Before we get started, you should backup your system and your registry, so it’ll be easy to restore your computer if anything goes wrong........
Sunday, February 28, 2010
Defeat Keyloggers !
Keyloggers, an abbreviation for Keystroke Loggers, are a rather nasty tool used by hackers to invade your privacy. This tool can secretly capture all the keystrokes you make, every single mouse click, and virtually everything you do on the computer, which, when you think about it, is very scary.........
How to detect keyloggers
Keyloggers are software or spyware that record every keystroke you make typing on your PC. Some keyloggers are installed in order to capture your usernames and passwords, bank account numbers, credit card numbers, etc........
Saturday, February 27, 2010
How to use refog keylogger
Video tutorial on how to use, download refog keylogger Employee Monitor.......
How to find, use and fix Xss
Xss is a type of computer security vulnerability typically found in web applications which enable malicious attackers to inject client-side script into web pages viewed by other users........
How Pakbugs fucked Indian Prime Minister Manmohan Singh
Few days ago, we have noted that ICW have defaced few small Pakistani sites, so Pakbugs have responded with little hard.
Their Prime Minister's Private (Not official) site has been owned by Pakbugs. Here is the mirror........
Their Prime Minister's Private (Not official) site has been owned by Pakbugs. Here is the mirror........
Thursday, February 25, 2010
Hacking Mode
All you hackers out there that can actually hack, I got a question for ya! When you sit down, and are about to start hacking away at whatever, what gets you in and keeps you in the “hacking mode”? You know that place you get into where you have full concentration on the task before you and nothing can get in the way of you and the final outcome.........
Hackers steel Card Data
A growing emphasis by computer hackers on stealing payment card data from hotels and resorts and their increasingly sophisticated malicious software and attack methods are two highlights in a new report from security consulting and technology firm Trustwave Holdings Inc........
Hackers Steal Millions In Emissions Certificates
Credit card numbers? Please. Medical records? Booooring. The modern hacker knows that the real money’s in carbon emission trade credits. No, seriously: A recent phishing expedition of carbon-emitting companies in Europe, New Zealand and Asia reaped over $US4 million.........
Tuesday, February 23, 2010
How to Hide my IP 2010
Hide my ip + serial key, u can change your IP adress easy

Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you........
Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you........
How to perform Server Attack: Best ddos attacker!!!
Download here THE BEST ddos attacker! Server Attack .......
Monday, February 22, 2010
Pakistani Hackers Hacked www.google.co.ma !!!
Biggest Defacement Ever from pakistani Hackerz. Pakistan Zindabad !! ........
Saturday, February 20, 2010
How to Hack with hub and switch – sniffing
Let’s look at the difference between a hub and a switch and how one could attack them. Watch the video to see hubs and switches from a hacker’s point of view. Read the post for a more formal description. (sorry about the quality, still working on perfecting this video stuff)........
Friday, February 19, 2010
How Yahoo Messenger Monitor SNIFFER
Yahoo Messenger Monitor Sniffer is handy network utility software designed to capture and observe Yahoo Messenger conversations on all computers in a network. It is able to record conversations automatically in real time.........
Wednesday, February 17, 2010
Cyber hacking and sexual blackmail
British business executives dealing with China were given a formal warning more than a year ago by Britain’s security service, MI5, that Chinese intelligence agencies were engaged in a wide-ranging effort to hack into British companies’ computers and to blackmail British businesspeople over sexual relationships.........
Monday, February 15, 2010
How Conficker virus hits Manchester Police computers
Sunday, February 14, 2010
Hack a Mobile Phone Using Super Bluetooth Hack

Previously i've posted How to Remotely Shutdown a Computer With Cellphone. In this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v.1.8. This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian.........
Saturday, February 13, 2010
Stand-alone version of google Buzz
SAN FRANCISCO (Reuters) -Google Inc said it may create a stand-alone version of its Buzz social networking product but won't separate Buzz from its Gmail service, a linkup that has spurred controversy over privacy.........
Largest hacker training website shut down !!!
SHANGHAI (Reuters) - China has closed what it claims to be the largest hacker training website in the country and arrested three of its members, domestic media reported on Monday.........
Pakbugs Got Hacked
A web forum called www.pakbugs.com was one of those "underground" forums where people discuss hacking techniques and sell malware code, bank logins and stolen credit card numbers........
Tuesday, February 09, 2010
Hacker Training Website Shutdown
Three suspects behind the site, which provided prospective hackers with instructions on how to launch cyber-attacks and use malicious software, were arrested following the raid on the offices of "Black Hawk Safety Net" in Hubei province.
The state-run Xinhua news agency called the operation China's "biggest hacker training website" ........