Remove Cyber Snoop Manually

>> Sunday, February 28, 2010


Before we get started, you should backup your system and your registry, so it’ll be easy to restore your computer if anything goes wrong........

Read more...

Defeat Keyloggers !


Keyloggers, an abbreviation for Keystroke Loggers, are a rather nasty tool used by hackers to invade your privacy. This tool can secretly capture all the keystrokes you make, every single mouse click, and virtually everything you do on the computer, which, when you think about it, is very scary.........

Read more...

How to detect keyloggers


Keyloggers are software or spyware that record every keystroke you make typing on your PC. Some keyloggers are installed in order to capture your usernames and passwords, bank account numbers, credit card numbers, etc........

Read more...

How to use refog keylogger

>> Saturday, February 27, 2010

Video tutorial on how to use, download refog keylogger Employee Monitor.......

Read more...

How to find, use and fix Xss

Xss is a type of computer security vulnerability typically found in web applications which enable malicious attackers to inject client-side script into web pages viewed by other users........

Read more...

How Pakbugs fucked Indian Prime Minister Manmohan Singh

Few days ago, we have noted that ICW have defaced few small Pakistani sites, so Pakbugs have responded with little hard.

Their Prime Minister's Private (Not official) site has been owned by Pakbugs. Here is the mirror........

Read more...

Hacking Mode

>> Thursday, February 25, 2010


All you hackers out there that can actually hack, I got a question for ya! When you sit down, and are about to start hacking away at whatever, what gets you in and keeps you in the “hacking mode”? You know that place you get into where you have full concentration on the task before you and nothing can get in the way of you and the final outcome.........

Read more...

Hackers steel Card Data


A growing emphasis by computer hackers on stealing payment card data from hotels and resorts and their increasingly sophisticated malicious software and attack methods are two highlights in a new report from security consulting and technology firm Trustwave Holdings Inc........



Read more...

Hackers Steal Millions In Emissions Certificates

Credit card numbers? Please. Medical records? Booooring. The modern hacker knows that the real money’s in carbon emission trade credits. No, seriously: A recent phishing expedition of carbon-emitting companies in Europe, New Zealand and Asia reaped over $US4 million.........

Read more...

How to Hide my IP 2010

>> Tuesday, February 23, 2010

Hide my ip + serial key, u can change your IP adress easy



Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you........



Read more...

How to perform Server Attack: Best ddos attacker!!!



Download here THE BEST ddos attacker! Server Attack .......


Read more...

Pakistani Hackers Hacked www.google.co.ma !!!

>> Monday, February 22, 2010



Biggest Defacement Ever from pakistani Hackerz. Pakistan Zindabad !! ........




Read more...

How to Hack with hub and switch – sniffing

>> Saturday, February 20, 2010



Let’s look at the difference between a hub and a switch and how one could attack them. Watch the video to see hubs and switches from a hacker’s point of view. Read the post for a more formal description. (sorry about the quality, still working on perfecting this video stuff)........




Read more...

How Yahoo Messenger Monitor SNIFFER

>> Friday, February 19, 2010




Yahoo Messenger Monitor Sniffer is handy network utility software designed to capture and observe Yahoo Messenger conversations on all computers in a network. It is able to record conversations automatically in real time.........


Read more...

Cyber hacking and sexual blackmail

>> Wednesday, February 17, 2010


British business executives dealing with China were given a formal warning more than a year ago by Britain’s security service, MI5, that Chinese intelligence agencies were engaged in a wide-ranging effort to hack into British companies’ computers and to blackmail British businesspeople over sexual relationships.........

Read more...

How Conficker virus hits Manchester Police computers

>> Monday, February 15, 2010



Flash memory sticks
Greater Manchester Police (GMP) has been cut off from a national criminal database for more than three days because of a computer virus.........

Read more...

Hack a Mobile Phone Using Super Bluetooth Hack

>> Sunday, February 14, 2010


Previously i've posted How to Remotely Shutdown a Computer With Cellphone. In this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v.1.8. This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian.........






Read more...

Stand-alone version of google Buzz

>> Saturday, February 13, 2010

SAN FRANCISCO (Reuters) -Google Inc said it may create a stand-alone version of its Buzz social networking product but won't separate Buzz from its Gmail service, a linkup that has spurred controversy over privacy.........

Read more...

Largest hacker training website shut down !!!

SHANGHAI (Reuters) - China has closed what it claims to be the largest hacker training website in the country and arrested three of its members, domestic media reported on Monday.........

Read more...

Pakbugs Got Hacked

A web forum called www.pakbugs.com was one of those "underground" forums where people discuss hacking techniques and sell malware code, bank logins and stolen credit card numbers........

Read more...

Hacker Training Website Shutdown

>> Tuesday, February 09, 2010












Three suspects behind the site, which provided prospective hackers with instructions on how to launch cyber-attacks and use malicious software, were arrested following the raid on the offices of "Black Hawk Safety Net" in Hubei province.
The state-run Xinhua news agency called the operation China's "biggest hacker training website" ........

Read more...

Joint Statement of Hacker-crew

>> Monday, February 08, 2010

“Joint statement of PCA (Pakistan Cyber Army) and Zombie_ksa(PAKbugs-crew)

PCA (Pakistan Cyber Army) and Zombie_ksa(PAKbugs-crew)comes into friendly terms with ICW (Indian Cyber Warriors,HMG) PCA (Pakistan Cyber Army) and Zombie_ksa (PAKbugs-crew) comes into friendly terms with ICW (Indian Cyber Warriors, HMG).   { Read Full Story }

Read more...

Download Free Focusrite Forte Suite

>> Friday, February 05, 2010


Focusrite Forte Suite

The Focusrite Forte Suite is a channel strip plug-in for
Pro Tools based on the now-legendary Focusrite Forte recording
console of the mid-’80s
(original price for Forte console: $1.5 million).
Read Full Story }

Read more...

Apple iPad will ship with camera?

>> Thursday, February 04, 2010

A few reports have surfaced today that the Apple iPad will likely launch with a camera, despite it  not being showed off during Apple's tablet unveiling last week. 

A screenshot from the event shows a dot above the screen that looks very much like a camera. A screenshot from the iPad emulator (via the SDK) shows the clear option to "take a photo." 

                                                                                                                { Read Full Story }

Read more...

What is Cracker

>> Tuesday, February 02, 2010

A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there.           { Read Full Story }

Read more...

What is Hacker ?

 Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems."
1) Eric Raymond, compiler of The New Hacker's Dictionary, defines a hacker as a clever programmer. A "good hack" is a clever solution to a programming problem and "hacking" is the act of doing it. Raymond lists five possible characteristics that qualify one as a hacker, which we paraphrase here:                        
                                                                                            { Read Full Story }





Read more...

Hacker Arrested, faces up to 40 years in prison




Cable modem hacker faces up to 40 years in prison
Matthew Delorey of Massachusetts has been arrested this week, accused of selling hacked Comcast cable modems that would allow buyers to have free Internet access.

Delorey has also been charged with one count of conspiracy and one count of wire fraud, each of which has a maximum sentence of 20 years and a fine of $250,000 USD. 

Read more...
Related Posts with Thumbnails

  © Blogger template Webnolia by Ourblogtemplates.com 2009

Back to TOP