Types of Hacker

Let’s see the categories of Hackers on the basis on their knowledge. Coders **The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.

Concept of Ethical Hacking

hi guys this is my first post i hope to present hacking A to Z 101 lets begun :) Hacking The Art of exploring various security breaches is termed as Hacking. # Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking

Why Hackers Hack?

The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information

Steps Performed By hackers

1) Reconnaissance 2) Scanning 3) Gaining Access 4) Maintaining Access 5) Clearing Tracks • Performing Reconnaissance • Scanning and Enumeration • Gaining access • Maintaining access and Placing Backdoors • Covering tracks or Clearing Log

Prevention from Hackers

What can be done to prevent Hackers from finding new holes in software and exploiting them? Information security research teams exist—to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.

ad

Wednesday, December 26, 2012

More facebook,Twitter likes


hi friends  today im going to tell some small tip for get huge likes to your facebook fan pages,twitter accounts,google plus pages ,youtube videos,ect
 i recommanded these site you can get facebook likes,twiter followers,youtube likes ect
 click link or banner
getlikespro.com
Add me fast
www.like4like.org

Like4Like.org - How it works

Saturday, December 15, 2012

TuneUp Utilities 2013. Free with crack spyware free


 TuneUp Utilities 2013. Download Free


Our premium tuning features set standards when it comes to removing browser traces and other computer residue. The brand-new TuneUp Utilities 2013 now cleans some 150 popular PC programs, 28 Windows® functions and 25 browsers – a record for this product, made possible thanks to our intensive research. Other new highlights: With the newly developed Live Optimization 2.0 feature, TuneUp recognizes and helps stop the most resource-hungry applications on your PC, laptop, or tablet.

NEW! TuneUp Disk Cleaner 2013: The Professional Cleaner for your PC

Far too much data clutter accumulates on your computer on a daily basis. Not only does it fill up your hard drive, it can also cause system crashes and put your privacy at risk. The new TuneUp Disk Cleaner 2013 is your reliable cleaning professional:

Program residue: TuneUp Utilities 2013 cleans chat logs, history lists, and cached files from over 150 popular programs, in a single step.
Windows data trash: The new TuneUp Disk Cleaner reliably cleans 28 Windows functions, including installation remnants (from Microsoft Installer), error reports, temporary files.
More Information


NEW! TuneUp Browser Cleaner 2013: Erases Browser Traces Reliably

Protects your privacy by completely cleaning over 60 areas in Internet Explorer®, Google Chrome, Opera®, Safari®, and Firefox®. Discovers and cleans numerous traces like Flash cookies that even your browser itself won't clean. With the new TuneUp Browser Cleaner, you'll even optimize your browser's databases.

MORE POWERFUL! TuneUp Registry Cleaner and TuneUp Shortcut Cleaner

Our improved TuneUp Registry Cleaner lets you scan and clean even more areas in your registry, making the heart of your Windows system more spotless than ever before. The enhanced TuneUp Shortcut Cleaner cleans orphaned shortcuts, defective Windows history lists, and other programs from your hard drive.

NEW! TuneUp Live Optimization 2.0: Stops resource-hungry applications even more effectively

You see this on every PC: Programs that run in the background, eating up RAM, and robbing a computer of every last bit of its resources. TuneUp Live Optimization stops this performance loss: Active programs get a higher priority and unused background programs a lower one. With TuneUp Utilities 2013, you'll use the Live Optimization feature even more efficiently:

Disabling programs: The new intelligent Live Optimization feature can learn, too. If a resource-hungry application is too conspicuous, you can use the new wizard to set it to "standby" at the touch of a button.
Exception rules: With just a click of the mouse, you can prevent your favorite performance-hungry programs from being downgraded so they receive full power.
Easy-to-understand program names: The new Live Optimization wizard displays actual program names that are clearly understandable - cryptic process descriptions are a thing of the past. This way you know immediately what programs are straining your computer the most.
With TuneUp Live Optimization 2.0 it's easier than ever before to quickly identify resource-hungry applications and obtain better optimization for your PC.

Other key innovations

Now supports Windows® 8: TuneUp Utilities 2013 works with Microsoft's brand-new Windows® 8.
1-Click Maintenance and Automatic Maintenance: A total of four tweaked and enhanced trace removal tools - TuneUp Disk Cleaner, TuneUp Browser Cleaner, TuneUp Registry Cleaner, and TuneUp Shortcut Cleaner - make 1-Click Maintenance and Automatic Maintenance more powerful than ever before.
TuneUp Process Manager The new TuneUp Process Manager displays easy-to-understand names and information on all background processes, giving you a better overview of your PC. And the special "Heat Zone" feature highlights particularly demanding programs in color.

Supported OS:

Windows 8/7/vista/xp

Homepage: http://www.tune-up.com/services/whats-new/tuu2013/

pass word -  funhackers


Download Link 

Wednesday, December 12, 2012

Internet Download Manager v6.12

Internet Download Manager v6.12


Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
Version 6.12 adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

pass word :codefh.blogspot.com

Download Link
 If you like to help your friends please share this on facebook,twitter

Saturday, December 8, 2012

Free Windows Xp SP 2 in 2 Mb Compressed

Free Windows Xp SP 2 in 2 Mb Compressed


hi friends you can download windows xp SP 2 in 2 mb compress version
credit goes to hackrish


Download Link
 If you like to help your friends please share this on facebook,twitter


Sunday, November 25, 2012

Email Password Hacking

Email Password Hacking

There is no specified attack available just to hack the password of Email accounts. Also, it is not so easy to 
compromise the Email server like Yahoo, Gmail, etc.

Email Password Hacking can be accomplished via some of the Client Side Attacks. We try to compromise the user 
and get the password of the Email account before it reaches the desired Email server.

We will cover many attacks by the workshop flows, but at this time we will talk about the very famous 'Phishing 
attack'.

Phishing


The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is Bogus and set up only to steal the User’s information.

Phishing scams could be

Emails inviting you to join a Social Group, asking you to Login using your Username and Password.

 Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.

 Emails containing some Information of your Interest and asking you to Login to Your Account.

Any Email carrying a Link to Click and asking you to Login.

Prevention against Phishing

Read all the Email Carefully and Check if the Sender is Original

 Watch the Link Carefully before Clicking.
 Always check the URL in the Browser before Signing IN to your Account
Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email.

Saturday, November 24, 2012

Email Spamming

Email Spamming


Email Spamming is a variant of Bombing; it refers to sending Email to hundreds or thousands of users (or to lists that expand to that many users). Email spamming can be made worse if recipients reply to the Email, causing all the original addressees to receive the reply. It may also occur innocently, as a result of sending a message to mailing lists and not realizing that the list explodes to thousands of users, or as a result of a responder message (such as vacation(1)) that is setup incorrectly.

Saturday, October 27, 2012

Certified Ethical Hacker v7 Instructor Slides


Certified Ethical Hacker v7 Instructor Slides



Let' come to the topic as the name tells the story that  means learning in the easy way, "Certified Ethical Hacker's set of instructor slide" by eccouncil, we are damn sure that this will surely be helpful for you and for those who want to become an ethical hacker, so guys read on and prove yourselves .


This package includes the following modules.

1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffers
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Evading IDS, Firewalls and Honeypots
17. Buffer Overflows
18. Cryptography
19. Penetration Testing




Enjoy....... 

 If you like to help your friends please share this on facebook,twitter