Step 1.
If you are using the old Blogger interface:
Go to Dashboard - Design - Edit HTML - Expand Widget Template (make a backup)
If you are using the new Blogger interface:
Go to Dashboard - Template - Edit HTML - Proceed - Expand Widget Template (make a backup)
Step 2. Find (CTRL + F) this code in your template:
</body>
Step 3....
How to make key generators?
Mar 27, 2011 | comments

Hi there, in this tutorial, I intend to teach you how to make a pretty simple keygen, of a program called W3Filer 32 V1.1.3.W3Filer is a pretty good web downloader...I guess some of you might know the program.I`ll assume you know:A.How to use debugger (in this case, SoftIce).B.How to crack, generally (finding protection routines,patching them,etc...).C.How...
Phishing Attack Prevention
Mar 21, 2011 | comments

Indiatriks is aware of public reports of an ongoing phishing attack. At this time, this attack appears to be targeting PayPal, Bank of America, Lloyds, and TSB users. The attack arrives via an unsolicited email message containing an HTML attachment.This attack is unlike common phishing attacks because it locally stores the malicious webpage rather...
Fake Donation Website blocked
Mar 16, 2011 | comments

Earlier we found a phishing site that poses as a donation site to raise money for the victims of the recent earthquake in Japan. The phishing site http://www.japan{BLOCKED}.com is created by using an open-source social networking system Jcow 4.2.1. It is hosted on the IP address 50.61.{BLOCKED}.{BLOCKED}, which is located in the United States....
Microsoft Announces Global Availability of I. Explorer 9
Mar 14, 2011 | comments

Microsoft Corp. announced the launch of the latest version of the world's most-used browser with the release of Windows Internet Explorer 9 in 39 languages at an event at the SXSW Interactive conference. Internet Explorer 9 is Microsoft's most-downloaded browser beta of all time, with more than 40 million downloads, and it has already has gained more...
Ongoing attacks target new Adobe Flash Player zero-day flaw
Mar 14, 2011 | comments

Adobe Systems Inc. is warning of ongoing attacks targeting a critical zero-day vulnerability in Adobe Flash Player that could enable attackers to gain complete control of an affected computer.The software maker issued an advisory, Monday, warning that several security vendors have detected Microsoft Excel files containing an embedded malicious Flash...
Waledac botnet cracks 500k email acounts
Mar 13, 2011 | comments

Security researchers have discovered that a botnetknown as Waledac has successfully cracked nearly500,000 email accounts, and is likely to start usingthem to vastly increase its spam activity. This makes thespam more likely to evade modern filtering techniques,such as IP blacklisting, as the messages will appear tooriginate from legitimate users.Researchers...
Malware hijacking Facebook user accounts
Mar 13, 2011 | comments

Facebook is under attack again from the cyber criminalcommunity. Lolbot.Q malware is using Facebook tohijack user’s accounts and we’ve just seen Asprox.N(we do love the names the security vendors give newmalware), is a nasty trojan that comes attached toan email as a downloadable file which is targetingFacebook users.The trojan sends a message that...
Google to use One-Time-Passwords for Gmail
Mar 13, 2011 | comments

Google has demonstrated over time to be very seriousabout Gmail accounts safety, rolling out more and moreeffective features mitigating the number of stolen emailaccounts.One time password are nowadays spread amongInternet banking websites where the so called OTPtoken generates a new password every 30 secondsand adds more security to the username and...
Free Ebook
Mar 2, 2011 | comments (3)
This is absolutely free for all of you !!!!!!!!
Note:-
How to get this ?
1. First comment here with your name n mail id.2. Join us and Follow us on facebook , g+ and Twitter and tell ur friends about this site or share on your wall . To validate plz write your ID in comment fild. 3. I will send your book absolutely for free.
Note:- 1. Only...
HACKING TOOLKIT 2011 RELEASED
Mar 2, 2011 | comments (19)
THE BLACK HAT HACKING TOOLKIT-2011 RELEASED (100 in 1)
CONTAINS :-
1.HOTMAIL HACKING 2.YAHOO HACKING 3.MSN FUN TOOLS 4.FAKE SCREENS/PAGES 5.XP Killer 6.Sniff Password 7.Port Scanner 8.Fast Resolver 9.Domain Scan 10.Whois Domain 11.NetRes View 12.PHPbb Defacer 13.Angry IP Scanner 14.FTP Brute ForcerPage 5: 15.Hook Tool Box 16.Smart HAck UpLoader...
QUAD SIM CELLPHONE
Mar 2, 2011 | comments

This is Flying F160 is the world’s first Quad SIM card, quad standby mobile phone. Quite why you’d need four SIM cards in your phone is another matter, although I suppose for permanent travellers this could save a bunch of time swapping out cards when you cross a border.The rest of the spec is pretty so-so, with a 2 inch touchscreen, TV & FM radio,...
BlackBerry Playbook
Mar 2, 2011 | comments

BlackBerry maker RIM has seemed a bit lost for the last couple of years, unsure whether to persevere with the style that always served it well or embrace touchscreens wholly. That quandary continues on its phones, but there’s no doubting the focus of the PlayBook tablet. A brand new operating system, an extremely powerful dual-core processor, all...
GADGETS 2012
Mar 2, 2011 | comments
This is a smart pen coming in 2012 may be is capable of writing on any surface and then storing what was just written in to its memory so you can download it lat...
GADGETS IN 2012
Mar 2, 2011 | comments

HP recently did and came up with a number of drawings and ideas as to what we might be using in 2012. The first is this HP laptop which can be seen above. It has virtual keys, is razor thin and is featherweight. Hopefully virtual keyboards will be easier to use in 5 years time as currently they su...
How to Trace Hackers
Mar 2, 2011 | comments

If you spend a lot of time connected to the Internet, it is only a matter of time before a hacker attempts to gain access to your computer. Proper security and firewalls are usually all that is needed to prevent them from gaining entry, but computer owners who are less focused on system security may have a hacker slipping through their open ports....
5 WAYS TO EXPLODE BLOG TRAFFIC
Mar 2, 2011 | comments

1. Write. Write stuff. Write stuff people like to read.Most often blogs end up being abused by people who think the world is waiting to know what happens to them every second (I don't deny them this right...they have it!), however the same thing can be presented in a way that forces the reader to continue reading. Simple check! read as though you didn't...
How to make free website for newbies
Mar 2, 2011 | comments

IN THIS WAY U CAN MAKE AWEBSITE LIKE-YOU.co.ccNOTE-WHEN YOU GO LINKS TOWEBSITES GIVEN HERE ALLSIGNUPS ARE FREEi am going to share that howmake ur own a website.1}-Gotohttp://www.co.cc2}-register an account there.andthen activate it from mail ureceived from support@co.cc3}-then search for a domain like-Hackerlovand register that domain.{in co.ccwebsite}4}-now...
New cookies stealing from mozilla firefox
Mar 2, 2011 | comments

New cookies stealing from mozilla firefox to hack gmail or orkutHacking orkut or Gmail.With the Help of Cookies or by stealing cookies of the victimBy going through this post i hope you will understand how easy has hacking become with the help of cookies.By this post you'll be learning cookie stealing and Hacking orkut Or Gmail account.Procedure to...
easy way to hack a website for NEWBIES
Mar 2, 2011 | comments

If you have the html and javascript knowledge then you can access password protected websites. So you want to know how??
keep reading.....
* Open the website you want to hack. Provide wrong username-password in its log in form.(e.g : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be preparedYour...
How To Defeat The Attempts Of A Black Hat Hacker
Mar 2, 2011 | comments

In order to survive in the World Wide Web, there are certain things that we need to know in order to endure. The first one is that each computer user is responsible for his machine and the data that it contains. It doesn't matter if a transnational spends hundreds of millions of dollars in IT security if an absent-minded employee downloads and installs...
Stealing passwords in LANs
Mar 2, 2011 | comments

Stealing passwords in LANs. Dis article is all abt daStealing passwords from LAN.Requirement:: CAIN(from http://www.oxid.it/), a computer with ethernet card, and a LAN(obviously!)Working Principle:: * Install CAIN. * Now after installation start it. * go to the configure option in menu bar and in 'SNIFFER' tab choose 'start sniffer on startup'...