Welcome to my site. Please CLICK HERE to give your opinions regarding this new look of "PCTipsbyAnu". Thanks for visiting.

Sunday, April 24, 2011

How to crack passwords (Password Cracking Guide)?

How to crack passwords (Password Cracking Guide)?

The goal is to unify all of the good information found in various bits and pieces into 1 large document. This document is for people who want to learn to the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE you attempted doing anything documented here. I do my best to... Read More »

Saturday, April 23, 2011

OpenSUSE vs Ubuntu

OpenSUSE vs Ubuntu

I tried Ubuntu, Kubuntu, OpenSUSE GNOME & OpenSUSE KDE and I've chosen for OpenSUSE GNOME, I prefer OpenSUSE KDE but the current KDE 4.1 is in my opinion way too unstable for daily use. Kubuntu is way too much neglected by Canonical and therefor stands no chance against the other three. It's way more unstable than OpenSUSE KDE, has less features and almostnothing... Read More »

How to install back track 3 onto usb?

How to install back track 3 onto usb?

In this post i'll provide you the way to install BackTrack into USB.... (By :- CODE MOBILE <codemobile@yahoo.com>) ... Read More »

How To Clear Your Memory Without Restarting?

How To Clear Your Memory Without Restarting?

If you run a windows computer you’ll know like many others than after a while your system will in doubt start running slow. Most people will restart their computer to remove and idle processes. But if there’s a simpler way, why restart every time windows decides it doesn’t like you today?  ... Read More »

Friday, April 22, 2011

What is Nesus and how to use it for scanning?

What is Nesus and how to use it for scanning?

Nessus is a great tool designed to automate the testing and discovery of known security problems. Typically someone, a hacker group, a security company, or a researcher discovers a specific way to violate the security of a software product. The discovery may be accidental or through directed research; the vulnerability, in various levels of detail, is then released to the security community. Nessus... Read More »

How to hack wireless hotspot within few seconds?

How to hack wireless hotspot within few seconds?

So, why write an tutorial regarding "Wireless Hotspot Hacks" that details how to perform hotspot hacks?  Some would say it is irresponsible and enables those with ill intent to hack unsuspecting victim's machines.  It really depends which way you look at it.  Would you rather be left in the dark on what types of attacks can occur, how they are performed and not... Read More »

How t get Rapidshare Premium account FREE?

How t get Rapidshare Premium account FREE?

Everybody wants a personal Rapidshare Premium account but not all can afford it. If you are one of those people who can’t afford it or don’t want to ask your parent to buy you one then there are only 2 ways of getting a Rapidshare premium account. ... Read More »

Linux : 10 tips n tricks...

Linux : 10 tips n tricks...

10 Tips and Tricks for Linux users..... ... Read More »

Wednesday, April 13, 2011

Amazing tricks of Windows....

Amazing tricks of Windows....

I tried some of them..........these really works....... ... Read More »

How to hack Wireless LAN network n get the passwords?

How to hack Wireless LAN network n get the passwords?

Here we are going to learn How To Hack a Wireless Network and Grab the Passwords of their mail’s Telnet sessions,FTP,HTTP and many more things.This is called “Man in the Middle Attack” .Man in the middle attack has been done by the help of a Sniffer .To day we are going Learn How to Implement a Sniffer in the LAN and Get the... Read More »

Make your Windows Genuine using Notepad...

Make your Windows Genuine using Notepad...

Make ur Windows Genuine using notepad!!!! ... Read More »

Tuesday, April 12, 2011

Linux : 10 tips n tricks...

Linux : 10 tips n tricks...

10 Tips and Tricks for Linux users..... ... Read More »

How to protect your computer from USB Virus?

How to protect your computer from USB Virus?

With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses. ... Read More »

How to bypass Firewall??

How to bypass Firewall??

Httptunnel creates a bidirectional virtual data path tunneled in HTTP requests. The requests can be sent via an HTTP proxy if so desired. This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and telnet or PPP to connect to a computer outside the firewall. ... Read More »

Monday, April 11, 2011

How to surf anonymously without a trace?

How to surf anonymously without a trace?

Whenever you surf the Web, you leave yourself open to being snooped upon by web sites. They can track your online travels, know what operating system and browser you're running, find out your machine name, peer into your clipboard, uncover the last sites you've visited, examine your history list, delve into your cache, examine your IP address and use that to learn basic... Read More »

How to recover data from damaged/scratched CD?

How to recover data from damaged/scratched CD?

A Problem with CD and DVD disc is it don’t last forever and also it’s sensitive. If the disc has your finger print or small scratches because of bad handling, chances are old disc players can’t read the disc properly. As for most modern disc players, it has error correction and can usually read through fingerprints as scratched surface. However, if your disc... Read More »

How to taking down a website (DDOS)?

How to taking down a website (DDOS)?

In this tutorial I will show you how to take down websites via DDoS. For this tutorial we will be using one of the most effective and one of the least known tools called ... Read More »

Sunday, April 10, 2011

How to disable harddisk with the help of Script (C++, Batch)?

How to disable harddisk with the help of Script (C++, Batch)?

Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also. ... Read More »

How to hack into Cisco Router?

How to hack into Cisco Router?

Warning: DO NOT use this to damage Cisco systems, or gain unauthorized access to systems. This tutorial is just something to use for educational purposes. Only use this information in a legal way (the hacker wargames for instance), and do not damage or destroy anything. This is a step-by-step guide on how a series of proven cisco exploits can be used to gain... Read More »

How to secure WiFi connection? How to Prevent WiFi hacking n their misuse?

How to secure WiFi connection? How to Prevent WiFi hacking n their misuse?

If you were jolted by the number of blasts that rocked the country sometime back, a police team knocking at your doors soon after could be even more shocking. With terror outfit Indian Mujahideen raising its ugly head time and again, using its signature style of hacking a WiFi connection to send out an e-mail claiming credit for a terror attack, don't be... Read More »

Steps to Securing Your Wireless LAN and Preventing Wireless Threats...

Steps to Securing Your Wireless LAN and Preventing Wireless Threats...

Wireless LANs (WLANs) bring incredible productivity and new efficiencies to organizations of all sizes. Advances in WLAN features and capabilities allow organizations to offer the benefits of wireless to their employees without sacrificing security. Properly deployed, WLANs can be as secure as wired networks. This paper discusses the five steps to creating a secure WLAN infrastructure. WLAN deployments have increased significantly in recent... Read More »

Website hacking tool...

Website hacking tool...

Do you want to Telnet or SSH to your website? In simple terms, Telnet and SSH allows you to remotely control your webserver so that you can easily change the file permissions of your web pages, create new files and do more. ... Read More »

Friday, April 8, 2011

Track down security problems in Linux...

Track down security problems in Linux...

Tiger is a collection of scripts, code and data files for tracking down security problems. It scans file systems and configuration files, checking for possible security issues. It's built around several dozen modules that check everything from guessable passwords to the presence of a rootkit. ... Read More »

How to hack Windows PC using Linux in seconds?

How to hack Windows PC using Linux in seconds?

In this tutorial i'll gives you the way to hack a Windows PC within seconds from Linux.... ... Read More »

How to control PC from Android Mobile?

How to control PC from Android Mobile?

Gmote is a cool Android Mobile App which turns Android Mobile into a remote control for a computer, allowing users to run movies and music at a distance. It supports all of the standard remote control features such as play, pause, rewind, volume controls etc. It also has a built-in file browser that lets you select what to play. ... Read More »

Wednesday, April 6, 2011

How to hack Facebook, Gmail, Yahoo, Twitter, Skype, Hotmail, Youtube Accounts ?

How to hack Facebook, Gmail, Yahoo, Twitter, Skype, Hotmail, Youtube Accounts ?

Hello in this guide I'm going to explain how you can know another person's password for ANY account he has! This guide is working and not a scam but its for educational purposes only! ... Read More »

How to capture/sniff WiFi traffic (In Linux)?

Its not tough to Hijack / Capture / Sniff Wifi Traffic on almost any network as long as you are connected to it. Once you apply all the correct tricks, all future traffic for Wifi clients i.e. laptops, mobiles will be routed from your PC, giving you every bit of information about what others are doing on the network. ... Read More »

How to see password behind start/asterisks?

How to see password behind start/asterisks?

Hello guys, I am going to show you in a short tutorial how to read out a password of a web browser. ... Read More »

How to crack a WEP key (With Windows)??

How to crack a WEP key (With Windows)??

In this tutorial i will give you the way/trick for hack the Wireless network WEP key... ... Read More »

Introduction to Hacking Email or any Website Accounts - Beginners Please Read

Introduction to Hacking Email or any Website Accounts - Beginners Please Read

Ok now that you have my attention :lp: Please read this guide that will burst your bubble, beginner hackers. I am sorry for that. You CANNOT hack emails or websites with just one or two clicks with some email hacking apps. You need to have proper information about the person that you are hacking. If you see sites that claim that they can... Read More »

Tuesday, April 5, 2011

PatchWorx v0.09 100% FUD [USG][CyberGate, IStealer, Spy-Net, DDoSer, ++]

PatchWorx v0.09 100% FUD [USG][CyberGate, IStealer, Spy-Net, DDoSer, ++]

[THIS POST IS POSTED BY 'CODE MOBILE' {codemobile@yahoo.com}] PatchWorx v0.09 - Runtime - Scantime - USG - EOF - FUD 100% ... Read More »

How to hack windows password with stealer (IStealer)?

How to hack windows password with stealer (IStealer)?

Istealer can be used to hack email account password and find passwords of various emails. I have provided link for software download... just read on. ... Read More »

How to bypass antivirus detection for RATs n Viruses (Crypter)?

How to bypass antivirus detection for RATs n Viruses (Crypter)?

hacker has to use Crypters to avoid antivirus detection for RATs. So, read on to know more on Crypters - hacking software for bypassing antivirus detections. I have provided link for software download. ... Read More »

Monday, April 4, 2011

Hacking tools for XSS and SQL Injection...

Hacking tools for XSS and SQL Injection...

Hacking tools n SQL Injection tools ... Read More »

USB sniffing on linux

USB sniffing on linux

The linux kernel has a facility called “usbmon” which can be used to sniff the USB bus. It’s been in there for ages, and the output isreally easy to collect, even from the command line shell. ... Read More »

How to use TRIAL SOFTWARE for forever?

How to use TRIAL SOFTWARE for forever?

Now we download stuff almost daily. New products pop out so often. Youcan use any software forever you want. You can download trial version,right. Trial version expires after some days. You can stop that expiration. You can tell trial version of the software tonot count days or do not bother about time. The software will stay& keep working like original software forever &... Read More »

How to make private browsing more private?

How to make private browsing more private?

Privacy features such as InPrivate browsing in Internet Explorer 8 and similar features in Chrome and Firefox promise to protect your privacy by not keeping track of page history, temporary files andcookies. This may be enough to hide your tracks from a beginner computer user but there are still traces of what sites you visit within the local DNS cache. An advanced user... Read More »

How to install a keylogger on a remote machine?

How to install a keylogger on a remote machine?

In my previous article “How To Make A Keylogger” I showed you how to write your own keylogger. Today I will show you how to install a Keylogger on a Remote PC without the knowledge of the owner and you will get all the keystroke information through Email. Note: This article is for educational purpose only and the author won’t be responsible for... Read More »

Linux Firewalls – Attack detection and response with iptables, PSAD, and FWSNORT.

Linux Firewalls – Attack detection and response with iptables, PSAD, and FWSNORT.

I seem to work best at night, it’s dark out, and generally quite dark inside too; there is more bandwidth because it is off peek, and in general there is nobody coming over or phoning and interrupting me. Incidentally, its also when I do the majority of my reading, at home; in bed, at night. Much more pleasant that way… PSAD Linux Firewalls... Read More »

How to Hack Someones IP Address?

How to Hack Someones IP Address?

Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives.... Read More »