This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Don`t Learn to HACK - Hack to LEARN.All about Ethical Hacking, Penetration Testing & Computer Security

Saturday, October 6, 2012

Mail account & Many Facebooks Hacked

  HI All  Mail account & Many Facebooks Hacked by Myanmar hacker guru. Will u see some email in under ?Okay I want to owe This mails.Join to myanmarhackerguru@gmail.com mmaunggyi@gmail.comakbar2081@gmail.comtitan278109@gmail.comihatenightmare22@gmail.commydreammustbesuccessful@gmail.com deathemo88@gmail.combabylay.bur@gmail.comtukanghackerperusuh@gmail.comkarimullah1990@gmail.com nnyspar@gmail.com beebar.83@gmai...

Tuesday, September 11, 2012

How to Detect Anonymous IP Addresses

As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified                                 ...

What is Phishing ?

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used.Phishing is an...

What are Keyloggers

Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.There are two types of keystroke loggers:1. Software based and 2. Hardware based. Spy ware: Spector (www.spector.com)Spector is a spy ware and it will record everything anyone does on the internet. Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector,...

Portal Hacking (DNN) - Website Hacking Technique

Hello frnds, Now these days hacking is very popular among hackers but there are very types of hacking .One more hacking method called "Portal Hacking (DNN)". This method also uses google search to find hackable sites.. Now you can imagine that how much google.com is important for Hackers also...                                                        Note:-This...

History of hacking

The first hackers appeared almost simultaneously with the first computers meant. The past couple of decades have seen many attempts made to evade computer systems wither as a protest or due to personal interest by the hackers. But these hackers pose a continuous threat to the security of our PCs, and computer systems as well as the information. Even the most popular casino Sites are keen interest of these hackers. Let us take a brief look...

Monday, September 10, 2012

How To Automatically Log Out From Facebook After Certain Time

I know its happen to many people , suppose you are chatting with your friends in Facebook then you got a phone on somebody came in your door , you just leave your PC without log out from Facebook and you forget that you were chatting with your friends in Facebook.On the opposite site your friend become angry that you are not replying.If you have face this kind stuff then best is automatically log off from Facebook after a certain or fixed ...