this blog is about hacking tips and tricks n sum cool general pc tricks...

Owner: Anurag_Verma

Listed in: Computers

Language: English

Report it

Site Statistics

Unique Visitors Today:
Page Views Today:
Unique Visitors this Week:
Page Views this Week:
Unique Visitors this Month:
Page Views this Month:
Total Unique Visitors:
Total Page Views:
Total Hits Out:
Traffic Chart

Latest Blog Posts for how to hack

  • WAMP troubleshooting
    on Jun 16, 2013
    When you are installing wamp chances are you may come across many problems llike localhost is not showing or only is working not localhost. Some of the solutions for these kind of problems are:check for port 80,go to wamp then apache servic...
  • Installing and configuring WAMP for wordpress
    on Jun 16, 2013
    WAMP stands for Windows Apache MySql and Php.It is a web development platform and can be used to run and test our wordpress site on localhost.To run WAMP we must install and configure it.Here are the steps mentioned-Download the WAMP server(32 or 64...
  • How to Hack any Facebook account easily by Reverting/Reseting Password of your Victim - No Keylogging,Phishing Required
    on Jul 24, 2011
    Hello There....Here is one more interesting tip on how to hack a Facebook account by the method of reverting the password.This method does not involve any skill or anything just a brain would be enough to get you through this trick ! Well,you might t...
  • How Antivirus Software Works!!!!!
    on Jul 2, 2011
    Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software...
  • How to find Who is invisible or blocked you on Google Talk ?
    on Jun 29, 2011
    Steps to find who is invisible or blocked you on gtalk :1) Download & Install Pidgin.2) Configure Pidgin for GtalkClick the Add button. “Accounts -> Manage Account” will also bring you to the same screen. Let’s add Gtalk to Pidgin.Clicki...
  • What are Input Validation Attacks ?
    on Jun 29, 2011
    Input Validation Attacks :-Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.The most common input validation attacks are as follows-1) Buffer Overflow :- Buffer overflow a...
  • Introduction to "robots.txt"
    on Jun 29, 2011
    Hi guys,There is a hidden, relentless force that permeates the web and its billions of web pages and files, unbeknownst to the majority of us sentient beings. I'm talking about search engine crawlers and robots here. Every day hundreds of them go out...
  • Question:Where is the SAM file stored?
    on Jun 28, 2011
    Ans:This file is located on your computer’s hard drive in the directory “C:WINDOWSSystem32Config”...
  • SAM file location
    on Jun 28, 2011
    This file is located on your computer’s hard drive in the directory “C:\Windows\System32\config”...
  • How to use the SysKey utility to secure the Windows Security Accounts Manager database
    on Jun 28, 2011
    The Microsoft Windows 2000, Microsoft Windows XP, and Microsoft Windows 2003 Security Accounts Management Database (SAM) stores hashed copies of user passwords. This database is encrypted with a locally stored system key. To keep the SAM database...
Loading Comments...


{ds_PageTotalItemCount} commentcomments

Post a Comment