The incredible amount of information continuously leaked onto the Internet, and therefore accessible by Google, is of great use to penetration testers around the world...
Wednesday, December 29, 2010
Friday, December 24, 2010
Wireless Internet Connections Hacking
Have a laptop, or a wireless internet card in your PC? Have you ever been in the position that where you lost your WEP / WPA key, and you interested on retrieving it back? Well with Aircrack you can.
Monday, December 20, 2010
Destructive Hacker Attacks In The Past 25 Years
From a computer virus named for a stripper to swarming botnet attacks on the Pentagon and Microsoft, The Daily Beast lists the 10 most infamous hacks, worms, and DDoS takedowns in the last 25 years....
Saturday, December 18, 2010
Hack Gears of War 3 in Bulletstorm : Epic Edition
If you want your shoulderpads big and your quipping brosome, you'll surely want to pick up the Xbox 360-exclusive 'Epic Edition' of Bulletstorm, which was announced today... as it'll grant you early access to the Gears of War 3 public beta, that's 50% more bicep....
Threads to PlayStation Network
Security issues with the online PC PlayStation Store may have allowed the unauthorized access of personal account information, Sony Computer Entertainment announced on the official UK and US PlayStation sites....
Friday, December 10, 2010
Pentagon Whistleblower talk about Wikileaks
Pentagon Whistleblower Daniel Ellsberg on Wikileaks Iraq War Docs....
Amazon servers banned WikiLeaks
WikiLeaks – the organization behind one of the largest diplomatic data dumps in history – was ejected from Amazon cloud-based servers, apparently under pressure from US politicians...
Wikileaks Donations Blocked by Paypal
PayPal has posted a statement to its website, saying: "PayPal has permanently restricted the account used by WikiLeaks due to a violation of the PayPal Acceptable Use Policy,...
Sunday, December 05, 2010
Google on Risk by Chinese Hackers
Contacts told American diplomats that hacking attacks against Google were ordered by China's top ruling body and a senior leader demanded action after finding search results that were critical of him, leaked U.S. government memos show....
How to Enable/Disable Window Animations
Turn Off Animations for Individual Users :
- [Start] [Run] [Regedit]
- Registry Key: HKEY_CURRENT_USER\Control Panel\Desktop\WindowMetrics
Hack internet Explorer 8 speed
When a user starts Internet Explorer is one of the most common performance issues seen with Internet Explorer 8. The primary cause of this problem is third-party add-ons that were either preloaded on a new computer or bundled with other software and installed over time....
Thursday, November 25, 2010
Get Hacked Iphone Apps : Install Apps with Installer.app and AppTapp
I am amazed at the pace of iPhone hacking. Even a week ago, you’d see multi-step guides to installing apps on an iPhone. Now there’s a program (Installer.app) with a front-end called AppTapp that does everything in a nice graphical user interface (GUI) for you....
Monday, October 25, 2010
Wifi networks being hacked in 5 seconds
A study conducted recently has found that nearly 50 per cent of Wi-Fi networks could be hacked. The study conducted in six cities and derived that out of 40,000 Wi-Fi network nearly 20,000 did not have passwords assigned to them....
Tuesday, October 12, 2010
Hack a Computer in an Action Movie
Being the hero in an action movie isn't all about kicking evil in the teeth, leaping away from explosions, and making glamorous love while a hit single plays delicately in the background...
Tuesday, October 05, 2010
How to Hack Apple TV
I decided to limit myself to just a couple of hours of Apple TV hacking this morning as I have books that need writing, children who need feeding, a house that needs cleaning and, lord almighty, you wouldn't believe the laundry.....
Monday, October 04, 2010
How most wireless LANs Hacked in minutes!
Even after two years of WPA certification and nearly one year after802.11i ratification, you might be wondering why I’m still talking aboutWEP encryption.....
Saturday, October 02, 2010
Hack Your Android Phone
Do you want to take control of your Android phone? By "rooting" your device, a process similar to jailbreaking an iPhone, you can install custom ROMs (images), which add stability and speed improvements to Google's mobile operating system.....
Friday, August 27, 2010
Internet threat: Hackers swarm bank accounts
The new trojan programs — which wait on your hard drive for an opportunity to crack your online banking account — are different from traditional "phishing" e-mail scams that try to trick you into typing your login information at fake bank websites...
Hack Paypal account To Get Money $$$
This is how to hack the paypal accounts hurry before it's to late and paypal chanes the bots again.
This is the new bot and everything you need to know to get into paypal. My buddy who works for paypal told me about the new bots and all so yah
This is the new bot and everything you need to know to get into paypal. My buddy who works for paypal told me about the new bots and all so yah
Hacking Godfather ‘Maksik’ Sentenced to 30 Years by Turkish Court
A Ukrainian cybercrime lord linked to nearly every major breach of U.S. retail networks in the past four years was sentenced this week to 30 years in prison by a Turkish court. His sentence was on unrelated charges of hacking banks in that country, according to reports...
How PIN Crackers Nab Holy Grail of Bank Card Security
Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator. The attacks involve both unencrypted PINs and encrypted PINs that attackers have found a way to crack, according to an investigator behind a new report looking at the data breaches...
4 Hackers Indicted in $9.5 Million Bank Card Attack
Four men have been indicted in Georgia on charges that they hacked into the Atlanta-based bank card processing company RBS WorldPay. They allegedly used an army of flunkies to steal $9.5 million in cash from ATM machines around the world in a span of hours...
Thursday, August 05, 2010
How to Hack Computer inside LAN Network
This technique will be taking advantage of Port 139. Most of the time,Port 139 will be opened in the computer. First of all, we will do a port scanning at the target computer which is having IP....
Tuesday, August 03, 2010
Indian Hacker Hacked 2 Pakistani Websites
Indian Hacker Crazy009,a Member of Freehacking Team hacked 2 more pakistani wensites.
Darson Securities (Pvt) Ltd. is the major Pakistan based capital market brokerage....
Sunday, August 01, 2010
Six of Best White and Black Hat Hackers of All the Time
While the real experience of hacking might not be accurately represented in movies, hackers certainly do become famous for white and black hat —good and bad— deeds.....
Sunday, July 18, 2010
Download Free AIO Latest Themes for Windows 7
Requirements:
Operating system: Windows ® Se7en
Processor: Pentium III 1 GHz
Memory: 512 MB
Video card: 16 bit, 1280x800.....
Operating system: Windows ® Se7en
Processor: Pentium III 1 GHz
Memory: 512 MB
Video card: 16 bit, 1280x800.....
Thursday, July 15, 2010
Obama's Twitter Hacker
A 23-year-old Frenchman has been given a suspended jail sentence for hacking into US President Obama's account on micro-blogging site Twitter......
Sex Tape Hacker Blackmail Woman
A man allegedly steals explicit home videos from girls' and women's computers and blackmails them to film more.....
Sunday, July 11, 2010
Malware on Jerusalem Post website
Hackers compromised the website of the Jerusalem Post on Monday so that it served up malware.The attack relied on planting scripts on the site itself, rather than the more common tactic of compromising its ad-serving system to serve tainted ads....
Hack Probed, Strathclyde Police website pulled offline
Strathclyde Police's website has been out of action for nearly 24 hours while its IT team investigate whether the force's online portal has been compromised by Chinese hackers....
Friday, July 09, 2010
Free Download WinUtilities Pro 9.72
WinUtilities is a system tweaking suite that includes more than 20 tools to improve and tweak your PC's performance. It offers an attractive and easy to use interface that organizes all tasks into categories and provides graphical statistics whenever possible....
Free Download Kaspersky Rescue Disk
Kaspersky Rescue Disk 10 - Special program for testing and treatment of infected x86 and x64-compatible computers. The program is used when the extent of infection, when it is not possible to cure your computer with antivirus programs or tools of treatment, run on operating systems........
Tuesday, July 06, 2010
Install Tor in backtrack4 !!!
So you’ve been checking out BackTrack 4, and you want to get your anonymity on? This is assuming you have either installed BT4 to your hard drive or you’re using the VMWare version.........
Sunday, June 27, 2010
Download Free 4Media HD Video Converter v6.0.3 build 0419
This professional HD converter software supports decoding and encoding of all High-Definition video formats including HD AVI, H.264/AVC, HD MPEG4 TS, HD MPEG2 TS, HD WMV, HD, and QuickTime, also converts AVCHD(.mts, .m2ts) to AVI/MPEG/MKV, etc. Plus, you can convert any general video and audio formats for playback on various digital devices.........
Download Free Smart FTP 4.0.1122 (x32/x64) !!!
SmartFTP - This FTP client utility lets you share files in local area networks and between servers on the Internet. The program delivers secure, reliable and efficient file transfer.........
Saturday, June 26, 2010
PPPoE and bridge mode of ADSL Modem
There are two ways to configure an ADSL modem for broadband connection. One in PPPoE (Point to Point Protocol over Ethernet) and the another is Bridge mode.
PPPoE Mode........
PPPoE Mode........
Monday, June 14, 2010
Hacker Documentary Leaked!
After collecting cobwebs in a studio vault for the better part of a decade, an unreleased documentary on the 2003 hacking scene leaked onto the Pirate Bay Thursday........
Wednesday, May 26, 2010
How Hacker Develops Multi-platform Rootkit for ATMs
One year after his Black Hat talk on Automated Teller Machine security vulnerabilities was yanked by his employer, security researcher Barnaby Jack plans to deliver the talk and disclose a new ATM rootkit at the computer security conference.........
Friday, April 30, 2010
How USB Steals Pc Passwords
USB Steals Pc Passwords
Tweaked USB that steals every passwords including licences........
Tweaked USB that steals every passwords including licences........
Thursday, April 29, 2010
Saturday, April 24, 2010
Download Free Flash Virus Killer 2010 Version
This is a set of portable software to download to a removable disk (flash) is designed to destroy viruses, have necessarily causing harm to the system.........
Download Avira AntiVir Personal 10.0.0.565 + ( Avira AntiVir Premium 10.0.0.601 ) Latest Updates
Avira AntiVir - Avira Company has updated its line of products for the security of the system, produced specifically for personal use.........
Friday, April 23, 2010
How Hacker Restores Linux Support to PS3
Sony removed Linux support on the PlayStation 3 through the OtherOS feature with a firmware update. Before the firmware was live, hacker George Hotz ("GeoHot") vowed to restore support for Linux.........
How Chinese Hackers Stole Dalai Lama’s Email, Government Secrets ?
Chengdu, China (AHN) - Security analysts have discovered an intricate community of cyber hackers they say breached computer networks in India, according to officials from the Dalai Lama, United Nations and numerous other countries.........
Tuesday, April 20, 2010
Download Free Easy CD-DA Extractor 2010 Ultimate
Easy CD-DA Extractor aka “Swiss Army Knife Of Digital Audio” is ALL-IN-ONE software that copies Audio CDs, converts audio files from one format to another, edits metadata of audio files........
Saturday, April 17, 2010
How Pentagon trains workers to hack Defense computers
The Pentagon is training people to hack into its own computer networks.
"To beat a hacker, you need to think like one," said Jay Bavisi, co-founder and president of the International Council of Electronic Commerce Consultants, or EC-Council.........
Why WhitePages.com halts ad networks ?
WhitePages.com has stopped ad networks from delivering ads to its site after they were found to contain fake antivirus malware.........
Friday, April 16, 2010
Start of Cyber World War 3
Einstein said: “I do not know with what weapons World War 3 will be fought, but World War 4 will be fought with sticks and stones.”
The State Department says that their network is attacked 50,000 times a day; which is probably 40,000 times less than the rest of our networks.........
Wednesday, April 14, 2010
Free download MP3 Convert Master 1.1.1.395
MP3 Convert Master is an All-in-One MP3 converting tool that can convert WMA to MP3, Wav to Wma, Mp3 to Ogg, Mp3 to Wma, MP3 to WMA and other audio files between different formats. With MP3 Convert Master,........
Tuesday, April 13, 2010
Free Download Hide Your IP Address V1.1
Everyone who is connected to the Internet – is unique, your own address IP.K Unfortunately, about 99% of hacker attacks using IP-address of the victim, to monitor or steal personal informatsiyu.Hide Your IP Address – protects personal information against spyware........
Sunday, April 11, 2010
Free Download Cool Screen Capture 7.0.1.377
Cool Screen Capture is a great application which allows users to record their desktop activity. Professional technique and intuitive interface make it suitable for every customer.
Customers can capture video or image from DV, TV Tuner and other devices.........
Saturday, April 10, 2010
I Signed Up for SocialSpark!
This is a Sponsored Post written by me on behalf of IZEA. All opinions are 100% mine.
SocialSpark is a Excellent social site,which help advestisers to advertise thier contents and products on blogs through bloggers with paying some revenue to bloggers.........
SocialSpark is a Excellent social site,which help advestisers to advertise thier contents and products on blogs through bloggers with paying some revenue to bloggers.........
Monday, March 29, 2010
How to Convert MTS/M2TS to MOV with Moyea MTS Converter for Mac ?
When buying a Sony HD Cam (HD-UX3), a HD HF200 camcorder, a JVC HD cam or any other ones, you will need an AVC high-definition (MTS/M2TS) player to view or playback the HD content via your pc or Mac computer..........
Tuesday, March 23, 2010
How to Sneak the Internet at Work?
It simply amazes me what people at work will do to get their computer on the Internet; they risk loosing their jobs to surf Facebook, MySpace, porn, and outside e-mail accounts, and those ridiculous jokes they pass between each other. I've seen romances flame up and burn out on the same day, there are those that search for love and sex, online banking, bill paying, help with divorces, restraining orders, and marriages........
Monday, March 22, 2010
Downlaod Free REFOG Employee Monitor !!!
Do all your employees use their computer resources and Internet connection solely for your business? Do they work as hard when you are away as they do when you are watching over their shoulders? In other words, do you suspect your employee's productivity is lacking? You should consider installing a surveillance system to address the problem.........
Saturday, March 20, 2010
How to Track the Hacker? Eposide 1 Part 2
stealing your information from your computer and sendind to hacker is trackable path where you informations are to be sent..........
Friday, March 19, 2010
How to Track the Hacker? Eposide 1
if someone steal your information from your computer and send to hacker,then what you do to track the hacker's path where you informations are to be sent..........
Wednesday, March 17, 2010
Download Free Hijack Hunter v1.3.0
Hijack Hunter is an application that thoroughly scans your computer and displays all the gathered data in a comprehensive way.........
Tuesday, March 16, 2010
Pak India Cyber Wars !!!
We all are aware of the wars India and Pakistan have fought and the resulted destruction especially precious human lives. In the current information age, some battles are not only fought with guns and tanks but also through media, internet and pen.........
Sunday, March 14, 2010
How to hack yahoo hotmail..etc (program)
HAck yahoo hotmail..etc Accounts new 0day exploit
in this thread i will ut the program that exploit the vulnbility.......
Saturday, March 13, 2010
How to Hack Bandwih through Mozzila Firefox
There are many ways to outsmart a slow Internet connection, especially since you use the internet access in the cafe-cafe that most of them have limited the bandwidth of every computer.........
Download Creating Web Sites Bible
Updated for the most recent tools, techniques, and standards for creating cutting-edge Web sites for businesses or personal use, this book is one-stop shopping for HTML, javascript, CSS, tables, forms, Flash, and more........
Friday, March 12, 2010
Get Best Hacking Ebooks Collection 34 in 1 AIO
Hacking e-Book -34in1- (AIO) | 137.37 MB
This AIO have:BlueTooth HackingEthical HackingGoogle HacksHack and Crack
Hack Attacks Revealed........
This AIO have:BlueTooth HackingEthical HackingGoogle HacksHack and Crack
Hack Attacks Revealed........
Thursday, March 11, 2010
Hackers Worry about illegal actions
Hacker training generated an estimated income of 238 million yuan last year.
First the bad news: Hackers last year caused an estimated economic loss of 7.6 billion yuan ($1 billion) in China.........
First the bad news: Hackers last year caused an estimated economic loss of 7.6 billion yuan ($1 billion) in China.........
Wednesday, March 10, 2010
How to get views, ratings, subscribers - youtube hackers
The program version is now 2.0 !
Here is a screen-shot for VERSION 2.0........
Here is a screen-shot for VERSION 2.0........
Thursday, March 04, 2010
How California hackers grabbed Ticketmaster's best online tickets
The California hackers charged with snapping up Ticketmaster's best online tickets pleaded not guilty Tuesday, insisting they are just extra-efficient scalpers........
Tuesday, March 02, 2010
How sms bomber Work in pakistan
This amazing tool will f4ck ur victims cell phone ..
just put the number and start teasing them ........
just put the number and start teasing them ........
How iStealer 6.0 Legends FUD Stealer Works: Download
What is new in this version?• Added new programs like Google Chrome, Opera, the last version of Firefox (3.5),IDM, SmartFtp and CuteFtp.
• The server has been improved for stability, totally tested in XP, Vista and W7........
• The server has been improved for stability, totally tested in XP, Vista and W7........
Sunday, February 28, 2010
Remove Cyber Snoop Manually
Before we get started, you should backup your system and your registry, so it’ll be easy to restore your computer if anything goes wrong........
Defeat Keyloggers !
Keyloggers, an abbreviation for Keystroke Loggers, are a rather nasty tool used by hackers to invade your privacy. This tool can secretly capture all the keystrokes you make, every single mouse click, and virtually everything you do on the computer, which, when you think about it, is very scary.........
How to detect keyloggers
Keyloggers are software or spyware that record every keystroke you make typing on your PC. Some keyloggers are installed in order to capture your usernames and passwords, bank account numbers, credit card numbers, etc........
Saturday, February 27, 2010
How to use refog keylogger
Video tutorial on how to use, download refog keylogger Employee Monitor.......
How to find, use and fix Xss
Xss is a type of computer security vulnerability typically found in web applications which enable malicious attackers to inject client-side script into web pages viewed by other users........
How Pakbugs fucked Indian Prime Minister Manmohan Singh
Few days ago, we have noted that ICW have defaced few small Pakistani sites, so Pakbugs have responded with little hard.
Their Prime Minister's Private (Not official) site has been owned by Pakbugs. Here is the mirror........
Their Prime Minister's Private (Not official) site has been owned by Pakbugs. Here is the mirror........
Thursday, February 25, 2010
Hacking Mode
All you hackers out there that can actually hack, I got a question for ya! When you sit down, and are about to start hacking away at whatever, what gets you in and keeps you in the “hacking mode”? You know that place you get into where you have full concentration on the task before you and nothing can get in the way of you and the final outcome.........
Hackers steel Card Data
A growing emphasis by computer hackers on stealing payment card data from hotels and resorts and their increasingly sophisticated malicious software and attack methods are two highlights in a new report from security consulting and technology firm Trustwave Holdings Inc........
Hackers Steal Millions In Emissions Certificates
Credit card numbers? Please. Medical records? Booooring. The modern hacker knows that the real money’s in carbon emission trade credits. No, seriously: A recent phishing expedition of carbon-emitting companies in Europe, New Zealand and Asia reaped over $US4 million.........
Tuesday, February 23, 2010
How to Hide my IP 2010
Hide my ip + serial key, u can change your IP adress easy

Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you........
Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you........
How to perform Server Attack: Best ddos attacker!!!
Download here THE BEST ddos attacker! Server Attack .......
Monday, February 22, 2010
Pakistani Hackers Hacked www.google.co.ma !!!
Biggest Defacement Ever from pakistani Hackerz. Pakistan Zindabad !! ........
Saturday, February 20, 2010
How to Hack with hub and switch – sniffing
Let’s look at the difference between a hub and a switch and how one could attack them. Watch the video to see hubs and switches from a hacker’s point of view. Read the post for a more formal description. (sorry about the quality, still working on perfecting this video stuff)........
Friday, February 19, 2010
How Yahoo Messenger Monitor SNIFFER
Yahoo Messenger Monitor Sniffer is handy network utility software designed to capture and observe Yahoo Messenger conversations on all computers in a network. It is able to record conversations automatically in real time.........
Wednesday, February 17, 2010
Cyber hacking and sexual blackmail
British business executives dealing with China were given a formal warning more than a year ago by Britain’s security service, MI5, that Chinese intelligence agencies were engaged in a wide-ranging effort to hack into British companies’ computers and to blackmail British businesspeople over sexual relationships.........
Monday, February 15, 2010
How Conficker virus hits Manchester Police computers
Sunday, February 14, 2010
Hack a Mobile Phone Using Super Bluetooth Hack

Previously i've posted How to Remotely Shutdown a Computer With Cellphone. In this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v.1.8. This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian.........
Saturday, February 13, 2010
Stand-alone version of google Buzz
SAN FRANCISCO (Reuters) -Google Inc said it may create a stand-alone version of its Buzz social networking product but won't separate Buzz from its Gmail service, a linkup that has spurred controversy over privacy.........
Largest hacker training website shut down !!!
SHANGHAI (Reuters) - China has closed what it claims to be the largest hacker training website in the country and arrested three of its members, domestic media reported on Monday.........
Pakbugs Got Hacked
A web forum called www.pakbugs.com was one of those "underground" forums where people discuss hacking techniques and sell malware code, bank logins and stolen credit card numbers........
Tuesday, February 09, 2010
Hacker Training Website Shutdown
Three suspects behind the site, which provided prospective hackers with instructions on how to launch cyber-attacks and use malicious software, were arrested following the raid on the offices of "Black Hawk Safety Net" in Hubei province.
The state-run Xinhua news agency called the operation China's "biggest hacker training website" ........
