Sunday, January 30, 2011
Saturday, January 29, 2011
Friday, January 28, 2011
How to Find the IP Address of a Remote Computer
Most of you may be curious to know how
to find the IP address of your friend’s computer or to find the IP
address of the person with whom you are chatting in Yahoo messenger or
Gtalk. In this post I’ll show you how to find the IP address of a remote
computer in simple steps.
I have created a PHP script to make it
easier for you to find the IP address of the remote computer of your
choice. Here is a step-by-step process to find out the IP address.
Wednesday, January 26, 2011
How to Alter Windows Product ID
If you are running a Microsoft Windows
operating system on your computer, then you are most likely aware of the
fact that your PC will have a Product ID. This Product ID is a system
specific alphanumeric code which is derived/calculated based on the
Windows product key you use and the hardware configuration of your
Computer. In simple words, Product ID is the alphanumeric code that you
see when you Right-Click on the My Computer icon and select the Properties option.
How to Hack Windows Administrator Password
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation
where in we need to gain access to a computer which is password
protected or at times we may forget the administrator password without
which it becomes impossible to login to the computer. So here is an
excellent hack using which you can reset the password or make the
password empty (remove the password) so that you can gain administrator
access to the computer.
Saturday, January 22, 2011
Wednesday, January 19, 2011
How To Send Anonymous Emails
Most of us are very curious to know a method to send anonymous emails to
our friends for fun. But the question is, is it possible to
send anonymous emails in spite of the advanced spam filtering technology
adopted by email service provides like Gmail, Yahoo etc? The answer is YES,
it is still possible to bypass their spam filters and send anonymous
emails to your friends. For example, you can send an email to your
friend with the following sender details.
Monday, January 10, 2011
Sunday, January 9, 2011
Friday, January 7, 2011
If your PC has multiple users then you can now display legal notice to
every user before they login to your PC. This legal notice will be
displayed at every startup just before the Desktop is loaded. Using
this you can tell your friends about the do’s and dont’s in your
computer when they login in your absence. Well you can do this pretty
easily. For this there is one small registry hack. Here is the
step-by-step instruction to do this.
Wednesday, January 5, 2011
How to Hack an Email using Hardware Keylogger
A software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered through the keyboard.
Now I’ll tell you what is a hardware keylogger and how it can be used for hacking an email.
Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.
Now I’ll tell you what is a hardware keylogger and how it can be used for hacking an email.
Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.
Is your Nokia Cell Phone Original
Nokia is one of the largest selling phones across the globe. Most of
us own a Nokia phone but are unaware of it’s originality. Are you keen
to know whether your Nokia mobile phone is original or not? Then you are
in the right place and this information is specially meant for you.
Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).
Then check the 7th and 8th numbers
Phone serial no. x x x x x x ? ? x x x x x x x











