Modern Futuristic Unique Design

latest articles

ANON JUNK

...

Read more

How to grab someone IP address ?

How to grab someone IP address ? 2                     I will you show you how to grab someone Ip address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chat or by...

Read more

Change your Ip in less then 1 minute

Change your Ip in less then 1 minute 1                          In my previous post i had show you how to Grab someone ip address now i will show you how to change ip address in less then a minute....

Read more

More Simple Way To View Saved Password in Google Chrome

More Simple Way To View Saved Password in Google Chrome Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This...

Read more

OPERA MINI FREE AIRTEL GPRS TRICK

OperaMini Free Airtel Gprs Tricks April 2012 Hello To All Friends After My Super Popular Trick Optimizing Internet Connection Using Internet Cyclone - Increase Internet Speed in Windows . Our Team Will Tell You About Free Gprs Trick April 2012 on Airtel . I am give you Free...

Read more

DATA CARD FREE RECHARGE MTS MBLAZE

...

Read more

boost torrent speed

Trick To Boost Torrent Speeds Using UTorrent Turbo Booster Plugin uTorrent Turbo Booster is a recent plug-in designed to improve the functionality of probably the most popular P2P file sharing application around – uTorrent. This tool comes equipped with modern technology that aims at getting your download speed...

Read more

hack cyber cafe

How To Hack PC On Cyber Cafe | Hack A Closed Pc On Cyber Cafe here is a quick new hack on how to intrude in the PC which is shut downed at Cyber cafe. (Don’t Forget to read our disclaimer at the bottom of the post.) 1....

Read more

How to Transfer Windows Files - Images - Settings Easily Have you purchased a new PC or shifted to an old one but all the data stuff is in your previous PC, well than that’s not a big problem because we have Windows Easy Transfer official transfer tool...

Read more

brute force attack

Brute-force attack The EFF's US$250,000 DES cracking machine contained over 1,800 custom chips and could brute-force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted on both sides with 64 Deep Crack chips. In cryptography, a brute-force attack, or exhaustive...

Read more

what is key logging

Keystroke logging From Wikipedia, the free encyclopedia Jump to: navigation, search Keystroke logging (more often called keylogging or "keyloggers") is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their...

Read more

what is back door

back door A back door is a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a back door so that the program can be accessed for troubleshooting or other purposes. However, attackers often use back doors that they detect or...

Read more

gmail phishing

gmail phishing First I have shown you people how to set up Facebook Phishing site , In this Tutorial I will show you how to set up Gmail Phishing site, step by step with pictures. Step 1: The First Step in Making the site is to regester an account...

Read more

create trojan horse

How to Make a Trojan Horse Most of you may be curious to know about how to make a Trojan or Virus on your own. Well, here is an answer to your curiosity. In this, post I’ll show you how to make a simple trojan on your own using C...

Read more