This is very interesting google trick. You can change the google background image. This is offered by google itself.
Visit Google.com
You can see at the bottom as “Change the background Image”
Click it and sign in to your gmail account(if you already login then it is no need)
Google provides...
Friends, you may eager to know what is lover or spouse or children doing in internet. In this post i will introduce about sniperspy remote spy software. It allows to monitor the remote system. The special about this software is that no physical contact is needed to install the spy software.
Why...
Do you know what programs are processing in your pc? You use Default task manager for seeing the list of Process. In Default task manage it just show only the list of process and memory usage. You may not know which one is system process,malware program,application program. Some advanced...
Before we see what SQL Injection is. We should know what SQL and Database are.
Database:
Database is collection of data. In website point of view, database is used for storing user ids,passwords,web page details and more.
Some List of Database are:
* DB servers,
* MySQL(Open source),
* MSSQL...
Want to know the status of your website? I gave one website below in which you can test your website status.
http://www.websitegrader.com
You can compare your website with another website or blog also.
Features:
Keyword strenth analyzing
Page rank analyzing
Twitter grade
Blog grade
etc.
Also...
Hi friends, Is your age lesser than the 18? are you eager to see adult videos in youtube. This trick will help you to watch the adult videos without login.
Usually youtube allow to see the adult videos after verifying the age by log in. But the funny thing about the you tube is that they...
This article is especially for Java programmers. I am going to give you tool which will decompile the byte code and give you source code. Sounds good na?!
The “Java Decompiler project” aims to develop tools in order to decompile and analyze Java 5 “byte code” and the later versions...
You can create a big size file using windows default command prompt itself. Why we need huge size file? When you create virus or you can use in your college for occupying the memory.
First of all Decide the Size of huge file. For eg, if you decide 1 milliion byte,then we should convert it...
Are you website or blog owner? want to have some number of hits for websites. You can do this by batch programming. It is simple Batch program.
What is the Use?
Your page will get more no of hits. By sending to your friends and other victims, you can more hits to your website from various...
are you having multiple gmail accounts? As far as browsers concerned , we can login with only one gmail account. Here i am going to introduce a new Mozilla add on. This add on will allow you to login in multiple account without logout the accounts.
How to do?
visit...
Using tunnels while pentesting can be a lot safer using these encrypted tunnels we can expose a local server behind a NAT or firewall to the Internet essentially bypassing restrictions on machines behind strict Firewall rules and NAT restrictions such as mobile hot spots and corporate networks...
Today i am going to introduce a mozilla add on which will very helpful for web developers (for hackers also).
Features:
View/Add/Edit Cookies
Clear cookies
Disable image in website
Disable java script in website
Disable css in website
more…
Download and install the add on from here...
Are you getting lot of spam mails to your inbox? Do you know why it comes to your mail? The mistake is yours only. Because of you only you are getting larger number of spam. How you responsible for that? Go ahead to know what is your mistake.
Spam Mail Definition:
Also known as junk mail...
For finding ftp sites you can use this trick. This is simple trick using google search engine. If you know google searching tactics,then you can whatever faster.
How to Use index of for ftp?
Search in google as
index of ftp/ +file_extension
replace the file_extension with file extension which...
Hi friends, the most of internet users using mozilla Firefox. Have you ever notice the Private Browsing option in your firefox? If you didn’t so,then you should read this article.
First of all you have to understand what is cookies ?
Now i hope you understand what is cookies. If you still...
This Post is writtern By File_closed07
A friend and I wrote this command line SMS bomber in Bash. It allows you to set the message you want to send, the phone number to send it to, the carrier of the phone (which can be found at http://www.fonefinder.net), and the delay between messages. You’ll need...
Using tunnels while pentesting can be a lot safer using these encrypted tunnels we can expose a local server behind a NAT or firewall to the Internet essentially bypassing restrictions on machines behind strict Firewall rules and NAT restrictions such as mobile hot spots and corporate networks...
Hello welcome back, Today I will show you how to generate wordlists in Crunch using Kali Linux. If you are using a different Operating System or you do not have crunch installed please download it now.
Crunch comes pre-installed in Kali Linux in this tutorial we will be using Kali Linux 2017.2...