Monday, December 2, 2013

HACKER'S UNDERGROUND HANDBOOK





*This book is containing basic hacking tricks and basic computer knowledge

*what are the programming knowledges u want 
to become an hacker

*this book explain linux function ang password hacking,phishing attacks,
Malware analysis, windows hacking,cross site scripting,remote access etc

*its also contain wireless hacks such as scanning for wireless networks,cracking wep,
Packet sniffing etc

*this is very useful to those who are interest to learn hacking

How to know your gmail account is hacked or involved with any unauthorized activities






         Step 3:click,the last activity option(details)



           Step 5: you will decide its your ip address     and location .  suppose its hacked



you will find any unauthorized action in your account  you must change your password

SECRETS REVEALED BEHIND IMAGES

Hello friends
                I willing to reveal the one type of secret behind the following trick
How to hidden files behind the images “.already we know about that ,( if u don’t know about it kindly CLICK HERE)but unfortunately
We using that commands 
without understand
So I will decide to explain that commands  ,Here we are use two commands, first one 



Cd desktop-change directory to desktop


Copy /b imagename.jpg+ filename.rar finalname.jpg


Copy –used copy the data

/b –use file’s binary value

Imagename.jpg+filename-add the both binary  values of them

Finalname.jpg-a mounted jpg file

Hence the combinations of image and file binary codes mixed and the new file final imagename  is generated

Finally the secrets are revealed

Speed up your pc or laptop by using pen drive




step 1:Insert the pendrive
step 2:Open my computer &right click on pendrive ,select properties

step 3:Select Ready boost option on header menu






step 4:Click “dedicate this drive to ready boost”



step 5:Then click ok &your USBdrive shown as full




To disable:
                 same process click”don’t use this device”
                 then click ok



NOTE:
     if u willing continue this speed more than one hour,   you must Restart your computer, then continue to
enjoy it

BEST 13 OPERATING SYSTEMS FOR HACKERS

In normally hackers are thinking and doing different from others,and also hackers 
use special operating operating systems .here 13 famous operating systems are present for hackers, including downloading link

1. kali Linux


download Kail Linux
2. BackTrack 5r3


download BackTrack 5r3
3. NodeZero.



download node zero
4. BackBox Linux


download Backbox linux
5. Blackbuntu.


download‎ black ubuntu 
6. Samurai Web Testing Framework.
7. Knoppix STD.
8. Pentoo.
9. WEAKERTH4N.
10. Matriux Krypton.
11. DEFT.
12. CAINE
13. Bugtraq

LI-FI A NEW TECHONOLGY

Chinese Scientists Invent Lightbulbs That Emit Wi-Fi 


*Li-Fi is a label for wireless-communication systems 
using light as a carrier instead of traditional radio frequencies 


*A group of Chinese scientists at Shanghai's Fudan University have a bright idea: A lightbulb that produces its own Wi-Fi signal. According to Xinhua, the technology is called Li-Fi, and the prototype actually works better than the average connection in China.

*As many as four computers placed near a Li-Fi bulb can connect to the net, using light frequencies rather than the usual radio waves. The bulb is embedded with a microchip that produces a signal, yielding rates as fast as 150 mbps—far faster than typical connection speeds in China, and about three times faster than the speed I'm getting right now. (Seriously, I just did a speed test.)

*One of the perks of Li-Fi is that it's affordable. Have a lightbulb and a Li-Fi kit? Boom—you have internet. Next month, researchers are showing off 10 sample kits at a trade show in China, and the country is moving in a direction that could make Li-Fi a practical and commercially viable asset—especially since, as Xinhua reports, Chinese people are quickly replacing old fashioned incandescent bulbs with LEDs.

*Of course, there are still a few technical details—mostly dealing with microchip design and manufacturing—that would need to fall into place before Li-Fi becomes ubiquitous. So for now, Li-Fi remains an experiment with a bright future.

How to enable/disable your usb port(pen drive port)



*In normally every pc having 6 USB ports,so we no must know which port belongs to which order

Step 1:Right click on my computer and open manage 
 

step 2:Select Device manager from list




step 3:select universal serial bus controller from shown list



step  4:expand the list,that will show 6 usb ports



step 5:right click any port &select disable to disable usb port



  step  6:same thing to enable  the usb port,right click and select enable to enable the usb port

How To Hide File Behind Image ?

In order to do this you should have basic understanding of command line, but if you don't know check out  tutorial given below.

    1. Select an image to be used for hiding file behind the image.
    2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
    3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
    4. Now open cmd by going to Start > Accessories Command Prompt and type following commands in it.
    cd desktop

    5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
     Copy /b imagename.jpg + filename.rar finalimage.jpg
    • Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
    • Replace filename with name of your file you want to hide. It must be in .rar format.
    • Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
    6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

    How To Access Hidden File ?

    To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.

        1. Open winrar
        2. Now locate your image and open it or simply drag your image in winrar.
        3. Extract the file and done.

    Sunday, December 1, 2013

    How to Find your broadband connection’s top speed :-

    How-to-Find-your-broadband-connection's-top-speed
     Online tools can check the speed of your broadband connection, but their snapshot figures don’t tell the whole story. Your speed can increase or decrease through the day, especially if your connection is share with others.
    JD’s Auto Speed Tester ( Download Now ) tells you when your internet connection is at the best.
    Connect the PC you are using directly into your Router with an Ethernet cable. Now put your Power option to never sleep. To open open Power option open the Run command and enter the command powercfg.cpl .
    How-to-Find-your-broadband-connection's-top-speed1
    Now here change your setting to never .
    How-to-Find-your-broadband-connection's-top-speed1
    Now open the software and Click Run test. it will perform the first test , then wait for the cycle time before repeating the test. if you want to minimize while test, Click on the “Send to Tray ” option.
    How-to-Find-your-broadband-connection's-top-speed1

    Leave the test running for at least 24 hours to get a good view of how your network operates throughout the day.
    How-to-Find-your-broadband-connection's-top-speed1
    You have the option to Save your report spreadsheet. if you want to change the graph view look then click on theDisplay and pick your color.
    How-to-Find-your-broadband-connection's-top-speed1

    Collect data from more than one day to get a full picture of your connection. Click on the AvGraph button to see your best and worst download times.
    How-to-Find-your-broadband-connection's-top-speed1


    Enjoy your speed test.