Saturday, 31 December 2011

CEH v7 Instructor Slides


     This package includes the following modules.
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing


Thursday, 29 December 2011

Angry Birds for PC Full for Free


        The most popular and addictive mobile game Angry birds is now available for PC. To play this game your PC should have following hardware.
  • Operating System: Windows ® XP / Vista / Windows ® 7 
  • Processor: 2GHz 
  • Memory: 512 MB 
  • Video: 3D-graphics card compatible with DirectX, 128 MB 
  • Sound Card: Sound device compatible with DirectX ® 9.0c
  • Free space on hard disk: 45.2 MB

Learning PHP, MYSQL and Javascript



     This book will help you to:

  • Understand PHP essentials and the basics of object-oriented programming
  • Master MySQL, from database structure to complex queries
  • Create web pages with PHP and MySQL by integrating forms and other HTML features
  • Learn about JavaScript, from functions and event handling to accessing the Document Object Model
  • Use libraries and packages, including the Smarty web template system, PEAR program repository, and the Yahoo! User Interface Library 
  • Make Ajax calls and turn your website into a highly dynamic environment
  • Upload and manipulate files and images, validate user input, and secure your applications

      NOTE : Password for the rar file is tricks4u


Wednesday, 28 December 2011

HTML in 10 Steps or Less


If you are building your own Web pages and need HTML solutions fast, then this book is for you-whether you're new to Web site authoring or you need a quick refresher on how to create a table. Open the book and you'll discover clear, easy-to-follow instructions for more than 250 key HTML Web tasks, each presented in ten quick steps-or less. Easy-to-navigate pages, lots of screen shots, and to-the-point directions guide you through every common (and not so common) HTML challenge-and help you get more done in less time.
  • Each solution is ten steps-or less-to help you get the job done fast
  • Self-contained two-page spreads deliver the answers you need-without flipping pages 
  • A no-fluff approach focuses on helping you achieve results
  • A resource packed with useful and fun ways to get the most out of HTML

   NOTE : Password for the rar file is tricks4u



Monday, 26 December 2011

Social Engineering - The art of human Hacking


                 The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.


  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

      NOTE : Password for the rar file is tricks4u



Thursday, 22 December 2011

Teach yourself Linux in 24 hours


              Sams Teach Yourself Linux in 24 Hours is a tutorial aimed at making the Linux beginner more effective and productive users of the operating system. Most books in this category are more of a general reference in nature and are designed to cover Linux in general. Well, every Linux distribution is different - file locations can change, commands can be a little different, etc. This means the readers of those books may not find answers specific to their installation. This book will use the effective Sams Teach Yourself format to instruct the reader how to: install the operating system, configure their hardware, and effectively use the tools that come with the Red Hat distribution included on the CD-ROM.

  • Learn how to install Red Hat Linux by walking through an easy to follow hardware configuration
  • Understand how to use Linux commands, configure your network and servers and manage users of your system
  • Discover the power of X(TM) Windows

   NOTE : Password for the rar file is tricks4u


Tuesday, 20 December 2011

Getting good with Javascript

Rockable javascript

        This book will introduce you to important programming concepts, It will show you how to write your first scripts, and make you comfortable with JavaScript codes. You will learn following topics in this book.


  • The basics of types, variables, and operators
  • Best practices for efficient coding
  • Testing and optimizing your JavaScript
  • Interacting with HTML elements
  NOTE : Pawword for the rar file is tricks4u


Sunday, 18 December 2011

Backtrack Hacking Video Tutorials

Backtrack Hacking Video Tutorials
This are amazing video tutorials of backtack which include very good collection of hacking videos using backtrack such as sql injection, phone phreaking, wireless hacking, website hacking, network hacking and more. Below is the complete list of videos included in DVD. 

Videos Included In The DVD

  • Episode 1 – Network Hacking – Arp Poisoning
  • Episode 2 – Wireless Hacking – Cracking WEP
  • Episode 3 – Wireless Hacking – DeAuth
  • Episode 5 – Lock Picking – Bump Key
  • Episode 6 – Phone Phreaking – Beige Box
  • Episode 7 – Phone Phreaking/Network Hacking – Sniffing VOIP
  • Episode 8 – Lock Picking – DIY Padlock Shims
  • Episode 9 – Lock Picking – Mult-Disc Combo Locks
  • Episode 10 – Hacking Basics – MD5
  • Episode 11 – Website Hacking – Sql Injection
  • Episode 12 – Hacking Basics – Backtrack
  • Episode 13 – Website Hacking – XSS
  • Episode 14 – Staying Secure – SSH Tunnel
  • Episode 15 – Modding – Xbox Softmod
  • Episode 16 – Wireless Hacking – Cracking WPA
  • Episode 17 – Triple Boot – Windows, Backtrack, & Ubuntu
  • Episode 18 – Local Password Cracking
  • Episode 19 – Lock Picking Basics
  • Episode 20 – Ettercap
  • Episode 21 – XSS Tunnel
  • Episode 22 – Playstation 2 Softmod
  • Episode 23 – Cracking WEP Update
  • Episode 24 – Bypass Hotspot’s Access Controls

  • Underground – Install Backtrack 3 on USB
  • Underground – CSRF(Cross Site Request Forgery)
  • Underground – Alternate Data Streams
  • Underground – Local File Inclusion
  • Underground – Windows Privilege Escalation
  • Underground – Bluetooth Hacking
  • Underground – VMWare
  • Underground – Fix Google Mail Enumerator
  • Underground – Home Made Lock Picks
  • Underground – Downfalls of Anti-Virus Software Part 2
  • Underground – Downfalls of Anti-Virus Software
  • Underground – Evilgrade
  • Underground – Trojan Basics
  • Underground – Manipulating Windows User ***s
  • Underground – Combine Files
  • Underground – Password Phishing
  • Underground – Windows SMB Relay Exploit
  • Underground – Application Patching
  • Underground – Metasploit Autopwn
  • Underground – Email Spoofing
  • Underground – Introduction
  • Extracting Database Information from Information_Schema
  • FPGA MD5 Cracker
  • Arduino ARP Cop
  • Email Injection
  • Ping of Death
  • DNS Spoofing with Virtual Hosts
  • Bypass Cisco Clean Access & Cisco NAC Appliance
  • Dual Boot – Windows & Backtrack
  • Sql Injection Challenge How-to
  • How to use Intel Pro/Wireless 3945ABG in Backtrack 2
  • Local Privilege Escalation Vulnerability in Cisco VPN Client


Friday, 16 December 2011

Introduction to Linux - A Begineers Guide

       
               Many people still believe that learning Linux is difficult, or that only experts can understand how a Linux system works. Though there is a lot of free documentation available, the documentation is widely scattered on the Web, and often confusing, since it is usually oriented toward experienced UNIX or Linux users. Today, thanks to the advancements in development, Linux has grown in popularity both at home and at work.
The goal of this guide is to show people of all ages that Linux can be simple and fun, and used for all kinds of purposes. This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples and encouraged to try out things on your own.

NOTE : Password for the rar file is tricks4u



Thursday, 15 December 2011

Ankit Fadias Ebook Collection

            This are a full collection of ankit fadias ebooks which includes almost all his ebooks if u like it then download it from below link. Some of Ebooks included are DOS attack,hacking into linux, Defacing websites  etc. Below is the screen shots of the all books included in download. For such more ebooks and tutorials subscribe below.







      Note: Password for the rar file is tricks4u



Wednesday, 14 December 2011

How to become Worlds No 1 Hacker

hacking ebooks

      This book will give you information on different concepts of hacking like cracking wireless network,hacking cell phone and many more. Below is the full list of hacking topics included in this book.

  • Attack Basics
  • Password Basics
  • Account Basics
  • Denial of Service Basics (DOS)
  • Logging Basics
  • Spyware
  • Port Scanning
  • Unix remote attack
  • SQL injection
  • Spoofing and Hijacking
  • Social Engineering
  • How to become hacker in 15 minutes
  • Making money as Hacker
      NOTE: Password for the rar file is tricks4u



Monday, 12 December 2011

World trade center attack trick on notepad


            As some of you might be knowing that the flight number of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence or anything else but whatever it is, it does startle us. you will be definately amazed by the this trick.

  • First open Notepad.
  • Type “Q33N” (without quotes) in capital letters.
  • Increase the font size to 72.
  • Change the Font to Wingdings.

   Enjoy and subscribe below !!!

Sunday, 11 December 2011

Advance Matrix Effect Using Notepad

Advance Matrix Effects
I had previously posted about Matrix effect using Notepad . But this is more advance and it looks more realistic then the previous one. So open up your notepad and get started.

How To Create Matrix File ?

  1. Open Notepad and copy below code.

@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t  
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A

  2. Save the file as matrix.bat  (.bat is must)
  3. Done enjoy !!

    More Cool Tricks

    Friday, 9 December 2011

    Java Programming Ebook for Free

    • This book is for kids from 11 to 80 year old .
    • This book is for parents who want their child into computer programming .
    • This book is for college students who are looking for a suppliment to over complicated textbooks.
    • This book is easy for begineers of any age.
       NOTE : Password for the rar file is tricks4u 



    Make personal diary using notepad



                  Do you know that you can use your Notepad as a simple digital diary or a personal Log-Book to keep record of your daily work instead of using boring pen and book ? Well, if you dont know then follow the below mentioned steps to make one for yourself !


    • First open up the Notepad.
    • Then Type in .LOG (in capital letters) and press enter.
    • Save it with any name and close it.
    • Open the file again.

                  When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.

    Thursday, 8 December 2011

    Watch Star Wars movie in CMD

           
                        This is very intersting and amazing command prompt trick which will play star wars movie in the command prompt or cmd. Below are complete steps with screen shots for this trick with. Without wasting time lets gets started.


           1. Go to start > Run and type in cmd and press enter
           2. Now type in telnet as shown below and press enter.


           3. After that enter o as shown below and press enter.


           4. Next enter towel.blinkenlights.nl as shown below and press enter.


           5. Now star wars movie will start playing on your command prompt.


           6. Enjoy !! and dont miss to subscribe below .

    Wednesday, 7 December 2011

    How to open number of sites with one click ?

                   Today i will show you how to make a batch file which will open number of websites with just one click. You can also use this method to open different computer programmes like internet explorer, notepad etc.

    • Open Notepad and copy below codes
    @echo off
    start www.coolhacking-tricks.blogspot.com/
    start www.google.com
    start www.facebook.com
    • Save this file as batch.bat
    • Now open your save file and it will open three websites wilth just one click.
    • You can also add more sites by writting Start followed by websites

    Tuesday, 6 December 2011

    Hacking For Begineers Free Ebook

    Hacking For Begineers
    Hacking for begineers, as the name says is completely for begineers you can begin your hacking journey with this book or Hackers underground handbook both are amazing books for noobs. The book is well written and you will enjoy reading it. More Ebooks and tutorials are own its way so subscribe below and dont miss them. Below are some topics covered in this book.

    • Concept of Ethical hacking
    • Email Hacking
    • Windows Hacking
    • Linux Hacking
    • Wireless Hacking
    • Mobile Hacking
    • Trojans
       Note : Password for the rar file is tricks4u


    Sunday, 4 December 2011

    Uninstall WindowsProgrammes With A Right Click

    Uninstall Windows programmes with a right click
    As you know when ever we want to uninstall any windows program we need to go to control panel and manually uninstall them. But here is a trick which let you uninstall any windows program from their desktop shortcuts. MenuUninstaller is a free peace of software that adds an "Uninstall" option to the Windows context menu so you can remove programs from their shortcuts.

    How To Uninstall WindowsProgrammes With A Right Click ?

      1. Download  Menu Uninstaller  and install it on your pc.
      2. After installing an uninstall option will be added to your windows context menu.
      3. Right click on any shortcut and you will See Uninstall option as below.
    Uninstall WindowsProgrammes With A Right Click
      4. Click on it to uninstall any programme.
      5. Check out some other cool trick and tips given below.

    Awesome Computer Tricks For You

    List of some good proxy sites

    proxy sites

                 Below is the list of some good proxy site which you can use to surf anoymously on the internet . Even you can use this proxy sites to open block website in school or offices. For example you can use facebook if it is block at your school or office.

    List Of Top Proxy Sites


    http://aniscartujo.com/webproxy
    http://www.badboysproxy.com
    http://www.surfscreened.com
    http://www.hagiomusic.info
    http://www.greenpips.info
    http://urlbrowse.com
    http://www.hideipaddress.net
    http://www.sneakfilter.com
    http://www.browsestealth.com
    http://www.sneak1.info
    http://proxiesrus.com
    http://www.surfindark.com
    http://www.navydog.com
    http://falsario.com
    http://www.proxypit.com
    http://www.proxypan.com
    http://myspacewebproxy.org/
    http://www.allfreehere.info
    http://www.takefreely.info
    http://autobypass.com
    http://www.proxcity.info
    http://www.proxyzip.org
    http://www.cheekyproxy.com
    http://www.eggproxy.com
    http://www.theschoolcloak.com
    http://www.hidemefast.com
    http://browseanywhere.info
    http://www.404surf.com
    http://www.cloakip.net
    http://www.browsedark.com
    http://www.dartprox.com
    http://www.proxish.com
    http://www.surfsneak.com
    http://www.surfsneaky.com
    http://www.browsehidden.com
    http://www.filterhide.com
    http://www.browsesneak.com
    http://myspaceproxyy.com
    http://www.browsesneaky.com
    http://www.proxyz.us
    http://www.sneakschool.com
    http://www.iphide.com
    http://www.proogle.info
    http://greatproxy.info
    http://www.playnsurf.info
    http://www.realproxy.info
    http://aplusproxy.com
    http://www.ecoproxy.com
    http://freedom.webtuo.com
    http://www.slyuser.com/
    http://tenpass.com
    http://pawxy.com
    http://pawxy.org
    http://logu.in

    Saturday, 3 December 2011

    Trick to find facebook Profile ID


                   In my previous post i have posted about Facebook status update trick in which we use profile id, but what if  person got username. So this is the trick which will let you get profile id of any person who got custom username. Check below image and see how URL of  facebook profile looks before and after custom username.



                      In case of Profile ID before custom username you can easily identify it by looking at Profile URL, But in case of profile with custom username its not same. Below are simple steps to find Profile ID having custom username.
    • Go to the profile you want to find Profile ID
    • That URL will look like this www.facebook.com/username
    • Change that URL to graph.facebook.com/username
    • Then you will get something like below image.

            

       Subscribe below For such more tutorials !!!

    Friday, 2 December 2011

    What Is Keylogger And How To Be Safe From Keyloggers?

    keyloggers
    In this tutorial i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.

     1. What is keylogger ?

    You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

    2. How it can harm you ?

    In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
    • Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.

    3. Types of  keyloggers 

    There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.

                                  HARDWARE KEYLOGGER                                  
    hardware keyloggers 

     SOFTWARE KEYLOGGER
     software keyloggers
                                  

     4. How to Protect yourself from keyloggers ?

    Keylogger  can be used by your enemy  to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
    • Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
    • You can even use above method to protect your facebook profile, yahoo or gmail id.
    • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

    You May Also Like To Read

    Thursday, 1 December 2011

    Have Fun Playing Snake Game On Youtube

    As you know snake is one of the oldest but also most popular and fun playing game, which can now be played on youtube with a simple trick.You can have fun playing snake game while your video streams.

    How To Play ?

        1. Go to youtube and select any video.
        2. While video is streaming on youtube press left button of mouse and press up arrow key .
        3. Now the streaming circle will start to move like a snake.
        4. Play this snake game with arrow keys.

    Some Cool Tricks