Hi guys, today i'm introducing you a script that looks like simple but works as a WWE player... Amazing Script With All Browsers Support:- Copy And Paste Script into Your Web-browser Address barjavascript:functionShw(n) {if (self.moveBy) {for (i = 35; i > 0; i–) {for (j = n; j> 0; j–){self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0);} } }} Shw(6) ;) ... Read More »
Friday, December 31, 2010
Hacking tools : Type of hacking? What is DDOS? Tools for DDOS?
Adenial of service (DoS) attack is an attack that clogs up so muchmemory on the target system that it can not serve it’s users, or itcauses the target system to crash, reboot, or otherwise deny servicesto legitimate users.There are several different kinds of dos attacks asdiscussed below:-1) Ping Of Death :-The ping of death attack sends oversized ICMP datagrams (encapsulatedin IP packets) to... Read More »
How to hack into unprotected remote webcams via google?
In this post Iwill show you how to use a simple Google Hack to access unprotectedwebcams online.There are thousands of unprotected webcams availableonline, Since many Webcams use known protocols to transmit live videostreams over the web, it's often very easy to search for publiclyaccessible webcams.1. First of all open your Internet browser and visit Google.com2. Search on Google for the following Keyword "inurl:/view.index.shtml"3.... Read More »
How to hack remote pc via cookie? (How to make your own cookie looger for hacking?)
Cookies stores all the necessary Information about one’s account ,using this information you can hack anybody’s account and change hispassword. If you get the Cookies of the Victim you can Hack any accountthe Victim is Logged into i.e. you can hack Google, Yahoo, Orkut,Facebook, Flickr etc. What is a CookieLogger?A CookieLogger is a Script that is Used to Steal anybody’s Cookies andstores it into... Read More »
How to use Google for hacking? (Google hacks)
Google search engine can be used to hack into remote servers or gatherconfidential or sensitive information which are not visible throughcommon searches.Google is the world’s most popular and powerfulsearch engine. It has the ability to accept pre-defined commands asinputs which then produces unbelievable results.Google’s Advanced Search Query SyntaxDiscussedbelow are various Google’s special commands and I shall be explainingeach command in brief and will... Read More »
How to hack remote linux computer/server? (Hack remote pc...)
This article is intended to show youhow to hold onto root once you have it. It is intended for hackers andadministrators alike. From a hacking perspective, it is obvious what good thispaper will do you. Ok..... You've been at it for allnight. Trying all the exploits you can think of. The system seems tight. Thesystem looks tight. The system *is* tight. You've tried everything. Defaultpasswds, guessable passwds, NIS weaknesses,... Read More »