0
XSS Cross Site Scripting  - Introduction
XSS Cross Site Scripting - Introduction

An Introduction to XSS In this tutorial I will not be going into depth of XSS, I will be covering the explanation of the basic types. ...

Read more »

0
Create Free Website Instant
Create Free Website Instant

Hey Guys ! Here are some Best networks where you can create free Instant Website Without any Skillful knowledge about designing and dev...

Read more »

0
Increase Page Views | Web Hits Flooder
Increase Page Views | Web Hits Flooder

I am going to show you how to increase the page hits of you website.For this you want to dedicate a browser .In this i am using interne...

Read more »

0
Turn KeyBoard to Disco keyBoard
Turn KeyBoard to Disco keyBoard

This trick just makes your keyboard lights go crazy and do disco. The script I’m sharing with you, when executed makes your Caps, Num a...

Read more »

0
RFI - Remote File Inclusion - web Hacking
RFI - Remote File Inclusion - web Hacking

Hello Guys ! today I'm going to show you how RFI process goes Step By Step #Searching for Vuln. Sites #Checking if they are V...

Read more »

0
RAT - Introduction
RAT - Introduction

RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hac...

Read more »

0
Internet Download Manager - Full Version - Registered
Internet Download Manager - Full Version - Registered

 Latest Internet Download Manager Registration Internet Download Manager is a full-featured package that handles downloading tasks with a...

Read more »

0
Turn your Laptop into Wi-Fi hotspot ! Share Wifi |
Turn your Laptop into Wi-Fi hotspot ! Share Wifi |

Sometimes, we need to access shared internet or want to share our internet with other people. At that situation we don’t have the sui...

Read more »

0
How to Become a Good Hacker
How to Become a Good Hacker

What are the things that you need to become a hacker? 1. Programming Knowledge: → C/C++ → Web designing (HTML/CSS,Javascript,PHP,...

Read more »

0
CCNA Network Devices - CCNA Basic
CCNA Network Devices - CCNA Basic

Guys i am here with New Topic! Cisco Network Devices ♦ Router ♦  Routers are networking devices that forward data packets between net...

Read more »

0
Access any PC without knowing the password
Access any PC without knowing the password

  Guys i am sharing great Tool with you :) known as KON-Boot  Rather than cracking a Windows password, KON-BOOT bypasses it and lets...

Read more »

0
Useful Websites For Hacking
Useful Websites For Hacking

To check if a port is open: http://www.canyouseeme.org/ To multiple scan a file for viruses: http://vscan.novirusthanks.org/ The best...

Read more »

0
List of Web Application Hacking methods
List of Web Application Hacking methods

      Below are the well known Methods For Hacking Web Applications ! This list below fits in category Parameter manipulation     Arb...

Read more »

0
Animated Heart Share Buttons Blogger Widget
Animated Heart Share Buttons Blogger Widget

 Hey Guys i am here With New Tutorial. This is Animated beautiful Heart Widget with Social Buttons ! Lets see how to add it to your bl...

Read more »

0
Fixed Social Media Widget For Blogger
Fixed Social Media Widget For Blogger

 Hey Guys ! i am gonna show You how to add Social media Bar "Static Social Media Widget" On your Blog! Its ...

Read more »

0
Basic Of networking | CCNA
Basic Of networking | CCNA

What is a computer Network? A network is any collection of independent computers that communicate with one another over a shared netw...

Read more »

0
Introduction To CCNA
Introduction To CCNA

Asalam-O-Alykum Guys !! I am Raheel and This is Our First Lecture About CCNA ! Defination : CCNA (Cisco Certified Network Associate) ...

Read more »

0
Free CCNA Course
Free CCNA Course

Assalam-O-alykum ! Hope you all Ok ! So guys i m starting New CCNA R/S " Cisco certified Network Assosiate 'Route/switch' ...

Read more »

0
Android Apllications on Pc
Android Apllications on Pc

Do you wish to run Android application or games but don’t have a Smartphone to do it?  Do you want to use Instagram on Pc and want to play ...

Read more »

0
Create PDF of Any Website
Create PDF of Any Website

If you want to save web pages in a PDF file then you should follow the following steps you can use the PDF file while you do not have acces...

Read more »

0



Copy upside down text (flipped text) into a Facebook/Twitter/G+ status update !

~EnjOy~
Flip Text Upside Down
Flip Text Upside Down

Want to surprise your friends on Facebook, Twitter , My Space or Google Plus? Write Your Text Here ! and Flip Your Text :) Make...

Read more »

0
Session Hijacking
Session Hijacking

Session hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two computer...

Read more »

0
Penetration Testing
Penetration Testing

What is Penetration Testing? Penetration testing is the legal and authorized attempt to exploit a computer system with the intent of...

Read more »

0
Linux Distributions
Linux Distributions

Hey Guys I am here Again Today i m gonna Share information about Linux Distro' ! There are many Distro' . Here is a Short Introduc...

Read more »

0
Linux Introduction
Linux Introduction

What is Linux? Linux is an operating system that evolved from a kernel created by Linus Torvalds when he was a student at the Univ...

Read more »

0
Hacking DNN website | Portal Hacking |
Hacking DNN website | Portal Hacking |

Hey Guys , One more hacking method called "Portal Hacking " DOT NET NUKE" (DNN)". This method also uses google search ...

Read more »

0
SQL Injection Basic Hacking TuT
SQL Injection Basic Hacking TuT

If you are new to the world of hacking websites, then SQL injection is possibly the easiest to learn and most common of the substan...

Read more »

0
Hacking Facebook in LAN
Hacking Facebook in LAN

in this post I am going to show you a way you can hack the facebook accounts of all the people who are on your network (LAN or wifi ) . I ...

Read more »

0
EC Council - Penetration Testing Procedures & Methodologies
EC Council - Penetration Testing Procedures & Methodologies

Hey Guys !  EC Council Book For you !! This Book is about  Penetration Testing ! Download and Read !  This book discusses the vario...

Read more »

0
Sql Injection Dork List
Sql Injection Dork List

Today i am gonna share Google Dorks for sql injection ' which is one of the most used method to hack a website . Using the SQL...

Read more »

0
Find Facebook Profile ID
Find Facebook Profile ID

Here is the trick which will let you get profile id of any person who got custom username. You can also Find Fan Pages Id . Check below ima...

Read more »

0
Disclaimer
Disclaimer

Disclaimer These articles are intended for IT Professionals and systems administrators with experience servicing computer hardware. Ple...

Read more »

1
| About Me |
| About Me |

Well About me.. I am in search Of my Self   " Apni Talash mein " ! Neither Noob , Nor Geek ! Currently learning loads ...

Read more »
 
 
Top