German Security Researchers have discovered that freezing an Android phone allows hackers to access the Encrypted data stored in the phone. The encryption method introduced in the Android version “Ice cream sandwich” by Google. The researchers bypassed this encryption system … Continue reading
Hello again everybody. Today i will teach you how to bypass the stupid annoying surveys that pops up wasting your time and get in to your nerves . So here is a brilliant method to block that thing First go … Continue reading
Hey guys…Its been some time since i posted something.So here is something usefull for you.This will help you google search anything you want more effectively and better search results.Hope this helps Explicit Phrase:Lets say you are looking for content about … Continue reading
Hey guys.It’s been a long time since i posted something new.So i thought i would share with you guys something very interesting.That would be how to send anonymous mail to anyone! With this method,you can mail to anyone anything from anyones email id !Its a very simple and interesting method.So here is it.
First go here http://www.webwizny.com/sendemail.php
Then give the fake email id that would be displayed at the receiver email id of your victim.
Give the receivers email id.
Give the topic and write the body.
Its that easy and you did something that others would think as uber-difficult.
Hope you liked it!
We have all been googling atleast once how to do this. Everyone wants to hack someone else’s facebook account these days and they have thousands of reasons. So in this thread, I will be sharing all possible methods to hack … Continue reading
Whats New in Kali Linux? Enter Kali Linux “So, what’s the difference between BackTrack and Kali?” you might be asking. Unfortunately for us, that’s not a simple question to answer. It’s a mix between “everything” and “not much”, depending … Continue reading
Steps Download one of the most necessary tools. Before you go off hacking, you will need to download a port-scanner. One of the most powerful and free port-scanners is nmap. If possible make sure you install the GUI with it. … Continue reading
So far i have provided few Web Application Pen Testing tutorials . Now it is time to for practicing your hacking / pentesting skills in legal way. Last time , i explained about the Damn Vulnerable Web Application(DVWA). Now, i’ve … Continue reading
Whether you’ve installed Windows 8 yourself or bought a new PC with it, you’re now faced with an unfamiliar operating system that at first glance seems more difficult to customize than earlier versions of Windows. What to do — give … Continue reading
Web-Hacking is a huge topic that I could easily discuss for hours. When I had the idea to expand our Blog’s topics (not only Apple, iPhone, iPad, little tips on Mac and Windows etc….) and add more hacking information, tutorials … Continue reading