : Grabbing fine grain details


Banner grabbing is an attack designed to detect the version of an operating system or application. Mean after port scanning we found open port 80 (apache) and target os is Linux,but we don’t know what is version of apache for hacking. Like apache 2.0, 2.2, or 2.6 .The method is :

Comments

OS fingerprinting : a vital part of hacking !


OS (Operating System) Fingerprinting is a process to find out victim's Operating System(Windows, Linux, UNIX)Certain parameters within the TCP protocol definition are left up to the implementation.  Different operating systems, and different versions of the same operating system, set different defaults for these values.  By collecting and examining these values, one may differentiate among various operating systems, and implementations of TCP/IP. The TCP/IP fields that may vary include the following:

Comments

Port scanning:not a kid's game

In computer networking, a port is an application-specific or process-specific software construct serving as a communications endpoint. It is used by transport protocols of the Internet Protocol Suite, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). A specific port is identified by its number, commonly known as the port number, the IP address with which it is associated, and the type of transport protocol used for communication.

Comments

Google awesome I'm feeling lucky trick


In this I'm feeling lucky trick you will see something different :-)

 1.Go to www.google.com

Comments

Google Loco : I'm feeling lucky trick


In this I'm feeling lucky trick you will see a moving Google :-)

 1.Go to www.google.com

Comments

Hack into System account : The highest level of access in Microsoft Windows computer's!

Many believe that administrator account is the highest level of access in windows computers.There is an account in Microsoft Windows that is more powerful than the administrator account in Windows Operating Systems. That account is called System account and it is similar to the root OR super user in the Linux/Unix world .Often this account is used by geeks for malware recovery, as malwares work in this level.

Comments

The Art Of Information Footprinting!




Information gathering is the process to get maximum details of target site. It is a very vital
part of hacking because the more information about target system we have, more the number of
attacks we can launch.It can be done as..

Comments

Do a ping scan on any website to find it's ip!

By doing a ping scan we can get the IP of any website.
Steps are:

Comments

  • Disclaimer

    This Site may contain articles related to "Hacking" but they are hosted in our site for educational purpose only.They are meant to give a better insight to the recent cyber threats. Neither Te-Bay nor it's contributors will be responsible for any damage arising from misuse of information hosted here . If you are not willing to accept these conditions, please stop using this site and the information hosted here.

  • Search

  • Buy & Get Lucky On Te-Bay

    Cheapest & Genuine Online Store
    Flipkart.com

    We Are Hot Favorite For...

      Subscribe 2 Our Newsletter

      Enter your email address:

      Delivered by FeedBurner

      Join our Community