ANON JUNK

...
Read moreFrY jUnkz: THE ULTIMATE COMPUTER GEEKZ. WE ARE(GULLY,DCJ,RJ,HT} TEENAGERS,,, INTERESTED IN HACKING & PROGRAMMING..............
How to grab someone IP address ? 2 I will you show you how to grab someone Ip address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chat or by...
Read moreChange your Ip in less then 1 minute 1 In my previous post i had show you how to Grab someone ip address now i will show you how to change ip address in less then a minute....
Read moreMore Simple Way To View Saved Password in Google Chrome Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This...
Read moreOperaMini Free Airtel Gprs Tricks April 2012 Hello To All Friends After My Super Popular Trick Optimizing Internet Connection Using Internet Cyclone - Increase Internet Speed in Windows . Our Team Will Tell You About Free Gprs Trick April 2012 on Airtel . I am give you Free...
Read moreTrick To Boost Torrent Speeds Using UTorrent Turbo Booster Plugin uTorrent Turbo Booster is a recent plug-in designed to improve the functionality of probably the most popular P2P file sharing application around – uTorrent. This tool comes equipped with modern technology that aims at getting your download speed...
Read moreHow To Hack PC On Cyber Cafe | Hack A Closed Pc On Cyber Cafe here is a quick new hack on how to intrude in the PC which is shut downed at Cyber cafe. (Don’t Forget to read our disclaimer at the bottom of the post.) 1....
Read moreHow to Transfer Windows Files - Images - Settings Easily Have you purchased a new PC or shifted to an old one but all the data stuff is in your previous PC, well than that’s not a big problem because we have Windows Easy Transfer official transfer tool...
Read moreBrute-force attack The EFF's US$250,000 DES cracking machine contained over 1,800 custom chips and could brute-force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted on both sides with 64 Deep Crack chips. In cryptography, a brute-force attack, or exhaustive...
Read moreKeystroke logging From Wikipedia, the free encyclopedia Jump to: navigation, search Keystroke logging (more often called keylogging or "keyloggers") is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their...
Read moreback door A back door is a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a back door so that the program can be accessed for troubleshooting or other purposes. However, attackers often use back doors that they detect or...
Read moregmail phishing First I have shown you people how to set up Facebook Phishing site , In this Tutorial I will show you how to set up Gmail Phishing site, step by step with pictures. Step 1: The First Step in Making the site is to regester an account...
Read moreHow to Make a Trojan Horse Most of you may be curious to know about how to make a Trojan or Virus on your own. Well, here is an answer to your curiosity. In this, post I’ll show you how to make a simple trojan on your own using C...
Read more![]() |
BLOG BY:KARTHIK@FRYJUNKZ |