scroll post

Blogger Tips and TricksLatest Tips And TricksBlogger Tricks

Useful Websites For Hacking

To check if a port is open:
http://www.canyouseeme.org/
To multiple scan a file for viruses:
http://vscan.novirusthanks.org/
To check if a site is down:

How To Bypass the Windows Authentication?


At first we need a software called Kon-Boot and we will have to make either CD or Pendrive bootable with this software.

Click To Download

Steps for making CD or Pendrive bootable.

How to Recover Windows 8/7/XP/Vista Password??

When I got my computer running Windows 8 I was so excited that I could finally have a fresh taste of the long-awaited Windows 8. As I have all my important data in the Surface now I set a login password, thinking that it is pretty safe now. However, this password also stops me from logging in because I forgot Window 8 password somehow! I tried my password hints, a free software tool, which all failed. I really need to regain access to my computer and I can't do my work without knowing the data stored in it. What can I do now? Is there a quick way to recover Windows 8 password?"

How to become a Hacker?

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in the same situation, then this is the right place for you.

WinRAR Password Recovery - How to Recover RAR / WinRAR Password

Suppose that you have downloaded a WinRAR archive and it is an important WinRAR file. You have waited for this WinRAR file for a quite long time. But when you are happy to finish downloading this WinRAR file and try to open it, it is encrypted with a password. Oh what a pity! It is not easy for you to get this RAR file, but it is unexpected to have a password. You may not give up this RAR or WinRAR file because it took you a whole day to download it. Therefore, you may need to take advantage of a method to recover WinRAR password, and the WinRAR password recovery tool may be your better choice!

DOS-Denial of Service

DOS Attacks or Denial Of Services Attack have become very common amongst Hackers who use them as a path to fame and respect in the underground groups of the Internet. Denial of Service Attacks basically means denying valid Internet and Network users from using the services of the target network or server. It basically means, launching an attack, which will temporarily make the services, offered by the Network unusable by legitimate users.

Computer Prank - How to Change the Processor Name shown in the System properties dialog Box ??


How to Change the Processor Name shown in the System properties dialog Box ??
Just follow the simple steps as given below:
Step 1. Go to . Start.. Run ... and
type regedit

LET’S EXPLOIT THE WEBCAM!!

If you are using your webcam only as a medium for video calling or chatting then you are  not using it to its maximum use. Now you may ask me How? So now I will show you how to exploit the webcam to its maximum use.
By installing third party softwares you can exploit your webcam to its maximum use.
Home security system