Facebook has evolved into one of the hottest social networking website in the world. Here I post a simple trick to hack into any facebook account n also to hack in any remote pc... Here I am demonstrating using PRORATtrojan. Please make note that all these hacking tools andsoftwares are detected by antivirus. You have to uninstall or close your runningantivirus first.Step-1: Download... Read More »
Monday, November 22, 2010
How to use images for password in place of text password?
A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA). Take a look... Secure passwords have one big disadvantage: They are hard, and sometimes even impossible to remember, especially if different secure... Read More »
How to block an IP address?
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}IP blocking prevents the connection between a server/website and certain IP addresses or ranges of addresses. IP blocking effectively bans undesired... Read More »
Sunday, November 21, 2010
How to create a Virtual Private Network?
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Calibri","sans-serif";}Virtual private networks (VPN) letremote users connect back to corporate networks over encrypted links. Many VPNsare built with proprietary technology and can be tricky and expensive to setup. For a small business or... Read More »