To have a single name or to remove your last name on facebook, follow these steps. 1) Open Firefox browser, and go to Otions>Advanced...
How To Dual Boot Ubuntu With Windows (EFI Booting)
So, many of you might be having problems on dual booting windows and ubuntu on a EFI enabled machine. Well this is because the grub bo...
Bypassing Kaspersky Antivirus Password.
So, sometimes when you visit a website which allows us to download hacking tools and warez, Kaspersky antivirus and other antiviruses bl...
Hacking Humans ~ Social Engineering
Did you know that humans get Hacked as much as computers? It is called social engineering and it has been happening long before computers ...
Resetting The BIOS Password.
Whats is BIOS? BIOS Stands for B asic I nput O utput S ystem. The BIOS is the first thing you see when you turn on your compute...
How to Hack Windows Passwords.
In this article, i will tell you how to break into a windows PC and how to bypass the password. There are methods you can try to break ...
Windows Backdoor Password Reset
Alright so in this tutorial i will show you how you can change windows administrator account. but before that i want to tell you that th...
Facebook 3 Different Passwords
Well, this is not actually a hack or something, but just thought to post this information with you guys. Do you know that you can access t...
USB Password Stealer
So, it is common that most of the keeps there passwords saved in their browsers, well this is very helpful so that they don't have to w...
Keylogging
Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. ...
Facebook Phishing
How to hack a facebook account by phishing: Facebook phishing is the most common and easiest way we can hack a facebook account. ...
How To Hide IP Address
How do I hide my IP address? The most common method to hide your IP address is to use a proxy server in one form or another. A proxy ...
Session Hijacking ( cookie stealing )
First of all, before going any further you have to understand what a cookie is. So what is a cookie? a cookie is a small piece of informati...
Use your USB stick as RAM
Have you ever thought that you can use your USB pen drive as your computer's RAM? I will tell you how to do this. It is very very simpl...
Keep Your Mobile Phone Secured.
Treat your smart phone like your wallet - keep it safe and on your person at all times. Remember it's not 'just a phone' ...
Man In The Middle Attack ( MITM - Basic )
Man In The Middle Attack, is when a attacker sits in the middle of a network and captures all the packets transferred between two computers...
Hack Your Broadband
First, Download a Port scanner, I prefer Advance Port Scanner, download it from here ( Download Link ).
Remote Administration Tools (RATs)
A Remote Administration Tool, or a Remote Access Trojan, commonly known as a RAT is a Trojan Horse, once installed on a server, it ...
DoS Attack With Windows Command Prompt
How to Dos a website with just using CMD? Here are the steps. 1) First find the IP Address of the remote website using the Ping, Tracert...
Unix Tutorial 8
8.1 UNIX Variables Variables are a way of passing information from the shell to programs when you run them. Programs look "in the ...
Unix Tutorial 7
7.1 Compiling UNIX software packages We have many public domain and commercial software packages installed on our systems, which are ...
Unix Tutorial 6
Other useful UNIX commands quota All students are allocated a certain amount of disk space on the file system for their personal fi...
Unix Tutorial 5
5.1 File system security (access rights) In your unixstuff directory, type % ls -l (l for long listing!) You will see that you now ...
Unix Tutorial 4
4.1 Wildcards The * wildcard The character * is called a wildcard, and will match against none or more character(s) in a file (or d...
Unix Tutorial 3
3.1 Redirection Most processes initiated by UNIX commands write to the standard output (that is, they write to the terminal screen), ...
Unix Tutorial 2
2.1 Copying Files cp (copy) cp file1 file2 is the command which makes a copy of file1 in the current working directory and calls it fi...
Unix Tutorial 1
1.1 Listing files and directories ls (list) When you first login, your current working directory is your home directory. Your home d...
Basics Of UNIX
What is UNIX? UNIX is an operating system which was first developed in the 1960s, and has been under constant development ever since...
Basics of SQL injection and Manual SQL injection tutorial
This time we have manual SQL tutorial , we know there are lots and lots of tools for SQL injection but manual SQl injection is the best w...
BotNets
What is a botnet? A botnet is a collection of infected computers under the control of one or more attackers. These botnets are used for...
What is a webserver?
A web server can mean two things - a computer on which a web site is hosted and a program that runs on such a computer. So the term web s...
E-Mail Bombing
Email bombing is characterized by abusers repeatedly sending an email message to a particular address at a specific victim site. In...
DENAIL OF SERIVCE
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network...
Backdoor Shells
A backdoor shell is a malicious script used to gain access to a server. You can either upload a backdoor shell to a server or include it r...
Cross Site Request Forgery ( XSRF )
Cross Site Request Forgery ( CSRF ) also known as XSRF is a type of attack where the attacker tricks the user's web browser. to be m...
Remote File Inclusion ( RFI )
Remote file inclusion is one of web application vulnerability . Using this vulnerabilitiy an attacker can include their remote file suc...
What Is Social Engineering?
Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves...
Log on Automatically to Windows 7 & Windows 8 Without Typing Your Password
In this article I will show you how to setup Windows 7 and Windows 8 so that it will log you in automatically, withou...
Password Security - Turn Your Dumb Habits Into Geek Habits
When it comes to computing habits, people are always bad at security and passwords. We keep reusing the same password(s) over and over ...
Best Practices on How To Make Safe Banking & Financial Transactions Online
Transactions from a computer connected to a trusted network. If you are connected to a trusted network such as the one from your home o...
25 Internet Security Tips
Only The Paranoid Survive is a tract on corporate fundamentals penned by Intel's ex-Chairman Andy Grove. The words should, however,...
12 Tips to Maintain a Virus Free Computer
Is your computer infected with virus? Do you often get mysterious error messages? Well, this is a common problem faced by almost all the ...
How Domain Name System (DNS) Works
In the world of Internet and the area of computer networks, you will often come across the term Domain Name System or Domain Name Service...
New features added to Acunetix Web Vulnerability Scanner 8 Build 20120911
New Features and Security checks has been added to the new build 20120911 of Acunetix Web Vulnerability Scanner 8. Also, number ...