Hacking Simplified

Web Security Redefined

Facebook
RSS
Attention Indian Users>> Please add "https://" (without quotes) before any adf.ly link to complete your Request for download etc.... Admin Peerzada Mussadiq

Disable Advertisements in uTorrent

If you are annoyed with the advertisements displayed in your favourite ╬╝Torrent, Then I am sharing a trick with my viewers in order to get rid from these annoying ads. Here we go: 
Open ╬╝Torrent.Go to Options >> Preferences.
[ Read More ]

Windows XP Professional SP3 32-bit - Black Pre Activated Edition 2013.5.22

Due to a lot of emails from your side I was not able to reply them all, so I decided to write this post in order to share the Pre Activated Version of Windows XP.


[#] SHORT SUMMARY:
----------------------------------------------------------------
1. Includes ALL the latest Windows XP updates including Windows Media Player 11, Internet Explorer 8, .NET Frameworks and over 200 MB additional CPU, LAN, WLAN, and SATA/AHCI drivers and with the Windows XP Recovery Console and Repair option.
[ Read More ]

It is Kali Linux - Beyond Backtrack

Vulnerability Scanning and pen-testing was made easy to the hackers as well as penetration testers as they used Backtrack. Backtrack is one of the famous Linux distro that has all the necessary tools to conduct a successful attack on the victim network /
[ Read More ]

Windows 8 Operating System on A USB Stick

Article Submitted by: Cara Morris
Wednesday, 20 February 2013

Some believe that USB flash drives have changed technology for the best. In fact, the widespread successes of these devices have made the CD/DVD drives superfluous. However, these devices are not only limited to storing data -- today, you can use this device to boot up your personal windows desktop on any PC (given the fact that the PC possesses the hardware performance requirements). Storage capacity on these tiny drives are increasing rapidly, in fact, there's also rumors on the internet that a 1000 gigabyte USB flash
[ Read More ]

How Basic SQL injections can be prevented: A must for website Administrators



The basic attack is login form bypassing which has already been discussed in the previous post. In this type of SQLi we inject queries like 1‘OR’1‘=’1 etc. in the username and password fields.

The code which is used in these types of websites that can be easily
[ Read More ]

How to crack IDM manually?



Dear Friends Today I am going to provide a tutorial about Cracking IDM (Internet Download Manager) manually.
[ Read More ]