Wednesday, 28 December 2011
Evolution and Future of Personal Computing
05:41
No comments
Let’s talk about last two decades in terms of evolution of personal computing.
1991-2000: Some major hardware developments occurred, which made the dream of personal computing come true. Software giants like Microsoft, Apple, Google, etc evolved and took over the IBM-dominant market. Desktops started making their way into offices and eventually, homes.
2001-2010: The starting of decade was taken over by Microsoft operating system, Windows XP. It spread like a fire, used in most offices, homes, business etc. Apple developed some products like iMac, MacBook, which had its different customer base, not as vast as Microsoft. But the end brought increment in the number of Mac users.
Monday, 19 December 2011
Aakash tablet PC- specs and review
18:12
No comments
All of us are very well aware of India's cheapest tablet PC launched. They named it Aakash. Indian govt. promised last year to invent a cheapest tablet PC, so that every student can get to know know what is a tablet and how it works. Now govt. kept their promise and Aakash is in market. Anyone can purchase it online by visiting it's official website www.aakashtablet.com just for Rs. 2500/-
Here i am presenting secifications and review of this tablet PC.
Here i am presenting secifications and review of this tablet PC.
Saturday, 17 December 2011
Protect Your Facebook, Gmail, Hotmail, Yahoo Accounts From Hackers Using Zemana Antilogger
18:07
No comments
Today I am writing article on "How To Protect Your Computer, Facebook, G mail, Hotmail, Yahoo Accounts From Hackers Using Zemana Anti logger". Zemana anti logger is a powerful way to protect your PC from malware, remote key loggers and spyware programs that are widely spread all over the Internet. Zemana Anti logger is the No.1 privacy software that can protect your computer by blocking all the known and unknown Internet threats.
Unlike most antivirus softwares, Zemana antilogger does not rely on the signature based and file scanning approach. Rather it makes use of a unique technology to detect and shut down the malware and spyware programs just before it can steal your identity or hurt your computer. Zemana AntiLogger eliminates threats from keyloggers, SSL banker trojans, spyware, and more..
Unlike most antivirus softwares, Zemana antilogger does not rely on the signature based and file scanning approach. Rather it makes use of a unique technology to detect and shut down the malware and spyware programs just before it can steal your identity or hurt your computer. Zemana AntiLogger eliminates threats from keyloggers, SSL banker trojans, spyware, and more..
Create A Hidden User Account in Windows 7 and xp
17:50
No comments
- For your own privacy purposes or say it for security reasons you can Create A Hidden User Account under windows xp/7 operating system.
- This tweak will easily allow you an account that is normally displayed on the Welcome screen to be hidden from view. To log on using that hidden account it is necessary to use the Log On To Windows dialog box similar to the one that in Windows 2000.
2. Registry Key: HKEY_LOCAL_MACHINE \SOFTWARE\ Microsoft\ WindowsNT\ CurrentVersion\ Winlogon\ SpecialAccounts\ UserList
3. Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
4. Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden
5. Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]
6. Exit Registry and Reboot...
While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.
Wednesday, 30 November 2011
WEBSITE HACKING : BASIC XSS TUTORIAL FOR WEBSITE HACKING PART : 3
17:03
No comments

Today in this article, I am going to teach you how to hack website using XSS. In this article i have shared Cookie Catcher page, which is used for catching cookies.
If you have not read part 1 and part 2, I strongly recommend you read both my articles for learning more about Website Hacking....
Basic Information About Website Hacking Part 1
How to find a vulnerable Website?? Part 2
Website Hacking : How to find a vulnerable Website?? Part 2
16:58
No comments

Today in this article, I am going to teach you how to find website vulnerablility using Dork. Here i have shared some Dorks which you can use to fine vulnerable Website through google.
If you have not read part 1 I strongly recommend you do:
Basic Information About Website Hacking Part1
Hack Website : Basic Information About Website Hacking Part 1
16:50
No comments

Website security is a major problem today and should be a priority in any organization or a webmaster, Now a days Hackers are concentrating alot of their efforts to find holes in a web application, If you are a website owner and having a High Page rank and High Traffic then there is a chance that you might be a victim of these Hackers.
Few years back their existed no proper tools search for vulnerability, but now a days there are tons of tools available such as SQL Injection through which even a newbie can find a vulnerable site and start Hacking in just few minutes.
Monday, 14 November 2011
How To Create Fake Facebook Conversations
16:16
No comments

Wanna to make make own funny and cool facebook conversation and have fun ? In this post I’ll show you how to use web service for creating fake facebook conversation.
1) Go to fakeconvos.com
2) Click on create a new convo
Two biggest TRUTHS about hacking Facebook,Gmail,Yahoo,Hotmail etc
15:54
No comments
Every now and then I get mails and chats from different people who ask me to hack a facebook account or google account ,hotmail , yahoo etc . Its very annoying why people ask the same question again and again .
So I thought to write a post over it . Maybe you are reading this article because you searched on google "how to hack Gmail and facebook" or somthing similar to it .
So what you do is that you go to google and make respective search and you get lots of results -
Subscribe to:
Posts (Atom)