FolderLock Without any Software.....
Folder Lock With Password Without Any Software
Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
How to hide .exe file into a JPEG image ?
Hide EXE files into JPEG
This is a good trick to hide your exe files into a jpg file..!
How about sending a trojan or a keylogger into your victim using this trick..??
1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.
This is a good trick to hide your exe files into a jpg file..!
How about sending a trojan or a keylogger into your victim using this trick..??
1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.
How to Hide Data in Image, Audio & Video Files: Steganography ?
Hide Data in Image, Audio & Video Files: Steganograph
Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.
Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.
Proxies for Windows
Use Proxies in Windows
100% Working......
Go to control panel1)phone modem options
2)advanced
3)In Providers, click Microsoft H.323 Telephony Service Provider, and then click Configure.
4)In Configure H.323 Service Provider
5)To specify an H.323 proxy, select the Use H.323 proxy, and then type the server name or IP address for the proxy.
How to Close your non-responsive programs automatically ?
Close your non-responsive programs automatically
Normally you end tasks the non-responsive programs manually using windows task manager with (CTRL + ALT +DELETE) keys. Sometimes these non-responsive programs creates problem to run windows and others programs properly. You can configure your computer to manage these non-responsive programs automatically. Windows has a feature that will close all non responding program automatically. If you have little knowledge about editing windows registry then you can configure your computer for this purpose.
How to use Bluetooth technology to connect laptop and cell phone?
Bluetooth technology to connect laptop and cell phone
We can use Bluetooth technology to connect laptop and cell phone. We can move videos, images, photos etc from desktop computer or a laptop to our cell phones. In order to use Bluetooth technology to connect laptop and cell phone we need a laptop and a cell phone which support this technology. Try webhosting
If the laptop doesn't support it, we can use a USB Bluetooth dongle. Just plug it into the USB port of the desktop computer or laptop. Leave the rest to Microsoft Windows. It will find the driver and install it itself. If it is not supported, we can manually install it via the manufacturer's compact disk. Follow these simple steps in order to use Bluetooth technology to connect laptop and cell phone: (In this example, we are using Windows Vista.)
How to improve your Wireless internet and network connection?
Improve your Wireless internet and network connection
Microsoft Windows gives you a notification whenever your wireless network has a weak signal. This is a sign that you should improve your wireless network. When you get this notification, it means that the wireless connection is not as reliable or high-speed as it's supposed to be. In fact, the wireless connection signal may be completely lost in certain areas of the house. If you would like to improve your wireless network signal, you should carry out a few of these tips. These tips will extend the wireless range. They will also improve the overall performance as well as reliability of the wireless network.
Microsoft Windows gives you a notification whenever your wireless network has a weak signal. This is a sign that you should improve your wireless network. When you get this notification, it means that the wireless connection is not as reliable or high-speed as it's supposed to be. In fact, the wireless connection signal may be completely lost in certain areas of the house. If you would like to improve your wireless network signal, you should carry out a few of these tips. These tips will extend the wireless range. They will also improve the overall performance as well as reliability of the wireless network.
How to Secure a Wireless Network from Hackers?
Secure a Wireless Network from Hackers
The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks.
How To Make A Fake Virus ?
Make A Fake Virus
This is an interesting tutorial in which we will create a fake “virus” which can shutdown, restart and log off your pc(Can also write a message and specify the countdown time). This is actually a faster way to turn off your pc, ’cause it doesn’t require clicking START>TURNOFF button etc…
.And you can always do a little mischief by sending it to your friends ;)
Hide IP Address from ISP Service Provider
How to Hide IP Address from ISP Service Provider ?
HackGalleryTips |
“Can I hide my IP address from my ISP (Internet Service Provider)?”.
First of all, why would you be interested in doing this? ISP usually
logs your online activities and can even ban or warn you if you perform
certain activities (e.g. download copyrighted movies form torrents).
logs your online activities and can even ban or warn you if you perform
certain activities (e.g. download copyrighted movies form torrents).
Android Tips
Do you want to take control of your Android phone?
Do you want to take control of your Android phone? By "rooting" your device, a process similar to jailbreaking an iPhone, you can install custom ROMs (images), which add stability and speed improvements to Google's mobile operating system, as well as install new features developed by the hacker community themselves. The procedure involves running commands that enable total access to the device. For non-developer types, hacks like these sound scary, but by following the instructions below, you can take control of your Android phone in only a matter of minutes. The end result is a truly open device which you can modify to your heart's content.
HackGalleryTips |
SQL Injection Scanners
Latest Top 15 SQL Injection Scanners
While the adoption of web applications for conducting online business has enabled companies to connect seamlessly with their customers, it has also exposed a number of security concerns stemming from improper coding. Vulnerabilities in web applications allow hackers to gain direct and public access to sensitive information (e.g. personal data, login credentials).
HackGalleryTips |
While the adoption of web applications for conducting online business has enabled companies to connect seamlessly with their customers, it has also exposed a number of security concerns stemming from improper coding. Vulnerabilities in web applications allow hackers to gain direct and public access to sensitive information (e.g. personal data, login credentials).
How To Delete an UnDeletable File ?
Eassy way To Delete an “UnDeletable” File
HackGalleryTips |
Hello Friends, this Tutorial is for all those who want to delete some files but they cannot delete them due to some reasons. Well this is a Full Proof way of deleting any Damn File. After Deleting the File in this way there won’t be any trace of that File on your computer.
Notepad Hack Trick
How To hack by Notepad trick ?
HackGalleryTips |
Well quite old but here is d complete collection
Step 1: Open Notepad
Step 2: Write following line in the notepad.
this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.
How to send a Fake E-mail ?
Learn how to send your fake email HAckZ
For the purpose of this tutorial,
we’ll be sending from bush@whitehouse.gov to dummy@anysite.com.
Second, you’ll need to find out the mail server that your recipient is using.
For the purpose of this tutorial,
we’ll be sending from bush@whitehouse.gov to dummy@anysite.com.
Second, you’ll need to find out the mail server that your recipient is using.
Click Start, Run, enter “CMD”, then presss OK. In the window that comes up, type nslookup -q=MX anysite.com | |
Go to Applications, Utilities, and choose Terminal. In the window that comes up, type nslookup -q=MX anysite.com | |
Bring up your favourite shell, and type nslookup -q=MX anysite.com |
How to make a Keylogger ?
It is Easy to make a Keylogger.....
Wanna learn how to make your own keylogger ? Here is step by step tuorial that will help you to make a keylogger in C++ using dev-c++, it can also be done in codegear c++ builder, Visual studio and similar.
Keylogger is simple stealth software that sits between keyboard hardware and the operating system, so that it can record every key stroke
Keylogger is simple stealth software that sits between keyboard hardware and the operating system, so that it can record every key stroke
VoIP Hopper – VoIP VLAN Hopping Tool
VoIP Hopper – VoIP VLAN Hopping Tool
VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific ethernet switches. VoIP Hopper does this by mimicking the behavior of an IP Phone, in Cisco, Avaya, and Nortel environments. This requires two important steps in order for the tool to traverse VLANs for unauthorized access.
Fix Windows Error using Registry Cleaner
Fix your windows errors with registry cleaner
HackGalleryTips |
WIndows is the most used operating system of the world. But most of the virus and malwares harms windows. And each time a person is forced to re install windows because of virus effects.
But you can also recovers and fix your windows errors without re-installing windows.
PHP Vulnerability Finder
PHP Vulnerability Hunter v.1.1.4.6
PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool which detects almost ll of the web application vulnerabilities listed on the advisories page. PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool capable of triggering a wide range of exploitable faults in PHP web applications.
Secure From Android Hackes
Best 6 ways to Beat Android Hackes
Be afraid! Be extremely afraid! A whole host of hackers are out there waiting to harness your Android for their own devices and according to experts, the data theft problem is only going to worsen. Whether it’s a rogue app which installs itself with a Trojan virus to boot or an unscrupulous soul hacking into your voicemail, your personal details are hot property should someone be able to harvest them. Follow our top tips to steer clear of the dodgy Android operators however, and you’ll be able to swat them away like the pesky critters they are.
Hackgallerytips.blogspot.com |
Hackers Targeting IPv6 : As websites scramble
Hackers Turn Attention to IPv6
Hackers are targeting the IPv6 protocol as websites scramble to switch over to the new Internet Protocol platform from its predecessor, IPv4.
According to CIO, Cisco engineer and security expert Eric Vyncke believes that the stateless auto-configuration feature that comes with IPv6 poses a huge threat to organisations.
Windows Phone 7 Tips & Trickes
Tips and Tricks for Windows Phone 7
In the first of a new regular feature on ITProPortal we are offering tips and tricks about mobile phones and their operating system that you may, or may not, know about.
ITPP is now covering aspects of the Microsoft Windows Phone 7 operating system, which will help in getting the best out of a handset and the platform as a whole.
Hack Android Password
Do you know where the Android Password is Placed ?
"Android Password are stored in text files on Device"
There has been a new discussion that has been triggered by a user over secuity of passwords stored in Android devices. The argument says that passwords aren’t stored in any form of encryption, and if anyone has access to root of the device, you could be seriously compromised.
How to secure from backdoor programs ?
Most used backdoor programs
There is a general misconception about security today. Most people would love to believe that their firewalls are completely capable to protect them from anything indecent.
The sad part, they could not be more wrong. Avitricks aim to prove it with three separate programs that can compromise the security of computers you have the opportunity to say “What’s a backdoor?” Yes, these programs were created in 1990, but still pose a real threat today. It is the first two that are still being developed.
There is a general misconception about security today. Most people would love to believe that their firewalls are completely capable to protect them from anything indecent.
The sad part, they could not be more wrong. Avitricks aim to prove it with three separate programs that can compromise the security of computers you have the opportunity to say “What’s a backdoor?” Yes, these programs were created in 1990, but still pose a real threat today. It is the first two that are still being developed.
How to Protect your Password from Keylogger ?
Fool keylogger and protect yourself from hackers
when you surf net at public computers or net cafes…maybe it can be even at your friends house..etc.. there is a danger that a possible key logger software can steal your password, so i have come up with a simple and effective way to counter it…at least 50% …
lets see how simply you can fool a key logger,
Create Fake Login Page Inorder To Hack others Account
How to create your own Fake Login Page.. ?
This goes into more detail on how to create a fake page to login, and get redirected while it is sending a email of the password and username to your inbox. If you found this easy, then try out the post, “How to Hack Gmail, Yahoo, Hotmail, Orkut or Any Other”
Fake login page is a fake page which you can use to hack others username and password. Fake login page looks exactly like the original page and if someone login in your page using his original username and password, the username and password will be mailed to you The process of Hacking anyone’s id using fake login pages is known as Phishing
hackgallerytips.blogspot.com |
Fake login page is a fake page which you can use to hack others username and password. Fake login page looks exactly like the original page and if someone login in your page using his original username and password, the username and password will be mailed to you The process of Hacking anyone’s id using fake login pages is known as Phishing
Facebook hacked, users seeing images of porn and violence
Facebook scare: 2 lakh accounts hacked in Bangalore
hackgallerytips.blogspot.com |
The recent Facebook hack has reportedly claimed over 2 lakh victims in Bangalore. According to a news report in Mid Day, some two lakh Facebook users in Bangalore had their accounts hacked and weblinks to their morphed pornographic pictures sent as feeds to friends and family.
Quoting social networking analysts, the report says that more than 2 lakh Bangalore Facebook accounts were hacked. The cybercrime department too is reported to have received calls and complaints regarding the mass hacking.
According to the report, there are around 50 posts on Facebook stating that the users are quitting the social networking site forever after being embarrassed before friends and family.
Improve Windows Xp Boot Speed Upto 60%
How To Increase Windows Xp Speed Upto 60% ?
Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This chapter explores how to put these techniques to work. Some of the things may already have been discussed in some threads earlier |
Subscribe to:
Posts (Atom)