Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Sunday, May 29, 2011

COMPUTER NETWORKS: CHAPTER 5- OSI model cont.

COMPUTER NETWORKS: CHAPTER 5- OSI model cont. hello guys ... how is it going ? my gal ditched me :(anyway i give a damn ...so we just finished a brief introduction of THE OSI model. today m gonna take a lookat how OSI model works in real life ..here we go baby(if u are confused a bit about ports and all that dont worry , i will cover it )ok as you...

Friday, May 27, 2011

Chapter 12 : SQL Injection (Site Hacking)

Uptill now,we have seen few terms related to hacking and some methods to hack passwords like phishing,keyloggers etc. Now we are moving a little forward.Now in this thread i m going to post something about SQL INJECTION. Its a type of hacking with the help of which we can hack sites (mostly the newly born sites and educational sites ) Ok buddiez...

Chapter 11 : Hack email thru brute force

Here is a tutorial how to hack email ids thru brute force,its not so much efficient process because it takes a lot of time .... anyhow i thought to share it with u guys atleast it will give u some knowledge .... Follow these steps : Procedure : 1.Download Brute Force Software . 2.Excract on desktop and lets start/ ok run it 3.To hack email in target bar write: pop.mail.yahoo.com 4.Type most be: POP3 5.Put connections to 60 and timeout to 60 6.Make sure you check a ''Single User'' 7.Then...

Thursday, May 26, 2011

COMPUTER NETWORKS :CHAPTER 4

COMPUTER NETWORKS : CHAPTER 4- The OSI model cont. hello guys .. how u doin !!! its a little hot in here ... grrrranyways enough shitin last chapter we stopped at session layer...wat is the next layer ??its transport layerTRANSPORT LAYER First of all this is the most important layer in my opinion.this layer describes in which manneror in which way...

Tuesday, May 24, 2011

COMPUTER NETWORKS :CHAPTER 3- Understanding the OSI model

COMPUTER NETWORKS :CHAPTER 3- Understanding the OSI model Hello guys, here we are on chapter 3 0f computer networks.Sorry i wasout of town so i coudnt post , anyways in this post i will bediscussing about THE OSI MODEL.some of you might have heard OSI model.Or you may have heard "thisis a layer 4 function or this layer deals with data packets etc etc".Anyway...

Monday, May 23, 2011

[EARN] Only for PAKISTANIS

I am receiving a lot of emails these days about how to earn online money and can we really earn money through internet etc. So, I thought of explaining about earning through internet. Yes , its really easy to earn online money.We have seen a lot of things related to online earning but usually we believe that these are all scam .... don't pay ..... That's...

Chapter 10 : RATs (Hacking on Server's PC)

" Copyrighted " Introduction : A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as: Screen/camera capture or control File management (download/upload/execute/etc.) Shell control (usually piped from command prompt) Computer control (power off/on/log off)  But this can also be misused. It is used only on one servers means you can use RAT on all the computers...

Sunday, May 22, 2011

Hack bux.to and make money

Bux.to is a PTC site(Paid to click).You get paid to click on ads and visit websites. The process is easy! You simply click a link and view a website for 30 seconds to earn money.In this article i will show you on How to hack bux.to to browse ads.By using this trick you will be able to surf more ads and the most amazing part is that you will not...

Saturday, May 21, 2011

COMPUTER NETWORKS : CHAPTER 2 - some more basics

COMPUTER NETWORKS : CHAPTER 2 -basic communicationI hope you read first chapter , well if you already know that than no problem .we will start chapter 2 and i will be writing about how devices communicate in a LAN and how they communicate to cloud. BRIEF INFRA OF LAN Ok now u are in a LAN , then you must see a cable connected to your laptop or PC or...

COMPUTER NETWORKS : CHAPTER 1

COMPUTER NETWORKSHello guys , This is kumar sourav. I m writing my first post and i will be concentrating on computer networks as you gonna need it in long run. I will write these in different chapters , and i will focus mainly on CISCO routers , switches and hubs .Anyway thanks a lot to HACK WITH STYLE and XEO HACKER .Now we start.There is mainly...

Chapter 9 : Hack into Someone's PC using Keylogger

Ardamax Keylogger Ardamax Keylogger 2.9 is good, but not as good as Ardamax Keylogger 2.8, reason being is because on Ardamax Keylogger 2.9, when your victim clicks the file, it comes up saying "This will install Ardamax monitoring tool, do you wish to continue?", where as if you use Ardamax 2.8, it will just infect they're PC when they...

Friday, May 20, 2011

Facebook dislike button is spam

It's some sort of scam/spam.. Think about it, how many facebook applications require you to install a Mozilla add on.. No idea what the dodgy mozilla add on does.. Hopefully people scroll down to the reviews and work out that it isn't a good idea to install it. The worrying thing is this group has over 600,000 members. Oh and if people really...

Wednesday, May 18, 2011

Online Clases

Hello guys, these days I am receiving a lot of mails in which guys are saying to teach them hacking . So I have decided to start the online classes as we have started in the last December . Timings for these classes are : Timings 21st May,2011  at  12a.m 23rd May,2011  at  12a.m 25th May,2011  at  12a.m 27th May,2011  at  12a.m 29th May,2011  at  12a.m If we need to add more classes then we will do it . Charges for this course is as follows : ChargesYou...

Chapter 8 : Phishing ( The fake page )

Sorry guys ,I was little busy thats why cant post it . Anyways now its here ...INTRO First i wanna tell u what is phishing .... Suppose you want to hack the facebook account of anyone , then to hack account u make a fake page of facebook which looks like the original one but is attached to your site .... u send this page to your friend saying anything like "hey new version of facebook,check the hidden pics of girls " . Now he must try to login on it . once he typed his pass and click login,he...

Saturday, May 14, 2011

Chapter 7 : Changing the ip address and bypassing the firewall

Proxy is changing ur ip adress.dis chapter is totally related 2 changing ur ip address,changing ip address is very much imp. bcoz by doing it, we get many benefits.we can download multiple files 4m rapidshare by dis we can bypass a firewall der r many sites vch allows only one account on 1 ip address,on dose sites we can make multiple ids by...

Chapter 6 : Softwares and Cracking

This summary is not available. Please click here to view the po...

Chapter 5 : SEARCH ENGINE OPTIMIZATION

SEARCH ENGINE OPTIMIZATIONNowwards we will moov 2 SEO[SEARCH ENGINE OPTIMIZATION],thenwards SOFTWARES ND CRACKING ,THEN WARDS PROXY ND THENWARDS HACKING IN 2 OTHER'S COMUTER. THESE R D NEXTCHAPTERS. LET'S START learning seo. Well,SEO gives us d exact thing vch we want 2 get 4m google.suppose dt u r searching 4 something on google then google gives...

Page 1 of 9112345Next
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers