Welcome

welcome to all visitors to the blog All Tutorials 4 You .. This blog is new again .. Our party would like to apologize for any kesulitaqn and defects in this blog, it is still in the renewal of the tap .. Please note

How to make phishing page

Step 1- Firstly u must signup for a free web hosting service like:ill advice u to use t35 or 110mb. www.t35.com   www.110mb.com   www.ripway.com etc..... and register a domain or subdomain.After getting your signup done, you have your own subdomain like for instance you register with 110mb then your domain is like www.yourname.110mb.com. Step 2- Now Login to your 110mb account and go to "File Manager" in the 110mb control panel. Step 3- Now what you have to do is, go to your domain folder like "yourname.110mb.com" and create a seperate folder in that directory with the name of the site, for eg. yahoo , if you want to phish a yahoomail...

Blackberry Battery Power Saving Tips

  ChargingCharge BlackBerry® smartphone as much as possible Use wall chargers as the preferred charging method MediaReduce volume Use headphones Load media using the BlackBerry® Desktop Manager (Avoids resizing) Turn off equalizer settings (Media – Options) BrowsingVisit mobile sites where applicable Turn Repeat Animations to a lower setting (Browser – Options – General Properties) Close browser when finished using (close with ESC key, not red End key) Screen/KeyboardReduce Backlight Timeout (Options – Screen/Keyboard) Reduce Backlight Brightness (Options – Screen/Keyboard) Holster smartphone (turns off LCD automatically) Set Audible Roll...

Step by Step Guide on Connecting to a Wi-Fi Network Using Windows

Wireless Internet (Wi-Fi) zones are convenient, easy to access, and available to any device with a wireless adapter. Finding open wireless Internet is usually no problem in populated areas. In fact, airports, libraries, and cafés often advertise free Wi-Fi hotspots. When you find an open Wi-Fi zone, you'll need to take a few simple steps in Windows 7 or Windows Vista to connect safely. Note that public Wi-Fi networks are typically unsecured, meaning that a determined attacker can follow everything you do while siphoning off your private information. While we recommend avoiding unsecured networks whenever possible, sometimes you just need to...

Wep0ff – Wireless WEP Key Cracker Tool

Wep0ff is new tool to crack WEP-key without access to AP by mount fake access point attack against WEP-based wireless clients. It uses combination of fragmentation and evil twin attacks to generate traffic which can be used for KoreK-style WEP-key recovery. This tool can be used to mount fake access point attack against WEP-based wireless clients. This code tested patched madwifi-old drivers with athraw support, but also works with madwifi-ng. With madwifi-ng you need to create two virtual interfaces: one in master mode (for fake AP) and second in monitor mode (to listen on). How to Use: 1. Setup fake AP with KARMA tools or iwconfig iwpriv...

Hacking Password Protected Zip Files.

You thought you were smart. You would put a password on your zip file, Genius! But now you have either lost the password or forgotten it. The files are gone forever..right? Nope, let me explain how to get the password and the files back. It's easy. Difficulty: ModerateThings you'll need: Brute Force Attack ProgramYou will need a brute force attack program that will try millions of passwords on the zip file until it gets the correct one. It can take minutes to months depending on how hard you made the password. You just have to think how important the files are to you. I have personally forgotten my passwords before and used a brute force...

Thursday, April 21, 2011 How to enable Task Manager, Regedit, System Restore, MsConfig, Control Panel, Cmd, Run After a virus attack

That’s where tools like Re-Enable aid the user. The software programoffers to activate Windows features like Regedit, Windows Task Manager, System Restore, MsConfig or the Control Panel after a virus attack. It displays all features in the main interface upon startup. Some or all of the apps and functions can be selected for fixing. A click on the Re-enable button after the selection will start the recovery process. The program offers a Tool menu on top that comes with additional troubleshooting utilities. Here it is possible to restore Safe Mode, edit Hosts files, reset files and folder attributes, unhide drives, repair the desktop, repair...

How To Use Trial Software's For Ever

One of  my blog readers asked me "How can i use trial version software's forever" .Instead of answering him i taught i can write a tutorial on How to use trial version software's for Ever Concept :- When you  install a software for the first time it makes an entry into the Windows Registry with details such as Installed Date and Time, installed path etc.After installation every time you run the software it compares the current system date and time with the installed date and time.So with this it can make out whether the trial period is expired or not. So if we make software think that the trial period is not over we...

Guidelines For Creating Strong Passwords

Its been a while since i wrote a Security article , Today i will be sharing some Guidelines For Creating  Strong Passwords .This article was originally written by lockdown.co.uk .and its been modified by me. Choosing the right password is something that many people find difficult, there are so many things that require passwords these days And remembering them all can be a real problem.Because of this a lot of people choose their passwords very badly. The simple tips given below are intended to assist you in choosing a good password Guidelines For Creating Strong Passwords The following are some Guidelines for creating...

Hacker High school -e Book Download

The Hacker High school project is the development of license-free, security and privacy awareness teaching materials and back-end support for teachers of elementary, junior high, and high school students. Today's teens are in a world with major communication and productivity channels open to them and they don't have the knowledge to defend themselves against the fraud, identity theft, privacy leaks and other attacks made against them just for using the Internet. This is the reason for Hacker High school. Herzog runs Hacker High school, a program to teach kids and teens security awareness and critical, Internet research skills....

How to Make a Phisher/Fake Page For Any Website

I received many Emails from my blogger readers requesting me to make Fake /Phisher page for various websites like orkut ,twitter , GMail , Face book ...etc .I have already written some tutorials  on how to hack Face book , GMail using a fake/phishing page . But many had doubts , problems . To clear all there doubts  i taught i can write a tutorial on how to make your own fake/phisher page for any website that you want  Follow the steps given below to create your own phishing page How to Make a Phisher/Fake Page For Any Website  1. First open...

How to make Free Phone calls from your PC

Many of my blog readers where asking is there any way to make free phone calls from PC so i decided to share a few cool things like "How to make Free Phone calls from your PC to any Mobile or Landline phone " in the World". Its absolutely free i.e 100% free. So guys read on.... How to make Free Phone calls from your PC First of all download FriendCaller from here. After it is fully installed, open friend caller from desktop. Then register. I recommend you to use temporary email for the registration, like yopmail.com Then go to your email and confirm your account and you will be credited $ 0.10 for free calls. So you can only call for 10...

Best Port scanning Tools

What is port scanning? It is similar to a thief going through your neighborhood and checking every door and window on each house to see which ones are open and which ones are locked. similarly computers have ports form 1 to 3000 ports  for communication  EG:-  21: FTP 22: SSH 23: Telnet 53: Domain Name System 80: World Wide Web HTTP 119: Network News Transfer Protocol 443: HTTP over Transport Layer Security/Secure Sockets Layer 445: microsoft-ds, Server Message Block over TCP If these ports are not secure a hacker can communicate with these ports and cause havoc The list given below are some of the best port scanners You...

Wireshark Tutorial | Stealing Password And Cookie

As told earlier sniffers are widely used for stealing passwords and cookies so as a last part to wireshark tutorial I 'll roughly cover how you can do this. For this demonstration you'll need Mozilla Firefox web browser and Add-N-Edit Cookie add-on. After installing Firefox you can download add-on from following links. Once installed restart your browser, you can access this add-on from tools menu. Add-N-Edit Cookie Add-N-Edit Cookie Now first of all I 'll clear how you can steal passwords. Suppose you want to steal password of victim who has account on some http://www.abcxyz.com website then first of all open website on your own browser and...

How to Change Skin Tone in Photoshop

PREVIEW Step 1Duplicate layer Set Blending mode to Soft Light at 100% Step 2Go to Image > Adjustment > Selective Color... Pick Black from the drop down, and then add 20% to Black from the spectrum Step 3Select skin areas using Magic Wand Tool(Q) Feather Selection (Alt+Ctrl+D) 5px then Layer Via Copy (Ctrl+J) name it "skin" Step 4Add an Curves adjustment layer (Curves) (Layer > New Adjustment Layer > Curves) Add a Level layer... Note: You can duplicate the layer if it isn't strong enough. Then finally change the Hue/Saturation layer ... Step 5[image] Add colour to the lips Pick the Lasso Tool then draw the selection around her...

Make up a girl

Open your girl stock I choose this, it dark and so much  green First, hit Ctrl + M or go to Image >> Adjustment >> Curve Set Black and White point as i did, move the curve little up it look brighter Ctrl + U to open Hue/Saturation windows, set like this yes, it okei, now  .. is the make-up step Duplicate this layer, Gaussian Blur (Filter >> Blur >> Gaussian Blur ) it with 10 px Change blending mode = Screen, 40 % opacity make new layer, set Blending mode = Overlay, use soft brush with black and white color to draw our result ! Use Magic Wand tool, hold Shift, and select all girl's skin areas Feather...

Page 1 of 14123Next

Followers