Skip to main content

Posts

Showing posts from August, 2014

How to Root Your Android Device (Framaroot Method)

Framaroot is a one-click universal root method that works on a number of Android devices. With a couple of root exploits attached with the app, you can easily root your device in no time. The app also allows users to unroot their devices within a single-click, so you can just go back to the unrooted state in a second should you want to. So without further ado, let’s see how you can root your device using Framaroot:

How To Grab Someone's IP Address ?

In this tutorial I will you show you how to grab someone’s IP address using PHP script. This method can be used to grab someone Ip address on yahoo or Facebook chat or by sending mail to victim. So Lets get started.
How To Hack Someone Ip Address ? 1. Copy the below codes into Notepad and save it as Grab.php (.php is must) 
<?php
$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);

imagefill($img_number,0,0,$backcolor);
$number0 = " This is Your IP/Proxy";
$number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
$number2 = " Host/Proxy: $hostname";
$number4 = " _________________________________";

Imagestring($img_number,10,5,5,$number0,$textcolor);
Imagestring($img_number,10,5,25,$number1,$textcolor);
Imagestring($img_number,10,5,45,$number2,$textcolor);
Imagestring($img_number,10,5,50,$number4,$textcolor);
Imag…

What Is Doxing? Doxing and its Uses............

You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website calledPipl (http://www.pipl.com/). Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use isFacebook (http://www.facebook.com). Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its email search.The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your passport online; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it intoFacebook or Pipland…

Top 10 Registry Tweaks that Power Up Windows

The Windows registry is a mysterious place, but if you're comfortable editing it, you have the power to tweak nearly every Windows setting you can imagine. Here are 10 of our favorite registry tweaks that make life easier.
All of these hacks work in Windows 7, even if not labeled as such. Many may work in Vista or earlier versions of Windows, but varies, so be sure to read up more on the tweak before you go meddling in Vista's registry. And, of course, be sure to make a backup of your registry before you start hacking away.


10. Hide Pre-Populated Items in Windows Explorer's Sidebar
Windows Explorer is pretty easy to navigate, but that sidebar can easily get cluttered with features you don't use. For example, if you're the only computer on your network, you probably have no need for the Homegroup or Network trees. Each item in the Explorer sidebar has a registry key, and with just a few minor tweaks, you can have them hidden in no time.
9. Disable Libraries in Windows…