Saturday, May 28, 2011

Chapter- 5 ( cyber law )

0 comments
Information Technology Act – 2000 Chapter-V************************************************************************************SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES14. Secure electronic record.Where any security procedure has been applied to an electronic record at a specific point...

Chapter- 4 ( cyber law )

0 comments
Information Technology Act – 2000Chapter-IV**************************************************************************************ATTRIBUTION, ACKNOWLEDGMENT AND DESPATCH OF ELECTRONIC RECORDS 11.Attribution of electronic records.An electronic record shall be attributed to the originator :(a) if it was...

Chapter- 3 ( cyber law )

0 comments
Information Technology Act – 2000Chapter-IIIELECTRONIC GOVERNANCE**************************************************************************************4. Legal recognition of electronic records.Where any law provides that information or any other matter shall be in writing or in the typewritten...

Chapter- 2 ( cyber law )

0 comments
Information Technology Act – 2000 Chapter-II***************************************************************************************DIGITAL SIGNATURE3. Authentication of electronic records. (1) Subject to the provisions of this section any subscriber may authenticate an electronic record by affixing...

Chapter- 1 ( cyber law )

0 comments
Information Technology Act – 2000Chapter-I*************************************************************************************MINISTRY OF LAW, JUSTICE AND COMPANY AFFAIRS(Legislative Department)New Delhi, the 9th June, 2000 / Jyaistha 19,1922 (Saka)The following Act of Parliament received the assent...

Thursday, May 26, 2011

11_FBI_Tools

0 comments
************** Tools: ************** Ads locater 2004 historian 1.4 mui cacheview 1.00 NetworkMiner 0.87 regripper 2.02 systemreport 2.5 usb-history r1 windows file analyzer 1.0 disk investigator 1.4 live view 0.6 WinPcap 4.02 DOWNLOA...

RAR Password Recovery Magic

0 comments
RAR Password Recovery Magic is a powerful tool designed to recover lost or forgotten passwords for a RAR/WinRAR archives. RAR Password Recovery Magic supports the customizable brute-force and dictionary-based attacks. RAR Password Recovery Magic has an easy to use interface. All you need to do...

Wednesday, May 25, 2011

Protect Files Using Empathy

0 comments
Empathy is a special utility allowing you to password-protect any executable file. Empathy can modify an EXE file so that it will require a password to run. Only a person knowing the password will be allowed to run the protected program. Protected files stay protected if you copy them to another...

3 Hacking Games Collection Free Download

0 comments
1).Where can you hack military organizations and massive businesses, empty their bank accounts and infect their systems without ever worrying about getting caught? If you didn’t guess the virtual world of games, then you need to be smacked because it says it in the title! I went out and got...

Using Chat Find Ip Adderss & Location

0 comments
1. www.chatrack.frihost.net2.Then Make An Account On this Site(it totally free)3.Then They Will give You A link,The Link Will Be used To Find The IP Of Any Person4.Then While Chatting You Can Give The Link To Any Person,And Say ThAt Its A site Cotaining Funny jokes or Your Own Made Animation..when...

Find FTP Servers

0 comments
The easiest search quote is "index of ..."Some kind of examples are:index of ftp/ +mp3index of ftp/ +divxindex of ftp/ +"whateveryouwant"Google has many operators that should help you to specify your searchUSE EMThere are also lots of advanced operators availablehere are a few:cache:link:related:info:stocks:site:allintitle:intitle:allinurl:inurl:eg:allintitle:...

What Is SQL injection???

0 comments
SQL Injection SQL injection is most common methodology employed by a hacker to exploit vulnerabilities in software applications. Vulnerabilities are basically weak links in the software that exposes unauthorized data/information to a user. SQL injection occurs when the user input is incorrectly...

Learn How To Hack Websites , Mysql Injection Tutorial

0 comments
SQL Injection in MySQL DatabasesSQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as...

Phishing ?

0 comments
Phishing is the process of stealing sensitive information, such as usernames, passwords, and bank information, by pretending to be someone you’re not. An example of this would be if you receive and e-mail from a hacker pretending to be your bank....

How To Find The Websites Having SQL injection Vulenerability

0 comments
So You Have Always Wondered That Sql Injection is such a nice approach in hacking a website but you must have not got any website that has login form having sql injection vulnerabilitySo heres the trick how to find one...just make a google search...

Tuesday, May 24, 2011

How To Enhance uTorrent Download Speed

0 comments
Lets get started. If you dont have Utorrent, Download it from here http://www.utorrent.com. Remember to increase torrent speed please disable firewall before you use it. Now Open it up and follow these screenshots tutorial:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------For...

VB SCRIPT TROJAN HORSE COLLECTION

0 comments
List:******************************************************************************[VB]bLACKdREAM[VB]derSphear[VB]Evoloution[VB]Monk1.0[VB]Omega1.1[Vb]Sect[Vb]SennaspyAutoTrojan[VB]stealth eye[VB]Ullyssealte susse codBasic Trojan HorseBlack DreamClientServerciccioCommandCenterControla MachineFearRATHandle-XMessiah...

Learn How To Hack Websites With LFIntruder (Lfi scanner)

0 comments
Hi all, i'd like to share some of my stuff with my blog visitors.It Will Help to scan websites for Lfi(Local File Inclusion) SnapShot: DOWNLOA...

Dangerous Google Searching E-BOOK

0 comments
DOWNLOA...

CREDIT CARDS PACKGES

0 comments
Hack credit cards ....... 5 software collection..... DOWNLOA...

Avhackers_Phisher_maker_3.1

0 comments
DOWNLOA...

500_Hacking_Tutorials

0 comments
DOWNLOA...

[JAVA] Some cool Javascripts for fun

0 comments
Here i will post some cool java tricks... copy the scripts in adress bar (plae where u type facebook.com ) and hit enter..1)This piece of code pulls off all the images from your web page and rotates them in a circle. Really makes any page go naked (without...

Facebook Image Dance Java Script

0 comments
Use this java script on ur facebook page ......CODE:***************************************************************************javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0;...

Hack ip

0 comments
okey guys i am new here and want to share the easiet way to get someone ip adrress.....okey we start......Step 1go to the url http://whatstheirip.com/Step 2: Enter your email address below and click "Get Link"Step 3: Send your friend the innocent looking...

Hacking,Sniffing,Scanning Websites

0 comments
Best Hacking Websites*********************************************************************************top 10 Password Crackershttp://www.oxid.it/cain.htmlhttp://www.openwall.com/john/http://freeworld.thc.org/thc-hydra/http://www.aircrack-ng.org/http://www.l0phtcrack.com/http://airsnort.shmoo.com/http://www.solarwinds.com/http://www.foofus.net/fizzgig/pwdump/http://project-rainbowcrack.com/http://www.hoobie.net/brutus/Top...

Windows Tricks

0 comments
[TRICK]Clean ur RAM by notepadClean Ur RAM--U may recognize that ur system gets slower and slower when playing and working a lot with ur pc. That's cause ur RAM is full of remaining progress pieces u do not need any more.So create a new text file on...