Except as contained in this notice,the name(s) of the above owners shall not be used in advertising or otherwise to promote the sale,use or other dealings in this software without prior written authorization.The software is provided as is,without warranty of any kind,express or implied,including but not limited to the warranties of merchantablility,fitness for a particular purpose and non infringement.In no event shall the authors be liable for any claim,damages or other liability,whether in an action of contract,tort or otherwise ,arising from,out of or in connection with the software or the use or other dealings in the software.
We are not collecting any personal information of the user or are using it anywhere. None of the data is being collected by us, Everything is stored locally by this application.
rate us if u like this....
Getting started with HTML5 and CSS3
HTML is a hyper text markup language which is used to develop a web page .Any page you see in a internet is a mixture of html and css. HTML has many versions ,latest is html5 .In this post we will discuss how to learn html and css.
Read more
Windows 8 shortcut keys
I think ,now you all have windows 8 operating system in your computer. but the problem is that it's shortcut keys is quite different from the other operating system.So here are some windows 8 shortcut keys.
Read more
Install windows 8 and windows 7 on same pc
we all familiar with the upcoming operating system that is windows 8. Is windows 8 better than windows 7?? or am i comfortable with the new environment these are the question u have to ask to yourself.
Read more
Windows 8 introduction
This year we have a new operating system around us that is Windows 8,that is launching on 20th oct 2012.We all are excited to have a new operating system in our computer but i ask you one question have u ever think what's the new feature of W8? Why it is different from W7,and many other questions.In this post we are going to discuss about the new features of w8 and many other things.
Read more
How to shut down pc much faster
Many times when we don't have enough time or have to go somewhere urgently then we simply switch of our computer or laptop which may damage our hard disk.
What we can do in this case ? All of you would be just wondering that how much time our Computer would take to Shut Down ! Now what if our Computer takes time to Shut Down ?
We simply switch of it. But as we know that if Computer does not Shuts Down Properly then it may cause errors and may some time be Dangerous for the window,your window may be corrupt or harm.
We simply switch of it. But as we know that if Computer does not Shuts Down Properly then it may cause errors and may some time be Dangerous for the window,your window may be corrupt or harm.
Now There is a Solution for this
Read more
How to send data wireless to other pc
Need of making data transfer wireless is shown in figure given below :D
how to send a data(movie,software,pics,any other file)without connecting your pc to our friend.
Today i m going to tell u how to send a file (movie ,set up ,.exe file or any file )wirelessly.
Read more
How to increase a computer ram through a
pen drive
if your computer is running slow because of low Ram memory then don't be worry.
today i m gonna teach you how to increase your Ram memory without spending money.
which makes your computer faster and easy to access.
All you need is a pen drive.
Read more
Facebook hacking in 5 steps
In my previous post i told you about the Facebook hacking through a phishing page.
Now i m going to tell u how to hack a Facebook account in a very easy way...
Read more
How to hack windows7 password
By:Navprabhat Singh
Do u ever think to hack your friend windows password ?? I think u always think about it.Today i m gonna show you how to hack your friend windows password....
Read more
Data transfer at 50mb/sec speed
Have you ever notice that whenever you transfer your data.It's transfer rate will be approximately 15mb/sec.It takes a lot of time to transfer a movie or some large data.Now i m gonna show you how to transfer a data with a speed of 50mb/sec.
Read more
Hack windows password via live CD
Read more
Hide data behind the image -
Steganography
by:Navprabhat Singh
I think u work a lot to hide your data from your friend and parents,like your girl friend pictures and more over.U can do it via many ways.I am gonna show u how to hide data behind the image the image this process is called Steganography.Read more
Hack windows password part:2
by:Navprabhat Singh
In my previous posts i have posted about
and by simply using
to crack windows password.
The biggest disadvantage of the previous trick is that software is of large size so it might be difficult to download it in a short period of time.Now i am going to show you how to hack with windows password killer.This software is of small size but it will reset your victim's password.
and by simply using
to crack windows password.
The biggest disadvantage of the previous trick is that software is of large size so it might be difficult to download it in a short period of time.Now i am going to show you how to hack with windows password killer.This software is of small size but it will reset your victim's password.
Read more
How to crack winrar password
Usually when we download some application or software from the rapid share or media fire they all available in zip file,and even some of them locked with a password.Suppose your friend is hiding some private data from you by locking it with password and u want to see that stuff then don't worry.Today i m gonna show you how to crack winrar password easily.
Read more
How to see the deleted pictures of your crush
by:Navprabhat Singh
Generally we log in to our Facebook account to see our crush,her profile,pictures and many other things like her status etc etc.(I don't know about you but i do.)Suppose your crush deleted all her pictures
Now what should you do?
Read more to find out the method to view the deleted image of your crush.
Read more
How to know IP Address of Anyone
Usually there is a requirement of victims ip address is needed in most of the hacking methods ,even ip address play a vital role in hacking(except hacking softwares,crackers).
You can hack any computer through IP address .There are many techniques to do that.For this we have to know the IP address of our victim.Today i will show you how to know the IP address of anyone.
You can hack any computer through IP address .There are many techniques to do that.For this we have to know the IP address of our victim.Today i will show you how to know the IP address of anyone.
Read more
Angry birds Rio gold 2012 for PC fully
cracked
Now one of the world's popular game angry birds new version 2012 is available on internet and i brought you the link to download it's fully cracked version for free.Angry birds Rio gold 2012 is an awesome game and having a tremendous graphics as compare to it's previous version.
Read more
Hack Admin Password through Cain and Able Part 1
by:Navprabhat Singh
In my previous posts i taught you about how to hack windows password through various software like ophcrack and many more.The disadvantage is that these softwares are of large size say 350mb to 3gb,so mostly people ignore it .Now i am going to show you How to Crack windows password through Cain and Able software which is of 7 to 8 MB of size and faster as compared to others.
Read more
Expose your friend's email address of Facebook
We know that for hacking anyone Facebook password first we have to know about his/her facebook email id .Sometimes our victim hide the email id ,then it becomes quiet difficult to hack his password.
Now in this paper i will show you how to expose anyone email id of Facebook so that we have at least something about him to hack his Facebook password.This method is quiet easy and can not harm anyone as we just expose his email id not anything else.
Read more
Expose your friend or ARP Poisoning
by:Navprabhat Singh
ARP stands for Address Resolution Protocol.ARP acts as a layer over the internet protocol address(IP) and converts it in to a Media Access Control address (MAC address) or Ethernet Hardware Address (EHA).Understanding the concept of ARP is very important for exposing your friend because a potential exposer will be able to steal the data between two computers this is called Man In The Middle Attack (MITM).It can only be done through a software CAIN and ABLE.
Read more
Subscribe to:
Posts (Atom)
Post a Comment
Note: only a member of this blog may post a comment.