tech-da-hack.blogspot.com
tech-da-hack: Fun Hack cont...
http://tech-da-hack.blogspot.com/2010/10/fun-hack-cont.html
Why go anywhere else if you can find such gr8 hacks here? Monday, October 11, 2010. 2 Open Notepad and slowly type "Hello,friend how are you? I am fine bbye tc":. Set WshShell = WScript.CreateObject("WScript.Shell"). WshShell.SendKeys "lo ". WshShell.SendKeys ", fri". WshShell.SendKeys " how". WshShell.SendKeys " are". WshShell.SendKeys "I a". WshShell.SendKeys "m f". WSc, hoript.Sleep 500. WshShelw al.SendKeys " bb". WshShell.SendKeys "ye ". WshShell.SendKeys " tc". Monday, October 11, 2010. WiFi Allian...
tech-da-hack.blogspot.com
tech-da-hack: February 2011
http://tech-da-hack.blogspot.com/2011_02_01_archive.html
Why go anywhere else if you can find such gr8 hacks here? Monday, February 7, 2011. Dating site has facebook profiles. 250,000 Facebook users have become the unwitting members of a dating site whose authors claim is a work of art and not set up to make money, but Facebook is expectedly not entertained by their stunt. Reports that Facebook is looking into the possibility of taking legal action against Cirio and Ludovico. The social networks terms of service on automated data collection. State that to do t...
tech-da-hack.blogspot.com
tech-da-hack: Email Spoofing
http://tech-da-hack.blogspot.com/2010/10/email.html
Why go anywhere else if you can find such gr8 hacks here? Monday, October 11, 2010. Some times we just want to hack someone's password for the sake of sending some mails to their girlfriends / boyfriends or may be just friends from their IDs. It is not always essential to hack passwords for just sending few mails. you can do it without logging in their accounts. Many of us must be wondering that how is it possible to send mails without logging in into someone's account. There are two ways of doing this :.
tech-da-hack.blogspot.com
tech-da-hack: Secure your Wireless world ...
http://tech-da-hack.blogspot.com/2011/03/secure-your-wireless-world.html
Why go anywhere else if you can find such gr8 hacks here? Wednesday, March 2, 2011. Secure your Wireless world . Secure your Wireless Router Using WEP. The world is so advanced and fast the people can't afford to have any kind of time lag in communication. In this run wireless networks(Wi-Fi,Bluetooth,infrared etc.) play an essential role. In this article we the 'tech-da-hack' team is sharing way to secure your wi-fi using WEP. We have to secure our network from the mallicious or unauthorized users.
tech-da-hack.blogspot.com
tech-da-hack: Change Login Keyring in Ubuntu
http://tech-da-hack.blogspot.com/2012/02/sometimes-if-one-changes-password-from.html
Why go anywhere else if you can find such gr8 hacks here? Sunday, February 5, 2012. Change Login Keyring in Ubuntu. Sometimes if one changes the password from the terminal in the way explained in the previous post, the login keyring may change. This would result in some problem within the OS,where it would ask for the login keyring and declare it as incorrect. To change the login keyring follow these steps:. 1) Go to the terminal and type the following two commands:. Rm -fr /.gnome2/keyrings.
tech-da-hack.blogspot.com
tech-da-hack: Understand what wireless sniffers are,what do they do and How do they work ?
http://tech-da-hack.blogspot.com/2012/01/understand-what-wireless-sniffers.html
Why go anywhere else if you can find such gr8 hacks here? Saturday, January 28, 2012. Understand what wireless sniffers are,what do they do and How do they work? The sniffing tool can use two methods of detecting wireless LAN. 1 Have the adaptor which scans all the channels for the beacon* messages. An Example of a Network Protocol Analyzer is wireshark that is available as a free source on http:/ www.wireshark.org/download.html. Saturday, January 28, 2012. Enter your email address:. Designed by Shantanu...
tech-da-hack.blogspot.com
tech-da-hack: January 2012
http://tech-da-hack.blogspot.com/2012_01_01_archive.html
Why go anywhere else if you can find such gr8 hacks here? Sunday, January 29, 2012. This is one technology advancement which is sending shock waves through the world of computing. At present the memristor is under development by a team at Hewlett Packard(HP). Sunday, January 29, 2012. Saturday, January 28, 2012. Understand what wireless sniffers are,what do they do and How do they work? The sniffing tool can use two methods of detecting wireless LAN. Saturday, January 28, 2012. Enter your email address:.
tech-da-hack.blogspot.com
tech-da-hack: November 2010
http://tech-da-hack.blogspot.com/2010_11_01_archive.html
Why go anywhere else if you can find such gr8 hacks here? Tuesday, November 16, 2010. Adobe Acrobat/Reader Phishing Scam. Today the Adobe Product Security Incident Response Team (PSIRT) released a bulletin stating the email phishing scam that has been reported by customers for some Adobe products. This is what their bulletin said:. With the availability of Adobe Acrobat X solutions. It is not available in any other manner via download, including via email. Tuesday, November 16, 2010. Some times we just w...
tech-da-hack.blogspot.com
tech-da-hack: March 2011
http://tech-da-hack.blogspot.com/2011_03_01_archive.html
Why go anywhere else if you can find such gr8 hacks here? Tuesday, March 8, 2011. Secure yourself from Da Threat Of 'Vital information resource under Siege' (VIRUS). The computer systems using operating systems rather than windows are generally considered more secure and safe. If one compares the number of viruses for windows and other O.S. windows will break any records. Keeping in mind the Threats we Tech-da-hack team suggests few essentials to secure your system from viruses:. Tuesday, March 08, 2011.
tech-da-hack.blogspot.com
tech-da-hack: December 2010
http://tech-da-hack.blogspot.com/2010_12_01_archive.html
Why go anywhere else if you can find such gr8 hacks here? Tuesday, December 28, 2010. Hope 2011 is better! Recently security vendor Bit9 released its annual "Dirty Dozen" list. According to statistics obtained from International Institute of Standard and Technology and International Vulnerability Database, it lists top 12 software with most vulnerabilities for 2010. From January to October this year, Google Chrome browser vulnerability has been discovered up to 76, which tops the list. We believe that th...