Sign Up To Recive Latest Blog Updates

subscribe to Hacks N Cracks

Enter your email address:

Delivered by FeedBurner

Understanding Hash Functions and Keeping Passwords Safe

From time to time, servers and databases are stolen or compromised. With this in mind, it is important to ensure that some crucial user data, such as passwords, can not be recovered. Today, we are going to learn the basics behind hashing and what it takes to protect passwords in your web applicatio...

3 Fabulous New Google Search Tricks

Except for Google, I can’t think of a monopolistic business that is so dutiful in updating its products and rolling out new features ever so often. They might have the nasty habit of snooping our browsing habits and history, but Google does a bang up job in identifying the domains in search that needs improvement.Last week, Google unveiled three brilliant...

10 Twitter Tools to Boost Your Efficiency

Twitter recently announced that over 200 million Tweets are posted each day. This is an incredible figure, underlying the success of the service. Spending time on Twitter boasts plenty of advantages, yet I’ve found that one can get easily sucked in and spend too much time than is good for our workflow.So here are 10 great tools that I am using each...

The ABCs of Web Development

Web development can often be an utterly perplexing affair. Today, aimed at beginners, I’d like to introduce you to twenty six concepts or technologies, each mapping to a letter of the alphabet. Sounds wonky? It probably is! Let’s get started after the ju...

Can You Hack Your Own Site? A Look at Some Essential Security Considerations

Version one goes gold! Visitors are landing from every corner of the globe. You know there are likely to be a few teething problems; I mean, this is 1.0.0.0… all those zeroes are meant to allow us a little grace, right?Maybe that dastardly style sheet just won’t cascade elegantly on browser X. An incomplete comment chucks out some broken mark-up....

How to Track the location of an IP address

Lookup details about an IP address including location, ISP, hostname, type, proxy, blacklist status and more. Trace, Track and Locate an IP address. In this post i want to show you some useful tips to find out the exact location of an IPaddress. For example, if you pick up a proxy from a proxy list (like SamAir.ru), you get only the country where...

How to find the IP address of the email sender in Yahoo! Mail

Guide to tracking of emails to find sender's IP address using email headers. In this tutorial i shall be writing about the trick to get the IP Address of sender in Yahoo Mail. This is useful if someone is spamming your inbox with junk mail or any other reason you may have to find the location of the email sender...

How to Change Your IP Address and Surf The Web Anonymously

Download Invisible IP Map to surf anonymously in internet. Hide your IP and encrypt your connection. Previously i've posted "How to find the IP address of the email sender in Yahoo! Mail" and "How to Track the location of an IP address". In this article i'm going to show you a software, Invisible IP Map, that can make you be "anywhere" in world....

Pranav Mistry SixthSense Technology is thrilling potential: Real Hacker from India

Pranav Mistry SixthSense Technology is thrilling potential: Real Hacker from India SixthSense Technology : Interactions between the real world and the world of data At TEDIndia, Pranav Mistry demos several tools that help the physical world interact with the world of data -- including a deep look at his SixthSense device and a new, paradigm-shifting...

How to Protect Your Computer from Keyloggers

Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keylogge...

Hackers steal over a million emails from Washington Post jobs site

Passwords, job accounts safe, says Jobs site  The Washington Post has said that the database of its jobs site had been breached by hackers who stole about 1.27 million users' IDs and email addresses.The company said on its website that the Washington Post Co's jobs website was breached twice last month. Washington Post said it took immediate...

Web Browser Grand Prix 5: Opera 11.50, Firefox 5, And Chrome 12

Three major released have landed since our last impromptu Web Browser Grand Prix (WBGP4): Chrome 12, Firefox 5, and Opera 11.50. Can Chrome or Opera regain the WBGP championship? Will Mozilla Firefox ever overtake Microsoft's IE9 in the rankin...

10 LARGEST HACKER ATTACKS

We have entered a golden age for the nefarious world of hackers. According to a recent studypublished by Verizon and the U.S. Secret Service, incidents of data compromise climbed more than 400 percent in 2010 from the previous year to 761 breache...

LulzSec Exposed

Based on LulzSec chat logs, we can conclude the roles of LulzSec members during the 50 days of mayhem.  The Details geven below is all shared by WEB NINJAS on www.lulzsecexposed.blogspot.co...

Facebook Launched Video Chat With Skype Partnership

Finally, Facebook launched video Chat feature.It has partnered with skype for video chat.Facebook has started to feel the heat of competition as Google+ which was launched a week earlier has already features like Group Video chat  and now facebook is trying to play the catch up gam...

Make Facebook Account Like Google+ With Circle Hack

Google+ introduced the concept of using circles to organise friends.Now a new facebook application called Circle Hack has tried to copy this feature.It provides graphical interface like google+ circles with the Drag and drop feature.But the functionality provided by circle hack is limited as compared to Google+.In google+ you can control...

Google+ is New Facebook Rival

Not long ago social networking was ruled by Myspace.Now,it has been completely shadowed by Facebook which has an estimated 750 million users.At present there is no social networking site that could challenge the dominance of facebook.Finally Google has confirmed that it is working on its own Social networking Website calledGoogle...

A Beginners Guide to Ethical Hacking

I wish this book was around when I began my journey to learn how to hack. It was made specifically for the beginners who really want to get into hacking and for those of us who began and got lost. The author of this book is Rafay Baloch, an expert into the field of hacking. His book "A Beginners Guide To Ethical Hacking" contains all the interesting hacks, and the best part of this e-book is that he has written it in such a manner that even a 5th grade kid can understand it and become a Hacke...

Facebook Hacking Course

Are you shocked? Well, many irritated hacking pseudo-experts asked me such a question. Thanks to the media, the word “hacker” has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there’s no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community...

Learn How To Hack With The Hacker's Underground Handbook

Learn How To Hack And What it Takes to Crack Even the Most Secure Systems A couple of days ago I find great hacking (e)book called The Hacker’s Underground Handbook, (e)book that comes as an aid for all those that are starting journey to learn how to hack. It was made specifically for the beginners who really want to get into hacking and for those of us who began and got lost...

A brief history of hacking

The world is full of hackers, or so it seems. In the past few months barely a day has gone by without news of a fresh security breach.Multi-national companies have been left counting the cost of assaults on their e-mail systems and websites.Members of the public have had their personal information stolen and pasted all over the interne...

Fox News hacker tweets Obama dead

Hackers have taken over a Twitter account belonging to US broadcaster Fox News and declared President Obama dead.The @foxnewspolitics feed stated: "BREAKING NEWS: @BarackObama assassinated, 2 gunshot wounds have proved too much."More than two hours after the malicious postings appeared, they had still not been remove...

How to Hack E-Mail Account Password - Email Hacking Software

How to Hack E-Mail Account Passwords Using Trojans and Keyloggers I've been posting a lot about Email Hacking on this blog. Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease....

How To Hack Your School Network

Because of the frequency this question has been asked on this blog, i have decided to create a document for this question. This tutorial is for those newbies out there, wanting to "hack" their school. I'm gonna start by saying, if your going to hack the school, theres a high probability you get caught, and don't do anything dumb like deleting the network....

How Hackers Hack and What You Can Do To Foil Them

If you’re a home user and only have the basics (firewall + anti-virus/spyware), you don’t stand a chance against a more sophisticated hacker. Your anti-virus/spyware software won’t detect their presence and you won’t see any errant computer behavior. The hacker is going to do all kinds of things to your computer that you won’t even be aware of, including...

Protection Against Keyloggers and Trojans

Keyloggers and Troajans sometimes are extremely difficult to detect as hackers can use methods such as crypting, binding and hexing to evade antivirus detection. Once installed into victims computer,  the trojan or the keylogger can give a hacker complete access to your computer. Trojans and keyloggers are one of the most dangerous forms of malware.Below...

Beware of Phishing Attacks

Phishing is a method of stealing login info (usernames and passwords) by directing the victim to a clone (fake) login page, that logs the login info without the knowledge of the victim. Such clone website is known as a phisher. eBay, PayPal and other online banks are common targets. Phishing is an example of social engineering techniques used to fool...

What is Social Engineering?

Social Engineering is the art of Hacking In Real Life. Social engineering is the art of getting people to tell you stuff that they usually wouldn’t disclose, through the use of words and your appearanc...

How To Hack an Email Account – Email Hacking Methods

One of the most frequently asked questions by the internet users is “Is it possible to hack an email account?” I’ll start by saying Yes! As a matter of fact, almost anything can be hacked. But before we go on, let’s talk about email security for a moment. You may already know that email is insecure; however, it may surprise you to learn just how insecure...

Learn Hacking From The Basics

We live in a society influenced by media. Every day, media bombards us with new visions of stereotypes and suggests how to perceive the world around us. To put it literally – media form our perception of the world. We used to divide people into fat and thin, clever and stupid, poor and rich, those “backward pagans” and believers, and finally – into computer laymen and hacker...

What’s The Difference Between Hackers And Crackers

What Is A Hacker?A Hacker is known to build things, solve problems and not break or crack any system. The computer industry initially hired good programmers to make sure how to full proof their system. However, over the years, the media, journalism and writers have played a very important role in changing the real meaning of the word hacker. They...

Page 1 of 5412345Next
Twitter Delicious Facebook Digg Stumbleupon Favorites More