Many modern cell phones can take pictures and short video clips. This is great for taking candid photos and sharing them with friends and family at a later time. Modern cell phones also commonly have replaceable themes and ringtones, which are, in essence, 30-second audio clips. On newer phones, ringtones often are MP3 files, replacing older, nonstandard formats. According to many wireless providers,... Read More »
Monday, February 28, 2011
How to run internet service using IDEA/AIRTEL/BSNL using Huawei E156g wireless USB modem (Dongle)?
Running wireless internet services of BSNL/Airtel/Idea using Huawei E156G 3g Wireless USB Modem (Dongle) on Linux (all distributions) Huawei E156G 3G Wireless HSDPA USB modems (dongles) are very easy to install in Windows Operating System but many may find it difficult to operate it in Red Hat Enterprise Linux Client Edition 5.x. These dongles whether it comes packaged with BSNL, Airtel or Idea simcards... Read More »
How to control a remote computer with keylogger (Lost Door)?
Remote Administration tools also known as RAT are windows Trojans or in simple terms programs used by a Hacker to get administrative privileges on the victim’s computer. Using a RAT you can do a lot of cool things such as “Upload, delete or modify data” , “Edit registry”, “Capture victim’s screen shot”, “Take control of victim’s Computer”or “Execute a virus” just with a... Read More »
Sunday, February 27, 2011
How to make free call to any mobile number in World?
Well this is not any hack of mobile services but instead a legitimate way of making a free call to any number in world.This can be a real helpful if you do not have any account balance in your mobile and you need to make a urgent call. This is the right time movibox can help you out.So what you will get with... Read More »
Send anonymous e-mails... (Anonymous mailer software)
Have you ever had the need to send completely anonymous emails to someone? Perhaps you were trying to hack someones email password by sending him a phisher link. Acctually Anonymous Mailer software is very useful in Phishing where you have to send anonymous email to victim and make him login to his account using our sent phisher link.Anonymous Mailer is an Award winning... Read More »
How To Send a Self Deleting SMS?
In this post i will tell you how to send a self deleting SMS to any mobile that is automatically deleted after user reads it.Basically this technique is called SAFE-TEXT. It's a technique where a message destroys itself after being read. If you want to call it the Data-centric Suicide Message, that's fine too. This is a website that allows you to send... Read More »
How to make your own anonymous email service?
Do you want to send an email anonymously because, for example, you fear your views might not be appreciated by your boss? When avouching your opinion in public — critically important under more favorable circumstances — is unhealthy, anonymity becomes vital. Here i will show you how to setup your own anonymous email service. I am writing this post because there are some... Read More »
How to send anonymous sms without regstration?
There are a lot of websites on the Internet that provides free sms services but only handful of them allows you to send Sms without registration and anonymously. In this post I will review the services of 4 sms websites that allows you to send Anonymous messages.1. Smsti.inSmsti.in allows you send message of complete 160 words and without any ads. There message service... Read More »
Basic needs for hacking...
You learn about computers - in as much detail as you can- now most people willl disagree with this but the first thing you should do is learn HTML this way you will know 'how to make decent websites'. You may wonder why? because hacking is knowing ecverything about a cpmputer an using that knowledge to get what you want. Now after you have done... Read More »
Credit Card Generator...
If you just need a bunch of numbers use the online credit card number generator. That page is generated by an online version of this script. The program here will only be useful to you if you know what one of Python, Java, C#, PHP or Javascript are, and how to run a program in one of them. Command line Python program, Java... Read More »
Weakness of Linux OS...
What Are The Vulnerabilities?The main vulnerability of Linux OS is that anyone can access the code of the operating system. And, if you are not savvy enough with the programming code like hackers are. You only need to search for the correct free Linux hacking tool and you will be able to get inside in no time. The other problem is that many... Read More »
Wireless hacking tools...
Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant to be comprehensive in nature but rather to provide some general guidance on recommended tools to build your toolkit.Locating a wireless... Read More »