How Become Hacker

Learn the knowledge about hacking.

Pages

Saturday, 6 June 2015

Hide Files Behind The Images

Learn To Hide Files Behind The Images There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden...

Create A Undeletable And Unrenamable Folders In Windows

Create A Undeletable And Unrenamable Folders In Windows In this tutorial you will learn cool and simple trick to Create an undeletable and unrenamable Folders In Windows operating system. Most of the Peoples are not aware that it is possible to create Undeletable, Unrenamable folder in windows without any software. To Test this concept just follow simple steps given below. Try to make a new folder in windows & give it name...

What Is RAT Or Remote Access Trojan ?

What Is RAT Or Remote Access Trojan ? RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basically anything with your computer. Using RAT hacker can install keylogger and other malicious viruses remotely to your computer, infect files on your system...

How to Protect Hacking

How to Protect Hacking Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users’ knowledge. Most types of antivirus software can be set up to update automatically. Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal...

Proxy and Anonymous Internet surfing

Proxy and Anonymous Internet surfing 1) What is a proxy?A proxy is an address of a proxy server (look @ kind of proxy's) that is placed between your computer and the internet :Normal :Computer --------> InternetWith proxy :Computer ---------> Proxy server -----------> InternetThe main advantage of the Proxy is that it will cover up your IP address (your identity on net) which may help you in opening the ban sites in your country. It...

Hack Yahoo accounts with Session IDs or session cookies

Hack Yahoo accounts with Session IDs or session cookies ! "Hack Yahoo accounts with Session IDs or session cookies". What are session IDs or session cookies ?Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when...

How to Hack Softwares to use them Lifetime

How to Hack Softwares to use them Lifetime Hi, I am back today with a most usefull article..Hope all of you will Like It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??Most of us are familiar with many softwares that run only...