Posted in
Labels:
Poor mans technology,
Script
|
11:11:00 AM
We have taught you many cool tricks under the title Poor Man's technology .This latest post of the series talks about a text to speech convertor created without the help of any particular software.This code is designed in VBscript.All you have to do is to copy and paste the code and save it in notepad as .vbs.(for eg. Te-Bay.vbs).
So here goes the code:
Posted in
Labels:
Google,
internet
|
8:14:00 AM
In this I'm feeling lucky trick you will see Google Heart Page
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
8:12:00 AM
In this I'm feeling lucky trick you will see the history of Google :-)
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
8:09:00 AM
In this I'm feeling lucky trick you will see a Google Magic page.
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
8:07:00 AM
In this I'm feeling lucky trick you will see Google Pacman Page
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
8:05:00 AM
In this I'm feeling lucky trick you will see a Annoying Google Page :-)
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
8:02:00 AM
In this I'm feeling lucky trick you will see Google rainbow page.
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
8:00:00 AM
In this I'm feeling lucky trick you will see Google epic page.
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
7:58:00 AM
In this I'm feeling lucky trick you will see yourself as a pirate.
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
7:56:00 AM
In this I'm feeling lucky trick you get yourself chicken rolled :D
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
7:52:00 AM
In this I'm feeling lucky trick you will see more facts about Chuck Norris
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
7:48:00 AM
In this I'm feeling lucky trick you will see Funny Political Pix
1.
Go to www.google.com
Posted in
Labels:
pc tricks
|
3:59:00 PM
God mode is one of the most celebrated features of Windows 7.If you haven't heard of it, GodMode is a feature that was revealed by CNet's Microsoft Correspondent, Ina Fried.It provides a single place to access all Windows settings without needing to browse options and folders in the Control Panel.
Posted in
Labels:
hacking,
Script
|
3:39:00 PM
Many So called Big Buddies of the blogosphere does a mischief ,they copy protect the information hosted on their blogs.I'm personally opposed to this injustice.Knowledge is nobodies freehold.Sharing it does not reduce it.
Posted in
Labels:
pc tricks
|
3:22:00 PM
First of all download VLC player
VLC allows you to output any video playback to desktop.I don’t see much point to this, but it is entertaining to watch movies as a background.
Posted in
Labels:
hacking,
Mobile
|
3:45:00 PM
*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display (operator logo).
*#0000# To view software version.
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
*#62209526# - Display the MAC address of the WLANadapter. This is available only in the newer devices that support WLAN
#pw+1234567890+1# -Shows if sim have restrictions.
Posted in
Labels:
reviews,
software
|
8:36:00 AM
On an average every internet user register's a new account a week.This is because most often in order to receive services they have to register on the respective sites.You need a password for the Windows network logon, your e-mail account, your homepage's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, homepage, etc. Unimaginable.
Posted in
Labels:
Exploits,
hacking
|
11:23:00 AM
False Linking or Fake Shortcut is a widely used method of hiding any file's extension.You can use this method to hide Trojan server created using RAT client , for example we are gonna hide a a Trojan to one text file with .txt extension. Now move your Trojan server into an empty folder . Right click to select create shortcut from the context menu. Now rename shortcut name to same name that of Trojan file and make sure not to change extension of shortcut file. ChangeTrojan'sxtension to .txt.Right click on shortcut file to select properties. Now change target to,C:\Windows\System32\cmd.exe /c Trojan.txt,Set Start in to,"%currentdir%"and select Run minimized.Click on change icon and select an icon that suits a text file and click on OK.
Posted in
Labels:
reviews,
software
|
10:07:00 AM
Hey friends,
This is j3rky admin once again. Today I'm gonna tell you about How to install Google Earth in Ubuntu Natty Narwhal which is also called Ubuntu 11.04. What you will get in Ubuntu is similar to What you see in Windows or in other OS.
Everyone must have used Google Earth at-least once. But there are many people like me who use it very frequently, specially when you have to go to an unknown place for the first time. So without wasting your time, lets start our operation. :)
Posted in
Labels:
Gadgets,
Hardware
|
8:00:00 AM
Have you ever dropped USB Flash Drive in water ?It happens,sometimes we keep it in our shirt pocket and later just stuff it into the washing machine.What will you do when you find your USB drive wet???
Posted in
Labels:
Gadgets,
Hardware
|
7:58:00 AM
Often people have no idea what to do if their USB drive is not working.They simply throw it into thrash.But here is a utility provided by hewlett packard(HP) ,give it a chance.It can fix minute problems.
Posted in
Labels:
internet,
Script
|
9:20:00 AM
Script : Spiral Java script
What it will do?
It will make your image live moving. This script will animate your pictures on the screen and it will move like a spiral.
Posted in
Labels:
internet,
Script
|
7:59:00 AM
Script : Snake Java script
What it will do?
It will make your image live moving. This script will animate your pictures on the screen and it will move like a snake.
Posted in
Labels:
Facebook,
internet,
Script
|
4:16:00 PM
- Alt+/ : Search
- Alt+m : Compose a new message
- Alt+1 : Home page
- Alt+2 : Your profile page
- Alt+3 : Friend requests
- Alt+4 : Your messages
- Alt+5 : Notifications
- Alt+6 : Account page
- Alt+7 : Privacy
- Alt+8 : Facebook's Facebook page
- Alt+9 : Facebook Terms/Agreement
- Alt+0 : Facebook help center
Posted in
Labels:
Password Cracking,
reviews,
software
|
12:33:00 PM
Multi Password Recovery (MPR) - multifunctional password decryption, removal and
auditing solution for Windows. MPR instantly finds and recovers passwords from more
than 80 popular applications (FTP, E-mail clients, IM, Browsers and so on). It can also
delete stored passwords, shows passwords hidden under asterisks, copies SAM file and
can generate new passwords. Under W2K/XP/2K3 MPR is able to process blocked for
reading files.
Posted in
Labels:
Facebook,
virus
|
10:11:00 AM
The Koobface.b virus, which targets Facebook users, creates spam messages and sends them to the infected users’ friends via the messaging system on Facebook.
Posted in
Labels:
Cyber Security,
Facebook,
Security Alerts
|
9:29:00 AM
Have to give it to facebook, it has done a great job minimizing 95% of the spams. It filters and deletes all spam posts/comments as soon as possible too. But it being a very large and growing platform, there are still more annoying spammers emerging!
Most of them are easy to spot like OMG, you wont believe this.. that whatever. Like the ones below:
Posted in
Labels:
pc tricks,
Poor mans technology
|
7:46:00 AM
Hey guys, many of you might know only one or even two ways to lock Windows.. but there are actually three interesting ways!
Posted in
Labels:
Cyber Security,
hacking
|
2:11:00 PM
Well,you might be feeling that we should have gone a bit more forward and should have talked about each step in a bit more detail.Well,my friend the main of our tutorial was to create an awareness on how the whole process of hacking is done.I believe we were enough successful in proving that hacking is not something very impossible.But in fact stopping hackers from doing bad is a hard job.We recommend you to read more on hacking to gain a more clearer view.
Posted in
Labels:
Cyber Security,
hacking
|
1:58:00 PM
Covering Tracks is a process to delete all logs on the remote system. If target system is linux or
UNIX, delete all entries of /var folder and if it is windows os delete all events and logs.
Posted in
Labels:
Cyber Security,
hacking
|
9:22:00 AM
In this step of Remote hacking, try to get reverse shell by launching the attack on a remote system.
After getting remote access we place a root kit or Trojan virus for future remote access, without
any password,anytime :D.
Posted in
Labels:
Cyber Security,
hacking
|
9:14:00 AM
For exploit and final attack, open the websites which providesyou the source code format. You need to download the code and compile them for preparing exploit for final attack.
Posted in
Labels:
Cyber Security,
hacking
|
8:56:00 AM
A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.Assessments are typically performed according to the following steps:
Posted in
Labels:
Cyber Security,
hacking
|
8:44:00 AM
Banner grabbing is an attack designed to detect the version of an operating system or application. Mean after port scanning we found open port 80 (apache) and target os is Linux,but we don’t know what is version of apache for hacking. Like apache 2.0, 2.2, or 2.6 .The method is :
Posted in
Labels:
Cyber Security,
hacking
|
8:31:00 AM
OS (Operating System) Fingerprinting is a process to find out victim's Operating System(
Windows, Linux, UNIX)Certain parameters within the
TCP protocol definition are left up to the implementation. Different operating systems, and different versions of the same operating system, set different defaults for these values. By collecting and examining these values, one may differentiate among various operating systems, and implementations of TCP/IP.
The TCP/IP fields that may vary include the following:
Posted in
Labels:
Cyber Security,
hacking
|
8:48:00 AM
In computer networking, a
port is an application-specific or process-specific software construct serving as a communications endpoint. It is used by transport protocols of the Internet Protocol Suite, such as
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). A specific port is identified by its number, commonly known as the
port number, the IP address with which it is associated, and the type of transport protocol used for communication.
Posted in
Labels:
Google,
internet
|
8:33:00 AM
In this I'm feeling lucky trick you will see something different :-)
1.
Go to www.google.com
Posted in
Labels:
Google,
internet
|
8:29:00 AM
In this I'm feeling lucky trick you will see a moving Google :-)
1.
Go to www.google.com
Posted in
Labels:
hacking,
pc tricks
|
8:01:00 AM
Many believe that
administrator account is the highest level of access in windows computers.There is an account in
Microsoft Windows that is more powerful than the administrator account in Windows Operating Systems. That account is called
System account and it is similar to the
root OR super user in the Linux/Unix world .Often this account is used by geeks for malware recovery, as malwares work in this level.
Posted in |
9:22:00 AM
Information gathering is the process to get maximum details of target site. It is a very vital
part of hacking because the more information about target system we have, more the number of
attacks we can launch.It can be done as..
Posted in |
9:20:00 AM
By doing a ping scan we can get the IP of any website.
Steps are: