Hey after long time today I am going to share one awesome article and yes you may have learned the sql injection from HFS and now today we...
We have lunched our new blog !!
Surprise!!!! we have lunched our new blog, hello everyone today i am very happy to share one news that we have lunched our new blog named P...
How to Hack Someone's Cell Phone to Steal Their Pictures
Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phon...
How to Hack a Cisco Phone
Columbia computer scientist Ang Cui helped uncover a weakness in Cisco IP phones that can let a hacker take complete control of them. Read m...
How to hack games from the Windows 8 store
Hi folks, In this article I’ll share the results of ad-hoc security vulnerabilities research I’ve done on windows 8 apps deployment. Specifi...
Remove Windows XP Genuine Validation
My many friend have asked me how can we remove windows xp genuine validation. So I think many other may have the same problem and for that...
Block your website from scanners
Hackers uses the scanners to scan the website and to find the security vulnerability. And today I am going to share one trick to block all...
Collection of Top 10 Deface page
What is deface page ? After getting admin access in the website hacker will upload his own control penal that’s called the shell and wi...
Improve Backtrack5
Backtrack is specially designed for the security researcher and hackers. Its most awesome operating system with lots of the tools but in thi...