Showing posts with label INTERNET. Show all posts
Showing posts with label INTERNET. Show all posts

Live Chat is Available on DefenceHacker.in

We have launched a chat on our website for Readers. The Live Chat is available For 365 days online. To start a conversation with our Readers support,  Simply go to   and click on button Online on the right side of the page. We will do  best to help you as soon as possible. Thank You. Yours Hacker Friend, Parth Patel (Defence Hacker...

Anonymous Web Surfing Tools

HideMyAss  HideMyAss # http://www.hidemyass.com/ Tor Download #Tor from https://www.torproject.org/ Guardster Check out Guardster # http://www.guardster.com/ MegaProxy  Megaproxy # http://www.megaproxy.com/freesurf/ Fsurf Checkout Fsurf # http://www.fsurf.com/ Privoxy You can download Privoxy from https://sourceforge.net/projects/ijbswa/files/ Online Anonymous proxy Checkout Online Anonymous Proxy # http://zend2.com/ TryCatchMe Checkout...

Coming Soon - "Defence Hacker - The Book"

Go this link 1st of you like our fan page then wall post with your details(name-country-email address)  I will mail you books price list.. And email me with your detail - defencehacker.in@gmail.com OR Comment here your feedback... ...

Pdf to Word Converter Online

Pdf to Word Converter Online Download After pdf to image converter it time to convert Pdf to Word online. There are many website avaliable for the same purpose.Some of them are.. 1.http://www.pdfonline.com/pdf2word/index.asp “[PDF Online] provides the best quality PDF to Word conversion; will produce a download link instantly and will not keep you waiting. 2.http://www.convertpdftoword.net/ Easily convert between Word, PDF or any other document format. Free to try! 3.http://www.pdftoword.com/ Using...

Free Premium Accounts For All The Popular Sites

     If you are looking for premium accounts like hotfile, rapidshare, megaupload, mediafire, filesonic, fileserve and more, and still can't find a working one than this is a right place for you.     If you like having premium features like instant download no time limit but you cannot find a premium account and you are using a link generator than you will not have a hassle to download copy and paste links but direct downloads.      I would...

GOOGLE PLUS OPEN BETA WITH 9 NEW FEATURES INCLUDING SEARCH, MOBILE HANGOUTS, AND OPEN SIGNUPS

Google+, the search giant's bid to boost its relevance in the socially networked world of the Web, is now open to the masses.Google had required invitations to the service, since its debut as a "project" in June. But this morning, Google opened the doors of Google+ to all. Google+ has also graduated to being a "beta" product."We're nowhere near done, but with the improvements we've made so far we're ready to move from field trial to beta, and introduce our 100th feature: open sign-ups," Google...

Wireless Hacking - Part 1

Here we will know on how to crack a WEP key and get into others wireless networks. There are two methods of hacking; locally, or globally. There are an infinite amount of subsets to the following ideas, but let us cover as much as we can. The following is one part of several parts of the tutorial that will later be posted. Let us start off with the first scenario. Local Hacking This method normally consists gaining access some way or another via the intranet. Let us test the following...

How To Setup an Ad-Hoc Network and Secure it

Ad-hoc Network is a decentralized wireless network which you can setup in your home or organization. If you use mobile devices in the network then it becomes a mobile ad-hoc network (MANET). Ad-hoc Networks can be used to form a local network and share internet connections. There are many advantages associated with this system. First of all, it saves you the bandwidth and can be improvised to share the download streams. This means that it is possible to form a peer to peer (P2P)...

Best of the Web

This is a round-up of some great websites and cool blogs that we think you should check out...

Check Network Connectivity With Power of PowerShell [Script]

Some days ago i got some scripts from one of my friend which was certain to use when pentesting stuff for Testing the internet connectivity of a window’s computer (version ahead of windows xp). well it have many usages but you can use it as you want. [Activator]::CreateInstance([Type]::GetTypeFromCLSID([Guid]'{DCB00C01-570F-4A9B-8D69-199FDBA5723B}')).IsConnectedToInternet  There it so, use it if you want because its made for you only. If TRUE, the local machine is connected to the internet;...

How to use Google for Hacking

1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter inurl:”viewerframe?mode=motion” Click on any of the search results to access a different set of live cameras. Thus you...

How To Send Fake Email’s Anonymously To A Friend Without Registration

Hey, mates i have got a trick to send fake email’s to any of your friend anonymously.That mean’s you can use anyone’s indentity to send fake email that also anonymously,Nobody would be able to know your identity.I have collected a list of few websites which might help you to send fake email’s to your friend.So,here comes the time to start making your friends fool. List of Anonymous Mailing websites: Deadfake.com : You can use this site to send fake anonymous email to your friend’s by using anyone’s identity. Anonymailer.net :You can also use this website to send fake email’s to your mates. Sendemailanonymously.org : This too is a great fake mailing site by hiding your real identity to prank anyone. NOTICE : You must use this service for good purposes.Reminding...

What are IP Addresses??

An IP address (Internet Protocol address) is a unique address that certain electronic devices currently use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address. Any participating network device—including routers, switches, computers, infrastructure servers (e.g., NTP, DNS, DHCP, SNMP, etc.), printers, Internet fax machines, and some telephones—can have...