Sign Up To Recive Latest Blog Updates

subscribe to Hacks N Cracks

Enter your email address:

Delivered by FeedBurner

Understanding Hash Functions and Keeping Passwords Safe


From time to time, servers and databases are stolen or compromised. With this in mind, it is important to ensure that some crucial user data, such as passwords, can not be recovered. Today, we are going to learn the basics behind hashing and what it takes to protect passwords in your web applications.

3 Fabulous New Google Search Tricks


Except for Google, I can’t think of a monopolistic business that is so dutiful in updating its products and rolling out new features ever so often. They might have the nasty habit of snooping our browsing habits and history, but Google does a bang up job in identifying the domains in search that needs improvement.
Last week, Google unveiled three brilliant new additions to Google Search at Inside Search, an event dedicated to making online search better. Now, in addition to searching with text, we can search using voice and images. And then there is Instant Pages that decreases page load times. To know more about how these features work, follow me after the fold.

10 Twitter Tools to Boost Your Efficiency


Twitter recently announced that over 200 million Tweets are posted each day. This is an incredible figure, underlying the success of the service. Spending time on Twitter boasts plenty of advantages, yet I’ve found that one can get easily sucked in and spend too much time than is good for our workflow.
So here are 10 great tools that I am using each day to make the most of Twitter, whilst still remaining productive.

The ABCs of Web Development


Web development can often be an utterly perplexing affair. Today, aimed at beginners, I’d like to introduce you to twenty six concepts or technologies, each mapping to a letter of the alphabet. Sounds wonky? It probably is! Let’s get started after the jump.

Can You Hack Your Own Site? A Look at Some Essential Security Considerations



Version one goes gold! Visitors are landing from every corner of the globe. You know there are likely to be a few teething problems; I mean, this is 1.0.0.0… all those zeroes are meant to allow us a little grace, right?
Maybe that dastardly style sheet just won’t cascade elegantly on browser X. An incomplete comment chucks out some broken mark-up. Maybe you should have persisted those database connections after all. Hey, we all overlook things in the excitement of getting our first version running – but how many of these oversights can we happily stomach, and how many might just leave a bitter taste in ours, and more painfully our client’s mouths…

How to Track the location of an IP address

Lookup details about an IP address including location, ISP, hostname, type, proxy, blacklist status and more. Trace, Track and Locate an IP address.

In this post i want to show you some useful tips to find out the exact location of an IPaddress. For example, if you pick up a proxy from a proxy list (like SamAir.ru), you get only the country where the proxy is located. To find out the exact location of the IP you should perform a location lookup. There are many sites/services that can do this. My favourites and also the best ones (in my opinion) are GeoBytes IP Locator and IP2Location.

How to find the IP address of the email sender in Yahoo! Mail

Guide to tracking of emails to find sender's IP address using email headers.

In this tutorial i shall be writing about the trick to get the IP Address of sender in Yahoo Mail. This is useful if someone is spamming your inbox with junk mail or any other reason you may have to find the location of the email sender.

How to Change Your IP Address and Surf The Web Anonymously

Download Invisible IP Map to surf anonymously in internet. Hide your IP and encrypt your connection.

Previously i've posted "How to find the IP address of the email sender in Yahoo! Mail" and "How to Track the location of an IP address". In this article i'm going to show you a software, Invisible IP Map, that can make you be "anywhere" in world. People that hack sites will need this small baby to help em on the way. This tool will put you in selected location all around the world XD.

Pranav Mistry SixthSense Technology is thrilling potential: Real Hacker from India


Pranav Mistry SixthSense Technology is thrilling potential: Real Hacker from India

SixthSense Technology : Interactions between the real world and the world of data

At TEDIndia, Pranav Mistry demos several tools that help the physical world interact with the world of data -- including a deep look at his SixthSense device and a new, paradigm-shifting paper "laptop." In an onstage Q&A, Mistry says he'll open-source the software behind SixthSense, to open its possibilities to all.

How to Protect Your Computer from Keyloggers


Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers:

Hackers steal over a million emails from Washington Post jobs site


Passwords, job accounts safe, says Jobs site  
The Washington Post has said that the database of its jobs site had been breached by hackers who stole about 1.27 million users' IDs and email addresses.
The company said on its website that the Washington Post Co's jobs website was breached twice last month. Washington Post said it took immediate steps to shut down the website after discovering the attack quickly.

Web Browser Grand Prix 5: Opera 11.50, Firefox 5, And Chrome 12


Three major released have landed since our last impromptu Web Browser Grand Prix (WBGP4): Chrome 12, Firefox 5, and Opera 11.50. Can Chrome or Opera regain the WBGP championship? Will Mozilla Firefox ever overtake Microsoft's IE9 in the rankings?

10 LARGEST HACKER ATTACKS


We have entered a golden age for the nefarious world of hackers. According to a recent studypublished by Verizon and the U.S. Secret Service, incidents of data compromise climbed more than 400 percent in 2010 from the previous year to 761 breaches.

LulzSec Exposed

Based on LulzSec chat logs, we can conclude the roles of LulzSec members during the 50 days of mayhem. 


The Details geven below is all shared by WEB NINJAS on www.lulzsecexposed.blogspot.com

Facebook Launched Video Chat With Skype Partnership



Finally, Facebook launched video Chat feature.It has partnered with skype for video chat.Facebook has started to feel the heat of competition as Google+ which was launched a week earlier has already features like Group Video chat  and now facebook is trying to play the catch up game.

Make Facebook Account Like Google+ With Circle Hack


Google+ introduced the concept of using circles to organise friends.Now a new facebook application called Circle Hack has tried to copy this feature.It provides graphical interface like google+ circles with the Drag and drop feature.But the functionality provided by circle hack is limited as compared to Google+.In google+ you can control who can see your update using the circles but in facebook this function cannot be performed by Circle hack instead you have to Control these settings from Privacy settings.

Google+ is New Facebook Rival


Not long ago social networking was ruled by Myspace.Now,it has been completely shadowed by Facebook which has an estimated 750 million users.At present there is no social networking site that could challenge the dominance of facebook.Finally Google has confirmed that it is working on its own Social networking Website calledGoogle+.

A Beginners Guide to Ethical Hacking

I wish this book was around when I began my journey to learn how to hack. It was made specifically for the beginners who really want to get into hacking and for those of us who began and got lost. The author of this book is Rafay Baloch, an expert into the field of hacking. His book "A Beginners Guide To Ethical Hacking" contains all the interesting hacks, and the best part of this e-book is that he has written it in such a manner that even a 5th grade kid can understand it and become a Hacker.

Facebook Hacking Course

Are you shocked? Well, many irritated hacking pseudo-experts asked me such a question.

Thanks to the media, the word “hacker” has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there’s no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.

Learn How To Hack With The Hacker's Underground Handbook

Learn How To Hack And What it Takes to Crack Even the Most Secure Systems

A couple of days ago I find great hacking (e)book called The Hacker’s Underground Handbook, (e)book that comes as an aid for all those that are starting journey to learn how to hack. It was made specifically for the beginners who really want to get into hacking and for those of us who began and got lost.

A brief history of hacking


The world is full of hackers, or so it seems. In the past few months barely a day has gone by without news of a fresh security breach.
Multi-national companies have been left counting the cost of assaults on their e-mail systems and websites.
Members of the public have had their personal information stolen and pasted all over the
internet.

Fox News hacker tweets Obama dead


Hackers have taken over a Twitter account belonging to US broadcaster Fox News and declared President Obama dead.
The @foxnewspolitics feed stated: "BREAKING NEWS: @BarackObama assassinated, 2 gunshot wounds have proved too much."
More than two hours after the malicious postings appeared,
they had still not been removed.

How to Hack E-Mail Account Password - Email Hacking Software

How to Hack E-Mail Account Passwords Using Trojans and Keyloggers

I've been posting a lot about Email Hacking on this blog. Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

How To Hack Your School Network

Because of the frequency this question has been asked on this blog, i have decided to create a document for this question. This tutorial is for those newbies out there, wanting to "hack" their school. I'm gonna start by saying, if your going to hack the school, theres a high probability you get caught, and don't do anything dumb like deleting the network. Its lame, and you will get flamed for doing it. This hack will allow you to take control of the PC's at school. Lets start:

How Hackers Hack and What You Can Do To Foil Them


If you’re a home user and only have the basics (firewall + anti-virus/spyware), you don’t stand a chance against a more sophisticated hacker. Your anti-virus/spyware software won’t detect their presence and you won’t see any errant computer behavior. The hacker is going to do all kinds of things to your computer that you won’t even be aware of, including but not limited to: making configuration changes; swapping out legitimate programs and utilities; disabling certain security features; and taking anything and everything of possible interest. After he’s obtained what he’s looking for, he’ll erase every trace of his activities and tools from your computer and disappear.

Protection Against Keyloggers and Trojans


Keyloggers and Troajans sometimes are extremely difficult to detect as hackers can use methods such as crypting, binding and hexing to evade antivirus detection. Once installed into victims computer,  the trojan or the keylogger can give a hacker complete access to your computer. Trojans and keyloggers are one of the most dangerous forms of malware.
Below are some of the methods you can use to protect your computer from harmful Keyloggers and Trojans.

Beware of Phishing Attacks


Phishing is a method of stealing login info (usernames and passwords) by directing the victim to a clone (fake) login page, that logs the login info without the knowledge of the victim. Such clone website is known as a phisher. eBay, PayPal and other online banks are common targets. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.

What is Social Engineering?


Social Engineering is the art of Hacking In Real Life. Social engineering is the art of getting people to tell you stuff that they usually wouldn’t disclose, through the use of words and your appearance.

How To Hack an Email Account – Email Hacking Methods


One of the most frequently asked questions by the internet users is “Is it possible to hack an email account?” I’ll start by saying Yes! As a matter of fact, almost anything can be hacked. But before we go on, let’s talk about email security for a moment. You may already know that email is insecure; however, it may surprise you to learn just how insecure it really is.

Learn Hacking From The Basics

We live in a society influenced by media. Every day, media bombards us with new visions of stereotypes and suggests how to perceive the world around us. To put it literally – media form our perception of the world. We used to divide people into fat and thin, clever and stupid, poor and rich, those “backward pagans” and believers, and finally – into computer laymen and hackers.

What’s The Difference Between Hackers And Crackers


What Is A Hacker?
A Hacker is known to build things, solve problems and not break or crack any system. The computer industry initially hired good programmers to make sure how to full proof their system. However, over the years, the media, journalism and writers have played a very important role in changing the real meaning of the word hacker. They themselves are very confused in the term Hacker and a Cracker. A typical definition of a Hacker, that today comes to you mind is that a Hacker, is a person who tries to gain unauthorized access to any property and computers.

Twitter Delicious Facebook Digg Stumbleupon Favorites More