Sign Up To Recive Latest Blog Updates

subscribe to Hacks N Cracks

Enter your email address:

Delivered by FeedBurner

Singer Lady Gaga Twitter Account got Hacked 2 DAYS AGO

Singer Lady Gaga Twitter Account got Hacked This Morning The singer had her account invaded by some strange Spanish tweets early this morning. It’s been quite a day for going Gaga as the stories just keep on coming. You’d think she had an album coming out so...

Protect Your Mail from Spammers: How Spammers Get Your Email Address?

Protect Your Mail from Spammers: How Spammers Get Your Email Address?You’ve seen the emails: They claim to have been sent by a financial institution in a faraway land, or from a corrupt bureaucrat in an equally corrupt government. Whatever the ruse, the senders always claim to need your help in spiriting away millions of dollars. These schemes, known...

BACKDOOR DISTRIBUTED AS FACEBOOK MESSENGER APPLICATION

New rouge emails posing as official facebook communication service lead users to a 3rd party website which is distributing a backdoor as Facebook Messenger Application. This rouge email bear a subject as "someuser listed you as his uncle" and make use of real theme to look like  real facebook notifications. In the body of message, it informs for...

EBOMB A VIRUS FOR FUN

This is a simple attack that enables running multiple applications in victims pc just to harass him. There are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and type....

COMPUTER SECURITY THREATS | MALICIOUS PROGRAMS | MALWARES

Computer Security Threats | malicious programs | Malwares Computer security threats or Malicious code or Malwares comes in a wide variety of forms and is distributed through an ever growing number of delivery mechanisms. In general malicious program is any software that impedes the normal operation of a computer or networking device. This software...

HOW TO AVOID FACEBOOK SCAMS?

Facebook is the part of people's daily life. It's no. 1 social networking website so it is used for spreading scams by spammers.  Scammers search through Facebook user accounts and gather information from public profiles to send phishing emails so they can gather more secure information such as bank account numbers, credit card numbers and user...

HOW TO PROTECT YOUR EMAIL ID AND FACEBOOK FROM HACKERS

How to protect your email id and facebook from hackers Everybody use email accounts and social networking websites such as orkut, twitter and facebook. There are many important informations of a person in these email accounts and social networking website. so it is important to protect these account from hackers. Because hackers always try to get...

“Ethical Hacking” Case Studies

         “Ethical Hacking” Case Studies Some information and case studies about Ethical hacking!!&nb...

Trojan Horse Softwares & Tools: Download Free Trojan Horses

Tool: QAZ It is a companion virus that can spread over the network. It also has a "backdoor" that will enable a remote user to connect to and control the computer using port 7597. It may have originally been sent out by email. Rename notepad to note.com Modifies the registry ke...

Trojans and Backdoors : Working of Trojans

What actually a backdoor or trojan is. I already posted about trojans so backdoor virus Is  A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.  Working Of Backdoors and Troja...

How to spread a Trojan Horse: Methods to spread Trojan Horse on Internet

Wanna spread some TROJAN  Virus then read below, the modes of transmission..                              Modes of Transmissio...

Types of Trojan Horse Virus

Various Trojan GenreMost of the Trojans use auto-starting methods so that the servers are restarted every time the remote machine reboots / starts. This is also notified to the attacker. As these features are being countered, new auto-starting methods are evolving. Well now     ,some type of trojan virus are...

What is Trojans or Trojan Horse: Backdoors & its Working

We will begin with:Terms of reference for various malicious code Defining Trojans and Backdoors Understanding the various backdoor genre Overview of various Trojan tools Learning effective prevention methods and countermeasures Overview of Anti-Trojan software Learning to generate a Trojan progr...

Facebook has announced TWO FACTOR AUTHENTICATION

Facebook is the main target of hackers and spammers these days. SO facebook security team always try to make it as secure as possible. In this way they have added many security features in the website. Now facebook security team has announce some safety and security changes which include two factor authentication system and improvements to it's Https...

All Facebook CHAT Slangs and Smily Codes

Slang’s have become very common in chat’s,Sms,emails.People new  to these slang’s find really difficult to understand converstion.On the other hand it saves a lot of time and effort if slang’s are used.I will give the most commonly used Slangs with there meanings that are used in facebook chat or S...

Hacks n Cracks

Now, at last with a hard work of modification in ".js" and ".CSS" scripts , I had made a chome extension. As per the statistics i had found that 73% INTERNET users are using the famous browser CHROME , so i decided to make a chrome extension for Hacks N cracks visitors , as it is ease of use and by just a click we can browse the latest posts!...

Google Chrome Shortcut Keys

Today i am going to write some secrets of google chrome. Hey don't think too much. It's only a list of chrome shortcut keys. These keys can help you to navigate and use your chrome browser in faster an easy wa...

How To Use Keyboard Numpad to Control Mouse

I had got to know this feature long ago, but now i am posting it b'coz some times when our mouse is  not working and for some urgent work or for some use , we are not able to use computer perfectly!. Well, I had to because , in school I hate using BALL MOUSE, as they don't work smoothly. So I use the numpad instead to control my mouse pointer...

How to Protect Your Websites From Hackers? How to Protect You BLOGS from Hackers ?

How to Protect Your Websites From Hackers? How to Protect You BLOGS from Hackers ? It’s a nightmare scenario. You go to your website only to find a nasty message from a hacker bragging about hacking your site. And nothing else. As far as you can tell your content is gone and you can’t even find a way to log into your Website, WordPress OR Blogspot...

True Story Behind Underground Hackers: Myth About Blackhat Hackers

True Story Behind Underground Hackers: Myth About Blackhat Hackers Cyber war is nothing but an eye wash, actually speaking cyber war is a created hype by some old kids, in which one thinks himself a soldier and others as toy guns. And the computer as his Kingdome, little knowledge he possess is his wisdom, and tools he posses for hacking are his arms...

Page 1 of 5412345Next
Twitter Delicious Facebook Digg Stumbleupon Favorites More