Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Software Blogs  >  Open Source Blogs  >  Techniques For Hackers open-source Blog  > 

Google Secrets
2011-10-19 05:23
Method 1?ww.google.comput this string in google search:"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums"parent directory " DVDRip -xxx -html -htm -php -shtml -o… Read More
Hacking Unix Passwords
2011-10-19 05:21
Here's how to use it in a nutshell...Download the passwd file from your local unix site, or have someone download it for you.  It should be in the unix format (that is, line feeds… Read More
A Beginners Guide To UNIX
2011-10-19 05:19
In the following file, all references made to the name Unix, may also besubstituted to the Xenix operating system.Brief history:  Back in the early sixties, during the development of th… Read More
2011-10-17 13:08
This hack will only work if the person that owns the machinehas no intelligence. This is how it works:When you or anyone installs Windows XP for the first time yourasked to put in your usern… Read More
2011-10-17 13:00
1.) run your telnet program:on windows , go to START -> RUN -> "TELNET".on linux , you should open a shell , and write telnet.2.) then connect (on windows "connect" , on linux "open")… Read More
2011-10-17 12:57
ok..... here are the full details.....this works whether its windows 2000 or windows xp or windows xp SP1 or SP2 or windows server 2003....this works even if syskey encryption is employed… Read More
2011-10-11 10:32
Follow these steps for create phishing page for any Website:-Step 1:- First of all open the Website in your browser for which you want to create Phishing page.Step 2:- After open o… Read More
Send Mail By Others Email-ID
2011-10-10 19:08
What is Fake Mail?A fake mail is mail in simple word a anonymous email. A fake mail is a mail in which the sender can send this mail to anyone without mention his/her original ID. Yes t… Read More
25 Best Hacking Tools
2011-10-08 19:14
1.  Nessus : Premier UNIX vulnerability assessment toolNessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free "re… Read More
2006-06-07 11:16
Don't want your XP computer to show up in the network browse list (Network Neighborhood/My Network Places) to other users on your network? One way to accomplish that is to disable file shari… Read More
2006-06-07 11:16
Ok, this is a little trick that i usually use to find cd keys with google.if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up… Read More
2006-06-07 11:16
I use google cuz its the best search engine en everyone can acces .The easiest search quote is "index of ..."Some kind of examples are:index of ftp/ +mp3index of ftp/ +divxindex of ftp/ +"wh… Read More
2006-06-07 11:16
Method 1To view someone's IP# when they send you hotmail email do this:1) Click "Options" on the upper right side of the page.2) On the left side of the page, Click "Mail"3) Click "Mail Disp… Read More

Share the post

Techniques For Hackers

×

Subscribe to Techniques For Hackers

Get updates delivered right to your inbox!

Thank you for your subscription

×