How we can use Google for hacking purposes

Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, […]

How do hackers cracks the Software to get fully licensed

If you’ve ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today’s most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any program in the world. This is mainly […]

Transfer files from one computer to another using LAN cable

In this article you will find out  how to Send files from one computer to another with Lan cable (cat5). I never liked using big pen drives to share large data ( like big games,movies etc) so the only thing I am left with, was using lan cable. When to use lan cable Send files […]

1000 Popular Hacking tricks tutorials

I am going to share you 1000 hacking tricks collections ,these are the best and popular hacking tricks These tutorials are supported by windows vista, seven, and xp (still lots of people using this os) you will also get some knowledge article related to networking, how to become a hacker, and lots of stuffs related […]

Top 10 Most Popular Wi-Fi Hacking Tools

We have discussed a lot about hacking in our previous articles. We talked about about How to become hacker, why programming is important for hacker, how to hack social networking sites, and how to hack passwords etc. But We haven’t discussed much about Wi-Fi hacking. Although, this is the most asked question ‘How to hack […]

Prove This Math Equation To Hack The “Entire Digital World”

What if someone tells you that the entire existing security protocols of the internet can be broken by proving a mathematical equation? A clever person like you will say: It can be or it can’t be but who knows until someone proves the equation? Yes, you are right. You don’t know if the problem can […]

Step by step instructions to Create Facebook Phishing Android Application

In this tutorial i’m going to explain how to make an android application with facebook phishing method, so you can get the username and password of each person who login to facebook using this app. This app is actually looks like real facebook app with real facebook icon so victim can’t find out whether it’s […]