Send SMS

Hack Wifi Easily

                Hack Wifi Easily
Home

Salam If your internet is slower than usual, then you should check if someone has hacked in your WIFI .In this post I’m going to show you two effective way to check this.



The easiest way is by using free utility called Wireless Network Watcher v1.55 .

1) Go to nirsoft.net and download Wireless Network Watcher v1.55.

2) Install it on your pc and start scanning. It scans your wireless network and displays the list of all computers and devices that are currently connected to your network.

For every computer or device that is connected to your network, the following information is displayed: IP address, MAC address, the company that manufactured the network card, and optionally the computer name. 


If you want to check if someone has hacked in your WIFI without installing any software then you should log in your router . If anyone is connected to your network it will be shown in your router security settings. You can log into your router, usually http://192.168.1.1 . You can check your router ip address using command prompt

1) Run command prompt (cmd)
2)type ipconfig and press enter


3)ipconfig will list your ip , MAC and default gateway address. You can access to your router settings by
 typing default gateway address in your web browser.

4)Log in your router and look at the Home Network -> Devices, this shows all IP addresses connected to your network. 



USB KO RAM Ke Tor Per Use Kare

                 USB KO RAM  Ke Tor Per Use Kare
Home



Jab ap apna " Mamry Card & USB " kisi Shop Par Sale karen to ap use mokaml tor par Farmate krty Han kyun k os main apki family ki photo's ya kuch parsnal Data hota h.. lakin kuch Obas kisam ka log software ka zariye oska Data Recovery kar k wo data internet pe upload kar daty han ..is se Bchne k liye Apni USB Ko Ram Banaye 

USB KO RAM  Ke Tor Per Use Kare ...

Jinab app sab se pehle apni USB pc mein in karen unki propery check karen...bilkul khali honi chahiye USB Driver...jab properties check karo gay to waha apke USB ka naam bhi lika hoga...usse change karen " RAM Drive " naya naam rakk len.
eske baad tarteebwar iss tarah karte jain..

No1 : Right click on My Computer...then Properties.. abb aik adad
window open hogi waha " Advance " par click karen...yaha app dhek len
" Performance " lika hoga issi k samne " Setting " ke button par click karen.. setting par click karne ke baad aik r window open ho jayegi.. waha par bhi app ne "" Advance " par click karna hai... neeche dhek lain lika hoga..

""" Virtual Memory "" issi k sath "" Change ka button hoga uss par click karen..
jab app Change par click karogay o aglay window mein apki USB Drive jiska naam app ne RAM Drive raka tha nazar ajayega.. usko select karo.. uske baad neeche "" Custom Size par click karen ... waha unke samne wale boxes active ho jayengay... waha jitna RAM hai unse takreeban 5 MB size kam raken kiun windows atleast 5 MB khud leti hai...
eske baad "" OK "" karen. changing ka aik msg ayega usko b OK karen.
akher mein app ne " APPLY " pr click karna hai..Computer restart mangega ,,,restart karen..

umeed hai samaj aa gayee hogi,,, bahut easy hai

Ager Passand Aye To Like&Share Zaror Kare ...

Pictures for more details.....






Top 10 best hackers in the world

                 Top 10 best hackers in the world
Home


The Ten Biggest Legends of the Hacker Universe


The culture started from the, The hackers culture. Now I am an ethical hacker and many more people like me either interested in or wanted to be hacker , DO you know why is that so ? Answer is these guys made term hacking popular worldwide.

I know they were bad boys , but as an ethical hacker I salute their intelligence , their dedication , and everything they did.
For the users of this blog I am specially posting the names of top 10 hackers of the world who sometime in the past really rocked the news of the world.
Kevin Mitnick: Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone phreaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.”
Gary McKinnon: This 41-year-old Scotsman, also known as Solo, is the perpetrator of what’s considered the biggest hack in the history of computer science – into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet connection.

Vladimir Levin: This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times by means of the cracking technique. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.
Kevin Poulsen: Today he may be a journalist and collaborates with authorities to track paedophiles on the Internet, but Poulsen has a dark past as a cracker and phreaker. The event that brought him the most notoriety was taking over Los Angeles phone lines in 1990. A radio station was offering a Porsche as a prize for whoever managed to be caller number 102. It goes without saying that Poulsen was the winner of the contest.

Timothy Lloyd: In 1996, information services company Omega, provider of NASA and the United States Navy, suffered losses of around 10 million dollars. And it was none other than Tim Lloyd, an x-employee fired some weeks earlier, who was the cause of this financial disaster. Lloyd left a virtually activated information bomb in the company’s codes, which finally detonated July 31 of that same year.
Robert Morris: Son of one of the forerunners in the creation of the virus, in 1988 Morris managed to infect no fewer than 6,000 computers connected to the ArpaNet network (one of the precursors to the internet) He did it from the prestigious Massachusetts Institute of Technology (MIT) and for his criminal activities he earned a four year prison sentence, which was finally reduced to community service.
David Smith: Not all hackers can boast of creating the virus that spread the fastest to computers the width and breadth of the globe – David Smith can. In 1999, the father of the Melissa virus managed to infect and crash 100,000 email accounts with his malicious creation. Smith, who was thirty years old at the time, was sentenced and freed on bail.

MafiaBoy: In February of 2000, many of the most important online companies in the US, such as eBay, Yahoo and Amazon, suffered a technical glitch called Denial of Service, which caused a total of 1700 million dollars in losses. But did these sites know that the perpetrator of the attack was a 16 year-old Canadian who responded to the alias MafiaBoy? Surely not, although it didn’t take them long to find out, thanks to his bragging about his bad deed to his classmates at school.
Masters of Deception (MoD): MoD was a New York cyber-gang that reached its apogee in the early 90s. Under the cover of different aliases, its biggest attacks involved taking over telephone lines and centres of the Internet, then still in its infancy. During this time McD starred in the historic “battles of the hackers,” along with other groups like the Legion of Doom (LoD), as they sought to destroy each other until the computers couldn’t take it anymore.

Richard Stallman: Since the early 80s when he was a hacker specializing in artificial intelligence, this hippie-looking New Yorker has been one of the most active militants in favor of free software. At MIT he firmly opposed the privatization of the software used by the institute’s laboratory, so much so they he created what today is known as GNU and the concept of CopyLeft. Popular systems like Linux utilize the GNU mode and Stallman is currently one of the gurus of software democratization.

                                                                    
thanks for reading ..... looking forward a comment from u

Change your IP to Any country

                  Change your IP to Any country
Home



Really Important thing for Hackers ----Change Ur IP to Any country

when u do horrible thing you are unsafe in the internet.Because any browser refer ur proxy ID....that will help to find your location {where r u from} .................... so U can change your I.P address...

before changeing see u r i.p location - www.whatismyipaddress.com

as an example u can change u r location as a USA using a software

download this using this link- 5MB only
link - www. tinyurl.com/3hczppa

now open it and changed ur ip ,,,,,,,,,,,,,,,,,,,,


Change the Processor Name

                    Change the Processor Name
Home

A while ago on Technology Inspired, I published an article on changing your processor name. .

After a user restarts his computer, the name reverted back to original which is obvious as each time Windows boots, it checks the connected hardware and updates the registry value automatically. So, changing the processor name using the earlier article did not had permanent effect on the processor name.

Thus, the alien processor name you had earlier again reverted back to the boring old one.




Problem: To, make the name change permanent, it was required that the user updates the Processor Name String registry key each time when Windows starts.

Solution: It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the windows start up folder. To do so, just follow the steps given below:-


Steps :-
1.  Open Notepad.
2.  Copy and paste the exact code given below:-




Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
"ProcessorNameString"="Intel Core i 7   4GHz MHz"


To change the processor name, edit the part of the code given in blue. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Please open Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.

3.  Click on File Menu, click on Save As and select "All Types" in Save as Type option. Save the file as ProcessorNameChange.reg or *.reg.
4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive.



5.   Copy the created Shortcut file.
6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) or to C:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 7 and Windows Vista . Also remember that AppData is a hidden folder.)  if C: is your System drive.
7.  Paste the copied file.


This registry file would now execute each time when windows starts and the Processor Name String would be modified each time. So, even upon restarting your computer, you will see that the changed processor name is permanent.