How to Booting Xp With A Pen Drive ?

Booting Xp With A Pen Drive

There are times when a minor error in the Windows Registry or a Virus Infection, can make your system unbootable. In such a condition a properly configured USB drive on hand with Bart Lagerweij's free utility (BartPE), is a handy replacement for windows operating system.

How to Run multiple yahoo messengers ?

Running Multiple Yahoo Messengers

It is possible to run multiple Yahoo Messenger simultaneously right after installing the official version of Yahoo Messenger.

You will need to apply a simple windows registry patch to enable this feature.

>>Follow these simple steps :

Different methods for hacking Password

Password Hacking




Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques : 

FolderLock Without any Software.....

Folder Lock With Password Without Any Software


Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do. 
Then you see a batch file. Double click on this batch file to create a folder locker. 
New folder named 'Locker' would be formed at the same location. 

How to hide .exe file into a JPEG image ?

Hide EXE files into JPEG


This is a good trick to hide your exe files into a jpg file..!

How about sending a trojan or a keylogger into your victim using this trick..??

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

How to Hide Data in Image, Audio & Video Files: Steganography ?

Hide Data in Image, Audio & Video Files: Steganograph

Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

Proxies for Windows

Use Proxies in Windows

 100%  Working......

Go to control panel
1)phone modem options
2)advanced
3)In Providers, click Microsoft H.323 Telephony Service Provider, and then click Configure.
4)In Configure H.323 Service Provider
5)To specify an H.323 proxy, select the Use H.323 proxy, and then type the server name or IP address for the proxy.

Google Security

Google Security
 
Google is always adding new products and features. One of these is the Personalized Google Homepage. You can customize it with news, movies, weather, stock market reports and more. How convenient. But there is a dark side.

How to Close your non-responsive programs automatically ?

Close your non-responsive programs automatically


Normally you end tasks the non-responsive programs manually using windows task manager with (CTRL + ALT +DELETE) keys. Sometimes these non-responsive programs creates problem to run windows and others programs properly.  You can configure your computer to manage these non-responsive programs automatically. Windows has a feature that will close all non responding program automatically. If you have little knowledge about editing windows registry then you can configure your computer for this purpose.

How to use Bluetooth technology to connect laptop and cell phone?



 Bluetooth technology to connect laptop and cell phone

 




We can use Bluetooth technology to connect laptop and cell phone. We can move videos, images, photos etc from  desktop computer or a laptop to our cell phones. In order to use Bluetooth technology to connect laptop and cell phone we need a laptop and a cell phone which support this technology. Try webhosting
If the laptop doesn't support it, we can use a USB Bluetooth dongle.  Just plug it into the USB port of the desktop computer or laptop. Leave the rest to Microsoft Windows. It will find the driver and install it itself.  If it is not supported, we can manually install it via the manufacturer's compact disk. Follow these simple steps in order to use Bluetooth technology to connect laptop and cell phone: (In this example, we are using Windows Vista.)

How to improve your Wireless internet and network connection?

 Improve your Wireless internet and network connection

Microsoft Windows gives you a notification whenever your wireless network has a weak signal. This is a sign that you should improve your wireless network. When you get this notification, it means that the wireless connection is not as reliable or high-speed as it's supposed to be. In fact, the wireless connection signal may be completely lost in certain areas of the house. If you would like to improve your wireless network signal, you should carry out a few of these tips. These tips will extend the wireless range. They will also improve the overall performance as well as reliability of the wireless network.

How to Secure a Wireless Network from Hackers?

Secure a Wireless Network from Hackers



The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks.

How To Make A Fake Virus ?

Make A Fake Virus



This is an interesting tutorial in which we will create a fake “virus” which can shutdown, restart and log off your pc(Can also write a message and specify the countdown time). This is actually a faster way to turn off your pc, ’cause it doesn’t require clicking START>TURNOFF button etc…
.And you can always do a little mischief by sending it to your friends ;)

Hide IP Address from ISP Service Provider

How to Hide IP Address from ISP Service Provider ?
 
HackGalleryTips
 
“Can I hide my IP address from my ISP (Internet Service Provider)?”.

First of all, why would you be interested in doing this? ISP usually
logs your online activities and can even ban or warn you if you perform
certain activities (e.g. download copyrighted movies form torrents).

Make Folders Invisible

It is Eassy to Make Folders Invisible
HackGalleryTips
 
 
Hiding folders is an easy to do task inMicrosoft Windows XP. This is a great way to keep all your personal files un-findable.
To do this, create a new folder some where. Then ‘Right Click’ and select

Android Tips

Do you want to take control of your Android phone?
HackGalleryTips
Do you want to take control of your Android phone? By "rooting" your device, a process similar to jailbreaking an iPhone, you can install custom ROMs (images), which add stability and speed improvements to Google's mobile operating system, as well as install new features developed by the hacker community themselves. The procedure involves running commands that enable total access to the device. For non-developer types, hacks like these sound scary, but by following the instructions below, you can take control of your Android phone in only a matter of minutes. The end result is a truly open device which you can modify to your heart's content.

SQL Injection Scanners

Latest Top 15 SQL Injection Scanners
HackGalleryTips


While the adoption of web applications for conducting online business has enabled companies to connect seamlessly with their customers, it has also exposed a number of security concerns stemming from improper coding. Vulnerabilities in web applications allow hackers to gain direct and public access to sensitive information (e.g. personal data, login credentials).

How To Delete an UnDeletable File ?


Eassy way To Delete an “UnDeletable” File 
HackGalleryTips

  Hello Friends, this Tutorial is for all those who want to delete some files but they cannot delete them due to some reasons.  Well this is a Full Proof way of deleting any Damn File. After Deleting the File in this way there won’t be any trace of that File on your computer.

Notepad Hack Trick

How To hack by Notepad trick  ?
HackGalleryTips


Well quite old but here is d complete collection
Step 1: Open Notepad
Step 2: Write following line in the notepad.
this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.



How to send a Fake E-mail ?

Learn how to send your fake email HAckZ


For the purpose of this tutorial, 
we’ll be sending from bush@whitehouse.gov to dummy@anysite.com.
Second, you’ll need to find out the mail server that your recipient is using.
Click Start, Run, enter “CMD”, then presss OK. In the window that comes up, type nslookup -q=MX anysite.com
Go to Applications, Utilities, and choose Terminal. In the window that comes up, type nslookup -q=MX anysite.com
Bring up your favourite shell, and type nslookup -q=MX anysite.com

Download Youtube videos : Eassy way

How To Downloading YOUTUBE VIDEOS
HackGalleryTips






Many of my friends ask me about how to find or download videos online...

And i also know that most of you know about it tooo
  • Alright  now follow these steps....

How to make a Keylogger ?


It is Easy to make a Keylogger.....
Wanna learn how to make your own keylogger ? Here is step by step tuorial that will help you to make a keylogger in C++ using dev-c++, it can also be done in codegear c++ builder, Visual studio and similar. 
Keylogger is simple stealth software that sits between keyboard hardware and the operating system, so that it can record every key stroke

VoIP Hopper – VoIP VLAN Hopping Tool


VoIP Hopper – VoIP VLAN Hopping Tool


       
  VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific ethernet switches. VoIP Hopper does this by mimicking the behavior of an IP Phone, in Cisco, Avaya, and Nortel environments.  This requires two important steps in order for the tool to traverse VLANs for unauthorized access.

Fix Windows Error using Registry Cleaner


Fix your windows errors with registry cleaner


HackGalleryTips

WIndows is the most used operating system of the world. But most of the virus and malwares harms windows. And each time a person is forced to re install windows because of virus effects. 

But you can also recovers and fix your windows errors without re-installing windows.

Joomla Vulnerability Scanner


Joomla security scanner – JoomScan


                    Joomscan is a nice vulnerability scanner for the popular content management platform Joomla. It detects more than 550 vulnerabilities in the website based on the Joomla which includes file inclusion, sql injection, command execution.

PHP Vulnerability Finder


PHP Vulnerability Hunter v.1.1.4.6


            PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool which detects almost ll of the web application vulnerabilities listed on the advisories page. PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool capable of triggering a wide range of exploitable faults in PHP web applications.

Secure From Android Hackes

Best 6 ways to Beat Android Hackes

Hackgallerytips.blogspot.com
                      Be afraid! Be extremely afraid! A whole host of hackers are out there waiting to harness your Android for their own devices and according to experts, the data theft problem is only going to worsen. Whether it’s a rogue app which installs itself with a Trojan virus to boot or an unscrupulous soul hacking into your voicemail, your personal details are hot property should someone be able to harvest them. Follow our top tips to steer clear of the dodgy Android operators however, and you’ll be able to swat them away like the pesky critters they are.