Posts

Showing posts from March, 2016

 HOW TO USE TOUCHSCREEN ON YOUR LAPTOP OR DESKTOP 100% WORKING

Image
Hey Friends Today I M Going To Tell You How To Use Touchscreen On Your Laptop Or Desktop 100% Working   And Watch The Video If Its Good And You Want To Order This Go To The Link Another Link Given Below Http://Sh.St/Yxv8zz

CYBER CRIMES AND RULES ON INTERNET BE SAFE..

Image
As The Days Progresses Use Of Computers And The Internet Has Increased Rapidly Among People.With The Gaining Popularity Of Internet Or World Wide Web There Also Growth In Crime Specific To Cyber World.People Are Getting Smart Enough To Steal Some One Credential And Perform Various Action On That May Be Consider Bank Account Transaction Or Hacking Into Social Network. Everyone Who Uses The Internet Is A Potential Victim. In The Enforcement Of These Criminal Offenses, It Is Imperative To Incarcerate The Small Percentage Who Are Criminal Users And To Protect The Majority Of Users Who Are Innocent. There Is A Broad Spectrum Of Computer And Internet Crimes And They Are Often Covered By Both State And Federal Laws. Computer Offences Can Be Defined As A Crime In Which A Computer, Or A Network Of Computers, Are Used In The Commission Of The Crime. If An Individual Takes Advantage Of The Internet In The Commission Of A Crime, This Is Sometimes Called A Net-crime. The Direct Victim Of A Compute

PHP SCRIPT FOR PASSING BASIC AUTHENTICATION.

Image
This Php Shell Helps In Cracking Http Basic Authentication Password Cracking.Now Lets Come To The Real Topic What Exactly Basic Auth.  Http Basic Auth Cracker Php Script So In Order To Perform Http Transaction(Request- Response), Basic Access Authentication Is A Method For An Http User Agent To Provide A User Name And Password When Making A Request.After Providing Correct User Id And Password When It Is Asked.  Basic Auth Prompt It Will Allow You To Do The Http Request.So Our Objective Here Is How We Can Break It Or Get The Correct User Id And Password So We Can Do It With The Help Of Php Script And Brute Force Attack. You Can Brute Force Any Panel Which Is Using Basic Authentication Using This Script Download Link Here Procedure Is Very Simple You Need To Supply Link Where Htaccess Is Implemented , Username List And Password List  Provide Possible Username And Password List And Click "Lets Hex This Shit" Button If Password Is Weak Or In Your Password List, You Will Get S

HOW TO LOCK FOLDER IN WINDOWS ??

Image
1. Open Notepad And Copy Code Given Below Into It.     cls     @ECHO OFF     title coolhacking-tricks.blogspot.com     if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK     if NOT EXIST MyFolder goto MDMyFolder     :CONFIRM     echo Are you sure to lock this folder? (Y/N)     set/p "cho=>"     if %cho%==Y goto LOCK     if %cho%==y goto LOCK if %cho%==n goto END if %cho%==N goto END echo Invalid choice. goto CONFIRM :LOCK ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" echo Folder locked goto End :UNLOCK echo Enter Password To Unlock Your Secure Folder set/p "pass=>" if NOT %pass%== coolhacks goto FAIL attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder echo Folder Unlocked Successfully Go

HOW TO MAKE YOUR COMPUTER LIKE JARVIS...??

Image
MAKE YOUR COMPUTER LIKE JARVIS FROM IRON MAN MOVIE CLICK ON THE LINK GIVEN BELOW AND LEARN HOW TO DO THAT DONT FORGERT TO SHARE MY VIDEO AND LIKE MY CHANNEL

IPHONE 6S, 16GB CHEPEST (EXPIRED)

Image
Iphone 6s, 16gb Chepest Ever For At Price :- 31818/- Only Direct Link :- http://sh.st/TKFj0

HACKING FOR BEGINERS PART :2

Image
Step 1: Change Directory (Cd) We can change directories in multiple ways with  cd . As I showed you in  my previous article , we can use  cd ..  to move up one level in the directory tree. We can also move directly to the root directory by typing  cd /  or move to our home directory by  cd ~ . More often, we will use  cd  to move to a directory by using the absolute path of the directory. This mean that we write out the entire path of the directory we want to move to after  cd . We can also move to the directory by using the relative path of the directory. This means that we don't need to write the entire path, but simply use the path that we're currently in and append to it. Let's look at some examples. Let's say we're in our root user directory in  BackTrack  and we want to move to the  aircrack-ng  directory (we'll be doing some aircrack tutorials soon). We can simply type: bt > cd /pentest/wireless/aircrack-ng This will take us directly

HACKING FOR BEGINERS PART :1

Image
A number of you have written me regarding which operating system is best for hacking. I'll start by saying that nearly every professional and expert hacker uses Linux or Unix. Although some hacks can be done with Windows and Mac OS, nearly all of the hacking tools are developed specifically for Linux. There are some exceptions, though, including software like  Cain and Abel , Havij,  Zenmap , and  Metasploit  that are developed or ported for Windows. When these Linux apps are developed in Linux and then ported over to Windows, they often lose some of their capabilities. In addition, there are capabilities built into Linux that simply are not available in Windows. That is why hacker tools are in most cases ONLY developed for Linux. To summarize, to be a real expert hacker, you should master a few Linux skills and work from a Linux distribution like  BackTrack  or Kali. Image via  wonderhowto.com For those of you who've never used Linux, I dedicate the next few