How Become Hacker

Learn the knowledge about hacking.

Pages

Saturday, 6 June 2015

Hide Files Behind The Images

Learn To Hide Files Behind The Images There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden...

Create A Undeletable And Unrenamable Folders In Windows

Create A Undeletable And Unrenamable Folders In Windows In this tutorial you will learn cool and simple trick to Create an undeletable and unrenamable Folders In Windows operating system. Most of the Peoples are not aware that it is possible to create Undeletable, Unrenamable folder in windows without any software. To Test this concept just follow simple steps given below. Try to make a new folder in windows & give it name...

What Is RAT Or Remote Access Trojan ?

What Is RAT Or Remote Access Trojan ? RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basically anything with your computer. Using RAT hacker can install keylogger and other malicious viruses remotely to your computer, infect files on your system...

How to Protect Hacking

How to Protect Hacking Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users’ knowledge. Most types of antivirus software can be set up to update automatically. Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal...

Proxy and Anonymous Internet surfing

Proxy and Anonymous Internet surfing 1) What is a proxy?A proxy is an address of a proxy server (look @ kind of proxy's) that is placed between your computer and the internet :Normal :Computer --------> InternetWith proxy :Computer ---------> Proxy server -----------> InternetThe main advantage of the Proxy is that it will cover up your IP address (your identity on net) which may help you in opening the ban sites in your country. It...

Hack Yahoo accounts with Session IDs or session cookies

Hack Yahoo accounts with Session IDs or session cookies ! "Hack Yahoo accounts with Session IDs or session cookies". What are session IDs or session cookies ?Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when...

How to Hack Softwares to use them Lifetime

How to Hack Softwares to use them Lifetime Hi, I am back today with a most usefull article..Hope all of you will Like It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??Most of us are familiar with many softwares that run only...

What is Encryption?

What is Encryption? Encryption is a method or a technique used to encode a message so that it can’t be read by a normal user/person. Its an art of secret writing, It can also be defined as converting information from plain text using an algorithm or a cipher to make it unreadable, So that the converted information can only be read by the person who is having the special knowledge. The process of encoding is known as Encryption and its...

Basic SQL injection for website hacking

Demo Of Basic SQL injection for website hacking You might have seen hackers hacking and defaceing websites, editing it with their own stuff, makeing post on websites etc. There are many methods of doing this, In this tutorial I will be showing you a very basic and simply SQLi (Structured Query Language Injection).  I will show you how to find the websites admin panel using a simple google dork and a SQL query to bypass the admin user name...

How to make you computer fresh and fast

How to make you computer fresh and fast In this Article We will explain some simple methods to make your computer cleaner and run faster for long period of time. It’s so frustrating to see our computer slowed down after a period of time. So in this article you will get some methods or you can say ways to make your computer run faster.Follow the methods listed below:- Remove Useless software and apps : We often install many unnecessary...

Security tips to Aviod Virus /Trojan/ Keylogger Infection

Security tips to Aviod Virus /Trojan/ Keylogger Infection Security tips to Aviod Virus /Trojan/ Keylogger Infection1. Install a good antivirus. Free or Paid is good, but dont used cracked or pirated versions.2. Install real-time anti-spyware protection3. Update your Anti-virus programs daily.4. Perform scans on your computer daily.5. Disable autorun to prevent infection from pendrives.6. Disable image previews if usiing Outlook7. Use good anti-virus...

System Security For User

System Security For User........ System Security For User........ 1. Always use a strong password with a combination of alphabets, numbers and special characters2. Use Original Antivirus. Dont download Cracks & Keygens which are the main entry point for Viruses and Trojans.3. Use Original Windows OS ( Paid ) or Use Open source OS such as Linux, Ubuntu, Flavours of Linux. Do not use some programs to patch your system.4. Regularly Update...

Secure Browsing Tips

Secure Browsing Tips Secure Browsing Tips 1. Never keep same password for different services you use online like gmail , facebook, bank accounts etc.,2. Use multiple accounts so that you dont get spams in your personal/ official email address.3. Install good Antivirus and Two way firewall.4. Use VPN for hiding identity and secure browsing when using internet out of your home.5. Update your OS, Antivirus, Firewall and Browsers regularly.6. Install...

Email Security Tips For Internet Users

Email Security Tips For Internet Users Email Security Tips For Internet Users...... 1. Enable two step verification in you Email accounts.2. Enable Login-notification for you email and get notification in your mobile whenever you login.3. Set a strong password with a mix of alphabets, numbers and special charecters.4. Enable login- notification for you facebook accounts to prevent unauthorised access.5. Enable HTTPS in your email sttings...

How to Hide your IP Address | Change IP Address

How to Hide your IP Address | Change IP Address After a lot of requests from various hackers across the world, we are coming up with this post on . This post will tell you How to Hide Your IP Address or How to Change your IP AddressChanging or Hiding the IP address is one of the biggest concerns of all Hackers as the IP Address can reveal the identity if the Hacker. Its just like your online address. If anyone can find your actual online...

Make WhatsApp Free For Lifetime only for Android

Make WhatsApp Free For Lifetime only for Android Make WhatsApp Free For Lifetime only for Android !1: Uninstall whatsapp,if your trial version is finished, or you wantto extend it for a year.2: Go to gmail application andcreate a new gmail id.3: Once you have made it,wait for some time (it totally depends onyour connection speed,ideally youshould wait for 15-20 minutes)4: Go to google play, click on the menu button of your android and choose...

What is HTTP Header Injection Vulnerability

What is HTTP Header Injection Vulnerability HTTP Header HTTP Header is the component of HTTP requests and responces. Header fields are transimitted with each request and responce and carry additional data about the requests and responces.See the typical request and responce headers Here at Web-Sniffer.net HTTP header injection HTTP header injection is a kind of web application vulnerability which exists on those web applications that generatd...

How To Recover Your Hacked WordPress Website In Easy Steps?

How To Recover Your Hacked WordPress Website In Easy Steps? WordPress is one of the most popular content management systems at present. However as a general law, the increasing popularity comes with a number of dangerous has gained attention of bad boys as well. There are so many people who are reporting the cases of hacked WordPress account on a regular basis. So I have thought of putting a complete guide to discuss how to recover...