Showing posts with label Hacking Tutorials. Show all posts
Showing posts with label Hacking Tutorials. Show all posts

How To Hack Closed PC On Cyber Cafe



    1. As you all must have know these days all Cyber cafe owners have a program for administration to control all PC’s in local area network. So all files can be inter transmitted.
2. First of all press Ctrl+Alt+Del the task manager or any controlling application, will open. Then from APPLICATIONS select the program that is controlling all PC’s  & terminate it, This is for security reason. Now log of PC, & you ll get user names of the PC.
3. But some times, cyber cafes have security clients installed that have restricted access to Task Manager, restart the computer & press F8 continuously before windows boots.
The Menu will open, select Safe Mode from it. And now you can copy files from networked PC’s without any  security layer.

How To Hack Closed PC On Cyber Cafe


         You’ve read the reviews and digested the key feature enhancements and operational changes. Now it’s time to delve a bit deeper and uncover some of Windows XP’s secrets.
1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type ‘systeminfo’. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type ‘systeminfo > info.txt’. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

15 Tips to Improve your Linux Experience

     The beauty of Linux is in users ability to do large amount of customization to have a unique user expereince. So today we will look in to some tips for a “better” Linux experience. The term here is relative, because what works for me might seem a distraction for some or plain annoying to others; some of this “tips” might appeal to beginners, while advanced users might find it too easy. Hopefully some of these tips will be helpful to some of you.
1) Turn on your computer remotely by sending “magic network packets” to WakeOnLan supported network cards. This can be very helpful if you run a server at home but only access it occasionally. There is no need for you to have the server running all the time.
2) If you dual boot with windows, accessing Linux file system from your windows installation might be important for you. There are three windows applications that can help you do this: Explore2fs, Ext2 Installable File System, DiskInternals Linux Reader.

10 ways to Tweak your Linux Boot Process


     Linux rarely needs to be rebooted But when it does, it’s often slow to boot. Fortunately, there are ways to speed things up. Some of these methods are not terribly difficult. (although some, unfortunately, are). Let’s take a look.
#1: Disable unnecessary services

Depending upon the use of the machine, plenty of services won’t be needed. Using Linux just for a desktop? Then you won’t need sendmail, httpd, and many other services. If your server is only a Web server, you can shut off many services as well. To do this, you can go to the Administration menu and take a look at the Services entry. Just deselect all of the services you don’t want to start.
#2: Disable unnecessary kernel modules

Hack for Free Airtel GPRS

     After a Lot of research we have found another hack for free Unlimited GPRS for Airtel live users. The new trick for Airtel free internet is as simple as installing a software on your Cell phone. Actually the trick is to install a Mobile Web Browser called Teashark or Ucweb on your Cellphone.
Follow the steps below for unlimited mobile browsing.

Latest(2009) Hack for Free Airtel GPRS

     After a Lot of research we have found another hack for free Unlimited GPRS for Airtel live users. The new trick for Airtel free internet is as simple as installing a software on your Cell phone. Actually the trick is to install a Mobile Web Browser called Teashark or Ucweb on your Cellphone.
Follow the steps below for unlimited mobile browsing.

Reboot Linux using simple fork


       We all know that the simplest function in Linux is fork(). The fork is used create a child process which is an exact copy of the calling process (parent process). You might be thinking how can such a simple function reboot a linux machine. Well I must tell you that the program I am going to discuss today uses only this fork  function and can force a Linux Server which can serve as many as 100 computers to get rebooted. I have tried this on my College’s Linux Server which Serves more than 200 computers at a time and I was lucky to get out of this situation.

5 Myths about Internet Safety


    “Internet Safety” the term has been getting vague with the increasing virus outbreaks nowdays. PC Magazine once conducted a survey in which they asked the participants to rate their broadband ISP services and the results were astonishing. Most of users didn’t completely understand the seriousness of potential threats or how to protect their PCs. Here are the top 5 Myths about safe surfing over internet.

Installing a Keylogger on a Remote Machine


Hello friends,
    In my previous article 'How To Write A Basic Keylogger In VB' I showed you how to write your own keylogger. Today I will show you how to install a Keylogger on a Remote PC without the knowledge of the owner and you will get all the keystroke information through Email.
Note: This article is for educational purpose only and the author won’t be responsible for any kind of damage caused by following the information given in this article.
Now to install a Keylogger on a Remote Computer you have to follow the steps given below:

Mapping The Network Of A Victim Organization


    First of all I would like to wish Happy Birthday to Hacking Truths which is celebrating its second successful year on web, & you can win great prizes check out our special contest details here.
So lets get back on the hacking thing, as we discussed about how you can get information about your victim with the help of Passive Attack Gathering. Now what you have to do with this information ? The next step is known as Network Mapping.

How to Hack into a Security Camera

 
  This is really interesting article. Well this is not really hacking. All what we are looking at are  unsecured cams from around the world that are interfaced with the internet. So how do you find such cams. Just google these strings and select the results.What to do next need not have an explaination.
  • inurl:”CgiStart?page=” 
  • inurl:/view.shtml
Related Posts with Thumbnails