scroll post

Blogger Tips and TricksLatest Tips And TricksBlogger Tricks

How to recover scratched CD’s

Tips to recover scratched CD’s:

1. Spread a cloth on a flat surface and place the CD on it.

How to Play YouTube Playlist in VLC Media Player?

Hello Readers, Do you know that VLC Media Player, the world’s favorite video player that supports nearly every video format, can also play YouTube videos on your desktop without requiring the web browser or the Adobe Flash player.

Linux Basics: How to Compile & Execute C Programs

It's Time to Learn Linux Friends you know what, after April 8, 2014, technical assistance for Windows XP will no longer be available, including automatic updates that help protect your PC.

How to remove last name from facebook account?

Some people want to show only the Single name on their Facebook profiles so here I am with a trick to do this by using Firefox

Follow the steps given bellow:

Login to your facebook account

How to create a Nameless Facebook page?

Follow the steps to create a nameless page on facebook

Steps:

Login to Facebook and Create a Page. (from options upper right).

TIOBE Programming Community index Jan 2014

The TIOBE Programming Community index is an indicator of the popularity of programming languages. The index is updated once a month. The ratings are based on the number of skilled engineers world-wide, courses and third party vendors. Popular search engines such as Google, Bing, Yahoo!, Wikipedia, Amazon, YouTube and Baidu are used to calculate the ratings. Observe that the TIOBE index is not about the best programming language or the language in which most lines of code have been written.

Hack Facebook Account by Phishing Method

Facebook is one of the best social networking website. All of you want to hack your friend's facebook account to know what they are doing. Even I have posted many advanced methods some of my viewers are asking for phishing method. So This post is for all of you who were asking me how to hack a facebook account by phishing method.

New Facebook Hack: Cookie Stealing And Session Hijacking

What is Session Hijacking?Session Hijacking is Stealing the existing active Session. The main purpose of Session Hijacking is to bypass authentication process and gain unauthorized access to the computer or Website.

Session Hijacking- A Hackers way to Hack!

What is Session Hijacking?
Session Hijacking is Stealing the existing active Session. The main purpose of Session Hijacking is to bypass authentication process and gain unauthorized access to the computer or Website. In simple words , hackers will login as some other client using their Sessions.

Hack the Hacker!

Hello friends, today i am going to teach you how to see the hackers illegal phish pages password file using Google, where all the passwords of victims are stored.

Saved Password Locations

Hello Guys, Do you know when you press Remember Password Button on your Browser where those passwords are stored? In this Post let us look at which location all the passwords are stored.

Exploit Win7 Remote PC: MetaSploit Framework

Hello friends, Today I'll teach you you can exploit Windows 7 PC by using metasploit on BackTrack 5.

What is BackTrack?
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.

Comparison of Linux Commands and DOS Commands

Many Linux commands typed at a shell prompt are similar to the commands you would type in MS-DOS. In fact, some commands are identical.

So, let's look at the Similarities.

Linux Intro on Way2Computerworld

What is Linux?

                          Linux, often described as a technical user’s operating system, is quite popular in many circles of computer processing because of its versatility and easy-to-use framework.

Linux Commands with corresponding MS-DOS Commands

Type these commands in shell/console/Terminal.

startx – to open KDE from login shell (win in MS-DOS)
ifconfig – shows IP Configuration (ipconfig in MS-DOS)

Assassin's Creed IV Black Flag - Torrent




Minimum System Requirements:
 
OS: Win Vista SP 64bit, or Win 7 SP1 64bit, or Win 8 64bit 
CPU: Intel Core2Quad Q8400@2.6 GHz / AMD Athlon II X4 620@2.6 GHz
RAM: 2GB System Memory
GPU: Nvidia GeForce GTX 260 / AMD Radeon HD 4870
GPU RAM: 512MB VRAM with Shader Model 4.0 or higher
DX: DirectX June 2010 Redistributable
HD: 30 GB
AUDIO: DirectX Compatible Sound card with latest drivers

Call Of Duty - Black Ops 2 PC Game - torrent



It does not need any update or patch coz it includes everything you just need to extract it and play . So guys do not download and apply any patch or update or do it at your own risk.

Call Of Duty Modern Warfare 2 PC Game - Torrent


SYSTEM REQUIREMENTS

Minimum System Requirements
Processor : Intel Pentium 4 3.2 GHz or AMD Athlon 64 3200+ processor or better
Video Card : 256 MB NVIDIA GeForce 6600GT or better / ATI Radeon 1600XT or better
Memory : 1 GB RAM

Call of Duty 4 Modern Warfare 1 - Torrent

 
 
System requirements:
Operating system: Windows 7 / Vista / XP
Processor: Pentium or AMD 2.4 GHz
Memory: 512MB RAM

CyberGate RAT Tutorial for beginners on Way2Computerworld

1)What is a R.A.T?
                    R.A.T is remote administration tool. In other words, if a RAT is set up correctly, then a person (hacker) would gain acces on victim's computer. That hacker can do any stuff in victim's pc.

Advanced Phishing Tactics on Way2Computerworld!

Hello friends today I'd like to tell you one story Once in our college we're having Ethical Hacking workshop, he asked me to login from his system (social engg), I thought

Free Download Microsoft Office ProPlus VL 2013 (32 bit + 64 bit) with Activator - Torrent



Microsoft Office ProPlus VL 2013 (x86/x64) with Activator - Torrent
System Requirements:
Computer and processor: 1 GHz or greater x86/x64 Processor with SSE2 instruction set
Memory: 1 GB RAM (32-bit) / 2 GB RAM (64-bit)

Free Download Easy GIF Animator 6.0 Pro PreActivated


Easy GIF Animator is powerful yet very easy to use software for creating and editing animated GIF images.

How to Find Unsecure Admin Panel: Google Dorks

Google Search indexes everything that is made public on the web and Google dorks are used to find & hack targets using google search engine. here are the list of the most used  ones.

Windows 8: Top 5 Cloud Storage Apps

Cloud storage is a fast-moving arena, with advancements including the ability to store files and folders in the cloud along with meta data on your PC replicating the actual file. The file isn't there and isn't taking up space, but you can see relevant attributes.

How to Remove Write-Protection from USB Drives...



My Pen Drive is showing some error while I'm copying some data into USB drive and it was “Write Protected”

How to Download Facebook Videos........

Today I will show you how can one download the Facebook videos. Nowadays we see our group members upload many amazing videos and we may want to save it. So here now how to do is.