Welcome, Guest! Registration RSS

Shehab Hacking And Cracking Articles

Friday, 2024-04-26
Main » Entries archive

Protect your Privacy with Private Domain Registrations

lock

Keep your private details secure

One of the requirements of owning a domain is that you must give your contact details when registering that domain.

Internet regulations require that your name, address, email, and phone number be accessible 24/7 to anybody who wants to see them just by looking up your domain. This rule was created to make it easy to contact a domain owner in case of problems, but it has since been exploited by spammers and marketers to bother people. Your personal information is exposed 24 hours a day, everyday, to anyone, anywhere.

Unfortunately since this information is publicly available it may be ... Read more »

Views: 1582 | Added by: shehab3451 | Date: 2011-09-02 | Comments (114)

Well how many of us are wanting to use Win 7.. Well many of us will be craving for it.. so friends Here i have given you the Free of charge download (torrent)
Just click on the download link and you have it...

 TO Download the file click here  :D
Views: 1060 | Added by: shehab3451 | Date: 2011-08-25 | Comments (0)

All webmasters are after SEO these days.For those who aren't much familiar with it,Search Engine Optimization(SEO) is a method of optimizing your content to make it search engine friendly,so that, you rank up high for that particular keyword in the search results.I don't claim to be an expert in SEO,but from what I know, I think it would be safe to say that SEO is really Bad for blogging.The more I get to know about SEO,the more I hate it, as a blogger.Why I feel so?Let me explain.seobadblogging Why SEO is bad for blogging

On-site SEO

This is a process by which your content is optimized for the search engines,mainly includes the keywords and internal linking. ... Read more »

Views: 961 | Added by: shehab3451 | Date: 2011-08-25 | Comments (1)

These days hacking attempts are so rampant. We can never be 100% sure that our data is safe. The email account are most vulnerable, be it yours or your friends n' family.

One may argue that I take all the possible measures to thwart any possible hacking attempt, after all the root cause of hacking attempts is our carelessness. Sure enough, you are Clever. But are you confident that your friend too is taking the same precautions. What if you send a confidential info through a email and his/her account gets hacked?

In comes the role of self-destructing emails/messages. These emails get destructed automatically as per the preset time or on being read. My search to find the best self destructing email providers lead me to these:-

Privnote

self destruct email5 5 Ways To Se
		<!-- ... Read more »

Views: 1328 | Added by: shehab3451 | Date: 2011-08-25 | Comments (0)

Windows 7 Hack: Playing with "GodMode"

Have you ever wondered what else lies under the hood of that new Windows 7 laptop you got recently? The clever folks at CNET have found a simple hack that will grant access to all of those options in one easy-to-set-up shortcut.

The aptly named GodMode is a built-in, yet unadvertised feature in Windows 7 that gathers all Windows utilities in one spot. To access it, simply create a new folder and name it:

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

And that's it! Open it up and you'll find access to display options, backup/recovery, power m ... Read more »

Views: 1030 | Added by: shehab3451 | Date: 2011-08-22 | Comments (0)

Researchers have decomposed a 768-bit number with 232 decimal places into its two prime factors and published a paper with their results. The number is the string released as "RSA-768″ under the now defunct RSA Challenge. As a result, RSA encryption with 768-bit keys must, from now on, be considered cracked.RSA Key

It took the team of researchers from Switzerland, Japan, Germany, France, the US and the Netherlands about two and a half years to perform the factorization. The first step of the calculation, polynomial selection, required half a year on a cluster consisting of 80 PCs, while the second and considerably more labor-intensive sieving step took about two years on a cluster of several hundred computers. According to the researchers, a single Copter processor with 2 G bytes of RAM ... Read more »

Views: 994 | Added by: shehab3451 | Date: 2011-08-21 | Comments (0)

If you want to hack profile picture on Facebook with cool, you can use three different ways to your Facebook profile. In fact, some features in it can take photos directly from a Webcam profile.

1. Profile Maker
Profile Maker is that you can directly use these facilities without having to leave Facebook, as direct editing is done on up ..

The way is : visit http://apps.facebook.com/profile-maker/, then press the Allow button. After that, you can make your profile picture by playing with the buttons available. In fact, you can manipulate the image with quite elegant.

2. Pic Scatter
Pic Scatter is a feature that is almost similar to the Profile Maker. This feature can create new styles to your Facebook profile. In fact, you can do any time.

The difference between this applicatio ... Read more »
Views: 1085 | Added by: shehab3451 | Date: 2011-08-21 | Comments (2)

Tools hacking / cracking is one of the many ways that hackers usually used when launching their attacks. Variety of ways, ranging technique to guess passwords, exploit weaknesses to the way SQL server Injection, continues to grow over time.

Nah! For those of you who happened to learn to dive into the world of hacking / cracking is a good idea to try a few collection of tools to hack / crack that can be downloaded for free in several articles. Click here.
Views: 823 | Added by: shehab3451 | Date: 2011-08-20 | Comments (0)

If you are going to reinstall the computer with no CD Room, you can use FLASH DRIVE. In fact, re-install using the Flash Drive is more simple and easy to carry.

The one in need is a CD / DVD and a Windows Installer Flash Drive and a software called WinToFlash which can be downloaded here. This software helps you create a system boot to the Flash Drive.

The Steps to make Bootable Flash Drive :

1. Download and extract WinToFlash

2. Open WinToFlash.

3. On the Task tab, select the type of Windows that you will enter into the Flash Drive. Then click Run.

4. Insert the CD / DVD of Windows Installer and specify its location via 'setup file path'

5. Insert Flash Drive and also determine its location via 'USB Drive'

6. Then came the License Agreement screen, select 'I Accept' and click Continue

7. Screen appears to format the Flash Drive Click OK.

8. Furth ... Read more »
Views: 832 | Added by: shehab3451 | Date: 2011-08-20 | Comments (0)

« 1 2