Tuesday, 22 March 2011
Sunday, 20 March 2011

What exactly can someone tell from your IP address and what can they do with it? Can they find personal details or my precise geographical location?
•
In most cases your IP address is very easy to determine. But how much it says about you, specifically, depends on your ISP and what kind of IP address you have.
•
Finding someone else's...
Sunday, 20 March 2011 by Sayeed · 0

The Main point to become a hacker and safe your self
Never Disclose your Identity:
Never tell any body that you are a hacker even your friends or your relatives,you must keep it a secret
Use Proxy:
Never hack without a proxy
Be Careful:
Never let FBI enter your house without a search warrant.
Never Hack from your home:
Never hack from...
by Sayeed · 0

Make your Windows XP with Service Pack 2 geniune. Im not sure if this works on SP3.
Follow these step to Make your windows XP genuine
Step 1:
Click Start and then goto run and type ‘regedit’
Step 2:
Registry window will be opened, Then Go to
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer
and double...
by Sayeed · 0
Saturday, 19 March 2011

In this article I will tell you to use a great peice of software Email Tracker pro to trace an email, Email tracker pro can trace and track email back to the senders location. Stop SPAM email and phishing email with email tracker pro. The latest version of Email tracker pro is V9, however the program is not free and you will not find many...
Saturday, 19 March 2011 by Sayeed · 0
Friday, 18 March 2011

Basically we face this problem while installing the windows some tome the Boot file is missed and this shows the error as show below in the pic to solve this problem read the article
Insert the Windows DVD of Windows7/Vista in your system then follow these steps:
Boot off the Windows Vista DVD and then click Next at the first prompt:
You...
Friday, 18 March 2011 by Sayeed · 0

Every day, a lot of people contact me about suspecting their boyfriend or girlfriend of cheating, and ask me how to hack their Yahoo password so as to find out the truth. If you are in a similar situation and wondering to know how to hack a Yahoo password, then this is the post for you. In this post, I will uncover some of the real and...
by Sayeed · 0
Thursday, 17 March 2011

WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded...
Thursday, 17 March 2011 by Sayeed · 0

JUST FOLLOW THE PROCESS STEP BY STEP AND MAKE YOUR BOOTABLE PENDRIVE
1. Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it as bootable.
2. Open elevated Command Prompt. To do this, type in CMD in Start menu search field and hit Ctrl + Shift + Enter....
by Sayeed · 0
Subscribe to:
Posts (Atom)