Posts

mobile hacking tricks

Image
Mobile Hack Tricks Call Forging: To call someone from their own number or any number. 1. Go to  http://www.mobivox.com  and register there for free account. 2. During registration, remember to insert Victim mobile number in "Phone number "field as shown below. 3. Complete registration and confirm your email id and then login to your account. click on "Direct WebCall". 4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now"  button to call your friend with his own number. 5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank. Note: This trick will only knowledge purpose...          Just try this trick only known person. Trace MObile Location: Click On Below Link To Trace Unknown Number -> Tr

how to hack networks

Image
Network Hacking Ways To Attack a Network: Ping The IP address gives the attacker’s Internet address. The numerical address like 212.214.172.81 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name.  PING  stands for  “Packet Internet Groper”  and is delivered with practically every Internet compatible system, including all current Windows versions. Make  sure you are logged on to the net. Open the DOS shell and enter the following PING command: Ping –a 123.123.12.1 Ping will search the domain name and reveal it. You will often have information on the provider the attacker uses e.g.:   dialup21982.gateway123.provider.com Pinging is normally the first step involved in hacking the target. Ping uses ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP

how to recover deleted files

Image
Recover Deleted Files Recover My Files Recover My Files data recovery software will recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure. Recover My Files - Data Recovery Software Solution Recover files even if emptied from the Recycle Bin File recovery after accidental format, even if you have reinstalled Windows. Disk recovery after a hard disk crash Get back files after a partitioning error Get data back from RAW hard drives Recover documents, photos, video music and email. Recover from hard drive, camera card, USB, Zip, floppy disk or other media Data Recovery Software Download Current Version:  4.6.8.1012 100% Safe, 100% Secure To Recover deleted or corrupt photos : DiskInternals Flash Recovery 4.2 full download using which you can recover deleted or corrupted photos within few seconds. Isn't that nice, it

future tricks

Image
Future Technology Sixth Sense Technology:                                                                              Part-1 Video                                                            Part-2 Video Microsoft Office Labs In Future: Touch Life In Future: Roller Laptop :

fake sms

Image
Send Fake SMS SMS Mafia SmsMafia is a web texting application. This Service Is Completely Anonymous.Your Mobile No. Will Not Be Shown Anywhere. http://smsmafia.in/ SMS Global Send fake sms from this website.. Make sign up and u will get 25 sms as trial.. www.smsglobal.com  Send International SMS Free Just Add  00  before type the Country Code and then enter the number  Like  0091  For India. No Need To Register

proxy servers

Image
Proxy Server >>Proxy servers :- Its allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server. There are a variety of types of these proxy servers: *  Transparent Proxy   -  This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is n

phishing cooolll

Image
Phishing Attacks Here we tells about PHISHING & How can we protect from it.~! >>WHAT IS PHISHING:- The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.   >>MOBILE PHISHING: Phishing scams are not limited to the internet. Some phishers use the telephone to make requests for information. If you get a call from your banking institution asking for personal information, hang up and call your bank directly. Your bank will have your social security number and account information on file and sh