What is DNS Cache Poisoning?

DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones. One of the reasons DNS poisoning is so dangerous is because it can spread from DNS server to DNS server. In […]

How to Make Your Own Windows Registry Hacks

Over the years, we’ve created many Registry hacks to customize and tweak your Windows computer. Today we’re going to give you the keys to making your own registry hack files that you can use on any computer. Before we go further, it’s worth noting that even reading this article and thinking about the registry will […]

How to Create Your Own Virtual Hacking Lab

Many of you here are new to hacking. If so, I strongly recommend that each of you set up a “laboratory” to practice your hacks. Just like any discipline, you need to practice, practice, and practice some more before you take it out to the real world. In many disciplines, if you don’t practice, you […]

How to block someone’s Internet Connection using Notepad

In this trick I am going to show you how you can block someone’s Internet connection using notepad. We will be creating a batch file using notepad which will execute our command that stops internet connection. Creating of batch file is simple and take less than two minutes. The tutorial also includes how you can […]

How to run and complie C C++ and java without Software

C/C++ and Java are the also known as the mother of all the programming languages as this is one of the best Object Oriented Programming Language Of Computer World that plays great role in building out the real life project. So today in many college schools of the world are teaching this language as a […]

How To Make a Simple And Powerful Keylogger Using Python

A keylogger is a computer program which can be written using any computer programming language such as c++, when you install it on a Victim system it can keep the records of every keystroke in a text file. Keylogger is mainly used to steal confidential data such as passwords, credit card numbers etc. How to make […]

7 Superb Reasons Why Hackers Prefer to Use Linux OS

  Why do Hackers use Linux : Operating system Linux has amazing features that make it more dominating than others. It is an open source operating system and driven by its old version UNIX . Due to its many benefits over any other OS, hackers prefer to use Linux. We know other operating systems are […]