Skip to main content

Posts

Showing posts from January, 2016

Featured Post

Kali Linux Terminal Customization Tutorial

Today I'll show you guys how to change kali linux terminal header text.

SOCKS Proxy Explained (Full Tutorial)

I often see people ask questions about SOCKS that show they haven’t taken the time to learn what it is. This is a fast introduction to what SOCKS is. Overview SOCKS is a protocol that is intended to act a circuit level proxy for applications. It is very different from ‘normal’ proxy because they are application proxies. For example, when you use a HTTP proxy you are actually forwarding the HTTP request, and the HTTP proxy server then performs the request on your behalf. An example of this would be asking someone to pass you the salt at the dinner table, who then gets the salt shaker, and passes it to you. The SOCKS protocol is roughly equivalent to setting up an IP tunnel with a firewall and the protocol requests are then initiated from the firewall. The client contact the SOCKS proxy server and, by exchanging messages defined by the SOCKS protocol, negotiates a proxy connection. When a connection is established, the client communicates with the SOCKS server using the SOCKS prot

TOR Explained (Full Tutorial)

What is tor? Tor is an encrypted network that can route your traffic through relays, making the traffic appear to come from exit nodes. Unlike with proxies, the exit node itself doesn’t know your IP address or where you are. How Tor Works When you use a Tor client, your Internet traffic is routed through Tor’s network. The traffic travels through several randomly selected relays (run by volunteers), before exiting the Tor network and arriving at your destination. This prevents your Internet service provider and people monitoring your local network from viewing the websites you access. It also prevents the websites themselves from knowing your physical location or IP address – they’ll see the IP address and location of the exit node instead. Even the relays don’t know who requested the traffic they’re passing along. All traffic within the Tor network is encrypted. For example, let’s say you access Google.com through Tor. Your Internet service provider and local network ope

System Optimization Tutorial (20 important tips)

Follow these tips and you will definitely have a much faster and more reliable PC!   1. Wallpapers : They slow your whole system down, so if you're willing to compromise, have a basic plain one instead! 2. Drivers: Update your hardware drivers as frequently as possible. New drivers tend to increase system speed especially in the case of graphics cards, their drivers are updated by the manufacturer very frequently! 3. Minimizing: If you want to use several programs at the same time then minimize those you are not using. This helps reduce the overload on RAM. 4. Boot Faster: The 'starting Windows 98/XP' message on startup can delay your booting for a couple of seconds. To get rid of this message go to c:\ and find the file Msdos.sys. Remove the Read-Only option. Next, open it in Notepad or any other text editor. Finally, go to the text 'Options' within the file and make the following changes: Add BootDelay=0. To make your booting even faster, set

UDEMY: How To Rank On Page 1 Of Google In Just 48 Hours (leaked)

Course Description In this case study, we show you a technique that we have been using for over 12 months to rank websites for new keywords consistently , permanently and quickly , as well as giving you access to our other most closely guarded Google secrets. What are the requirements? Computer and Internet access What am I going to get from this course? Over 22 lectures and 3 hours of content! Rank any website on Google quickly Learn our "secret" ranking strategy What is the target audience? webmasters Online Marketers Business Owners   Download This Leaked Course From Here

how to stop auto play facebook videos

Hi friends, you might have seen that facebbok autoplays videos that are listed on your timeline, although muted. This involves useless consumption of data. Even if you dont want to see the video, it gets downloaded and is played. To get rid of this, you can do simple tweak in facebook setting, mentioned below.   Steps: Login to your facebook account. Go to the " Settings ", see below:  Click on " Videos " on left. Alternatively, you can directly hit this URL to go to videos setting page. https://www.facebook.com/settings/?tab=videos Change "A uto-Play Videos " to off.  Don't forget to share the post.

10 Free Internet Tricks working world wide on any networks

T oday i am back with some great tricks which you can use to access free internet and no matters what your service provider is or how strong the firewall of your service provider it because if one trick fails you can try another. Lets Get started ...... 1#, By using HTTPS This is an old trick but still working on many networks so use HTTPS rather then HTTP which will bypass your isp firewall which is pointing toward the service provider home page or website 2# Using @ sign This trick also works on most of the networks like when you open any website it point you toward their own network website so apply @ symbol after your network site or the website which opens on 0balance at your mobile like,                   https://0.facebook.com@www.google.com What actually this will do is redirect you to the google.com because of the @ symbol which is command the web browser to redirect on the given url after @. 3# Using Proxy on mobile One of the best way to bypass t

Download Darkcomet v 5.1 Beta - enhanced version

Hi everyone, many of you emailed us for the darkcomet link and i usually dont share such stuff because all of the versions of darkcomet over the internet are backdoored so why should i provide you the stuff which is infected but as per your emails and message that you really want darkcomet version 5.1 which is enhanced version of darkcomet i thought to share it with you guys , however believe me according to me its the safest version of darkcomet you can also check its md5 because i tried my best to disconnect backdoors from it. and let me know if link is broken email me at 8lackd3vil@gmail.com Download Darkcomet from mediafire \!/ PASSWORD : darkcomet Please dont mention here its infected or bla bla bla if you think its infected please dont download it :)  i know its clean however av will detect it because of its purpose which is monitoring etc. TAGS :- Darkcomet , darkcomet download , darkcomet free , clean version of darkcomet , down

How To Know If You Have Been Hacked (Security Tutorial)

Step 1 : Run Antivirus Software NOTE: While antivirus and anti-malware software can differ in what they detect, I'll be referring to both collectively as antivirus (or AV) throughout this article. It's good to make sure you have one that detects both viruses and malware including trojans, worms, spyware, rootkits, keyloggers, etc. There are many pieces of good antivirus software on the market. The problem is that even the very best will not detect over 5 to 10% of all known malware. Then, there is the unknown malware that comes out every day. Hackers are always developing new software, usually variants of existing malware, but different enough to evade the signature detection of these software developers. In these cases, your AV software is useless. Despite this, I still recommend that you buy a reputable brand of AV software and keep it up to date. Those updates are critical as they represent the signatures of the new hacking software that is found in t

How to protect facebook account from hackers

Facebook is, undoubtedly, the most popular social networking website with more than 500 million active users. Due to its popularity, many hackers (or should I say crackers?) are actively involved in hacking Facebook accounts of unsuspecting users. This article outlines the many strategies that such hackers use to gain access to Facebook accounts of hundreds of users each day and how you can stop them from hacking your account Email Address Hack  I have always been puzzled by Facebook 's leniency in this matter. All a hacker needs to do is know your name and he will be conveniently shown your email address at your profile. How easily a hacker can then hack your Facebook account (and everything else associated with that email id) if he 'guesses' your password (if you use a weak password) or answers your security question! This is something I hope Facebook improves on quickly. Until Facebook does so, here are some tricks you can use to protect yourself fro

Android HEX Editor Pro – Hack Tool v3.1.18 Cracked APK [Latest]

HEX Editor Pro Hex Editor – an application for editing the binary data, the data is represented in the “raw” – as a sequence of bytes. Since Hex Editor is quite a versatile tool it is not possible to describe all variants of its` use. Use your fantasy;-) This is AdFree version of Hex Editor. How to Install? Download and install apk as usual Done and Enjoy Screenhots Downloads HEX Editor Pro v3.1.18 (3 MB) Enjoy ;) Tags : hacking tools, hack tool, android hack, game hacker android, game hacker, android game hacker, android hacking apps, hacking apps, android hack, hacking tools for android

How to inbox people from anyones account in Facebook

Step 1 : First off you will need to pick 2 people from your friends list. One will be the inbox sender and one will be the reciever. Lets say we picked John for the inbox sender and Mark for the reciever. Step 2 : Since John is sending the inbox we need to get his Facebook login email. Go to their profile and click on about.. wait.. what's this? Their login email is hidden? Well we're going to have to use something else to get their email.. hmm.. I got it! Note: Their login email is not their @facebook.com email. Step 3 : Since their email may be hidden we need to use something else to get it. Go to Yahoo.com and login with Facebook. Once you have set it all up click import contacts from Facebook. Boom, you have almost everyone in your friend lists email address. Search for your inbox sender and copy his email address. Lets say John's email is John@john.com Step 4 : Head on over to http://emkei.cz/ This is a spoof email sender and can send an email

How to search on Google like a Pro(Full Explained)

Google is best search engine in the world. Actually people think that Google's popularity is because of its simple and fast searching interface but friends, its more popular because it has rich operators and query support that will make your searching experience even better. Most of us doesn't know which operators are supported by Google and if they know some of them, they doesn't know how actually these operators work and enrich our searching practice. Today, i will tell you How we can search on Google like elite hackers or simply say computer experts do. But for this its necessary that you should know and understand all the Google operators properly. So lets learn how we can enrich our searching experience in Google. Google operators : Google operators are classified into two basic categories: 1. Basic Google Operators like and, or, not etc. 2. Advanced google operators like inurl, intitle etc. I am also including bonus search queries that are ext