Remove Cyber Snoop Manually

>> Sunday, February 28, 2010


Before we get started, you should backup your system and your registry, so it’ll be easy to restore your computer if anything goes wrong........

Read more...

Defeat Keyloggers !


Keyloggers, an abbreviation for Keystroke Loggers, are a rather nasty tool used by hackers to invade your privacy. This tool can secretly capture all the keystrokes you make, every single mouse click, and virtually everything you do on the computer, which, when you think about it, is very scary.........

Read more...

How to detect keyloggers


Keyloggers are software or spyware that record every keystroke you make typing on your PC. Some keyloggers are installed in order to capture your usernames and passwords, bank account numbers, credit card numbers, etc........

Read more...

How to use refog keylogger

>> Saturday, February 27, 2010

Video tutorial on how to use, download refog keylogger Employee Monitor.......

Read more...

How to find, use and fix Xss

Xss is a type of computer security vulnerability typically found in web applications which enable malicious attackers to inject client-side script into web pages viewed by other users........

Read more...

How Pakbugs fucked Indian Prime Minister Manmohan Singh

Few days ago, we have noted that ICW have defaced few small Pakistani sites, so Pakbugs have responded with little hard.

Their Prime Minister's Private (Not official) site has been owned by Pakbugs. Here is the mirror........

Read more...

Hacking Mode

>> Thursday, February 25, 2010


All you hackers out there that can actually hack, I got a question for ya! When you sit down, and are about to start hacking away at whatever, what gets you in and keeps you in the “hacking mode”? You know that place you get into where you have full concentration on the task before you and nothing can get in the way of you and the final outcome.........

Read more...

Hackers steel Card Data


A growing emphasis by computer hackers on stealing payment card data from hotels and resorts and their increasingly sophisticated malicious software and attack methods are two highlights in a new report from security consulting and technology firm Trustwave Holdings Inc........



Read more...

Hackers Steal Millions In Emissions Certificates

Credit card numbers? Please. Medical records? Booooring. The modern hacker knows that the real money’s in carbon emission trade credits. No, seriously: A recent phishing expedition of carbon-emitting companies in Europe, New Zealand and Asia reaped over $US4 million.........

Read more...

How to Hide my IP 2010

>> Tuesday, February 23, 2010

Hide my ip + serial key, u can change your IP adress easy



Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you........



Read more...

How to perform Server Attack: Best ddos attacker!!!



Download here THE BEST ddos attacker! Server Attack .......


Read more...

Pakistani Hackers Hacked www.google.co.ma !!!

>> Monday, February 22, 2010



Biggest Defacement Ever from pakistani Hackerz. Pakistan Zindabad !! ........




Read more...

How to Hack with hub and switch – sniffing

>> Saturday, February 20, 2010



Let’s look at the difference between a hub and a switch and how one could attack them. Watch the video to see hubs and switches from a hacker’s point of view. Read the post for a more formal description. (sorry about the quality, still working on perfecting this video stuff)........




Read more...

How Yahoo Messenger Monitor SNIFFER

>> Friday, February 19, 2010




Yahoo Messenger Monitor Sniffer is handy network utility software designed to capture and observe Yahoo Messenger conversations on all computers in a network. It is able to record conversations automatically in real time.........


Read more...

Cyber hacking and sexual blackmail

>> Wednesday, February 17, 2010


British business executives dealing with China were given a formal warning more than a year ago by Britain’s security service, MI5, that Chinese intelligence agencies were engaged in a wide-ranging effort to hack into British companies’ computers and to blackmail British businesspeople over sexual relationships.........

Read more...

How Conficker virus hits Manchester Police computers

>> Monday, February 15, 2010



Flash memory sticks
Greater Manchester Police (GMP) has been cut off from a national criminal database for more than three days because of a computer virus.........

Read more...

Hack a Mobile Phone Using Super Bluetooth Hack

>> Sunday, February 14, 2010


Previously i've posted How to Remotely Shutdown a Computer With Cellphone. In this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v.1.8. This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian.........






Read more...

Stand-alone version of google Buzz

>> Saturday, February 13, 2010

SAN FRANCISCO (Reuters) -Google Inc said it may create a stand-alone version of its Buzz social networking product but won't separate Buzz from its Gmail service, a linkup that has spurred controversy over privacy.........

Read more...

Largest hacker training website shut down !!!

SHANGHAI (Reuters) - China has closed what it claims to be the largest hacker training website in the country and arrested three of its members, domestic media reported on Monday.........

Read more...

Pakbugs Got Hacked

A web forum called www.pakbugs.com was one of those "underground" forums where people discuss hacking techniques and sell malware code, bank logins and stolen credit card numbers........

Read more...

Hacker Training Website Shutdown

>> Tuesday, February 09, 2010












Three suspects behind the site, which provided prospective hackers with instructions on how to launch cyber-attacks and use malicious software, were arrested following the raid on the offices of "Black Hawk Safety Net" in Hubei province.
The state-run Xinhua news agency called the operation China's "biggest hacker training website" ........

Read more...
Related Posts with Thumbnails

  © Blogger template Webnolia by Ourblogtemplates.com 2009

Back to TOP