Open any blocked site.

Many schools and offices blocks social networking sites like Orkut. There is a very simple workaround to open these sites. The simplest way is to use a web proxy. So why use a web proxy ? Anonymous free web proxies allow you to bypass local proxies and security restrictions and surf blocked sites or simply surf privately and securely without need to install any software on your computer. If you browse the web through public web proxy the website cannot find your real IP address. You IP address gives out information regarding your location, OS, web browser, etc which can be misused. Proxy Websites To Access Blocked Websites http://www....
Email Hacking Tricks

I am going to show you how a hacker can hack your email a/c & how you can prevent your a/c from getting hacked. WARNING: Dont use this information for illegal purposes. Now there is no software available where you just enter the id & you get the password. This was possible some years back with the help of brute force or dictionary attack. BRUTE FORCE: The software trys all the possible key combinations on the keyboard as a password. This used to take much time i.e hours or sometime days! As there can be billions of key combinations & it was useless to find passwords such as 10-15 characters long as it would take months to find...
Hacker Terminology.

Hacker:- A person who modifies something to perform in a way that was different than it was made to do. Not just to do with computer hacking, but in this case it is. Cracker:- Crackers are people who break into a computer system for an offensive purpose, for example defacement. A cracker is still a hacker. Ethical Hacker: -People who hack into systems for defensive purposes, often people hired bycompanies to pen-test their network. White hat hacker: -Somebody with defensive security intentions, similar to an ethical hacker. White hat hackers existed before ethical hackers. Black hat hacker:- A hacker with malicious or offensive intentions Gray...
What is Key-logger and how it works?
A keylogger sometimes called a spying software is a small program which is used to monitor a local or a Remote PC, keyloggers now a days are so easy to use that a person with even a basic knowledge of computers can use keylogger. Once a keylogger is installed in your computer. It can monitor each and every keystroke typed on your computer, thus you can see how dangerous a keylogger can be. Types of Keylogger: Hardware Keylogger Software Keylogger Hardware keyloggers are rarely used now a days since you can monitor a Remote computer but Software keyloggers are the most widely used keyloggers as some of them support remote installationwhich means that you can monitor any computer anywhere in the World. 1) Can the victim detect it’s presence once keylogger is installed in his/her computer? Well...
0 comments:
Post a Comment